TIP: Click on subject to list as thread! ANSI
echo: ipv6
to: Markus Reschke
from: Victor Sudakov
date: 2019-01-27 15:08:00
subject: NAT

Dear Markus,

26 Jan 19 16:26, you wrote to me:

 VS>> The security guidelines I have read don't specify "NAT must be
 VS>> used." They specify "RFC1918 addresses must be used in the
 VS>> internal network."

 MR> For IPv6 they could use ULA (RFC4193). ;)

Good point. Thank you. Maybe fc00::/7 has a chance of becoming the new 
192.168/16.

 VS>> A static NAT has limited usage and indeed does not provide much
 VS>> additional security. But the dynamic NAT and especially PAT
 VS>> provide a very important security feature no packet filter
 VS>> provides: they *hide* the *source* *addresses* of internal hosts
 VS>> thus effectively hiding the network structure from outsiders.

 MR> And some dumbass enables UPnP on the firewall/router. >:)

I don't think enterprise-class firewalls have UPnP, do they?

And thinking about SOHO and home routers/firewalls, what kind of IPv6 
connectivity are they going to have, what do you think? Those present who have 
native IPv6 connectivity, what's your ISP's policy on assigning addresses to 
customers?

If my ISP were going to give me one IPv6 address (a /128) or even one /64 net, 
this would be too few for my purposes. For my current home network, I use five 
/64s, so for me it would be a /56 at least.

 MR> If an
 MR> organization thinks that it has to hide the internal IP addresses for
 MR> security reasons it can use NAT or proxies. Anyway, they still need
 MR> much more than that to secure their network.

 MR>>> There's also NAT for IPv6.

 VS>> Never heard of that, other than DNS64/NAT64 which are for a
 VS>> different purpose.

 MR> NAT66

Interesting. Do you know of any implementations that could translate ULA 
addresses into one global /64 pool?

Victor Sudakov, VAS4-RIPE, VAS47-RIPN
--- GoldED+/BSD 1.1.5-b20160322-b20160322
                                                                                               
* Origin: Ulthar (2:5005/49)

SOURCE: echomail via QWK@pharcyde.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.