6.1 KiB
+++ title = "Homelab - IPv4 Expose" date = 2026-04-04 description = "How I expose my IPv6 only Homelab for IPv4 clients" draft = true
[taxonomies] categories = ["Homelab"] tags = ["Homelab", "IPv4", "IPv6"]
[extra] toc = true +++
How I am currently exposing the services running in my homelab to IPv4 users despite not having a publicly routable IPv4 address/subnet.
Motivation
The problem I have is one that a lot of people in the self-hosting community will be familiar with. My ISP does not give me a public IPv4 address, to expose my self-hosted services to the broader internet.
Luckily my ISP provides me with a publicly routable /48 IPv6 subnet.
So I natively expose my services to the internet using IPv6 and then only have the problem of allowing native IPv4 only clients to use my IPv6 services as well.
Old Setup
Currently I rent a VPS from DigitalOcean, which then naively forwards any TCP connections to my IPv6 services. For this it periodically loads all services I have registered in Consul and looks for specific tags, which I use to mark services that should be exposed. For each such service, it then starts a TCP-listener on it's public IPv4 address and for all incoming requests connects to the IPv6 service being exposed, forwarding all data in both directions.
Idea 1 - SIIT-EAM
The Idea
SIIT-EAM (Stateless IP/ICMP Translation) allows one to have a "translator" in the network, which receives the incoming IPv4 packets and translates them into their corresponding IPv6 destinations. The translator needs to have one more public IPv4 and an IPv6 subnet with at least "free" 32 bits. One can then configure how the public IPv4 addresses should map to IPv6 addresses and the translator will act as a middle-man between IPv4 and IPv6.
For more details I would recommend going through the jool1 documentation.
The Plan
Services that need to be exposed get their own virtual IPv6 address using keepalived. The active/master node will be forced to the node on which the service is currently running using priorities.
On my external server setup Jool with SIIT-DC and iptable rules.
- Everything coming in at the given port for the service (for example HTTP, Teamspeak, etc.) is redirected to a different internal IPv4 address using iptables
- Jool listens on the internal IPv4 address and performs SIIT-DC or SIIT-EAM forwarding to the correct virtual IPv6 address
Setup
{% details(summary="Detailed instructions on how to setup everything") %}
- Get a server that supports Dual-Stack networking and in the best case a /64 ipv6 subnet (I choose Scaleway as a European cloud provider, with cheap servers) Scaleway IPv6 Docs Scaleway Check neighbor discovery
- apt-get update and apt-get upgrade
- Install Jool
- Based on the jool documentation
sudo apt install jool-dkms jool-tools- Enable IP forwarding
/sbin/sysctl -w net.ipv4.conf.all.forwarding=1/sbin/sysctl -w net.ipv6.conf.all.forwarding=1
- Install NDP Proxy Daemon ndppd
sudo apt-get install ndppd/sbin/sysctl -w net.ipv6.conf.all.proxy_ndp=1
- Configure Jool
/sbin/modprobe jool_siitjool_siit instance add "example" --netfilter --pool6 2001:0bc8:1640:6554:0:0:0:0/96jool_siit -i "example" eamt add 2001:4dd5:b276:1:f652:14ff:fe94:dc00/128 51.158.177.228/32- (Optional for debugging)
jool_siit -i "example" global update logging-debug true
- ndppd for neighbor discovery
- In
/etc/ndppd.confproxy ens2 { rule 2001:0bc8:1640:6554:0:0:0:0/96 { static } }
- In
{% end %}
Troubles
Jool missing pool6, because I first wanted to try with only the EAM entry
Lots of debugging with tcpdump on external and local server
Neighbor Solicitation not working
13:31:35.919212 IP6 _gateway > ff02::1:ff52:2f24: ICMP6, neighbor solicitation, who has 2001:bc8:1640:6554::4a52:2f24, length 32
fixed using ndppd.
Fixed forwarding for everything received on the v4 ip, no way to forward based on service
Idea 2 - NAT64 with static BIB
The Idea
The idea with this is to basically perform some static NAT64, to map ports on the ipv4 side to specific addresses and ports on the ipv6 side. This would allow me to have one entry for every port that I want to expose, regardless of the IPv6 or port of the service.
Compared to Idea 1
More fine grained stuff
Setup
{% details(summary="Detailed instructions on how to setup everything") %}
Future Work
- Automate the jool setup (ansible playbook or maybe even using cloud-init)
- Automate the configuration of the corresponding entries (likely a custom integration with consul)
References
-
We need to configure the pool4 used by jool using the given pool4 commands ↩︎