The challenge didn’t ask to disable ipv4 but it was (jokingly) daring people to expose all ports to public to see how long the system would last before being exploited by bots. It wasn’t meant to be taken seriously 😆
You can essentially achieve this with some routers with a “DMZ” network segment/ device, so all incoming requests to your external IP get forwarded to it automatically. You don’t even need to disable NAT if you set it up well.
A standard DMZ still does NAT. You get a private IP and the router "nat"s you, just that it forwards all incoming traffic to that device by default. I think technically, that gets you disqualified for no nat november. Though, you’d end up exposing the ports of the machine to incoming traffic, that’s correct.
The challenge didn’t ask to disable ipv4 but it was (jokingly) daring people to expose all ports to public to see how long the system would last before being exploited by bots. It wasn’t meant to be taken seriously 😆
NAT != closing ports
How would you disable NAT and still use ipv4 unless you are able to assign a public IPv4 to your PC (and have nothing else in the network)?
You got it on the nose, only one device.
you connect your PC directly out of the link that the ISP is giving you (if allowed), for example via PPPoE
You can essentially achieve this with some routers with a “DMZ” network segment/ device, so all incoming requests to your external IP get forwarded to it automatically. You don’t even need to disable NAT if you set it up well.
A standard DMZ still does NAT. You get a private IP and the router "nat"s you, just that it forwards all incoming traffic to that device by default. I think technically, that gets you disqualified for no nat november. Though, you’d end up exposing the ports of the machine to incoming traffic, that’s correct.