[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: stable addressing



On 20-apr-04, at 18:35, Fleischman, Eric wrote:

However, my own posting was not random but was rather due to an attempt to address the very large schism between the society in which I operate (Fortune 1000 companies) and the assumptions of the IETF leadership.

Which assumptions in particular?


Back in 1993 I described to the IETF the view from my knothole concerning IPv6 (then called IPng) in RFC 1687 (see http://www.ietf.org/rfc/rfc1687.txt).

[...] "In any case, end users today are not (in the general case) dependent upon the Internet to support their business processes." [...]

:-)

I agree that the assumption that we all share a big, happy, fully connected address space has little to do with today's reality. I doubt that many people consciously subscribe to this view, but it's so permeated through the IETF's collective subconsciousness that we still act on this assumption a good deal. (The fact that a decent alternative architecture isn't apparent doesn't help of course.)

I personally understand, appreciate, and value why IETF leadership wants to aggregate routes in order to simplify global routing tables. However, the mechanism by which this is done must leave the Fortune 1000 companies with total control over our own address space otherwise our community will actively resist whatever approach you come up with. That's just a fact of life. (Readdressing 300,000+ devices is not trivial even using dynamic addressing -- it's just not going to happen for something as unimportant as switching ISPs.)

This is a very complex problem. Just a few random notes:


- It takes a good deal of magic to make interdomain routing work at the best of times. Without aggregation this magic is going to be very black indeed.
- If we allow deaggregation for fortune 1000 companies, what do we tell company 1001?
- Readdressing 300k devices is entirely trivial if DNS names and address filters aren't an issue.
- Address filters aren't an issue if we can use different addresses for internal and external use.
- Selecting the "right" address when more than one is available is an unsolved problem.


There are two issues that the Multi6 community needs to understand about us and factor into its considerations:

1) We view ourselves to be much bigger than ISPs and we are the customer. We will *not* readdress our environment when we switch ISPs (unless the readdressing can be limited to the DMZ only -- readdressing small numbers of devices is not a problem for us: it happens all the time). That is, we will *own* our own IP addresses.

Owning some address space isn't the problem. Having the rest of the world make their packets find it is. Suppose you got a portable /32 worth of IPv6 address space. Would that solve your problem? Or would you want/need to announce more specifics throughout the world for different offices?


2) Our security people are currently enamored by NATs as a security mechanism. I am aware of what the IETF's security people think about this and I myself have worked in the real time multimedia arena since the mid-90s, so you know what I think about it (i.e., NATs hinder real time communications). But there you have it: a community that currently plans to deploy NATs regardless. What would help people like me to educate our security people would be if the IETF came up with an Informational RFC for how we can do NAT-like things without NATs within IPv6.

Current wisdom is that the security that NAT offers can also be gained through the use of a stateful firewall. However, IPv4 security issues don't automatically translate into IPv6 security issues. The continuous scanning and probing background noise that is present in IPv4 won't be much of an issue in IPv6 because the likelihood of hitting a live address is too small to even bother for an attacker.


Expect things to break if you do [use NATs]. In IPv4 software vendors are forced to add NAT workarounds to their products because NAT is very widespread in v4, but it's unlikely it will be in v6 as well, so I imagine there won't be many NAT workarounds for IPv6.

As the vendors on this list could readily attest, we in the Fortune 1000 have a very long history of refusing to buy vendor products unless they alter them to be able to work within our environments.

This means you must effectively hide the use of NAT from the people you communicate with, as it is unlikely that your buying power also extends to them. This will severely limit the number of applications you can use behind such an IPv6 NAT box.


That is, if the Fortune 1000 continues to deploy NATs as a security mechanism, then IPv6 vendors *will* build NAT work arounds, just like they do today for IPv4. Again, that's just a fact of life.

Despite the fact that NAT is as good as ubiquitous in IPv4, including both the networks of the largest companies in the world and something like half the residential internet users, it still manages to break applications. This can only be worse in IPv6 as much fewer people will be running NAT so the demand for workarounds will be less.


But we're getting ahead of ourselves. There are many proposals on the table, and a good number of them make NAT unnecessary.