vonskippy wrote:
Unless there's end-to-end IPv6 transport, with Native IPv6 name resolution, who cares?
Please enlighten me why I should setup IPv6 on a server that then has to tunnel everything thru IPv4.
What's the ROI (or I guess in this case ROT - return on time)?
1) SSL.
2) Having enough IPs to provide proper reverse DNS.
3) Highly flexible firewalls, routing tables.. your options expand quite a bit when you have IPv6, simply due to the addresses available to you.
4) No more service overloading with custom ports because you are IP-bound.
Most of this doesn't apply if all you are doing is web hosting (but point 1
definitely applies if that is the case). However, I run ldap, kerberos, ssh and http off of a single 360. I have 24 different services all told that I'm running, and if you include every different HTTP vhost in that, that number jumps to 60 (which then jumps to 70 if you include HTTP --> HTTPS redirects).
We've made our services work around IPv4 out of necessity, not because it was a great idea. IPv6 removes a lot of pressure from these situations.
I can run one SSL site off of one IPv4 address with most current software. Newer versions of apache (ie, ones that are not included in most server distros now) permit multiple SSL sites on one IP, and this is actually supported by every browser now.
But as mentioned, the server software doesn't really permit it currently. (Also, as I said... we're reworking protocols out of necessity due to lack of address space...)
So I can run one SSL site (for example, SSL'd webmail), and then point my 5-6 domains at it and call it "good enough." Or I can throw up another IP (out of my millions), provide it with an SSL cert specific to that hostname, and quit overloading services out of necessity due to address space limitations.
Don't get me wrong, $1/IP/month is a great price, but paying for 20-30-40 IPs isn't as good of an option as just running IPv6.
Kerberos in specific is picky about hostnames. I have one IP at home, and one IP on my server. This means that I can have one computer (my router) authenticate against kerberos. Or, I can roll IPv6, and have every computer correctly validate against kerberos -- thanks to having a 1:1 mapping of computers to (pubic accessible) IPs.