SecDir Review of draft-ietf-v6ops-natpt-to-historic-00

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the IESG.
These comments were written primarily for the benefit of the security
area directors.  Document editors should treat these comments just like
any other last call comments.

Background: The document describes the issues with NAT-PT as defined in
RFC2766 and recommends reclassification of the RFC to historic status.
NAT-PT allows communication between IPv4-only nodes and IPv6-only nodes
via a set of network layer translation mechanisms (a combination of
address and protocol translations). 

Review Summary: In general, I agree that while NATs have been a
necessary evil for IPv4, they should not be restricting IPv6 development
or applications. The document does a good job of describing the issues,
although, as I will indicate below, some of the issues described are
applicable to NATs in general and are not specific to NAT-PT alone. I
did not find any security issues with the document. 

Details: 

* Almost all the security issues pointed out in the document apply to
NATs in general and are not unique to NAT-PT. Having said that though, I
agree that those issues unnecessarily affect IPv6 if NAT-PT is used. For
instance: 

    - Section 1 points out the scalability concerns and single point of
failure introduced by NAT-PT, making it a nexus for attacks. While true,
this is true of NATs and more generally, true of any centralized entity
introduced by any protocol. IPsec gateways, Mobile IP Home Agents are
all examples of centralized entities through which a large volume of
traffic must pass. The major difference is that those are centralized
entities with which end nodes have a security association and are aware
that traffic is passing through those entities, while NATs are
essentially transparent and may be changing packets without
authorization. Hence, it is extremely difficult to detect a misbehaving
NAT than it is to detect some other misbehaving centralized entity. 

    - DoS threats relating to resource exhaustion are pointed out at a
couple of places in the document. The same comment as above applies
there as well. 

* Section 2.1 talks about issues with NAT-PT in protocols embedding IP
addresses. The issue about address length differences and the
consequences is certainly valid. All the ALG related issues, though, are
applicable to any kind of NATs. 

    - This section states "Assuming that the NAT-PT contains a
co-located ALG for one of the relevant protocols, the ALG could replace
the embedded IP addresses and ports.  However, this replacement can only
happen if no cryptographic integrity mechanism is used and the protocol
messages are sent in the clear (i.e., not encrypted)." Such an
operation, in theory, is also feasible when the IP addresses and ports
are considered mutable fields for security purposes. However, the stated
issues are valid for most known security protocols. 

    - This section calls out the need for UDP encapsulation of IPsec
traffic. Any protocol that does not run over a transport layer needs UDP
encapsulation for NAT traversal and this is not specific to NAT-PT.
We've done that with IPsec, MIP4, etc. and we've even run IKE over
different ports to avoid ALGs messing up the protocol. 

Hope that helps. 

Vidya

_______________________________________________

Ietf@xxxxxxxx
https://www1.ietf.org/mailman/listinfo/ietf


[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]