[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Comments on draft-vandevelde-v6ops-nap-00
At 12:50 8/11/2004 +0000, Tim Chown wrote:
Overall, very nice thrust :)
has some perceived benefits. Indeed, in an Internet model based on
universal any-to-any connectivity, product marketing departments have
driven a perception that some connectivity and security concerns can
only be solved by using a NAT device or by using logically separated
LAN address spaces.
>> But it's not any-to-any, is it? Maybe "originally based on the concept
of universal any-to-any connectivity, this concept has been stifled by
product marketing departments who have sold consumers a perception..."
(and as a result, we have an Internet of consumers...)
it is not any-to-any, but nevertheless initially that was the concept.
Would be nice
if IPv6 could bring it back closer to reality
This document describes the market perceived
reasons to utilize a NAT device in an IPv4 environment and shows how
these needs can be met and even exceeded with native IPv6. The use
>> What do you mean by "native" here? (some readers may not know)
Various way to address this. One solution is to get definition summary
in the document.
This document describes several techniques that may be combined on an
IPv6 site to protect the integrity of its network architecture.
These techniques, known collectively as NAP, retain the concept of a
well defined boundary between "inside" and "outside" the private
network, and allow firewalling, topology hiding, and privacy and
achieve these goals without address translation.
>> Are we concerned with address translation here, or use of private (site
local) addresses? The latter has no translation, but may leak...
It is a combination technologies as described. No translation with NAP
though :-)
The leaking should be solved with ULA as they may not be used to neighboring
administrative domains. (its still being discussed if this should be
hard-coded or
filtered by policy i believe)
2. Perceived benefits of NAT and its impact on IPv4
2.2 Simple security due to stateful filter implementation
It is frequently believed that a NAT device puts in an extra barrier
to keep the private network protected from evil outside influences
due to the stateful character of NAT technology (to protect against
hackers, worms, etc..).
>> I'd not say "evil" even if it is :)
It seems to make the text a bit more alive :-)
>> Also, "stateful" isn't the thing, it's that the internal (private)
addresses cannot (usually) be routed to/contacted from outside the
private network.
I think that is a question of terminology. your definition is the same as
my understanding
with that difference that the routing device has a translation slot created
due to the stateful character, hence the stateful aspect is the root-cause
why external devices can not access 'all' internal devices
This benefit may be partially real; however,
experienced hackers are well aware of NAT devices and are very
familiar with the private address space, and hence the secure feeling
is in vain.
>> A little wooly; perhaps specify the vulnerability in more detail.
Address translation does not provide security on itself; for example,
consider a configuration with static NAT translation and all ports
translating to a single machine. In such a scenario the security
risk for that machine is identical as if there were no NAT device in
the communication path. As result there is no specific security
value in the address translation function. The perceived security
comes from the lack of pre-established mapping state. Dynamically
establishing state in response to internal requests reduces the
threat of unexpected external connections to internal devices.
>> And of course many vulnerabilities these days are not from IP-based
connections into a network, but from data received by the network
(emails, images, web pages, etc). NAT is just a piece of the picture.
correct. A note is added in the Working document for creating -01 draft.
>> Some NAT users will also map ports to enable services into their
NATed network; here the NAT adds complexity; not sure that's captured
in the draft?
thats right. Main goal is to focus on the positive aspects on why people
use NAT (time to completion) and see how it can be achieved with
IPv6 without address translation. I'm not sure where to add this yet.
2.3 User/Application tracking
Due to the fact that NAT is a stateful technology, it could provide
limited capabilities for the administrator of the NAT to gather
information about who in the private network is requesting access to
which Internet location. This can be done by checking the network
address translation details of the private and the public addresses
of the NAT devices state-database.
>> But this can be done (and is done) with non-NATed networks?.
true. When using NAT it could provide additional chunk of information
on top of that.
2.4 Privacy and topology hiding
The ability NAT to provide internet access by the use of a single (or
few) global IPv4 routable addresses to a large community of users
offers a simple mechanism to hide the internal topology of a network.
