[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: NAT support and laws for the lawless
At 1:59 PM -0800 3/1/02, Hallam-Baker, Phillip wrote:
> > Hallam-Baker, Phillip wrote:
>> > People appear to be so caught up in whether we should be
>> supporting NAT that
>> > the issue of how to support NAT is forgotten about.
>>
>> Agreed. However, at some point we're writing laws for the
>> lawless. NATs
>> exist only by breaking what few real standards we've had in the
>> Internet. Writing standards for the rest of us to traverse a moving,
>> lawless target is not necessarily productive, IMO.
>
>Most of the NAT vendors are engaged in IETF and have shown wilingness to
>comply with IETF standards, provided they allow them to get their job done.
>
>NAT has an important security role. We deploy it because our customers want
>to conceal their IP addresses against traffic analysis.
>
>Given that in the original Internet design IP was just the protocol run on
>the 'network of networks' I don't think that the claims that NAT is foreign
>to the Internet is valid. NAT appears to me to be part and parcel of the
>original concept.
As one of the folks who was around when "the original concept" was
developed, I can emphatically say that NAT is not consistent with
that model. The reason is that IP was designed to run over any
underlying network layer protocol, and across layer 3 gateways, but
it was assumed to provide end-to-end service for realtime
communication. There were no firewalls back then and TCP and UDP were
intended to operate in end systems only. Note that one of the
problems associated with NAT in the IPsec context arises because the
TCP checksum includes the addresses from the IP header. This was not
one of our better protocol design decisions, but it obviously would
not have been made if there were any thought that an intermediate
system would modify these addresses.
Also, I have to question the purported traffic analysis security you
cite for NAT. Since it is probably fair to assume that very little
traffic sent through NAt devices is layer 3 encrypted, and since
higher layer security protocols usually provide lots of info suitable
for TA (e.g., SSL thoughtfully sends server and, optionally, client,
certs in the clear) it's hard to argue that NAT provide an effective
form of TFS.
Steve