I think this probably wraps things up:

Comparing IPv4 and IPv6, there are many things changed in IPv6.  Some are
obviously improvements.  Some are improvements that most people won't care
about.  And some are no improvement, just different.  When you boil it all
down, the one thing that is likely to add any value people care about is the
ability to establish p2p connections, which necessitates no NAT (or at
least, no many-to-one NAT) and necessitates eliminating the "block all
unknown inbound traffic" rule which has become standard on perimeter
firewalls.

Regardless of people's opinions at IETF or anywhere else, if you want to use
NAT, they will never be able to stop you.  If you build the perimeter
firewall/router, and if you happen to implement IPv6 NAT on it, there is no
technique to detect or prevent that.  It's not even possible to develop a
technique except inside the actual endpoint client application, which seems
unlikely to care.  The only way you might be prevented from using NAT in
IPv6 if you want it:  is if there's insufficient consumer demand and hence
insufficient product availability.

No, NAT will not be necessary or useful anymore in IPv6 for the sake of
creating address space.  Yes, NAT could be useful to mask your internal
network topology from the wild world web.  If you do implement NAT to mask
your internal network topology, you can use an external IP for every
internal IP, and therefore p2p will not be broken in IPv6 NAT, as it is in
IPv4 NAT.

As for security, exposing all devices directly to the Internet:  There are
many possible outcomes.  Fundamentally, the only security that IPv4 NAT
provides is to automatically block inbound unknown traffic (not established
or related to an outbound connection.)  
(1) It's possible that some firewalls might have a similar firewall rule
created for IPv6 by default, and you have to disable it if you want unknown
traffic to reach your endpoint.  
(2) It's possible the firewalls might ship without that rule by default, and
increase the reliance on your endpoint software firewall.  (Somebody should
tell Apple to create a firewall that works on OSX.)  ;-)  heheh  
(3) It's possible that devices such as your laser-printer-toaster or
automated beer brewing system might just enable a simple checkbox or switch
of some kind, so by default they don't take a world routable IP address, and
by default they're only accessible using the link-local address, on the
local LAN.  
(4) There's no reason IPv4 needs to die.  In all likelihood, devices which
have no benefit from worldwide accessibility will simply use IPv4 for
outbound connections.  They may implement IPv6, but hopefully then, they're
secured by one of the above methods.

There may be some more options as well, but that's all I can think of.



_______________________________________________
Discuss mailing list
Discuss@lopsa.org
http://lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to