[BBLISA] Last night's IPv6 talk

Doug Hirsch dhirsch at pobox.com
Thu May 13 09:31:17 EDT 2010


Several used copies of the book Running IPv6 were available, as of
last night, from Amazon for about $5, shipping included.

I too thank everyone for an interesting talk.

Doug

On 5/13/10, Edward Ned Harvey <bblisa3 at nedharvey.com> wrote:
> Even though I wasn't the organizer last night, I want to thank everyone who
> showed up and participated.  I found it very informative and interesting,
> and apparently so did many other people, reluctantly getting up to go home
> after 9, for the sake of needing to go home *some* time.  ;-)
>
>
>
> There were several points of interest I thought were valuable to stab a
> little deeper into:
>
>
>
> Even as ISP's roll out IPv6, they will not kill IPv4 anytime soon (not in
> the next 5 yrs.)  So for now, that's the solution to the DNS problem.
> Apple, MS, etc have plenty of time to work out the details of DNS
> deployment, DHCPv6 and so on.  Someday, you might have to pay extra to have
> IPv4 enabled on your network connection.
>
>
>
> The references that I cited were:  Running IPv6, Iljitsch van Beijnum.  It's
> good for an understanding of IPv6, but since it's like 5 yrs old, it's
> out-of-date in terms of configuring IPv6 on your system.  Fortunately, that
> doesn't matter at all, because nowadays, enabling IPv6 is trivial.
>
>
>
> I could share it with anyone if they want, up to 2 weeks, if you happen to
> have a kindle (or willing to use the mac or windows amazon kindle reader).
> That should be enough to read the whole thing for all the interesting parts.
> Also, I said it was $10.  Sorry, my mistake, it's $35 to buy.
>
>
>
> I mentioned NAT-PMP.
> http://en.wikipedia.org/wiki/NAT_Port_Mapping_Protocol
>
> And I couldn't remember the name of IGD.
> http://en.wikipedia.org/wiki/Internet_Gateway_Device_Protocol
>
> These are protocols that allow a NAT IPv4 device to communicate with the
> perimeter firewall, to auto-configure a hole through the firewall, to enable
> inbound traffic, to support peer-to-peer traffic.  Today, these protocols
> are not widely built-in to firewalls.  But some do support it.  Generally
> speaking, professional level security appliances don't support it, but
> hopefully that will become optional in the near future (and controllable via
> system policy), because I feel it's a very valuable thing, to enable
> peer-to-peer video conferences for example.
>
>
>
> The thing that's nice about NAT-PMP and IGD is that the client must
> explicitly request the hole opened at the perimeter firewall before it's
> allowed in.  So this is an additional layer of security, above just your
> software firewall.  Obviously, nobody feels very comfortable simply exposing
> all their internal IP's to the Internet.  So this helps facilitate
> communications without sacrificing security.
>
>
>
> Today, if you want to do p2p, the recommendation would be IPv4, with one of
> these.  Most p2p apps support it (skype, bit torrent, and many H323 or SIP
> clients, etc).  The question that remains is whether or not your perimeter
> firewall supports it.
>
>
>
> Moving forward, if you have world routable IPv6 addresses, there's no need
> for NAT and hence no need for NAT-PMP or IGD.  However .  As mentioned
> before, the only security that NAT offers you is implicitly blocking inbound
> unknown traffic.  Moving forward, the recommendation would be to still
> enable the firewall to block inbound unknown traffic.  In which case, the
> recommendation would be to use IPv6, *and* NAT-PMP or IGD, or the
> alternative du-jour.
>
>
>
> Not previously mentioned, the other security that NAT offers is internal
> network roadmap masking.  That is, somebody outside has no way of knowing
> your internal network topology or subnet ranges and possible router hops.
>
>
>
> Believe it or not, IPv6 can be NAT'd if you want to.  (Though implementation
> may be sparse or nonexistent right now.)  Many of the IETF idealists would
> scoff at that as being sacreligious and defeating the purpose, but you can
> see how slowly things move when you're trying to be ideal.  If striving for
> perfection, then critical components (DNS, DHCP) get left out by the time
> you need to use them.  So, just as you can expect people to use DHCPv6
> despite extremist objections, so you can expect some organizations to do
> IPv6 NAT sometimes despite the extremist views of individuals in the IETF.
> Specifically because they don't want to expose the internal network roadmap.
>
>
>
>
> One thing that's cool is:  If you do NAT your IPv6, you have a very large
> number of external IP's.  So you could do a one-to-one mapping of internal
> IP's to external IP's, instead of the many-to-one mapping that's generally
> used in IPv4.  Thus, you eliminate the p2p problems that IPv4 NAT has, and
> you're still able to do NAT.
>
>



More information about the bblisa mailing list