nanog mailing list archives
Re: Addressing plan exercise for our IPv6 course
From: Owen DeLong <owen () delong com>
Date: Tue, 27 Jul 2010 12:34:40 -0700
On Jul 27, 2010, at 12:05 PM, Akyol, Bora A wrote:
Please see comments inline. On 7/22/10 10:13 PM, "Owen DeLong" <owen () delong com> wrote:In all reality: 1. NAT has nothing to do with security. Stateful inspection provides security, NAT just mangles addresses.Of course, the problem is that there are millions of customers that believe that NAT == security. This needs to change.2. In the places where NAT works, it does so at a terrible cost. It breaks a number of things, and, applications like Skype are incredibly more complex pieces of code in order to solve NAT traversal.I look at this as water under the bridge. Yep, it was complicated code and now it works. I can run bittorrent just fine beyond an Apple wireless router and I did nothing to make that work. Micro-torrent just communicates with the router to make the port available.
It's only water under the bridge for IPv4. If we start putting NAT66 into play, it will be the same thing all over again. Additionally, it's only water under the bridge for existing applications. Each new application seems to go through the same exercise because for some reason, no two NAT gateways seem to have exactly the same traversal requirements and no two applications seem to implement the same set of traversal code.
The elimination of NAT is one of the greatest features of IPv6. Most customers don't know or care what NAT is and wouldn't know the difference between a NAT firewall and a stateful inspection firewall. I do think that people will get rid of the NAT box by and large, or, at least in IPv6, the box won't be NATing. Whether or not they NAT it, it's still better to give the customer enough addresses that they don't HAVE to NAT. OwenOf course, no disagreement there. The real challenge is going to be education of customers so that they can actually configure a firewall policy to protect their now-suddenly-addressable-on-the-Internet home network. I would love to see how SOHO vendors are going to address this.
Not so much... SOHO gateways should implement stateful inspection with the same default policy a NAT box provides today... 1. Outbound packets create a state table entry. 2. Inbound packets are only forwarded if they match an existing state table entry. Pretty simple, actually. Owen
Current thread:
- Re: Addressing plan exercise for our IPv6 course, (continued)
- Re: Addressing plan exercise for our IPv6 course Owen DeLong (Jul 22)
- Re: Addressing plan exercise for our IPv6 course Akyol, Bora A (Jul 22)
- Re: Addressing plan exercise for our IPv6 course Mark Smith (Jul 22)
- RE: Addressing plan exercise for our IPv6 course Frank Bulk - iName.com (Jul 22)
- Re: Addressing plan exercise for our IPv6 course Owen DeLong (Jul 22)
- Re: Addressing plan exercise for our IPv6 course Jens Link (Jul 23)
- Re: Addressing plan exercise for our IPv6 course Owen DeLong (Jul 23)
- Re: Addressing plan exercise for our IPv6 course Jens Link (Jul 25)
- Re: Addressing plan exercise for our IPv6 course Matthew Palmer (Jul 25)
- Re: Addressing plan exercise for our IPv6 course Akyol, Bora A (Jul 27)
- Re: Addressing plan exercise for our IPv6 course Owen DeLong (Jul 27)
- Re: Addressing plan exercise for our IPv6 course Mark Smith (Jul 29)
- Re: Addressing plan exercise for our IPv6 course Tim Franklin (Jul 29)
- Re: Addressing plan exercise for our IPv6 course Valdis . Kletnieks (Jul 24)
- Re: Addressing plan exercise for our IPv6 course Saku Ytti (Jul 24)
- Re: Addressing plan exercise for our IPv6 course Owen DeLong (Jul 24)
- Re: Addressing plan exercise for our IPv6 course Saku Ytti (Jul 24)
- Re: Addressing plan exercise for our IPv6 course Matthew Kaufman (Jul 24)
- Re: Addressing plan exercise for our IPv6 course Karl Auer (Jul 24)
- Re: Addressing plan exercise for our IPv6 course Owen DeLong (Jul 24)
- Re: Addressing plan exercise for our IPv6 course Owen DeLong (Jul 24)