Hrm, I think I'm calling it a day (or a night). Couldn't figure out yet why on this #Proxmox server a Linux bridge wouldn't forward #Multicast Router Discovery (#MRD) messages generated via @troglobit's mrdisc. While sending to ff02::6a via ICMPv6 echo request or UDP works just fine...
Disabling multicast snooping on the bridge does not help either. Nor does "ebtables -I FORWARD -p IPv6 --ip6-destination ff02::6a -j ACCEPT".
Likely sth. with the #ip6tables with nf-call-ip6tables enabled...
Here's how you will know when you've block threads.net on Mastodon 4.1.0 and above, as well as the resulting #iptables and #ip6tables entries.
The below screenshots only show how to block one domain and 3 IP addresses. See the next post in this thread for an updated list of all #Meta domains' IP addresses to block so they don't steal your data and flood your servers with traffic! #FediBlock #Fediverse #Threads #Instagram #FediPact #AntiMeta #MetaBlock
@Iaintshootinmis Happy to help. Methodologies are a bit different since network are larger by magnitudes.
@thc built some nice scripts in the past: https://github.com/vanhauser-thc/thc-ipv6
If you run out of time scanning the subnets in scope, which is likely, you might want to try techniques like IPv6 DNS walk https://github.com/nomis/ip6walk
For Layer2 check link-local address scopes and multicast addresses like ff02::1 or ff02::2.
Generally when it comes to filtering, I recommend to check if they handle #IPv6 and #IPv4 addresses differently in #firewalls. While #iptables is used for IPv4, IPv6 uses #ip6tables.