Hi Peter,

There are serious security issues with the idea of having a host on the receiving end "automatically undo" something that will give the impression that a packet was actually received from a different address. For example, an external source address could be used to pass ingress filtering rules at a border router, and then the address could be switched "back" to an address that appears to have originated locally. This could be used as the basis for an attack. The "TRIP" proposal I circulated had the same problem... There are potential solutions to this problem, such as having the addresses cryptographically generated, but they would have to be spelled out in detail for any proposal along these lines to be secure.

Also, how is the receiving host supposed to send traffic back to the source? Which address would it use?

I don't think I understand how your proposal would work, unless both the internal and external addresses are globally routed addresses. If that is the case, what benefit is gained from having two sets of addresses? Even if you did globally route both sets of addresses, I am still having some conclusion about what addresses will be seen by the transport layer (and apps) on both ends.

Could you perhaps write an Internet-Draft describing your proposal, so that we can discuss it in detail? It should include an explanation of how a client gets the IP address(es) for a remote host, how it initiates a connection, how the remote host responds, what addresses the transport layers will see on both ends, how the local host's transport layer associates the response with the connection it initiated, etc.

Also, could you explain which of the benefits of IPv4 NAT are preserved in your solution?

Thanks,
Margaret



On Dec 5, 2008, at 8:42 PM, Peter Dambier wrote:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello Keith,

the NAT66 I might get from my ISP is almost native IPv6.

The tunnel I might get from a tunnel broker means a loss
of speed and yet another dependence on somebody else.

Of course an IPv6 port of TOR would be a good idea.
Maybe I should talk to the TOR people.
But I am afraid that is not the tunnel you meant.

Connecting customers via aDSL and PPPoE my ISP does already
put me through a tunnel and he does already take some bytes
away.

I dont want a NAT in the first place but I prefer a NAT66
that can be undone by a symmetric NAT66 to an opaque one.

Kind regards
Peter


Keith Moore wrote:
Peter Dambier wrote:

I would very much like to have an extension header for NAT66.

That would allow symmetric NAT66 to automatically undo what
a NAT66 has done.


If you're going to incur per-packet overhead for the sake of reversing
the address translation, why not just tunnel?

Keith
_______________________________________________
Behave mailing list
[EMAIL PROTECTED]
https://www.ietf.org/mailman/listinfo/behave

- --
Peter and Karin Dambier
Cesidian Root - Radice Cesidiana
Rimbacher Strasse 16
D-69509 Moerlenbach-Bonsweiher
+49(6209)795-816 (Telekom)
+49(6252)750-308 (VoIP: sipgate.de)
mail: [EMAIL PROTECTED]
http://www.peter-dambier.de/
http://iason.site.voila.fr/
https://sourceforge.net/projects/iason/
ULA= fd80:4ce1:c66a::/48
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFJOdh+oQA0qetcyygRAuqwAJ4jh5HvZSckODCPyitXF7Qpfg9pcgCfZAep
frNw0I4d0ZVzvL1gJh6sIrw=
=hW7V
-----END PGP SIGNATURE-----
_______________________________________________
nat66 mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/nat66

_______________________________________________
nat66 mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/nat66

Reply via email to