Discord isn’t exactly known for generous file-sharing limits, still, the messaging app offered a 25MB limit to free users. The company has now updated its support page to reflect the upload limit for free users has been lowered to 10MB.

  • Kairos@lemmy.today
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    2
    ·
    3 months ago

    The issue is the absence of being able to port forward in a lot of places. UPNP exists on some networks but it’s usually disabled. But if we want actual peer to peer we’re going to need to implement some way to accept incoming connections EVERYWHERE.

      • Strykker@programming.dev
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        2
        ·
        3 months ago

        Gonna be real here, I’m in tech, there is no fucking way I’m gonna open my PC to the entire fucking internet. Vulnerabilities are everywhere and no code is perfect. Firewalls and nat help stop so many attacks from the start.

        Even if ipv6 is common I will assume most implementations will be nat based.

        • Max@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          edit-2
          3 months ago

          You definitely use a firewall, but there’s no need for NAT in almost all cases with ipv6. But even with a firewall, p2p becomes easier even if you still have to do firewall hole punching

        • FrederikNJS@lemm.ee
          link
          fedilink
          English
          arrow-up
          3
          ·
          3 months ago

          IPv6 does not require you to open your machine to the Internet, even without making use of a NAT. Sure you get an IP that’s valid on the whole internet, but that doesn’t mean that anyone can send you traffic.

        • KillingTimeItself@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          2
          ·
          3 months ago

          brother, use a firewall. NAT does nothing for this, a single stateful firewall will do more for device security than a NAT existing solely by itself.

          A nat doesn’t even do anything other than provide some basic level of device anonymity. If you didn’t have a firewall it would still be accessible, you would just need to either be really good at guessing ports, or sniff for traffic that’s relevant lol.

          • Strykker@programming.dev
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            1
            ·
            edit-2
            3 months ago

            Except the NAT device will stonewall traffic on every port except the ones I open, for my entire network, and then I can just worry about securing the software listening on those few ports, instead of having to worry about the firewalls on every device I own.

            Tldr default nat behavior is a state full firewall.

            • KillingTimeItself@lemmy.dbzer0.com
              link
              fedilink
              English
              arrow-up
              1
              arrow-down
              1
              ·
              edit-2
              3 months ago

              that’s literally what a stateful firewall does.

              It only allows corresponding return traffic to outgoing traffic that a device has internally sent outwards.

              if you disabled that, it wouldn’t do that. But even a NAT without a stateful firewall might end up doing this depending on how it’s configured and your open ports due to how the forwarding is handled. This is how we get around NATing for P2P traffic, though the trick is to just send two NATed users to the others ip and port at the same time to establish a connection that can “isAlive” from there. If you had no firewall you would only need to know the IP and port to do this.

              plus not to mention you can run internal firewalls on each device specifically which would do basically the same thing anyway. But then again i don’t use windows so that’s way easier.

              • Strykker@programming.dev
                link
                fedilink
                English
                arrow-up
                1
                arrow-down
                1
                ·
                3 months ago

                Yes, thank you for repeating what I just said, and justifying my desire for a nat. I do infact actually know a few things about computer networks and tcp/ip since I spent 7 years writing software to interface with and monitor them.

                • KillingTimeItself@lemmy.dbzer0.com
                  link
                  fedilink
                  English
                  arrow-up
                  2
                  ·
                  3 months ago

                  the only realistic scenario in which you would use a NAT under IPv6 is if you felt like using IPv4 addresses internally. Outside of that it serves very little purpose.

            • KillingTimeItself@lemmy.dbzer0.com
              link
              fedilink
              English
              arrow-up
              4
              ·
              3 months ago

              yeah, under IPv6 based home networking, you just assign a block of addresses to a home, 512 or something, for example, and then you just use a stateful firewall to do the same exact thing that a NAT + a stateful firewall would be doing on a traditional IPv4 network.

              Nothing stops you from using a NAT if you felt like you wanted your networking to be more complicated for no reason. But you probably shouldn’t.

              There are potential benefits for the anonymization of traffic (though this is probably easy enough to defeat by simply sniffing for all traffic across the IP block) a denial of service wouldn’t be super important anymore, as you could just engage in round robin across the other IPs, unless of course you DOS’d every IP all at once, but that would be super fucking obvious and trivial to deal with. Though it might kill an individual computer in the network due to traffic influx.

              You could still engage in DHCP IP handouts, which would actually be beneficial in terms of traffic anonymization in this case. Especially on a high frequency basis. Similar to the effects of NATing on an IPv4 network.

              Plus you could still grab a static IP address per device, and then just pass through firewall rules to allow external connections or whatever you please. No forwarding required.

    • Great Blue Heron@lemmy.ca
      link
      fedilink
      English
      arrow-up
      9
      ·
      3 months ago

      Once an end-to-end, encrypted, connection is established between a pair of peers then anything can be sent through it. The establishment proces is generally facilitated by a server of some description so neither peer needs to allow inbound connections. (I’m a long, long way from being an expert on this and happy to be corrected - but this seems like network fundamentals?)

      • KillingTimeItself@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        5
        ·
        3 months ago

        this is true, but the problem is that it’s really complicated, and not always reliable. Mostly due to NATing within the networks. Firewalls don’t help but you can get around those easily enough.

        There’s no guarantee that you’ll get a reliable P2P network connection over a NAT unless one peer isn’t NATed. Which is unlikely.

        TL;DR we would probably ddos the internet very quickly if we tried at the scale of something like discord.