Doesn't really matter if you're not using the whole thing. Instead of thinking of it as a /12, think of it as 16 /16s, and you just use as many or as few as you want. It's my go-to range because it's roomy enough for anything and uncommon enough not to collide with some system's defaults.
I particularly stay away from 192.168.0/1.x because every time you plug a brand-new consumer-grade device into your network that's what it grabs before you have a chance to change it.
But honestly that is pretty much it, if we add 192.168.100.0/24 which cable-modems use for their admin/diagnostic access. So we have /16 - 3 which seems pretty okay since we effectively only will collide with other OpenWrts
+1; I nowadays always try to attach to these in isolation first instead of adding them directly to the network (in spite of using 192.168.42.0/24)
Right, but if I'm already on that network on my laptop's wifi, and I plug a new router into an ethernet port on that laptop in order to configure it, I've got the same problem -- I've got to deal with the collision when I set up the ethernet port to talk to the new device. That or turn off the wifi which means I can't look stuff up or download firmware or whatever.
cerowrt was actually 172 and 42 based being as that seemed the cleanest place to put it. 42 is definately a lucky number for us. Also, I STRONGLY support mdns functionality by default, and would like very much the unicast extension for it be adopted.
Yes, stopped doing that, that's what I mean with "in isolation", WiFi off, just ethernet.
Yepp, that said most none routers nowadays are defaulting to DHCP which mostly does the right thing. TOS the turris derivative/add-on to OpenWrt helpfully logs and informs me when new MAC addresses show up, so I know what
See forgot all about the first octet... only 42 stuck with me, because it obviously is the correct answer.
172.42 is not in the private space though. it's 172.16 to 172.31
I guess you could do 172.16.42.0/24 but I still dislike the idea of using a single number as default, randomly distributing them is a way better solution.
What devices on your LAN actually really and truly REQUIRE an ipv4? (for example Tp-link cheapest switches do not offer ipv6 administration, PS4 network requires ipv4...)
Try to make a list off the top of your head, I'm interested in why we couldn't just drop ipv4 entirely.
ipv4 only:
my digiloggers power strip. Several esp32 devices. My mp3 player. My sony stereo.
I do think attempting an ipv6 only build and environment a good idea as to test transition technologies and especially if you also have a BDSM fetish, it's a real win.
In my opinion, what's needed to make OpenWrt more approachable for the average user is an initial configuration wizard. Zero-config would be even better, but such a wizard would at least put OpenWrt on par with commercial solutions. Steps would include:
Secure router admin login
Configure WAN, including SQM with automated speedtesting
Configure wifi (both bands, generate secure password or let the user pick, WPS off, and guest network.).
Don't show any unnecessary options for any of these. Option to go advanced and/or bypass the wizard.
An optional easy to use on/off switch style setup for a few key packages users might want to use (with their own wizards as needed). Might include wireguard, adblocker, samba, some sort of graphical statistics, etc.
Bonus points for mobile apps that can do any or all of this
Throw in automated or semi-automated updates and you're really competed with the ease of use of many commercial products.
I had a fairly dispiriting discussion with Ted Lemon, who said that the biggest problems with hncpd were:
It was definitely harder to configure than stock OpenWrt. I attempted to write a HOWTO on the dearly departed homewrt.net, but never could make it work.
That meant that no commercial vendor was going to implement it, especially because...
"No one" wants their interfaces to be separately subnetted
I actually think ipv4 these days is the real sadomasochists dream. It's so broken, who doesn't love NAT on the router behind NAT on the customer premises ISP device behind CG-NAT at the central office and a ban on your IP because the CG-NAT public IP has been doing "Naughty things" to Amazon or Startpage or craigslist or your favorite gaming server (because even "normal" things when 10,000 people are aggregated behind a single IP looks like a DDoS). Not to mention port forwarding for games, or installing UPnP daemons to automatically punch holes in your firewall and let the bad guys bots in. Not to mention that the address space is so dense that you get about 1000 probes an hour to various ports? Also the magic of STUN and SIP/SDP and collisions between your LAN and the corporate LAN you're VPNing into, and on and on and on.
Let's face it, if you have an Ipv6 only LAN and are talking to IPv6 services what happens is there is no NAT anywhere, as soon as you plug a device in it knows where the router is, who the DNS is, and makes itself an IP address which is guaranteed not to conflict with anything else on the network. Interactive streams flow end-to-end effortlessly, and typically your device automatically churns through privacy addresses making it at least marginally more complex to track individual devices. When you have to talk to ipv4 endpoints is the pain point, but as with T-Mobile it actually can work extremely well to let the ISP invest in some beefy devices to handle NAT64.
The biggest problem is the stuff like the sony stereo or the "smart" TV or the TP-Link 8 port switches or whatever that still aren't operating in the 21st century. Heck even my Amcrest cameras have IPv6 support.
Nevermind previous post (deleted), I figured it out.
As for giving the new or average user a better experience: Make a list of the good and the bad of other OEM/vendor GUI and features. Maybe we can try and combine those into "one perfect GUI". For the experienced/power user, they can always SSH into the router and use the CLI.
That last option is actually what I really missed in the Mikrotik RouterOS implementation.
But to get a better GUI, what I personally am missing is good documentation about how to add/code add-ons. As example: I would like to add a luci-protoco for XFRM devices. But I need to spend too much time looking at the code for let's say a GRE implementation to figure out how to do that...which means: I actually don't do it and use the CLI myself.
It does seem like it's largely "things". It's annoying too because things are precisely the stuff that really needs to start using IPv6. My grandstream SIP ATA handles IPv6 nicely. All my smart bulbs etc are ZigBee.
To put some counter to this, most of the stuff has acceptable solutions by now. And one thing IPv4 has going for it is that it is much easier to reason about it. For example google's insistence to not implement dhcpv6 is causing issues, with dhcpv6 upgrades would be much easier and sites that want central management/IP assignment could still do so.
Then we have the issues around "privacy addresses" (both helpful and not so helpful) that partly interfere with port rules in the firewall. (And it can be argued whether the default for IPv6 should be block or accept/forward all remotely initiated connections).
Interestingly, as if things would not be confusing enough the main OSes deal quite differently with privacy extensions...
I do not disagree that Ipv6 is required for the future, but for may/most home networks IPv4 is plenty sufficient, with NAT being admittedly the one big issue.
But that is also a boon, as it makes tracking by IP address harder. That is where IPv6 privacy extensions seem to shine, with their short life times, except the hypothetical tracker can simply ignore the interface identifier part of the address and use the fact that the prefix typically is at least as stable as IPv4 address assignments were (even CG-NAT tries to keep users on the same public IP address). If your ISP recycles prefixes like IPv4 addresses before IPv6 is not offering that much over public dynamic IPv4s, no?
If you want the firewall to block based on port numbers you have the same issue with IPv6, no? The firewall will need to be configured to allow remote connections in for games to work (admittedly without the need for port-remapping that is a bit easier).
Unless you decided to distribute that information via DHCPv6, IIRC android devices will ignore that...
Which is a thread model that did not exist with IPv4 as effectively the external IP address was more of a "prefix" than "interface ID" , but for home networks with few devices that still allows quite successful tracking (the privacy extensions only really fix the optimistic/naive initial SLAAC approach of encoding the network MAC address into the interface ID).
IMHO IPv6 suffers a bit from second system syndrome... be that as it may it is unavoidable and its warts are being addressed (stable privacy addresses).