* Re[2]: [RFC PATCH 00/18] netfilter: IPv6 NAT
@ 2011-11-29 12:50 Hans Schillstrom
2011-11-29 14:05 ` Patrick McHardy
0 siblings, 1 reply; 21+ messages in thread
From: Hans Schillstrom @ 2011-11-29 12:50 UTC (permalink / raw)
To: Patrick McHardy; +Cc: sclark46, netfilter-devel, netdev, ulrich.weber
>
>On 28.11.2011 18:14, Stephen Clark wrote:
>> On 11/24/2011 11:57 AM, kaber@trash.net wrote:
>>> The following patches contain the updated IPv6 NAT patchset forward
>>> ported
>>> to 3.2-rc3. ...
>>>
>>>
>>>
>> Probabably a dumb question but are these patches for natting ipv6 to
>> ipv6 or ipv4 to ipv6?
>
>IPv6 to IPv6. I haven't really considered IPv6 to IPv4 yet.
Have you ever tried ivi The IPv6 to IPv4 gateway ?
i.e address mapping and packet translation between IPv4 and IPv6 networks
I made a port to resent kernel in the begining of this year ( i think it was 2.6.36 ... ) and it seems to work.
(however there is some issues left....)
I like the idea of "ivi" for a larger scale of translation.
/Hans
^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [RFC PATCH 00/18] netfilter: IPv6 NAT 2011-11-29 12:50 Re[2]: [RFC PATCH 00/18] netfilter: IPv6 NAT Hans Schillstrom @ 2011-11-29 14:05 ` Patrick McHardy 0 siblings, 0 replies; 21+ messages in thread From: Patrick McHardy @ 2011-11-29 14:05 UTC (permalink / raw) To: Hans Schillstrom; +Cc: sclark46, netfilter-devel, netdev, ulrich.weber On 11/29/2011 01:50 PM, Hans Schillstrom wrote: >>> Probabably a dumb question but are these patches for natting ipv6 to >>> ipv6 or ipv4 to ipv6? >> IPv6 to IPv6. I haven't really considered IPv6 to IPv4 yet. > Have you ever tried ivi The IPv6 to IPv4 gateway ? > i.e address mapping and packet translation between IPv4 and IPv6 networks No, I'm currently looking at stateless IPv6 NAT mechanisms. > I made a port to resent kernel in the begining of this year ( i think it was 2.6.36 ... ) and it seems to work. > (however there is some issues left....) > > I like the idea of "ivi" for a larger scale of translation. Do you have a pointer to your port? ^ permalink raw reply [flat|nested] 21+ messages in thread
* [RFC PATCH 00/18] netfilter: IPv6 NAT @ 2011-11-24 16:57 kaber 2011-11-28 17:14 ` Stephen Clark 2011-12-23 13:08 ` Pablo Neira Ayuso 0 siblings, 2 replies; 21+ messages in thread From: kaber @ 2011-11-24 16:57 UTC (permalink / raw) To: netfilter-devel; +Cc: netdev, kaber, ulrich.weber The following patches contain the updated IPv6 NAT patchset forward ported to 3.2-rc3. Changes since last posting: - Layer 4 protocol registration has been fixed to work properly with modular layer 4 protocol modules - an inverted condition in the ip6t_NETMAP checkentry function causing rule addition to always fail has been fixed - use of HH_DATA_ALIGN in IPv6 headroom reallocation after rerouting to fix unaligned data access on Tile, as suggested by Eric - nla_policy fix has been moved to a separate patch The patchset is also available at: git://github.com/kaber/nf-nat-ipv6.git master Last open point is IPv6 fragmentation handling, I'll implement my suggested method of storing the biggest fragment size seen during reassembly in the CB and using that as a hard limit during refragmentation over the weekend. Patrick McHardy (18): netfilter: nf_nat: export NAT definitions to userspace netfilter: nf_nat: use hash random