Re: [v6ops] Thoughts about wider operational input

Vasilenko Eduard <vasilenko.eduard@huawei.com> Fri, 01 April 2022 07:15 UTC

Return-Path: <vasilenko.eduard@huawei.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E4CDB3A182E for <v6ops@ietfa.amsl.com>; Fri, 1 Apr 2022 00:15:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.906
X-Spam-Level:
X-Spam-Status: No, score=-1.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cO2os8pb8sqr for <v6ops@ietfa.amsl.com>; Fri, 1 Apr 2022 00:15:38 -0700 (PDT)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 258723A161E for <v6ops@ietf.org>; Fri, 1 Apr 2022 00:15:38 -0700 (PDT)
Received: from fraeml742-chm.china.huawei.com (unknown [172.18.147.200]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4KVBFw41CLz67xGQ for <v6ops@ietf.org>; Fri, 1 Apr 2022 15:12:52 +0800 (CST)
Received: from mscpeml500002.china.huawei.com (7.188.26.138) by fraeml742-chm.china.huawei.com (10.206.15.223) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Fri, 1 Apr 2022 09:15:33 +0200
Received: from mscpeml500001.china.huawei.com (7.188.26.142) by mscpeml500002.china.huawei.com (7.188.26.138) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Fri, 1 Apr 2022 10:15:33 +0300
Received: from mscpeml500001.china.huawei.com ([7.188.26.142]) by mscpeml500001.china.huawei.com ([7.188.26.142]) with mapi id 15.01.2375.024; Fri, 1 Apr 2022 10:15:33 +0300
From: Vasilenko Eduard <vasilenko.eduard@huawei.com>
To: Joe Maimon <jmaimon@jmaimon.com>
CC: v6ops list <v6ops@ietf.org>
Thread-Topic: [v6ops] Thoughts about wider operational input
Thread-Index: AQHYPWL+5ay9cZSrXUWG+DzsIaGQi6zKIZgAgAAMoQCAAA6FAIAApH4AgAALFICAAAQtAIAAAngAgABbovCADAHPXoAAAh4AgAAO+ICAAHdLgIAACJmAgAAPIoCAAILrgIAABmUAgAI7AiA=
Date: Fri, 01 Apr 2022 07:15:33 +0000
Message-ID: <b3e8b9bf090342fd92d622d8734a0250@huawei.com>
References: <52661a3d-75dc-111a-3f23-09b10d7cb8d4@gmail.com> <A72CDDDB-CDCE-4EAF-B95E-997C764DB2C4@gmail.com> <9175dc32-45c1-e948-c20a-3bcc958b77b9@gmail.com> <YjmJQMNgnJoSInUw@Space.Net> <D75EF08F-6A41-41B2-AFB2-649CBCC1D83E@consulintel.es> <CAPt1N1nRnYUFA=yyJHx6t52yqWbmcd2Tf1H8gQuCZBd3Q3VqJw@mail.gmail.com> <7F4AEB43-4B24-4A21-AE9D-3EB512B98C46@consulintel.es> <8fac4314b8244ba6b33eea68694296d0@huawei.com> <9A13E47B-75D0-443F-9EE9-D2917ACB2D0F@consulintel.es> <CAO42Z2xUG+BXj+VQpajed9aGjH+q-HR7RX7C-T4DsTbouz7xWQ@mail.gmail.com> <F6A90BBF-7F44-403E-960A-8F756353B562@chinatelecom.cn> <B49417F7-3EFB-4A4D-9D1A-0D21574EA4F2@consulintel.es> <44B01ACA-3D5C-4618-B608-3B3479D29875@consulintel.es> <62447DCB.1010206@jmaimon.com> <F04A9339-1C9F-40AA-8FD3-646106F71D5F@isc.org> <6244F0FA.4080809@jmaimon.com>
In-Reply-To: <6244F0FA.4080809@jmaimon.com>
Accept-Language: zh-CN, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.81.189.28]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/GCRjuBUbqd1pqqQ2EVY0yYgFw0s>
Subject: Re: [v6ops] Thoughts about wider operational input
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Apr 2022 07:15:44 -0000

Hi Joe,

What about the capability to initiate connectivity from the outside?
It is easy for the Firewall - just a rule on the CPE.
It is more difficult in NAT44 where the rule should be on the centralized CGNAT.
It restricts the potential list of services that is possible through NAT.

Eduard
-----Original Message-----
From: v6ops [mailto:v6ops-bounces@ietf.org] On Behalf Of Joe Maimon
Sent: Thursday, March 31, 2022 3:08 AM
To: Mark Andrews <marka@isc.org>
Cc: v6ops list <v6ops@ietf.org>; JORDI PALET MARTINEZ <jordi.palet=40consulintel.es@dmarc.ietf.org>
Subject: Re: [v6ops] Thoughts about wider operational input



>
>>
>>
>> JORDI PALET MARTINEZ wrote:
>>> To demonstrate how NAT is not security, you just need to enable Teredo or any other UDP tunneling traversing the NAT, so the security guys can see that without any special config in the NAT, you can dig a whole on it (Teredo Navalis = Shipworm).
>>>
On 31 Mar 2022, at 02:56, Joe Maimon <jmaimon@jmaimon.com> wrote:

>> And then you need to demonstrate how the equivalent would not happen on IPv6.

Mark Andrews wrote:
> The fix is the same in both protocols.  Install a FIREWALL and properly configure it to block port 3544.
> NAT is not and never has been a FIREWALL.
>
> A flat screw drive and a flat chisel can both be used to remove screws 
> or dig out wood.  They both work well at what they are designed to do and not for which they are not designed to do.
>

There is no actual permanent solution for internal to external worm/tunneling protocols, except yanking the plug or equivalent security policy.

There is just blocking the method du-jour. When possible.

All this is irrelevant to my point, which seems to have sailed overhead that Jordi's little demonstration says nothing about NAT and security that it does not also say about a similarly configured IPv6 firewall and hence would be dishonest showboating.

Joe



_______________________________________________
v6ops mailing list
v6ops@ietf.org
https://www.ietf.org/mailman/listinfo/v6ops