Installation Details
Version: Kicksecure 17.4.4.6
Install medium: Sandisk USB
Partition format: ext4 (auto-formatted)
I recall reading that the security‑misc profile disables the entire IPv6 stack. After installing, however, I verified that IPv6 is still active:
Upon post install I checked and cat /proc/sys/net/ipv6/conf/all/disable_ipv6 returned 0 (enabled) and ip -6 addr show returned a inet6 address.
I had to create a config file /etc/sysctl.d/99_disable-ipv6.conf with these lines to disable it:
net.ipv6.conf.all.disable_ipv6=1
net.ipv6.conf.default.disable_ipv6=1
Upon further looking at the github README:
Networking:
Optional - Disable the entire IPv6 stack to reduce attack surface.
But it doesn’t point to the exact configuration file that implements this.
I’m not using this installation as a server, and I’m skeptical of the “IPv6 evangelism” that circulates in many networking sysadmin circles, not Kicksecure. My concerns stem mainly from two points:
- IPv6 doesn’t provide the implicit NAT barrier that IPv4 does.
- Privacy implications of EUI‑64 that can expose hardware identifiers.
So here are two questions about IPv6 and Kicksecure.
1. Does Disabling IPv6 reduce Tor Anonymity set?
Does disabling the IPv6 network stack on my machine then in return prevent the Tor Daemons from using IPv6 relays? (Reduced relay pool to select from)
Will Tor only connect to IPv4 relays and ignore IPv6 relays?
2. Can we have IPv6 privacy extensions enabled without breaking root DHCP server?
Can we enable full IPv6 (for Tor daemon’s IPv6 relay access and machine outbound) with privacy extensions, while maintaining a stable IPv6 address bound to your DHCPv6 server’s DUID for reliable client leasing and server reachability as to not add breakage for users needing the IPv6 server?
Config note here worth mentioning man nm-settings-dbus
The special values “llt” and “ll” will generate a DUID of type LLT or LL (see RFC 3315) based on the current MAC address of the device.
dhcp-duid=ll # Fallbacks to link-local DUID for IPv6
The bottom line is can we keep a stable, DUID derived address for server accessibility while also generating temporary privacy focused addresses for outbound traffic (Tor relay/daemon and general machine use like e.g. in a users post about reticulum use)?