[190060] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Netflix banning HE tunnels

daemon@ATHENA.MIT.EDU (Ricky Beam)
Tue Jun 14 14:57:45 2016

X-Original-To: nanog@nanog.org
To: "Owen DeLong" <owen@delong.com>
Date: Tue, 14 Jun 2016 14:57:40 -0400
From: "Ricky Beam" <jfbeam@gmail.com>
In-Reply-To: <3D30DC0D-0279-46C0-97FF-8237FB613B88@delong.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

On Sun, 12 Jun 2016 19:47:18 -0400, Owen DeLong <owen@delong.com> wrote:
>> NAT may not be security, yet it's the only thing securing billions of  
>> people.
>
> Nope… NAT Can’t be done without stateful inspection.

Negative.
- 1:1 NAT (inside address A == outside address B) requires no state of any  
kind.
- Connection Tracking is not stateful inspection
- NAT Helpers / ALG / etc. (things that look for embedded addresses)  
aren't "stateful inspection"

The only "security" one gets from NAT comes from the lack of outside  
visibility through the NAT. An outside host cannot initiate a connection  
to any specific inside host of their choosing.

I've seen many "IPv6 Capable" CPEs that apply ZERO security to IPv6  
traffic. IPv4 goes through NAT, so one gets the pseudo-security of not  
being directly touchable from the internet.

home help back first fref pref prev next nref lref last post