The world supply of IPv4 addresses is nearing depletion. We were trying different approaches during the last couple of European hacker events. This year we like to use a combination of ratools and a A10 Networks box. To get used to the future and gain some experience with how it may soon feel, ports 1-4 on each switch function as "NAT64/DNS64" ports. Your operating system will need to support native IPv6.

You can also configure this IPv6 addresses as nameservers:

  • 2001:67c:20a1:1164::53 (Yes, this an IPv6 address. Yes, the 53 is still part of the address. It is not the port number, although the port is also 53. Sorry, we thought it was funny!)
  • 2001:67c:20a1:1164::1:53
  • 2001:67c:20a1:1164::f00f

Technology

For a complete explanation of NAT64/DNS64 please consult the NAT64 Wikipedia page.


NAT64 over WiFi

Just connect to SSIDs 32C3 or 32C3-legacy using username nat64 and password nat64 and you will be dropped into the NAT64 network. Using this credentials does not affect your encryption!


Experiences

Please share your experiences in the wiki or via Twitter! What did you like? What did not work?