this post was submitted on 26 Dec 2025
191 points (99.5% liked)
Linux
10789 readers
1010 users here now
A community for everything relating to the GNU/Linux operating system (except the memes!)
Also, check out:
Original icon base courtesy of lewing@isc.tamu.edu and The GIMP
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Why ipv6 only though? Is there something about it that makes it more resilient to DDOS? If a device on the botnet has both ipv4 and ipv6 I don't see how it's mitigated
I just figured the chances of the devices in a botnet being ipv6 is like 5% or less
The botnet's code probably doesn't support IPv6.
While archlinux.org doesn't do this, you can have multiple A and AAAA records which can provide DNS based load balancing, and IPv6 is easier to do that with since you usually get allocated a whole prefix. Of course that only helps to distribute the load, if your internet connection is the bottleneck then it won't help.
It's common practice to "blackhole" targets of DDoS attacks as a defensive measure. Blackholing means that packets coming into the network for a specific IP get discarded which lowers the stress on the network and especially on the receiving server. The server will work as if there was no attack but will only be accessible on non blackholed IPs. This would of course require the IPv6 to not get attacked either.
I'm guessing that's what's happening here.
https://en.wikipedia.org/wiki/Black_hole_(networking)