On Apr 23, 2010, at 10:16 AM, Matthew Kaufman wrote:

> Jack Bates wrote:
>> Matthew Kaufman wrote:
>>> But none of this does what NAT does for a big enterprise, which is to *hide 
>>> internal topology*. Yes, addressing the privacy concerns that come from 
>>> using lower-64-bits-derived-from-MAC-address is required, but it is also 
>>> necessary (for some organizations) to make it impossible to tell that this 
>>> host is on the same subnet as that other host, as that would expose 
>>> information like which host you might want to attack in order to get access 
>>> to the financial or medical records, as well as whether or not the 
>>> executive floor is where these interesting website hits came from.
>>> 
>> 
>> Which is why some firewalls already support NAT for IPv6 in some form or 
>> fashion. These same firewalls will also usually have layer 7 proxy/filtering 
>> support as well. The concerns and breakage of a corporate network are 
>> extreme compared to non-corporate networks.
> Agreed on the last point. And I'm following up mostly because I've received 
> quite a few private messages that resulted from folks interpreting "hide 
> internal topology" as "block access to internal topology" (which can be done 
> with filters). What I mean when I say "hide internal topology" is that a 
> passive observer on the outside, looking at something like web server access 
> logs, cannot tell how many subnets are inside the corporation or which 
> accesses come from which subnets. (And preferably, cannot tell whether or not 
> two different accesses came from the same host or different hosts simply by 
> examining the IP addresses... but yes, application-level cooperation -- in 
> the form of a browser which keeps cookies, as an example -- can again expose 
> that type of information)
> 
So can TCP fingerprinting and several other techniques.

Finally, the belief that hiding the number of subnets or which hosts share 
subnets is a meaningful enhancement to security is dubious at best.

Owen


Reply via email to