Re: ipv6 question

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 1/8/11 11:16 AM, Michael H. Warfield wrote:
> On Sat, 2011-01-08 at 10:57 -0700, James McKenzie wrote:
>> On 1/3/11 6:44 PM, Robert Nichols wrote:
>>> On 01/03/2011 06:31 PM, Michael H. Warfield wrote:
>>>> There is a wide spread myth that NAT and the fact that you are on
>>>> different addresses some how bestows upon you some measure of security.
>>>> As a leading security researcher, let me impress upon you that nothing
>>>> could be further from the truth.  You can security from the inherent
>>>> statefulness of your common consumer grade NAT but there are other forms
>>>> of NAT which do not convey this.  Merely the fact that your addresses
>>>> are mapped do not provide you with any protection.  It's the state
>>>> engine and the dynamic mapping that do this.  But, SURPRISE, that
>>>> exactly what's in a stateful firewall.  There is NO intrinsic advantage
>>>> of NAT over a decent stateful firewall.  None.
>>>>
>>>> IPv6 also has a number of security advantages over IPv4, not the least
>>>> of which are "no broadcast address" and "virtually impossible to
>>>> comprehensively brute force scan".  That doesn't mean it can't be
>>>> scanned (the scans have to be more targeted and intelligent),
>>> ...
>>>
>>> The problem that I see is that any system to which I have ever made a
>>> connection now has a nice, routable IPv6 address back to the machine
>>> that made the connection and can start probing that machine to see if
>>> any vulnerable services might have been inadvertently left listening
>>> on that interface.  No problem if it's a well secured file server,
>>> but it could also be an internet-aware HDTV or video recorder where
>>> I have no control over the internal OS.  Sounds like all traffic will
>>> now have to have to be routed through an external IPv6 SPI firewall
>>> appliance.  You no doubt have one of those, but I certainly don't,
>>> and I suspect one would cost a bit more than my $35 NAT router, plus
>>> being a bit beyond the administrative abilities of the average home
>>> user.
>> You really have to look at the IP v6 spec.  First, YOU HAVE to use
>> ipsec.
> Oh lord WHY can we NOT make this myth go away?!?!  The IPv6 spec does
> NOT mandate the USE of IPsec.  It only mandates the SUPPORT of IPsec.
> To be IPv6 compliant you must support it.  You do NOT have to use it.
> The IETF has tried to be very clear on this and I've sat in on some of
> the working groups discussing it.  I've been on the global IPv6 network
> over over a decade now and not used IPsec on IPv6.  I've used IPsec on
> IPv4 (and I'm a code contributer to the Openswan project) to help
> facilitate IPv6 tunnels over firewalls and broken (redundant) NAT
> gateways.  I can use IPsec on IPv6 and, if I use IKE2, I can even tunnel
> IPv6 directly on IPv4 in ESP (with version 1 IKE you have to use SIT on
> top of ESP in order to tunnel IPv6 on IPv4 through IPsec).  But, I don't
> need to so I don't.  You don't have to use IPsec.
>
You had better tell that to (ISC)2 as it is a question on their CISSP exam.

James McKenzie

-- 
users mailing list
users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux