On Mar 23, 2009, at 11:38 AM, Roger Marquis wrote:
Residential and commercial network owners and operators don't want
their
internal hosts to be directly reachable.
That's a fairly sweeping statement. At my company, there are a huge
number of hosts that we don't want to be externally accessible as
servers but which we allow to be clients of various sorts. At the
network layer, the difference between a request and response is not
visible.
One can certainly make one's hosts unreachable. One can not advertise
them in DNS, one can enumerate them using a prefix that isn't routed
outside (and perhaps isn't even routed to the DMZ), and so on. Oh yes,
there exist filters, which are the usual strategy of choice - stateful
firewalls act as diodes, allowing session initiation in one direction
but not the other. If someone doesn't want to authorize external
access to a host, that's not very hard to enforce. That is not the
purpose - and explicitly not a feature - of NAT66. Prophylactic
security, which has all of the issues and benefits of contraceptive
prophylactics, is quite separate.
I think the question Keith and others are asking is not whether a
system is reachable when they are not authorized to reach it. The
dreamers in the crowd might like to ignore that, but those of us who
live in the real world can ignore them. The question is the
reachability of systems that one is authorized to reach.
Keith is arguing that end to end addressing is required to implement
that. My point is that the exact number of the address is less
important than the ability to identify the host, given that the
application itself is not trying to know something about network layer
addressing.
_______________________________________________
nat66 mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/nat66