⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2993.txt

📁 RFC 的详细文档!
💻 TXT
📖 第 1 页 / 共 5 页
字号:

Hain                         Informational                     [Page 19]

RFC 2993           Architectural Implications of NAT       November 2000


   traversing multiple NATs.  Address management in the private space
   behind NATs will become a significant burden, as there is no central
   body capable of, or willing to do it.  The lower burden for the ISP
   is actually a transfer of burden to the local level, because
   administration of addresses and names becomes both distributed and
   more complicated.

   As noted in RFC-1918, the merging of private address spaces can cause
   an overlap in address use, creating a problem.  L2TP tunnels will
   increase the likelihood and frequency of that merging through the
   simplicity of their establishment.  There are several configurations
   of address overlap which will cause failure, but in the simple
   example shown below the private use address of Host B matches the
   private use address of the VPN pool used by Host A for inbound
   connections.  When Host B tries to establish the VPN interface, Host
   A will assign it an address from its pool for inbound connections,
   and identify the gateway for Host B to use.  In the example, Host B
   will not be able to distinguish the remote VPN gateway address of
   Host A from its own private address on the physical interface, thus
   the connection will fail.  Since private use addresses are by
   definition not publicly coordinated, as the complexity of the VPN
   mesh increases so does the likelihood that there will be a collision
   that cannot be resolved.

              ---------------                     ----------------
             |  10.10.10.10  |--------L2TP-------| Assigned by A  |
             |    Host A     |   ---       ---   |    Host B      |
             |    10.1.1.1   |--|NAT|-----|NAT|--|  10.10.10.10   |
              ---------------    ---       ---    ----------------

                                --------
                             Illustration 6

 7.7.  Centralized data collection system report correlation

   It has been reported that NAT introduces additional challenges when
   intrusion detection systems attempt to correlate reports between
   sensors inside and outside the NAT.  While the details of individual
   systems are beyond the scope of this document, it is clear that a
   centralized system with monitoring agents on both sides of the NAT
   would also need access to the current NAT mappings to get this right.
   It would also be critical that the resulting data be indexed properly
   if there were agents behind multiple NATs using the same address
   range for the private side.

   This also applies to management data collected via SNMP.  Any time
   the data stream carries an IP address; the central collector or ALG
   will need to manipulate the data based on the current mappings in the



Hain                         Informational                     [Page 20]

RFC 2993           Architectural Implications of NAT       November 2000


   NAT.

8.  IPv6

   It has been argued that IPv6 is no longer necessary because NATs
   relieve the address space constraints and allow the Internet to
   continue growing.  The reality is they point out the need for IPv6
   more clearly than ever.  People are trying to connect multiple
   machines through a single access line to their ISP and have been
   willing to give up some functionality to get that at minimum cost.

   Frequently the reason for cost increases is the perceived scarcity
   (therefore increased value) of IPv4 addresses, which would be
   eliminated through deployment of IPv6.  This crisis mentality is
   creating a market for a solution to a problem already solved with
   greater flexibility by IPv6.

   If NAT had never been defined, the motivation to resolve the
   dwindling IPv4 address space would be a much greater.  Given that
   NATs are enabling untold new hosts to attach to the Internet daily,
   it is difficult to ascertain the actual impact to the lifetime of
   IPv4, but NAT has certainly extended it.  It is also difficult to
   determine the extent of delay NAT is causing for IPv6, both by
   relieving the pressure, and by redirecting the intellectual cycles
   away from the longer-term solution.

   But at the same time NAT functionality may be a critical facilitator
   in the deployment of IPv6.  There are already 100 million or more
   computers running IPv4 on data networks.  Some of these networks are
   connected to and thus part of the Internet and some are on private
   isolated networks.  It is inconceivable that we could have a "flag
   day" and convert all of the existing IPv4 nodes to IPv6 at the same
   time.  There will be a very long period of coexistence while both
   IPv4 and IPv6 are being used in the Internet and in private networks.
   The original IPv6 transition plan relied heavily on having new IPv6
   nodes also be able to run IPv4 - a "dual stack" approach. When the
   dual stack node looks up another node in the DNS it will get back a
   IPv4 or an IPv6 address in response.  If the response is an IPv4
   address then the node uses IPv4 to contact the other node. And if the
   response is an IPv6 address then IPv6 can be used to make the
   contact.  Turning the NAT into a 6to4 [13]router enables widespread
   deployment of IPv6 while providing an IPv4 path if IPv6 is
   unavailable.  While this maintains the current set of issues for IPv4
   connections, it reestablishes the end-to-end principle for IPv6
   connections.






Hain                         Informational                     [Page 21]

RFC 2993           Architectural Implications of NAT       November 2000


   An alternative methodology would be to translate the packets between
   IPv6 and IPv4 at the boarders between IPv4 supporting networks and
   IPv6 supporting networks.  The need for this functionality was
   recognized in [RFC 1752], the document that recommended to the IETF
   that IPv6 be developed and recommended that a set of working groups
   be established to work on a number of specific problems.  Header
   translation (i.e, NAT) was one of those problems.

   Of course, NATs in an IPv6 to IPv4 translation environment encounter
   all of the same problems that NATs encounter in a pure IPv4 and the
   environment and cautions in this document apply to both situations.

