Re: TCP simultaneous open using iptables NAT?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, May 28, 2009 at 2:28 PM, Jozsef Kadlecsik
<kadlec@xxxxxxxxxxxxxxxxx> wrote:
> On Wed, 27 May 2009, Saatvik Agarwal wrote:
>
>> For my research project in school, I am trying to establish TCP
>> connections when both hosts are behind full-cone NATs using TCP's
>> simultaneous open functionality. Unfortunately, it seems that iptables
>> does not support TCP simultaneous open. For my test environment, I
>> simulate a full-cone NAT using iptables. My iptables rule is exactly
>> as follows:
>>
>> iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
>
> That rule cannot simulate full-cone NAT, because netfilter implements
> port-restricted cone NAT.
I agree to most of stuff that you have said but the above statement of
"port-restricted cone NAT" confuses me.
If we look at different types of NATs as mentioned here
www.crfreenet.org/~martin/referaty/stun/naty.pdf , i think the
netfilter implementation is really a symmetric NAT.
Iam I missing some thing?

>
>> According to the BEHAVE requirements outlined in IETF RFC 5382, TCP
>> simultaneous open must be supported by "well behaved NATs". So is
>> there a mistake in my rules or does iptables not support simultaneous
>> open?
>
> The connection tracking subsystem does not support TCP simultaneous open.
>
> As far as I'm concerned, I do not care whatever RFC is created in trying
> to push NAT over its limits - that is just a totally wrong track. NAT was
> invented solely to slow down the depletion of the IPv4 address space in
> the hope to give more time introducing and *deploying* IPv6 world-wide.
> And everyone was fully aware that NAT breaks one of the key concempts of
> IP, the end-to-end connectivity. These "NAT behavioral requirements" RFCs
> are the results of that breakage (and written exclusively from the point
> of view of the application designers).
>
> It is no point trying to *put back* end-to-end connectivity on top of NAT
> when the clear and straight solution is to go to IPv6.
>
> The end-to-end connectivity is the very reason why I refuse the idea to
> implement NAT for IPv6 in netfilter. The damage what IPv4 NAT produced
> hasn't taught us not to repeat the same mistake again, willingly?
>
> Best regads,
> Jozsef
> -
> E-mail  : kadlec@xxxxxxxxxxxxxxxxx, kadlec@xxxxxxxxxxxx
> PGP key : http://www.kfki.hu/~kadlec/pgp_public_key.txt
> Address : KFKI Research Institute for Particle and Nuclear Physics
>          H-1525 Budapest 114, POB. 49, Hungary
> --
> To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
> the body of a message to majordomo@xxxxxxxxxxxxxxx
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
>
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux