Computer Networking Anonymous 06/24/24 (Mon) 18:18:04 No. 331 [Reply]
I've been researching computer networking and there's still areas which feel a little muddy to me. My basic understanding of how a computer network works, is you have a computer (client), switch (optional), router. The client has an internal IP address which cannot be routed over the internet. So the client sends a packet to the router, destined for the internet, and the router uses NAT to translate the IP address to its external interface address, ie public address. Now you can access internet. This is simple enough, but my question is when proxy servers come in. I've often seen people say "just use a proxy bro" and I'm left wondering how that would help. From my understanding, proxies (in this case I'm talking about forward proxies) are placed in the internal network, on the LAN side. What happens when a client requests a webpage would be something like this: CLIENT (192.168.1.1) requests kissu page > kissu page request goes through router/switch and forwards it to proxy server (192.168.1.2), proxy server handles kissu page request for CLIENT > proxy (192.168.1.2) forwards request for kissu to the router (192.168.1.254), router translate 192.168.1.2 to public ip address using NAT > kissu back to the router (public ip) > to the proxy server (192.168.1.2) > finally is handed off to CLIENT. (192.168.1.1) Maybe I'm completely wrong in this, but if the whole point of using a proxy was hiding your connection on the internet, isn't it useless? Because at every point your connection leaves the router, it's still using your public address, which is tracable by law enforement. The only use I can see is that it would make it difficult to determine WHICH client on the LAN network was responsible for the kissu request. (Assuming you had a large number of devices on the LAN and a large number of people) So why do people say you should use a proxy over a VPN? Do correct me anywhere I am wrong, would love to learn more about the subject.
15 posts and 3 image replies omitted. Click reply to view. Anonymous 06/13/24 (Thu) 15:44:17 No. 347
>>346 >If they would release these for public use we'd have more than enough to go around. Most of them did. Only 5 companies are still on "class A" legacy assignment and 2 of them are ISPs, so that leaves 3. The US military reserves far more IP addresses than any of these.
https://en.wikipedia.o rg/wiki/List_of_assigned_/8_IPv4_address_blocks >>345 >they control all the servers and end points Only end points really matter because of encryption which is the part they have the least control of.
Anonymous 06/13/24 (Thu) 15:53:34 No. 348
>>347 >Only end points really matter because of encryption which is the part they have the least control of. I have some bad news for you...
>US military Private company. Just the blocks companies like Google and Microsoft are sitting on unused would keep things going for many years to come. IPv6 itself is a garbage standard for many reasons. Mainly because it isn't readable to a human like v4. They could have extended the address space by simply adding another decimal point and things would have been fine for the foreseeable future.
The default config for most IPv6 ISPs is hilariously bad. My ISP has been converting over lately and forced my LAN on to IPv6 one night with a fireware update. Within minutes I had bots from all over the internet attempting to log-in to every device on my network. My home media server was sending data over the internet and then back to my set-top device under a television in the same room. All behind my back.
After that experience I invested in a proper router and bought my own modem to. ISP wiped out my entire config behind my back for no reason because I got lazy and used their router instead of my own. Now my LAN is segregated from the rest of the world as much as humanly possible. ISP just straight up by-passed my firewall with one simple config file that they didn't disclose to customers. They had backdoor access to everyone's network even when it was supposed to be turned off and they promised to never do anything like that.
I'm worried they will take away my ability to use my own modem soon. Their latest modems do not allow you to log-in and they've already removed 2 of the former 5 approved devices from the list of modems you can run on their network. Just getting my modem approved took multiple calls to the ISP and no one was trained to deal with the request. If I change the MAC address of the modem I'll have to go through that all over again. Last Christmas they "forgot" I had my own device and sent a tech out unannounced to install their new modem. I wouldn't let him in the house. He claimed they shut off my service if I didn't but in the end I won that battle. But I fear I'll be losing the war.
Anonymous 06/13/24 (Thu) 16:06:51 No. 349
>>348 >I have some bad news for you... You're saying they have less control over routing devices directly in the hands of ISPs than the endpoints? Bullshit.
>They could have extended the address space by simply adding another decimal point and things would have been fine for the foreseeable future. This just shows you don't have a dime of knowledge about computer programming and system interoperability, and you have zero understanding on why IPv6 adoption is so slow. Your idea is no better than IPv6.
The rest of your post is the usual technobabbling typical of /g/ spinoffs. Comments like
>The move to IPv6 is mostly about being able to track each device on each LAN. Shows you have less than a shallow knowledge of networking. Public accessible LAN is not a unique property of IPv6, and I have personally use such IPv4 network before.
Anonymous 06/13/24 (Thu) 18:06:29 No. 350
>>344 >Tor is much less popular than VPN that it's possible to monitor all connections to the Tor network Ok? All Tor browsers are configured the same though so it's easier to blend inside a Tor user swarm. Remember that all Tor nodes IP adresses are public though.
>I remember there was a news article about a college student who was caught this way. Don't spread FUD please. The guy was convicted because he confessed, not because of Tor itself.
>You want at least VPN+Tor. You can do that if you want but it adds another layer of complexity
Anonymous 06/24/24 (Mon) 20:22:35 No. 352
>>349 >You're saying they have less control over routing devices directly in the hands of ISPs than the endpoints? Bullshit. I'm saying your encryption doesn't matter when you're using a CPU known to have multiple backdoors and a random number generator that isn't truly random.
>This just shows you don't have a dime of knowledge about computer programming and system interoperability, and you have zero understanding on why IPv6 adoption is so slow. Your idea is no better than IPv6. I'm pretty sure I've spent more time in a class room and the real world than you. But I didn't insult you like you chose to insult me. Which is pretty much your M.O. any time you disagree with someone.
Any system that is not both readable and easy to quickly transverse by a human is a flawed system. Which is exactly why we told everyone IPv6 was a bad idea over 25 years ago. It's also why we're 25 years past initial roll out and it's still not being used anywhere that matters. Maybe if you dealt with IPv6 -> IPv4 networking regularly you'd understand why it's stupid and not deployed widely. You'd also understand why having every device in a customers home _DIRECTLY CONNECTED AND PINGABLE FROM THE GLOBAL WAN_ is a _really_ bad idea. Hence why ISPs continue to rely on NAT. Since it's a cheap effective firewall that the customer doesn't turn off without going through multiple steps. Access that's being taken away from most customers now because 99% have no idea what they're doing. Which is making the lives of the 1% that know much worse in the process.
>Shows you have less than a shallow knowledge of networking. Public accessible LAN is not a unique property of IPv6, and I have personally use such IPv4 network before. Yeah you can expose a computer directly to the WAN on any IP network. The difference is in IPv6 it's the DEFAULT.
>>350 Again. If you expect privacy and security on a network controlled by the Government and some "private companies" known to hand over information without a warrant you're in for a bad time. You are no more protected on VPN/tor than you are directly connecting from someone. The only difference is now instead of your ISP knowing everything you do
Post too long. Click here to view the full text.