[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
food for thought on NAT traversal techniques
Hi,
Find below a bit food for thought on designing NAT traversal mechanisms.
I think it would be useful to consider a bit more on what we NEED.
- Should we send a clear signal to NAT vendors what kind of deployment
model we think is best, and what are the goals they should try to work
towards?
- Should we try to leverage existing IPv4 NAT traversal mechanisms if
possible (there seem to be a plenty of them, like STUN, TURN, etc.), and
even avoid all IPv6 work we can? Would that be of value in itself ("A
particular kind of NAT breaks this IPv_4_ solution we'd like to use to
traverse NATs")?
- What is the expected lifetime of our NAT traversal mechanism
(e.g. a few years, until most NAT vendors have started deploying 6to4 or
native) ?
- What features are critical for the NAT traversal mechanism?
For example:
* simplicity (spec and the protocol)
* ease of use (easy to turn on/configure)
* interop with NATs (works with all NAT boxes or close enough)
* robustness (is otherwise failure-proof with few things that could go
wrong)
* route optimization (traffic between different IPv6 nodes behind
NAT's as direct as possible)
* security (doesn't make unexpected holes, minimizes DoS attacks etc.)
- What are the properties of the solution(s) we would like to use/develop
considering these issues? How much work we should we should use on
mechanisms which are likely to:
* be quite low in our "preferred solutions list",
* have a limited lifetime, and hopefully soon replaced by a
better-working mechanism,
* are something other WG's have had to specify as well, and
* be something we may not even be able to specify implement correctly,
simply and reliably?
--
Pekka Savola "You each name yourselves king, yet the
Netcore Oy kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings