Hi Roger,

On Oct 29, 2010, at 9:19 PM, Roger Marquis wrote:
_Also_? Some? Really? I don't mean to question Margaret's experience
but I have to wonder what this statement is based on.

My statements are based on statements made by others here on this list, and at presentations of NAT66, as well as my work experience at companies that chose to use NAT for various reasons. I have managed IT, run enterprise networks and/or been involved in network planning for a few small-to-medium-sized enterprises, and we chose to use NAT on most of those networks for various reasons.

Some people say that NAT66 (as defined in the NAT66 document) will address their needs for NAT in IPv6. They want to use NAT in IPv6 for address independence, and they do not desire the other features/side effects of NAPT -- blocking inbound connections, forcing multiple nodes to use a single address which interferes with tracking/ identification of individual nodes outside the NAT, port sharing which results in several nodes having only one instance of a given port, etc.

Some people say that they need a IPv6 NAT box that blocks all incoming connections (unless they intentionally let something in). At least some of this group would be happy with a device that combines NAT66 and a stateful firewall that defaults to a closed configuration (as mentioned in this draft). I am not sure that I understand how/if an IPv6 NAPT box would meet this need better than a NAT66/Stateful FW combination, as long as the stateful firewall "failed closed", as you say. Can you explain why you view NAPT as a better solution than a NAT66/Stateful FW combination?

Other people actually seem to _want_ to have multiple internal nodes addressed at a single IP address using port translation. In most cases I've heard described, this is desired for its "topology hiding" properties. The ability to track/identify individual nodes outside the site can go both ways -- it can make it easier for network administrators to locate/diagnose network issues, but it also makes it easier for attackers to identify individual nodes to attack. I've heard people argue on both sides of this issue.

For folks who only want NAT for address independence, NAT66 (possibly combined with a stateful firewall) provides that, without all of the other NAT side effects. For folks who actually _want_ the properties and/or side effects of sharing a single address among multiple nodes, NAT66 won't do what they want, and they will ask their vendors for something else. That "something else" may be defined by the IETF or by customers/vendors, but it is not the intended subject of discussion on this list.

Margaret




Most of us
security professionals use NAT to block _all_ incoming connections
_by_default_.  This is known as fail-closed.



Internal hosts that need static mappings to external IPs get them, as
exceptions to the default rule.

Question for Margaret: would you consider firewalls that fail-open to be
best practice?  If not then why do you consider that model to be
appropriate when applied to NAT66?

I think it would make sense for the IETF to look into those use cases in
more detail, as was already done for CPE equipment.

Why would the IETF analyze what is codified in nearly every firewall
security policy and standard practice across the overwhelming majority of
home and business uplinks?

Roger Marquis
_______________________________________________
nat66 mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/nat66

_______________________________________________
nat66 mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/nat66

Reply via email to