Neil Schneider wrote:
And the fact that developers can't document the network interfaces to
their software so that proxies can be built is a failure to understand
the requirements of network security. It always seems to be the fault
of the security admin because the application is badly behaved and
requires that all inbound ports be open to allow it to function.
Programmers should be denied the ability to write network software if
they can't clearly define which incoming and outgoing ports their
application will require.
I don't think this is the problem at all. The problem is that it is very
nice to be able to use ephemeral ports. But this is directly at odds
with NAT. SIP, for example, is a very well documented and understood
protocol. SIP proxies exist. But how can I get every NAT manufacturer to
put a copy of SER in their NAT device and tell the end users how to
configure their applications to utilize it? And we expect to do this
with every application non-trivial application?
NAT has nothing directly to do with security anyway as far as I am
concerned. The security component of any NAT device is just a packet
filter. Deny all incoming connections. You can do this without NAT.
At this point I wish HTTP would have been better if it were implemented
such that it did not work with NAT. Then we would all have been forced
to move to IPv6 a long time ago and this NAT sillyness would have died
the quick death it so richly deserves instead of making us all suffer
for years on end.
--
Tracy R Reed http://ultraviolet.org
A: Because we read from top to bottom, left to right
Q: Why should I start my reply below the quoted text
--
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list