<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=UTF-8">
</head>
<body text="#000000" bgcolor="#FFFFFF">
<p>Hi folks;</p>
<p>I've long used Strongswan as an IPv4 based VPN for both my
Windows laptop and Android phone, with IPv4 on the gateway. Said
gateway has (for quite a while now) also received an IPv6 address
which I then distribute internally, since I can do that
reasonably-easily given the prefix I'm given by the upstream.</p>
<p>Recently my mobile provider (T-Mobile) has started supporting
dual-stack when <i>tethering. </i>This originally resulted in
the gateway, which was listening on IPv6 as well, connecting that
way but <i>not </i>on IPv4, with no resulting routing at all.</p>
<p>I removed the IPv6 address from the DNS entries for the gateway
and normal operation was restored; while StrongSwan is still
listening the client won't try to talk to it since the DNS name
only resolves to the IPv4 address.</p>
<p>But.... I'd really like to be able to have dual-stack and
tethering with IPv6 working. There are a couple of things I can
think of that could be trouble:</p>
<p>1. I don't know if the clients (Android's StrongSwan client and
the Win10 built-in VPN client) will negotiate BOTH IPv4 and IPv6
tunnels. If so, then all is well. But if either or both will not
then....</p>
<p>2. How reasonable is it to get IPv6 to come up and implement
6-to-4 in the gateway? Am I now screwing around in a form and
fashion that perhaps I shouldn't bother with?</p>
<p>I don't actually *need* IPv6 VPN capability today -- it's more of
a future-proofing thing at the moment. One of my primary "use
cases" for the VPN is to make the network shares and such on the
parent network safely usable and visible while on the road, and as
such right now those services do not advertise on IPv6 even though
the "inside" hosts in question DO get an IPv6 address distributed
via rtadvd.<br>
</p>
<p>Does anyone have practical experience with this situation? I've
not found anything particularly useful in the Wiki on configuring
this up.</p>
<p>If it matters the VPN host running StrongSwan on the server side
is FreeBSD 12-STABLE.<br>
</p>
<div class="moz-signature">-- <br>
Karl Denninger<br>
<a href="mailto:karl@denninger.net">karl@denninger.net</a><br>
<i>The Market Ticker</i><br>
<font size="-2"><i>[S/MIME encrypted email preferred]</i></font>
</div>
</body>
</html>