Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment Re: NAT killed IPv6 (Score 1) 233

Every time I've tried, it just backs up what I already knew. Are you sure it's not your own ignorance talking here?

You're right that someone from another country is going to have trouble sending a packet to 10.0.0.2 on your network... but that has nothing to do with NAT. We're talking about what NAT does to connections your router receives, not what it does to ones your router doesn't receive.

And the answer to that, if you read everything about how NAT works or if you go and test it yourself, is that unless you have a port forward rule that matches a specific connection, it does nothing to them at all. Which means the behavior is exactly the same as it is for any non-NATing router -- in other words, NAT doesn't function as a firewall.

Comment Re:Is it worth it (Score 1) 233

Then perhaps you should be less certain about your "we definitely made no other changes at the same time" assertion.

At the same time you put those machines behind NAT, you almost certainly also moved them from public IP space to RFC1918. That will have been what stopped all the random exploits, not the NAT.

Comment Re: NAT killed IPv6 (Score 1) 233

That's not weird, that's exactly what you'd expect if you're using RFC1918.

But okay. We now agree that a NATing router doesn't block inbound connections before you add the masquerade rule. What about afterwards? How does adding the masquerade rule make it start blocking inbound connections? The documentation for iptables states that masquerade will change the source IP of the connection, not that it will block other, unrelated connections, so it shouldn't have that effect.

Comment Re: NAT killed IPv6 (Score 1) 233

How can the router have no concept of an internal host? It's a router. That's a key part of its job. It doesn't need a mapping in the NAT table to route packets.

If what you're saying is correct, why can I establish a TCP connection to InternalIP:Port through a router that's doing NAT without adding a port forward? Because I've tried and it worked, but that completely contradicts what you're saying should happen.

In reality, if there's no entry in the NAT table it simply means that NAT doesn't do anything to the packet, not that the packet is dropped. The router will then route the packet to whatever IP the packet was sent to.

Comment Re:Is it worth it (Score 1) 233

In order to self-host something on v6, any clients that connect will also need v6 -- even those that don't self-host anything themselves. That's why everyone needs it, not just the people that want to run servers.

We went from massive worm problem to almost no worm problem overnight when connections were put behind a NAT

Are you certain that you changed nothing else about the network setup at the same time? Because I've tried adding NAT to a network to see what impact it had on inbound connections before, and it had none whatsoever.

I think you changed more than one thing at once, then got confused about which change was causing which effect. And now you're arguing with the people who are trying to explain this to you, instead of listening to them or doing your own tests.

Comment Re: NAT killed IPv6 (Score 1) 233

All v4 packets specify a destination. They have a dedicated spot in the header for a destination IP, and there's no way to omit that part of it.

Even if there was, you don't control the contents of incoming packets, so an attacker could just... put a destination into them. Declaring that they won't isn't going to stop them.

Comment Re:Why couldn't we have added four octets? (Score 1) 233

Alas, IPv4 is four octets. An eight octet IPv4 addressing system doesn't exist. You have to work with what you've got, not what you wish you had.

We could have added four octets in IPv6, but doing so would've been dumb because it wouldn't be big enough. Look how hard it's been to deploy one update to IP. Why would you set yourself up for needing to do it twice?

Comment Re: NAT killed IPv6 (Score 1) 233

How does the router know not to work before you've even added the masquerade rule? I could understand the effect applying forwards in time, but backwards in time?

Also, how does the masquerade rule drop incoming connections? The manpage says it's equivalent to an SNAT rule, which "specifies that the source address of the packet should be modified" and doesn't mention anything about dropping them. It should just change which IP they look like they're coming from.

Slashdot Top Deals

Cobol programmers are down in the dumps.

Working...