Given that I haven't implemented IPv6 in the least, I probably
shouldn't be wading into this discussion, but I've read a bit about it
a bit. That may not mean so much, though...

So anyway, as I understand it, IPv6 addresses are all about the
address prefix...and one of the prefixes is a link local prefix, which
allows only communication with hosts on the local subnet.

My assumptions have been that there will be a gateway firewall between
the trusted network and the untrusted and/or DMZ networks with
specific holes punched to allow permitted traffic, and everything else
being blocked, by default.

That does leave the possibility of a misconfiguration on the firewall,
and since security in-depth is a way of life, only the internal hosts
which need direct communication with the outside world will have IPs
with routable prefixes. All non-hardened machines will only have a
link-local IP (or have a secondary IP which is enterprise-specific and
unroutable).

Not every network can abide by an "ideal", where internal hosts need
no communication with the outside world (Spacewalk / MS Update servers
don't grow on trees, I suppose), but it seems that in a lot of the
cases where extra security is encouraged, this would be a viable
option.

Like I said, though, I may have a significant misunderstanding of the
situation, in which case, I welcome correction.

--Matt


On Wed, Mar 30, 2011 at 6:07 PM, Edward Ned Harvey <lop...@nedharvey.com> wrote:
> Ok, that other thread got kind of out of control.  So let's try this
> question again, in a different way:
>
> Given:  When using IPv6, some people will use NAT, others won't.  Each
> person can make their own decision.  If you want to dispute that, please
> start a new thread instead of this one.  I've had that discussion here
> before, and I'm done with it.
>
> Whether you NAT or NOT, most will agree it's a bad idea to expose your
> toaster, watch, TV, laptop and everything to the unsolicited inbound traffic
> from the wild wild web.
>
> Therefore, a stateful firewall packet filter at the perimeter is necessary
> to block inbound unsolicited traffic.
>
> Therefore, p2p in general is broken.  Unless....
>
> Unless there is a protocol or solution of some sort, that allows internal
> devices to reconfigure the perimeter firewall to allow the inbound traffic.
> Such tasks are currently done via NAT-PMP and IGD, but those unfortunately
> seem to be IPv4 only.  So...  What's the solution for IPv6?
>
> _______________________________________________
> Tech mailing list
> Tech@lists.lopsa.org
> https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
> This list provided by the League of Professional System Administrators
>  http://lopsa.org/
>



-- 
LITTLE GIRL: But which cookie will you eat FIRST?
COOKIE MONSTER: Me think you have misconception of cookie-eating process.
_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to