My hosting provider assigns a block of IPv6 addresses for each plan, so I thought I would enable them on my plans. Overall, the process is fairly simple, but it took some studying on my part to understand what had to be done and the “right way” of doing things. This is a quick summary of what I did.
I use systemd.network to configure each server’s network.
To enable a dual-stack IPv4/IPv6 configuration, I set up /etc/systemd/network/10-wired.network
as follows:
[Match]
Name=<Interface Name>
[Network]
DHCP=No
DNS=8.8.8.8
Address=YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY/YYY
Gateway=GGG.GGG.GGG.1
Gateway=HHHH:HHHH:HHHH:HHHH:HHHH:HHHH:HHHH:1
[Address]
Label=static-ipv4
Address=XXX.XXX.XXX.XXX/32
Peer=GGG.GGG.GGG.1/32
I followed this pattern from a guide I found. I think that it should be possible to do away with the Peer
configuration and adjust the address mask to approach things more traditionally, as this was highlighted as a way to deal with being assigned an address entirely independent of the gateway.
I decided to use opportunity to move to nftables, and patterned my implementation on this example ruleset. nftables’ clear syntax and useful constructs like sets and dictionaries made configuration a painless process. I switched my boxes at home to use nftables as well home to use nftables as well.
As a consequence of moving to nftables (not related to enabling IPv6 support), I modified my Fail2ban configuration to ban via nftables as well.
This was simply a matter of adding banaction = nftables
into the [DEFAULT]
section of /etc/fail2ban/jail.local
.
Most services will natively listen on IPv6 addresses out of the box. Postfix and nginx required a few minor changes.
I made a few updates to /etc/postfix/main.cf
by following the IPv6 support instructions on Postfix’s site.
I read a few thoughts on the best way to listen on both IPv4 and IPv6 stacks, this one being the most informative.
I ultimately ended up replacing all of my existing listen
directives with:
listen 80;
listen [::]:80;
listen 443 ssl;
listen [::]:443 ssl;
Finally, I added the server’s IP address as a new AAAA
record and updated the SPF record to include the ip6
field:
v=spf1 ip4:XXX.XXX.XXX.XXX ip6:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY -all
This tool was a helpful way to quickly check that things were functional, as I’ve not enabled IPv6 on my home network yet. Unfortunately my host’s nameservers do not have IPv6 addresses, so the results are not fully compliant.
I also verified that all expected services were listening on both IPv4 and IPv6 addresses via netstat -l
.