Re: IESG position on NAT traversal and IPv4/IPv6

"Tadayuki HATTORI" <taddyhatty@nifty.com> Thu, 18 November 2010 02:26 UTC

Return-Path: <taddyhatty@nifty.com>
X-Original-To: ietf@core3.amsl.com
Delivered-To: ietf@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4C5FA3A67BD for <ietf@core3.amsl.com>; Wed, 17 Nov 2010 18:26:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level:
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, STOX_REPLY_TYPE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q2GLkymlIe8N for <ietf@core3.amsl.com>; Wed, 17 Nov 2010 18:26:22 -0800 (PST)
Received: from msag503.nifty.com (msag503.nifty.com [202.248.238.124]) by core3.amsl.com (Postfix) with ESMTP id 86DEA3A677C for <ietf@ietf.org>; Wed, 17 Nov 2010 18:26:22 -0800 (PST)
Received: from GATEWAY (EM111-188-86-3.pool.e-mobile.ne.jp [111.188.86.3]) (authenticated) by msag503.nifty.com with ESMTP id oAI2Qu9l028165; Thu, 18 Nov 2010 11:26:58 +0900
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nifty.com; s=apr2010msa; t=1290047221; bh=WpwzrcQfX2jvP5MdVyoP7J17jXkOjFj7cCdH2yQUcHw=; h=Message-ID:Reply-To:From:To:Cc:References:Subject:Date: MIME-Version:Content-Type:Content-Transfer-Encoding; b=NxJzRmVVXt4bfhIjEh3F0rs7KhARW3Kk32k/CRD1NvPRpzbB8XGrM+FaJP15wnMd6 qSDSEnZkYoPr+m018sGbeCpvbEEcEmnZ7XuRcRp7mcmqnJzwc3zUKlvmHz+Cqu27a2 7OMtCr1YaC4pF3pMg4Nf257H5zlraDF4eY9RNQZ8=
X-Nifty-SrcIP: [111.188.86.3]
Message-ID: <5957D03791524ABF96EBE430C8CDC56F@GATEWAY>
From: Tadayuki HATTORI <taddyhatty@nifty.com>
To: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
References: <201011171741.oAHHfkAp014464@fs4113.wdf.sap.corp> <4CE466DC.3080807@necom830.hpcl.titech.ac.jp>
Subject: Re: IESG position on NAT traversal and IPv4/IPv6
Date: Thu, 18 Nov 2010 11:26:56 +0900
Organization: TaddyHatty
MIME-Version: 1.0
Content-Type: text/plain; format="flowed"; charset="utf-8"; reply-type="original"
Content-Transfer-Encoding: 8bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.5931
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5994
Cc: hallam@gmail.com, ietf@ietf.org
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: Tadayuki HATTORI <taddyhatty@nifty.com>
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Nov 2010 02:26:27 -0000

Hey, are you Japanese or Not?
Have you already quited Japanese?

Anyone should consider about both the protocol and
the constitution of own nation simultaneously.

It's the matter of right or wrong, not legal or illegal.

---
TaddyHatty,  



>
> Martin Rex wrote:
>
>>>> Correct.  It is called the HTTP CONNECT method.
>>>
>>> If, with your definition of "traversal", tunneling is a form
>>> of traversal, tunneling by IPSEC is a standard firewall
>>> traversal protocol and is much better than HTTP CONNECT
>>> because of UDP.
>>
>> Not quite.  Tunneling needs matching configurations on both ends,
>
> Yes, of course.
>
>> and that rarely works, in particular on a global scale with
>> peers you do not know a-priori.
>
> Where is the point to use firewalls or firewall functionality
> of NAT to be tunneled by someone you do not know a-priori?
>
> That's why I said:
>
> : FYI, traversable firewall is, by definition, broken.
>
> Or, if you are saying you and your peer are members of some
> large organization, the organization can take care of
> IPSEC peering configuration.
>
> But, too often, it is a lot easier, a lot more convenient and
> a lot more flexible to use ID/password at the application layer,
> which is partly why IPSEC is not really deployed.
>
>> Home DSL routers usually do NAT.  For outgoing connections,
>> they're transparent.
>
> Unlike end to end NAT, legacy NAT is not very transparent.
>
>> For incoming connections, it is either
>> possible to configure static mappings (external->internal)
>
> If you want to run servers behind NAT, you need static IP
> addresses and static port numbers, of course.
>
>> or there might be some dynamic configurability through UPnP.
>> UDP included.
>
> It works only after a connection is established through
> a static IP address and a port number.
>
> Masataka Ohta
> _______________________________________________
> Ietf mailing list
> Ietf@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf