Re: [v6ops] Thoughts about wider operational input

Nick Buraglio <buraglio@es.net> Thu, 31 March 2022 21:34 UTC

Return-Path: <buraglio@es.net>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E2A7A3A1222 for <v6ops@ietfa.amsl.com>; Thu, 31 Mar 2022 14:34:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.108
X-Spam-Level:
X-Spam-Status: No, score=-2.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=es.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BuwbHuE-Qd6m for <v6ops@ietfa.amsl.com>; Thu, 31 Mar 2022 14:34:10 -0700 (PDT)
Received: from mail-lf1-x136.google.com (mail-lf1-x136.google.com [IPv6:2a00:1450:4864:20::136]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 664883A1F5D for <v6ops@ietf.org>; Thu, 31 Mar 2022 14:33:36 -0700 (PDT)
Received: by mail-lf1-x136.google.com with SMTP id bq24so1473645lfb.5 for <v6ops@ietf.org>; Thu, 31 Mar 2022 14:33:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=es.net; s=esnet-google; h=mime-version:references:in-reply-to:reply-to:from:date:message-id :subject:to:cc; bh=QpEFCA3Ab/Rt5TuPHnUexdp+rhiL7lzkX7L26BNuQgI=; b=DdxWeaNtJOpTygrEGiSlwpAkbOgpFrTwDlQYUj5f2yhU8LtQSDCRQv5nwuyLrI0a9R jteP3Bx6NdpzrO0PPXhw5SYQl0rdWtmHgEtU88MFK/MiygkH012IZEujPcAHCjAd6SeG r6BiUAxWcRJiw1XmI8MqvbZjzoRr2Cw70UZEPEdYkHQbrldjuTxqli+u7htRt1VaRxjS fMlonkHpYYGGBngl5IRdYvCFAzrGAVPj71Lf5AJc6sZzrw44T7bSZHEuepM+RizaAI9O 0pMirS5xWxcDbYwM37EcV6FFAE9ZSNd8SzsisOo77KM8GPmigeQDedH+uE4wWtpsMSk8 2vIg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:reply-to :from:date:message-id:subject:to:cc; bh=QpEFCA3Ab/Rt5TuPHnUexdp+rhiL7lzkX7L26BNuQgI=; b=05+tEc2xZP+HVZhevDuM2ImUWZ7zZrI9lbHFE+h7Z1iVd1w2OWvHxUF7KeD+zuagI6 ZtQIfJ5kbyrrezR8+t+BfqV603R2v3whDfK09qxZmcMpJT/LRs41EIbCkdda+CgoVS23 NyMbXcADrIfDiU42sWXCDQrkdVFKUvlU1PH2zZsAcPKqhHy2jsYB58gHgd2WCOJ4e9fU eGVNyIYq7OxQ9Zlcrcs3aqE0cIN0TrWOxeV6kZ+RwTpBlQTspv0s0+FVwXZbt5A9UIQI 5TkDfwh5Pk4EfjIeOrYDIdTuUXpScOQkz+Wn91eRA8fIOXDb1MJ4vzzHfpZYDJahpsav IIjw==
X-Gm-Message-State: AOAM533CjIMHh0QIoE4u+ylMYg88DeGG3GBRr5mHJ6gtYzIw88L1dxI3 QN5LTB2XONtZ4xTIW0kkKASHu9rJ5mbRtMqPSVCckFAfJMZIxUwj3K2wdxuBOPOEuNEsa8zhFgY peX3IOu01SbL1pa7dysDnBB6MG0g7aeRj76HhKJFXT0Y5Kga5kH1WF0tTZ4P6zPS/BNGQhhr7LG ZTElpT
X-Google-Smtp-Source: ABdhPJz+84ys2EZtn1sAv2sKrgk/OV2SEBquY/hKKnkhN1tk2HpagIHcRTLklozoBEHTVw66dqPFSnX6vSXu6c8MPcU=
X-Received: by 2002:a05:6512:789:b0:44a:d12d:6210 with SMTP id x9-20020a056512078900b0044ad12d6210mr2460913lfr.41.1648762413650; Thu, 31 Mar 2022 14:33:33 -0700 (PDT)
MIME-Version: 1.0
References: <52661a3d-75dc-111a-3f23-09b10d7cb8d4@gmail.com> <A72CDDDB-CDCE-4EAF-B95E-997C764DB2C4@gmail.com> <9175dc32-45c1-e948-c20a-3bcc958b77b9@gmail.com> <YjmJQMNgnJoSInUw@Space.Net> <D75EF08F-6A41-41B2-AFB2-649CBCC1D83E@consulintel.es> <CAPt1N1nRnYUFA=yyJHx6t52yqWbmcd2Tf1H8gQuCZBd3Q3VqJw@mail.gmail.com> <7F4AEB43-4B24-4A21-AE9D-3EB512B98C46@consulintel.es> <8fac4314b8244ba6b33eea68694296d0@huawei.com> <9A13E47B-75D0-443F-9EE9-D2917ACB2D0F@consulintel.es> <CAO42Z2xUG+BXj+VQpajed9aGjH+q-HR7RX7C-T4DsTbouz7xWQ@mail.gmail.com> <F6A90BBF-7F44-403E-960A-8F756353B562@chinatelecom.cn> <B49417F7-3EFB-4A4D-9D1A-0D21574EA4F2@consulintel.es> <44B01ACA-3D5C-4618-B608-3B3479D29875@consulintel.es> <62447DCB.1010206@jmaimon.com> <7228D9A7-54A8-4BAE-9299-204C049F600B@consulintel.es> <6244BA91.3060306@jmaimon.com> <67762447-43D4-4393-851C-99370D3BF623@thehobsons.co.uk>
In-Reply-To: <67762447-43D4-4393-851C-99370D3BF623@thehobsons.co.uk>
Reply-To: buraglio@es.net
From: Nick Buraglio <buraglio@es.net>
Date: Thu, 31 Mar 2022 16:33:22 -0500
Message-ID: <CAM5+tA9+O8WeqXzZ6VozgSVstTktjWScRaE5S1KErZqcOmej3w@mail.gmail.com>
To: Simon <linux@thehobsons.co.uk>
Cc: v6ops list <v6ops@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000fc8f6c05db8a69dd"
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/CXMw3sIE8BeOv50dbBVDEViMfPQ>
Subject: Re: [v6ops] Thoughts about wider operational input
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2022 21:34:17 -0000

For 20+ years security vendors have conflated NAT and Firewall. That isn't
going to go away, frankly, and from the point of view of the security
engineer at an organization of a sufficient size, it doesn't matter if it
is technically correct or not. Obfuscating addressing is a very engrained
design model, largely because of this fact. I believe there is no a way
around that at least in the short term, probably also in the long term.
Understanding that what "enterprises" want is going to be driven by two
things: cost and risk. Address obfuscation is very, very, *very* (95%?)
present in enterprise architectures. Deviating from that is largely a
non-starter because it deviates from existing risk profiles and completely
changes the decades old architectures of application proxies and address
translation devices in strategic locations and like Joe M. has stated, the
fail closed model is by-and-large a requirement for many large
organizations.
If we want to understand what the enterprises want, we need to understand
their cost models and risk profiles.  Enterprises aren't going to fret much
about state tables, they'll buy bigger boxes. They aren't going to worry as
much about performance as, say, a service provider or a supercomputing
center. They care that their compliance requirements are met [see address
obfuscation, default deny, etc.], that their risk remains as low as
possible, and that their widget sells.
I hate to say it because I truly want the end to end connectivity, but I
believe that address translation with IPv6 is not going anywhere, and in
fact, will probably encourage deployment of v6 in the enterprise space.
It's a useful tool to get to where they want to be (again, see risk and
cost).
I think we need to rectify the fact that enterprises don't necessarily want
end to end connectivity for the above reasons, and I have seen significant
evidence pointing to that fact.

nb

On Thu, Mar 31, 2022 at 12:33 PM Simon <linux@thehobsons.co.uk> wrote:

>
>
> > On 30 Mar 2022, at 21:16, Joe Maimon <jmaimon@jmaimon.com> wrote:
>
> > JORDI PALET MARTINEZ wrote:
> >> Because if you don't have NAT, you are forced to properly configure a
> firewall.
>
> > That is backwards.
>
> ONLY if you start from the premise that NAT is not in fundamental conflict
> with IP basics - namely that “packets can be routed from any end point to
> any other end point” (with the modern security proviso of “subject to
> administrative policies”.)
> In any case, I’m used to configuring a firewall anyway. Most CE devices
> come with a stateful firewall installed and configured - most of them even
> with sensible defaults !
>
> > NAT is an operational requirement. You have it because without it
> something does not work the way you want it to.
>
> Not for IPv6. You are applying the “lets take IPv4 with all its faults and
> tack on some extra address bits” attitude. We should be taking the
> opportunity to fix the things that weren’t perfect/right with IPv4.
> And for the record, in my last job we were lucky enough to have a whole
> /24 to play in - and we did, without NAT for the most part. And guess what,
> it worked very well thank you.
> NAT is not strictly an operation requirement anyway, NAT is a sticking
> plaster on the festering sore of insufficient IP addresses. I would argue
> that NAT is the fundamental evil that is holding back adoption of a proper
> fix to the underlying problem - because it’s been “sold” as a solution by
> people who do not also mention that it’s broken and should be treated as a
> stopgap at most rather than the saviour of the internet it’s been hailed as.
>
> Most of the discussions in this thread have come down to “the problems
> with NAT haven’t been a big enough pain point to trigger properly adopting
> IPv6” - mostly because many of the people making the decisions don’t
> actually get to see the problems and costs they are subjected to.
> In a way there’s a parallel with the Y2k problem - I was one of many IT
> people doing work up front only to have both users and management ask “so
> what was the fuss about”. Of course, by fixing most problems invisibly up
> front, and the remaining ones as they cropped up, management never saw the
> underlying problem.
>
>
> > On 30 Mar 2022, at 22:22, Joe Maimon <jmaimon@jmaimon.com> wrote:
> >
> >
> >
> > Simon wrote:
>
> >> Any form of NAT breaks things<period> That’s the short answer.
> >>
> >> Longer answer, any protocol that embeds addresses in it gets broken -
> e.g. during session setup one end tells the other, please contact me at
> address X and port Y. That is quite common once you get past a basic “open
> connection, squirt some data, close session”. Examples that come
> immediately to mind :
>
> > In OSI speak thats a layering violation. An upper level protocol
> incorporates details and assumptions about lower layers as part of its
> operations.
>
> Citation ?
>
> > Unfortunately, TCP/IP and its application protocols are rife with them.
> Well more than one should expect were proper attention have been given to
> ensure that there was absolutely no equivalent proper way to do it.
>
> So do you agree that HTTP is fundamentally broken then ? Either that, or
> it’s a protocol violation to run a service on anything but ports 80 and 443
> ? Put another way, it’s a protocol violation to have a link to say my
> server:8443 ?
>
> > Just because its common and convenient and usually works or can be made
> to work does not make it correct.
>
> And of course, it’s usually done because it is the most sensible way to do
> it. Lets look at SIP for an example.
>
> The device (lets assume a simple phone to keep things simple) needs to
> talk SIP in order to control sessions. But it makes complete sense to use a
> different protocol to transfer the audio streams (multiple) - and note what
> I said about the audio streams not necessarily going to the same place as
> the SIP user registration.
> What you’ve said is that it should be “illegal” to allow my phone to
> exchange audio streams directly with someone else’s phone - OSI layer
> violation. Yet that is the most efficient way to do it (where it’s
> possible). The alternative is something like IAX where the application is
> effectively embedding a chunk of protocol stack - the ability to multiplex
> the packets of multiple streams inherent in IP (TCP or UDP) over one
> network - into the application. And in the world where all the traffic must
> be carried in one session, it means your voice traffic must pass through an
> “exchange” at both ends, adding delay and jitter as well as processing load
> to what would otherwise be a very lightweight application.
>
> >> They all involve developers, and support people, putting effort into
> implementing the workaround code and support (e.g. adding the settings to
> the config pages) and users waste effort getting them set up right. All
> effort that could be better put to productive use rather than fighting
> broken networks.
> >
> > In theory, the protocols are broken. If they hadnt taken the easy way
> out, we would not have to work around so many of them.
>
> Again, citation. According to whom, other than the “NAT is beautiful”
> brigade are they broken ?
>
> > RAM is cheap.
>
> Not in many lightweight devices it isn’t.
>
>
>
> Simon
>
> _______________________________________________
> v6ops mailing list
> v6ops@ietf.org
> https://www.ietf.org/mailman/listinfo/v6ops
>