[97236] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Security gain from NAT

daemon@ATHENA.MIT.EDU (Matthew Kaufman)
Mon Jun 4 19:59:36 2007

Date: Mon, 04 Jun 2007 16:31:22 -0700
From: Matthew Kaufman <matthew@eeph.com>
Reply-To: matthew@eeph.com
To: Leigh Porter <leigh.porter@ukbroadband.com>
Cc: Jim Shankland <nanog@shankland.org>,
	Owen DeLong <owen@delong.com>, NANOG list <nanog@nanog.org>
In-Reply-To: <46646237.4050702@ukbroadband.com>
Errors-To: owner-nanog@merit.edu


Leigh Porter wrote:
> Additionally, NATing services on separate machines behind a single NATed 
> address anonymises the services behind a single address.

Agreed. It can be very useful to not expose the internal topology 
through address assignment so as to not expose which 
subnets/desktops/users are accessing certain foreign addresses.

This is an even bigger issue in v6 if your stack exposes the MAC address 
in its choice of stateless autoconfiguration address, as this then gives 
away not just your internal topology but the vendor of the machines (or 
at least the ethernet card maker). One can easily imagine attacks based 
on knowing that a vulnerable and hard-to-upgrade embedded system (an 
Internet-fax machine, say) was on a particular subnet.

Matthew Kaufman
matthew@eeph.com

home help back first fref pref prev next nref lref last post