You are all excellent. Every one of you should be proud of yourselves.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: klinebau on February 24, 2026, 08:36:56 PMRA-NAMES uses the MAC address to register the IPv6 address, so you have to have an IPv4 address along with MAC in order for it to match using the EUI-64 address.
Quote from: meyergru on February 25, 2026, 12:45:25 AMIf your prefix is static, you can create overrides in Unbound for any client, using its EUI-64. So you get <prefix(56 bits)>+<interface prefix (8 bits)>+<client-EUI-64> as IPv6 for usual clients.
Note that some clients (e.g. Windows) choose to use arbitrary suffixess instead of a MAC-derived EUI-64 for privacy reasons. I am not talking privacy extensions here with changing suffixes, but hiding the MAC, which could normally be derived from the suffix.
Quote from: klinebau on February 24, 2026, 08:18:58 PMI am using dnsmasq with SLAAC and RA-NAMES. This allows dnsmasq to register IPv6 addresses for clients that use EUI-64 address. I find this to be very convenient. It doesn't help with privacy addresses, but I generally don't need to reference those clients by name anyway.
Quote from: IsaacFL on November 10, 2025, 06:51:50 PMI'm not sure whether this qualifies as a tip or a question, since I couldn't find a way to do this through the web interface.
While debugging an issue with the new firewall logs, I noticed that reverse lookups of my local IPv6 addresses were taking between 800 and 1500 ms each. The reason is that, because my clients use privacy extensions, each lookup (almost never cached) causes Unbound to query my ISP — which owns the address space and hosts the corresponding PTR records.
To address this, I created a file named 1-custom.conf in /usr/local/etc/unbound.opnsense.d with the following content:server:
# Authoritative reverse zone for my /56
local-zone: "d.c.b.a.8.b.d.0.1.0.0.2.ip6.arpa." static
This tells Unbound that this prefix is part of my local network, preventing it from trying to resolve those reverse lookups externally.
I couldn't find a way to configure this via the web interface, but it seems like a useful feature to have. My ISP assigns a /56, and it has been stable; however, if your ISP frequently changes your prefix, you could apply the same approach to their /48 or even /32 aggregate. In most cases, you won't get meaningful reverse lookups from your ISP for those addresses anyway.
Quote from: Patrick M. Hausen on November 06, 2025, 10:33:02 PMThanks. So I am the one a bit out of touch and old fashioned. It's been a while since I did systems integration for really large enterprises. More than 10 years. Back then all of them were heavily invested into AD.
Kind regards,
Patrick
Quote from: Patrick M. Hausen on November 06, 2025, 10:01:07 PMHow large and probably more relevant how OLD is that company?
Quote from: Patrick M. Hausen on November 06, 2025, 09:22:47 PMIn an enterprise setup you will in most cases have a Windows domain and Active Directory so all clients running Windows can do authenticated and trustworthy dynamic DNS updates.
You can still run OPNsense as your frontmost recursive DNS, just create forwarding entries for the internal zones pointing to your domain controllers.
Quote from: Maurice on November 06, 2025, 06:13:37 PMThat's not possible, by design. When enabling SLAAC, most clients use privacy extensions, meaning they randomise their interface identifier (lower 64 bits of the IPv6 address) for outbound connections.
If you really need to identify individual clients, you have to disable SLAAC and use stateful DHCPv6 (which is not supported by all clients).
You could look into identifying clients by their MAC address, but many randomise that, too.
If you need certain rules for certain groups of clients, it makes more sense to assign them to separate (V)LANs.