Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I'm a fan of github but lately i'm seeing a lot of issues like these... Also they don't have yet support for IPv6 (surprising).


The refusal to support IPv6 is embarrassing at this point


Had to buy an IPv4 address for a VPS the other day in order to clone some git repositories. Couldn't believe it. Costing their customers money when they should be able to support v6 by now.


What VPS are you using that doesn't come with both IPv4 and IPv6?


There are plenty of low end providers that support IPv6 only.

At that scale price of IPv4 is the highest cost of the VPS.

Here is a list of providers I created back in 2022.

https://blog.miyuru.lk/ipv6-hosting-2022/


Hetzner charges extra for IPv4 address, as I believe most of them do. I know because I went through the same crap.


It seems more like a weird Hetzner thing that they won't give you a IPv4 NAT gateway.


They charge €0.50 per month to add an IPv4 address. A shared IPv4 NAT gateway introduces a whole lot of problems for them just to support customers who need IPv4 but don't want to pay a tiny amount for it.


How would a server-side NAT know which Hetzner customer it should route a request to? It has an encrypted packet arriving at this shared address on port 443. You can route a shared address to the proper service based on the HTTP Host header but that can only be done by the customer using their encryption key, so no sharing an address between customers. Home LAN NAT only works because the router can change the source port used by the request so that responses are unambiguously routed to the right client.


I don't think they're saying they should support incoming connections on such a NAT, I think they're saying that servers behind the NAT would be able to make outgoing connections (e.g. to access shared resources).


Well, the answer is easy. It doesn't do any forwarding, so a random 443 packet gets dropped.

It would be the same as with home NAT. Your device can create TCP connections outbound but can't listen/accept.

It would solve the problem of not being able to communicate to another IPv4 server but it prevents you from hosting your own.


There are options where you pay 1€/IPv4/month and IPv6s are free.


AWS charges for ipv4 doesn't it?


In regards to an EC2, AFAIK, not necessarily. You pay extra for an elastic IP (IPv4) which is the equivalent to a static IP but the EC2 is assigned an IPv4 address and an IPv6 when IPv6 is enabled.


Beginning in early 2024, AWS began charging for every IPv4 address in-use on your resources.

https://aws.amazon.com/blogs/aws/new-aws-public-ipv4-address...


Aw, man. I forgot about that.


Azure has “support” for IPv6 that just “works”, so… they could just turn it on.

Oh, you’re wondering about the air quotes?

Don’t worry about it! Sales told my boss that that feature checkbox has a “tick”.


I thought a recent downtime was contributed to rolling out the initial prep for IPv6 support.


Given that they are probably at least partly on Azure, this makes it less surprising because Azure has the worst IPv6 implementation of the 3 large cloud providers.


Possibly stupid question but, how can someone mess that up?

What is wrong/missing?


I’ve gone on long rants about it before right here on HN but I can’t be bothered digging up the old post…

… the quick and dirty bullet points are:

- Enabling IPv6 in one virtual network could break managed PaaS services in other peered networks.

- Up until very recently none of the PaaS services could be configured with IPv6 firewall rules.

- Most core managed network components were IPv4 only. Firewalls, gateways, VPNs, etc… support is still spotty.

- They NAT IPv6 which is just gibbering eldrich madness.

- IPv6 addresses are handed out in tiny pools of 16 addresses at a time. No, not a /16 or anything like that.

Etc…

The IPv6 networking in Azure feels like it was implemented by offshore contractors that did as they were told and never stopped to think if any of it made sense.

References:

- Inbound IPv6 support for App Service was added this week. https://azure.microsoft.com/en-au/updates/?id=499998

- Outbound IPv6 support is "Preview": https://learn.microsoft.com/en-us/azure/app-service/overview...

- Public IP Prefixes support a maximum of 16 consecutive addresses even for IPv6: https://learn.microsoft.com/en-us/azure/virtual-network/ip-s...

- There's an entire page of IPv6 limitations. To understand how nuts this is, just swap IPv6<->IPv4 and see if it still reads like a professional service you'd pay money for! https://learn.microsoft.com/en-us/azure/virtual-network/ip-s...

- You STILL can't use PostgreSQL with IPv6: "Even if the subnet for the Postgres Flexible Server doesn't have any IPv6 addresses assigned, it cannot be deployed if there are IPv6 addresses in the VNet." -- that's just bonkers.

- Just... oh my god:

"Azure Virtual WAN currently supports IPv4 traffic only."

"Azure Route Server currently supports IPv4 traffic only."

"Azure Firewall doesn't currently support IPv6"

"You can't add IPv6 ranges to a virtual network that has existing resource in use."


> They NAT IPv6 which is just gibbering eldrich madness.

Yeah! I'm out.

What a complete lack of competence!




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: