On Wed, Apr 21, 2010 at 4:12 AM, Edward Ned Harvey <lop...@nedharvey.com>wrote:

> > From: Colm Buckley [mailto:c...@tuatha.org]
> >
> > There's nothing about P2P applications which requires an open firewall;
>
> If you're behind a firewall, which blocks inbound unknown connections,
> And I'm behind a firewall, which blocks inbound unknown connections,
>
> Then how do you propose you and I can communicate p2p?  It's only possible
> via techniques such as NAT traversal and STUN, which will only work on
> braindead firewalls.
>

I think we may be differing on the meaning of "unknown".  If the firewall is
configured not to allow P2P traffic, then there is no way to use these
protocols.  If, however, the network administrator does allow P2P traffic
(either by requiring proxy authorisation, or simply opening the relevant
ports), then it becomes trivial.  It doesn't mean that the firewall needs to
open "unknown" connections; what do you mean by the term "unknown"?

If the intention is to allow P2P traffic, then it's vastly easier on IPv6
where the IP address of the endpoint is consistent everywhere; there's no
need either for ugly external to internal port/IP mappings, nor for hacky
reflector or STUN setups.

RFC3041, first of all, is client-based.  It doesn't allow a sysadmin to mask
> the internal network topology; it's up to all the internal clients to do it
> voluntarily.
>

Yes; this is true.  I don't really see that it's important, though.  It's
client security which is important; subnets and the like don't actually have
an existence apart from the clients which exist on them.


> And second of all, that just means the clients' IP address will change.  It
> doesn't mask the network topology.  If some outside person does a
> traceroute, it will work perfectly well, identifying all the intermediate
> routers necessary to reach your internal node.
>

Well, sure, but why is this a problem?  It's always possible to block the
relevant bits of ICMP at the border firewall if you're really concerned
about not releasing the IP addresses of your internal routers; this would be
preferable than breaking the underlying addressing model of IP using NAT.
 NAT is basically an ugly hangover from the days of short address space and
lazy firewall design; it's always caused far more problems than it solves.

The IPv6 model is basically that every device has an address which is either
reachable through the relevant firewalls, or not.  Everything becomes
simpler under this model; take a look at the ludicrously overcomplicated
topology of your average multisite VOIP or VC network, with reflectors,
gatekeepers and the like, or the hacks which nearly everyone has at their
border firewall to map particular DMZ ports through to internal ports,
fragile though that be.

The point of RFC3041 is not masking your network topology.  It's making your
> laptop not uniquely identifiable or trackable.
>
> Have you read it?  It doesn't sound like you have.
>

Read it, set it up, using it right now.

Colm



-- 
Colm Buckley / c...@tuatha.org / +353 87 2469146
_______________________________________________
Discuss mailing list
Discuss@lopsa.org
http://lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to