Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 11 submissions in the queue.
posted by n1 on Thursday May 05 2016, @06:36PM   Printer-friendly
from the not-yet dept.

APNIC reminds us that "there are now a large number of ISPs, data centres, cloud services, and software that now support IPv6" and "enabling IPv6 can be as simple as clicking a button on your WiFi router."

I turned it on, with Comcast I received an IPv6 route but no DNS server. Fortunately, Google Public DNS has unmemorable addresses, which I was able to configure manually.

2001:4860:4860::8888
2001:4860:4860::8844

It works. "There's only one thing left for you to do: Turn it on!"

[ ed: What are the alternatives to Google's Public DNS? ]


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by jmorris on Thursday May 05 2016, @10:31PM

    by jmorris (4844) on Thursday May 05 2016, @10:31PM (#342281)

    There are worse things. I'm on Suddenlink and their DNS resolves pretty much everything to a Suddenlink IP and attempts https hijack. They want you to install their wildcard cert to make it possible. So I'm using the Google DNS servers until they get around to shutting that down, then it will be time to pay extra for VPN service.

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 0) by Anonymous Coward on Friday May 06 2016, @12:48PM

    by Anonymous Coward on Friday May 06 2016, @12:48PM (#342527)

    I used to run an open DNS server for people in circumstances such as yours. Then one day I noticed that the entire 100Mb/s was in use. Turns out some criminals were using DNS reflection attacks against someone else using my server, so that had to stop. As it turned out, a low-power Celeron can't handle processing iptables flood rules with the volume of traffic the crooks were sending, so bye bye public DNS server.

    It was much the same story with NTP.

  • (Score: 0) by Anonymous Coward on Friday May 06 2016, @06:37PM

    by Anonymous Coward on Friday May 06 2016, @06:37PM (#342654)

    yeah, or you could use dnsmasq and dnscrypt-proxy and use the default nameserver or pick another.