In this example the large community will be reflected in the internet
by a single (or few) IPv4 address(es).
The use of NAT then results in a user behind a NAT gateway actually
appearing on the Internet as a user inside the NAT box itself; i.e.,
the IPv4 address that appears on the Internet is only sufficient to
identify the NAT. Thus it is impossible to tell from the outside
which member of a family, which customer of an Internet cafâ, or
which employee of a company generated or received a particular
packet, if concealed behind NAT. Thus, although NATs do nothing to
provide application level privacy, they do prevent the external
tracking and profiling of individual host computers by means of their
IP addresses. At the same time it creates a smaller pool of
addresses for a much more focused point of attack.
>> There is a similarity with app-level, in that a NAT offers similar
"privacy" for web users as a web cache (although the details of what
is - or is not - logged at the NAT/proxy will be deifferent).
added the text
Some enterprises prefer to hide as much as possible of their internal
network topology from outsiders. Mostly this is achieved by blocking
"traceroute" etc., but NAT of course entirely hides the internal
subnet topology, which some network managers believe is a useful
precaution to mitigate scanning attacks.
>> Perhaps talk somewhere about two-faced DNS, which is used to
support this model.
>> Also scanning in v6 can be much harder, by obscurity (see
draft-chown-v6ops-port-scanning-implications-01)
Added reference to the this draft.
2.5 Independent control of addressing in a private network
Due to the ongoing depletion of the IPv4 address range, the remaining
pool of unallocated IPv4 addresses is below 30%. Recent consumption
rates are over 7% of the total IPv4 space per year. This run rate
leaves about 4 years to deplete the remaining unallocated pool.
>> Recent IETF list discussion would "debate" these numbers :)
ack
Many private IPv4 networks take benefit from using the address space
defined in RFC 1918 to enlarge the available addressing space for
their private network, and at the same time reduce their need for
globally routable addresses. This type of local control of address
resources allow a clean and hierarchical addressing structure in the
network.
>> But v6 addressing for the enterprise is a /48 (in effect a Class A
of v4 address space, but with 2^64 hosts per subnet not 2^8).
agree.
>> With v6, you are far less likely to need to go back to ask for more
address space (with the paperwork that goes with that).
agree
>> With v6, you don't have to resize subnets to use v4 address space
efficiently; an enterprise today may have a mix of /28 - /23 size
subnets for example, and may shrink/grow these as their network
user base/etc changes. In v6, it's all /64.
Good note. It will be added.
Another benefit is due to the usage of independent addresses on
majority of the network infrastructure there is an increased ability
to change provider with less operational difficulties.
>> This is a BIG plus for v4 today; no PI addressing in v6.
yep, that is discussed in later chapter
2.6.1 Medium/large private networks
Under this category fall the majority of private enterprise networks.
Many of these networks have one or more exit points to the Internet.
There are several reasons why NAT be be used in such a network. For
>> "be be" -> "may be"
the ISP there is no need to import the IPv4 address range from the
remote end-customer, which facilitates IPv4 address summarization.
The customer can use a larger IPv4 address range (probably with
less-administrative overhead) by the use of RFC 1918 and NAT. The
customer also reduces the overhead in changing to a new ISP, because
the addresses assigned to devices behind the NAT do not need to be
changed when the customer is assigned a different address by a new
ISP. Finally, the customer can provide privacy about its hosts and
the topology of its internal network if the internal addresses are
mapped through NAT.
>> So be more explicit and say "using NAT avoids the need for network
renumbering" and that "NAT can help support IPv4 site multihoming"
(though of course both solutions have restrictions and come at a
price) You do mention this further down, I note,
agree. adapted some wording here.
2.6.3 Single user connection
This group identifies the users which are connected via a single IPv4
address and use a single piece of equipment (PC, PDA, etc.). This
user may get an ambiguous IPv4 address from the service provider
which is based on RFC 1918. If ambiguous addressing is utilized, the
service provider will execute NAT on the allocated IPv4 address for
global Internet connectivity. This also limits the internet
capability of the equipment to being mainly a receiver of Internet
data, and makes it quite hard for the equipment to become a world
wide internet server (i.e. HTTP, FTP, etc.) due to the stateful
operation of the NAT equipment.
>> Or you have a SOHO user with one NAT device (e.g. cable modem) and
only one home PC. That's different to receiving a private v4
address that is NATed higher up the ISP network.
Correct. This is more the small enterprise example. We will prob. change
this section in a case study in next release.
>> Also in Section 3, maybe mention that NAT is often not a customer
choice; it's frequently imposed by the ISP, or deployed because the
organisation outsourced its IT.
will add the note
>> Is there an (obvious) new subsection for the case where the deploying
network for some reason feels it is unable to get enough global v4
address space, or the scenario is one where the number of attaching
nodes is unknown (e.g. a WLAN provision at a conference or hotel?)
ok. We will discus this further
3. Description of the IPv6 tools
This section describes several features that can be used to provide
the protection features associated with IPv4 NAT.
3.1 Privacy addresses (RFC 3041)
There is nothing that prevents a DHCP server from running RFC 3041
for any new MAC it hears, then remembering that for future queries.
This would allow using them in DNS for registered services since the
assumption would be a persistent value that minimizes DNS churn.
>> Any comment on the RFC3041-considered-harmful viewpoint here?
>> 3041 is very like v4 NAT in that 3041 doesn't protect the subnet ID
just as NAT doesn't protect the v4 global address used.
added note for discussion for -01 version.
3.2 Unique Local Addresses
A unique local address (ULA) is an IPv6 unicast address format that
is globally unique and is intended for local communications [12].
These are expected NOT to be routed on the global Internet. They are
routable inside of a more limited area defined by a local network
administrator.
>> Note also draft-ietf-ipv6-ula-central-00, i.e. the ULA itself may
not be unique, whereas the centrally assigned prefixes should be.
For sites looking to merge without use of NAT, the central method
would give a greater assurance of no clash.
ok, agree. Some text is added.
3.4 Untraceable IPv6 addresses
These are globally routable IPv6 addresses which can be randomly and
dynamically assigned to IPv6 devices and are globally aggregatable
addresses assigned to the local network by either a registry or
connecting ISP. The random assignment has as purpose to confuse the
outside world on the structure of the local network, while for the
local network the location of the randomly assigned IPv6 address is
known and connectivity inside the local network can exist. The goal
is to create a network infrastructure which appears from external
networks with an unpredictable structure, to avoid malicious events
to happen to the local network. When using untraceable IPv6
addresses, it may be that two apparently sequential addresses are
reachable on very different parts of the local network instead of
belonging to the same subnet next to each other.
>> Is there a reference to this? I'm not sure how this would actually
be implemented, or of the drawbacks of doing so.
>> Maybe "infinitely" sized subnets are an IPv6 "tool", in that a
subnet can absorb any number of hosts (in theory at least) without
subnet resizing or needing to NAT (if the network had a Class C v4
and might have more than 253 nodes attaching simultaneously).
>> Related is the issue of dynamic vs static address allocation; does
the same node get the same IP address when attaching each time, or
to conserve (v4) address space is the address dynamic? If a
network has a Class C v4 and has 1,000 users of whom only 100 may
be attached at any one time, in v4 you need dynamic addressing,
in v6 you don't.
We will rewrite some part of this section to clear up some dymistification.
4.1 Simple gateway between Internet and internal network
The connection creation towards the global Internet hosts/systems
will always happen with global IPv6 addresses. An enterprise will
typically receive a global IPv6 address prefix from his connecting
IPv6 Service Provider.
>> "his" -> "its"
4.2 IPv6 and Simple security
The vulnerability of an IPv6 host is similar as for an IPv4 host
directly connected towards the Internet, and firewall and IDS systems
are recommended. However, with IPv6, the following protections are
available without the use of NAT:
1. Short lifetimes on privacy extension suffixes reduce the attack
profile since the node will not respond to the address once the
address is no longer valid.
>> Important because with port-scanning very hard to do in v6, attackers
will need to gather target addresses from various server log files,
and then try these.
2. IPsec is a mandatory service for IPv6 implementations. IPsec
functions to prevent session hijacking, prevent content
tampering, and optionally masks the packet contents. While IPsec
might be available in IPv4 implementations, deployment in NAT
environments either breaks the protocol or requires complex
helper services with limited functionality.
>> Or significant compromises in trust.
3. The size of the typical subnet ::/64 will make a network ping
sweep and resulting port-scan virtually impossible due to the
Van de Velde, et al. Expires April 12, 2005 [Page 11]
Internet-Draft IPv6 Network Architecture Protection October 2004
amount of possible combinations available
>> See the port-scanning draft :)
This simple rule would create similar protection and security holes
the typical IPv4 NAT device will offer and may for example be enabled
by default on all broadband edge-routers. but with that difference
that the security caveats will be documented, and may hence be
removed with the next revision of the rule. The goal is that every
iteration, the IPv6 internet will become more secure for the
oblivious users.
>> The snag is configuring this in home networking scenarios (for example)
where today NAT "does the job"; as we require network access into the
home, how do we let Joe User say "my PDA can access my home DVR?".
unrealistic) pings to map the network, and virus/worm propagation
will be thwarted in the process At full rate 40Gbps (400 times the
typical 100Mbps LAN, and 13,000 times the typical DSL/Cable access
link) it takes over 5000 years to scan a single 64 bit space.
>> Again, see the port-scanning draft. You may find other notes worth
reusing in there.
ok
4.4 Privacy and topology hiding using IPv6
By using untraceable addresses, it is possible to only allocate
certain parts of the internal network with global prefixes, while
other, private network parts do not have global prefixes and remain
totally cut off from the outside. If an edge firewall is used (which
is strongly suggested) a traffic policy can be implemented as today,
based on various filtering and inspection rules. (Older techniques
such as application level proxies and SOCKS also remain available.)
>> Worth mentioning (two-faced) DNS issues here?
Maybe... i'll add note and check what the other believe is best?
If there is need to mask the internal structure towards the external
IPv6 internet, then the usage of 'Untraceable' addresses may be used.
These addresses will be derived from a local pool, and may be
assigned to those hosts for which topology masking is required or
which want to reach the IPv6 Internet or other external networks.
>> I think a separate I-D on "untraceable" addresses might be useful?
Sounds like a good idea. It would be good to have broader study on the
feasability of such a technology.
The technology to assign these addresses to the hosts could be based
on DHCPv6. To complement the 'Untraceable' addresses it is needed to
have at least awareness of the IPv6 address location when routing an
IPv6 packet through the internal network. This could be achieved by
'route-injection' in the network infrastructure. This
route-injection could be done based on ::/128 host-routes to each
device that wants to connect to the Internet.
>> I think you make a good point about scalability; need to have some
clearer idea of the tradeoffs here? (or in the separate I-D)
4.6.2 small private networks
The category describes those networks which only have only few
routers in the topology, and have a single network egress point.
These networks are also known as SOHO (Small Office/Home Office)
networks. Typically these networks don't have dedicated Network
Operation Center (NOC) and are using either a dial-up connection or
broadband access..
>> Most SOHO networks are single (access) router networks?
i believe so... does your home-office have dual connection? Mine does not not.
4.6.4 ISP/Carrier customer networks
This group refers to the actual service providers that are providing
the IP access. They tend to have three separate IP domains that they
support. For the first they fall into the Medium/large private
networks category (above) for their own internal networks, LANs etc.
and will be able to use the same solutions as above. The second is
their Operations network which addresses their backbone and access
switches, and other hardware, this is separate for both engineering
reasons as well as simplicity in managing the security of the
backbone, for this it is again possible to configure a single range
of addresses with the defined local scope defined in order to prevent
these from being accessed from the public network. The third is the
IP addresses (single or blocks) that they assign to customers. These
can be registered addresses (usually given to category a and b and
sometimes c) or can from a pool of RFC 1918 addresses used with NAT
for single user connections. Therefore they can actually have two
different NAT domains that are not connected (internal LAN and single
user customers) again this will be resolved by the large availability
of addresses and the procedures mentioned above.
>> So the main gain is simplified network management for the operator?
Or something else? Might be useful to make it clear.
added note for -01 draft update
4.7 Multihoming and renumbering
The IPv6 address space allocated by the ISP will be dependent upon
the connecting Service provider. This may result in a renumbering
effort if the enterprise changes from Service Provider. To keep the
>> "from" -> "its"
impact on the gateway when changing ISP to a zero human touch
environment, DHCPv6 Prefix Delegation [10] can be used.
>> You might want to cite Fred's draft here if you don't already, and
also draft-chown-v6ops-renumber-thinkabout-00. One specific
scenario to add here for renumbering might be network mergers?
Freds draft is included. The -renumber-thinkabout-00 was not. Will add the
suggested reference.
5. Additional benefits due to Native IPv6 and universal unique
addressing
Is all of the material in this section, specifically the material
that does not directly address the "advantages" of IPv4 NAT,
necessary?
>> It is useful to document somewhere; perhaps split into two sections,
one in poker terms that "sees" IPv4 NAT, and one that raises the bet
with IPv6?
added your vote :-)
5.1 Universal any-to-any connectivity
One of the original design points of the Internet was any-to-any
connectivity. The dramatic growth of Internet connected systems
coupled with the limited address space of the IPv4 protocol spawned
address conservation techniques. NAT was introduced as a tool to
reduce demand on the limited IPv4 address pool, but the side effect
of the NAT technology was to remove the any-to-any connectivity
capability. By removing the need for address conservation (and
therefore NAT), IPv6 returns the any-to-any connectivity model and
removes the limitations on application developers. With the freedom
to innovate unconstrained by NAT traversal efforts, developers will
be able to focus on new advanced network services (i.e. peer-to-peer
applications, IPv6 embedded IPsec communication between two
communicating devices, instant messaging, Internet telephony, etc..)
rather than focusing on discovering and traversing the increasingly
complex NAT environment.
>> There are some good "transparency" type RFCs from Brian and others
that could be cited here. 2775 springs to mind. Also RFC on
implications of using NAT - 2993 I think.
some are reference already. Will check with Brian.
5.2 Auto-configuration
IPv6 offers a scalable approach to minimizing human interaction and
device configuration. Whereas IPv4 implementations require touching
each end system to indicate the use of DHCP vs. a static address and
management of a server with the pool size large enough for the
potential number of connected devices, IPv6 uses an indication from
the router to instruct the end systems to use DHCP or the stateless
auto configuration approach supporting a virtually limitless number
of devices on the subnet. This minimizes the number of systems that
require human interaction as well as improves consistency between all
the systems on a subnet. In the case that there is no router to
provide this indication, an address for use on the local link only
will be derived from the interface media layer address.
>> Not sure about this. Most OSes will do DHCP(v4) by default today,
when connecting. So "autoconfiguration" is there, but it requires
DHCP to be set up somewhere by the "provider". How widely used
is the IPv4 link-local equivalent under 169. - seems to be mainly
a Microsoft implemented mechanism?
added note for discussion of -01 draft
5.3 Native Multicast services
Multicast services in IPv4 were severely restricted by the limited
address space available to use for group assignments and an implicit
locally defined range for group membership. IPv6 multicast corrects
this situation by embedding explicit scope indications as well as
expanding to 4 billion groups per scope. In the source specific
multicast case, this is further expanded to 4 billion groups per
scope per subnet by embedding the 64 bits of subnet identifier into
the multicast address.
IPv6 allows also for innovative usage of the IPv6 address length, and
makes it possible to embed the multicast 'Rendez-Vous Point' (or RP)
directly in the IPv6 multicast address when using ASM multicast.
this is not possible with limited size of the IPv4 address.
>> Cite Pekka's work on this?
>> Also make a comment about SSM and IPv6? There seems to be a strong
feeling that IPv6 is an opportunity to get SSM deployed more widely
with its more streamlined architecture.
added note for -01 discussion.
5.4 Increased security protection
The security protection offered by native IPv6 technology is more
advanced as with IPv4 technology. There are various transport
>> "as with" -> "than"?
mechanisms enhanced to allow a network to operate more secure with
less performance impact:
>> "secure" -> "securely"
o On a local network, any user will have more security awareness.
This awareness will motivate the usage of simple firewall
applications/devices to be inserted on the border between the
external network and the local (or home network).
>> I don't think users will be more security aware with IPv6, if they
even know they're using IPv6. I think with growing use of shared
hotspots etc we'll see growing awareness of personal firewalls in
general.
o The usage of private address-space in IPv6 still provides with
>> "is now provided by"
ok
Unique Local Addresses, which will avoid conflict situations when
joining networks and securing the internal communication on a
>> "joining" -> "merging"
ok
local network infrastructure due to simpler traffic filtering
policy
5.5 Mobility
Anytime, anywhere, universal access requires mIPv6 services in
>> "MIPv6"
yep. it is changed now. should be for all instances of MIPv6 in the draft.
support of mobile nodes. While a Home Agent is required for initial
connection establishment in either protocol version, IPv6 mobile
nodes are able to optimize the path between them using the mIPv6
>> "MIPv6"
option header while IPv4 mobile nodes are required to triangle route
all packets. In general terms this will minimize the network
resources used and maximize the quality of the communication
>> eg. very useful when two mobile nodes in same WLAN with low bandwidth
uplink what to share data, to avoid the data passing over the uplink.
5.6 Merging networks
With the usage of IPv6 the addressing overlap will not exist because
of the existence of the Unique Local Address usage for private and
local addressing.
>> As per above, note the difference between the two variants of ULA, one
centrally assigned.
5.7 Community of interest
Although some Internet-enabled devices will function as fully-fledged
Internet hosts, it is believed that many will be operated in a highly
restricted manner functioning largely or entirely within a Community
of Interest. By Community of Interest we mean a collection of hosts
that are logically part of a group reflecting their ownership or
function. Typically, members of a Community of Interest need to
communicate within the community but should not be generally
accessible on the Internet. They want the benefits of the
connectivity provided by the Internet, but do not want to be exposed
to the rest of the world. This functionality will be available
through the usage of NAP and native IPv6 dataflows, without any
stateful device in the middle.
>> Also maybe talk about virtual organisation networks built on the fly?
Very difficult to do in IPv4+NAT scenarios. The nodes may also
take part in other communications in general.
TWhat do you exactly mean with this? How do you see this model of
virtual organisations?
6. IPv6 gap analysis
6.3 Minimal traceability of privacy addresses
Privacy addresses (RFC 3041) may certainly be used within the
enterprise to limit the traceability of external traffic flows, but
they would still reveal the subnet address bits. To eliminate this,
some combination of privacy addresses with the previous two points is
required, and this work remains to be done.
>> The use of privacy addresses is also itself generally detectable.
6.4 Renumbering procedure
Documentation of site renumbering procedures [11] should be
completed. It should also be noticed that ULAs will help here too,
since a change of ISP prefix will only affect hosts that need an
externally routeable address as well as a ULA.
>> Also draft-chown-v6ops-renumber-thinkabout-00. Are there downsides
to using ULAs? If so, these are not described in this text. e.g. it
requires all nodes to implement address selection as desired (favour
ULA src for ULA dst, global src for global dst, etc).
6.6 Untraceable addresses
The details of the untraceable addresses, along with any associated
mechanisms such as route injection, must be worked out and specified.
>> A new I-D on this would be good.
>> What about a set of recommendations for a site? Like "use ULAs if
you want feature X", or is this just implied already?
it should be implied already. I hope the case study examples will make
thinks more clear.
Cheers, and many thanks for the feedback. We have now many notes, together
with our own
planned changes in the -00 draft to get to an enhanced -01 document.
Brgds,
G/