9.  Security Considerations

   NAT (particularly NAPT) actually has the potential to lower overall
   security because it creates the illusion of a security barrier, but
   does so without the managed intent of a firewall.  Appropriate
   security mechanisms are implemented in the end host, without reliance
   on assumptions about routing hacks, firewall filters, or missing NAT
   translations, which may change over time to enable a service to a
   neighboring host.  In general, defined security barriers assume that
   any threats are external, leading to practices that make internal
   breaches much easier.

   IPsec RFC-2401 [7] defines a set of mechanisms to support packet-
   level authentication and encryption for use in IP networks.  While
   this may be less efficient than application-level security but in the
   words of RFC-1752 [14] "support for basic packet-level authentication
   will provide for the adoption of a much needed, widespread, security
   infrastructure throughout the Internet."

   NATs break IPsec's authentication and encryption technologies because
   these technologies depend on an end-to-end consistency of the IP
   addresses in the IP headers, and therefore may stall further
   deployment of enhanced security across the Internet.  NATs raise a
   number of specific issues with IPsec.  For example;

   - Use of AH is not possible via NAT as the hash protects the IP
     address in the header.
   - Authenticated certificates may contain the IP address as part of
     the subject name for authentication purposes.
   - Encrypted Quick Mode structures may contain IP addresses and ports
     for policy verifications.
   - The Revised Mode of public key encryption includes the peer
     identity in the encrypted payload.






Hain                         Informational                     [Page 22]

RFC 2993           Architectural Implications of NAT       November 2000


   It may be possible to engineer and work around NATs for IPsec on a
   case-by-case basis, but at the cost of restricting the trust model,
   as discussed in section 4 above.  With all of the restrictions placed
   on deployment flexibility, NATs present a significant obstacle to
   security integration being deployed in the Internet today.

   As noted in the RFC-2694 [15], the DNS/ALG cannot support secure DNS
   name servers in the private domain.  Zone transfers between DNSsec
   servers will be rejected when necessary modifications are attempted.
   It is also the case that DNS/ALG will break any modified, signed
   responses.  This would be the case for all public side queries of
   private nodes, when the DNS server is on the private side.  It would
   also be true for any private side queries for private nodes, when the
   DNS server is on the public side.  Digitally signed records could be
   modified by the DNS/ALG if it had access to the source authentication
   key.  DNSsec has been specifically designed to avoid distribution of
   this key, to maintain source authenticity.  So NATs that use DNS/ALG
   to repair the namespace resolutions will either; break the security
   when modifying the record, or will require access to all source keys
   to requested resolutions.

   Security mechanisms that do not protect or rely on IP addresses as
   identifiers, such as TLS [16], SSL [17], or SSH [18] may operate in
   environments containing NATs.  For applications that can establish
   and make use of this type of transport connection, NATs do not create
   any additional complications.  These technologies may not provide
   sufficient protection for all applications as the header is exposed,
   allowing subversive acts like TCP resets.  RFC-2385 [19] discusses
   the issues in more detail.

   Arguments that NATs may operate in a secure mode preclude true End-
   to-End security, as the NAT becomes the security endpoint.
   Operationally the NAT must be managed as part of the security domain,
   and in this mode the packets on the unsecured side of the NAT are
   fully exposed.

10.  Deployment Guidelines

   Given that NAT devices are being deployed at a fairly rapid pace,
   some guidelines are in order.  Most of these cautionary in nature and
   are designed to make sure that the reader fully understands the
   implications of the use of NATs in their environment.

   - Determine the mechanism for name resolution, and ensure the
     appropriate answer is given for each address administration.
     Embedding the DNS server, or a DNS ALG in the NAT device will
     likely be more manageable than trying to synchronize independent
     DNS systems across administrations.



Hain                         Informational                     [Page 23]

RFC 2993           Architectural Implications of NAT       November 2000


   - Is the NAT configured for static one to one mappings, or will it
     dynamically manage them? If dynamic, make sure the TTL of the DNS
     responses is set to 0, and that the clients pay attention to the
     don't cache notification.
   - Will there be a single NAT device, or parallel with multiple paths?
     If single, consider the impact of a device failure.  If multiple,
     consider how routing on both sides will insure the packets flow
     through the same box over the connection lifetime of the
     applications.
   - Examine the applications that will need to traverse the NAT and
     verify their immunity to address changes.  If necessary provide an
     appropriate ALG or establish a VPN to isolate the application from
     the NAT.
   - Determine need for public toward private connections, variability
     of destinations on the private side, and potential for simultaneous
     use of public side port numbers.  NAPTs increase administration if
     these apply.
   - Determine if the applications traversing the NAPT or RSIP expect
     all ports from the public IP address to be the same endpoint.
     Administrative controls to prevent simultaneous access from
     multiple private hosts will be required if this is the case.
   - If there are encrypted payloads, the contents cannot be modified
     unless the NAT is a security endpoint, acting as a gateway between
     security realms.  This precludes end-to-end confidentiality, as the
     path between the NAT and endpoint is exposed.
   - Determine the path for name resolutions.  If hosts on the private
     side of a NAPT or RSIP server need visibility to each other, a
     private side DNS server may be required.
   - If the environment uses secure DNS records, the DNS/ALG will
     require access to the source authentication keys for all records to
     be translated.
   - When using VPNs over NATs, identify a clearinghouse for the private
     side addresses to avoid collisions.
   - Assure that applications used both internally and externally avoid
     embedding names, or use globally unique ones.
   - When using RSIP, recognize the scope is l

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -