This sounds like the beginning of an interesting discussion.
  I have taken the liberty of trimming the [Was: ..] portion
  of the subject.

So TR, what are the underlying gripes about NAT and firewall-based security?

- performance?
- ugly/dirty/messy coding or practices?
- individual liberties?
- network auditability???
- ??


And SS, what do you object to in Tracy's statement or assumptions?

- "host based security" practicality?
- technical challenges?
- ??


I have to admit my first reaction is that the "host based security" concept seems difficult to achieve without some kind of "licensing" (or what else?) of hosts that could assure hosts are capable of behaving responsibly & reliably wrt/ propagating security risks back into the net.

..jim

Stewart Stremler wrote:
begin  quoting Tracy R Reed as of Sun, Jan 29, 2006 at 10:32:35AM -0500:
[snip]
Use passive ftp or install the iptables ftp helper module which will rewrite the protocol layer port information to match what the nat in iptables is doing. I am really peeved these days over the destruction of the peer to peer connectivity aspects of the Internet. NAT must die and firewalls must go away in favor of host based security. We need to come up with a killer app for ipv6.

NAT is a godsend and should rule the day; process level IPs should be
implemented as NAT'd 127.x.x.x IPs and mediated by the OS kernel to the
appropriate static IP.  We need to make sure we start implementing NAT
functionality in IPv6-capable firewalls.



--
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list

Reply via email to