for bysource hash netfilter: nf_nat: add missing nla_policy entry for CTA_NAT_PROTO attribute netfilter: nat: remove module reference counting from NAT protocols netfilter: nf_nat: remove obsolete code from nf_nat_icmp_reply_translation() netfilter: nf_nat: remove obsolete check in nf_nat_mangle_udp_packet() netfilter: ctnetlink: remove dead NAT code netfilter: conntrack: restrict NAT helper invocation to IPv4 netfilter: nf_nat: add protoff argument to packet mangling functions netfilter: add protocol independant NAT core netfilter: ipv6: expand skb head in ip6_route_me_harder after oif change net: core: add function for incremental IPv6 pseudo header checksum updates netfilter: ipv6: add IPv6 NAT support netfilter: ip6tables: add MASQUERADE target netfilter: ip6tables: add REDIRECT target netfilter: ip6tables: add NETMAP target netfilter: nf_nat: support IPv6 in FTP NAT helper netfilter: nf_nat: support IPv6 in amanda NAT helper include/linux/netfilter.h | 14 +- include/linux/netfilter/Kbuild | 1 + include/linux/netfilter/nf_conntrack_amanda.h | 1 + include/linux/netfilter/nf_conntrack_ftp.h | 1 + include/linux/netfilter/nf_conntrack_h323.h | 15 +- include/linux/netfilter/nf_conntrack_irc.h | 1 + include/linux/netfilter/nf_conntrack_pptp.h | 2 + include/linux/netfilter/nf_conntrack_sip.h | 12 +- .../linux/netfilter/nf_conntrack_tuple_common.h | 27 + include/linux/netfilter/nf_nat.h | 33 + include/linux/netfilter/nfnetlink_conntrack.h | 8 +- include/linux/netfilter_ipv4.h | 1 - include/linux/netfilter_ipv4/Kbuild | 1 - include/linux/netfilter_ipv4/nf_nat.h | 58 -- include/net/addrconf.h | 2 +- include/net/checksum.h | 3 + include/net/netfilter/nf_conntrack_expect.h | 2 +- include/net/netfilter/nf_conntrack_tuple.h | 1 - include/net/netfilter/nf_nat.h | 8 +- include/net/netfilter/nf_nat_core.h | 7 +- include/net/netfilter/nf_nat_helper.h | 11 +- include/net/netfilter/nf_nat_l3proto.h | 52 ++ include/net/netfilter/nf_nat_l4proto.h | 72 +++ include/net/netfilter/nf_nat_protocol.h | 74 --- include/net/netfilter/nf_nat_rule.h | 15 - include/net/netns/conntrack.h | 4 + include/net/netns/ipv4.h | 2 - include/net/netns/ipv6.h | 1 + net/core/secure_seq.c | 1 + net/core/utils.c | 20 + net/ipv4/netfilter.c | 37 -- net/ipv4/netfilter/Kconfig | 67 +-- net/ipv4/netfilter/Makefile | 13 +- net/ipv4/netfilter/ipt_MASQUERADE.c | 26 +- net/ipv4/netfilter/ipt_NETMAP.c | 21 +- net/ipv4/netfilter/ipt_REDIRECT.c | 23 +- .../{nf_nat_standalone.c => iptable_nat.c} | 266 ++++----- net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c | 8 +- net/ipv4/netfilter/nf_nat_h323.c | 83 ++-- net/ipv4/netfilter/nf_nat_irc.c | 4 +- net/ipv4/netfilter/nf_nat_l3proto_ipv4.c | 281 +++++++++ net/ipv4/netfilter/nf_nat_pptp.c | 31 +- net/ipv4/netfilter/nf_nat_proto_common.c | 126 ---- net/ipv4/netfilter/nf_nat_proto_gre.c | 36 +- net/ipv4/netfilter/nf_nat_proto_icmp.c | 26 +- net/ipv4/netfilter/nf_nat_rule.c | 214 ------- net/ipv4/netfilter/nf_nat_sip.c | 121 ++-- net/ipv4/netfilter/nf_nat_tftp.c | 1 - net/ipv6/addrconf.c | 2 +- net/ipv6/netfilter.c | 8 + net/ipv6/netfilter/Kconfig | 48 ++ net/ipv6/netfilter/Makefile | 7 + net/ipv6/netfilter/ip6t_MASQUERADE.c | 135 +++++ net/ipv6/netfilter/ip6t_NETMAP.c | 94 +++ net/ipv6/netfilter/ip6t_REDIRECT.c | 98 +++ net/ipv6/netfilter/ip6table_nat.c | 319 ++++++++++ net/ipv6/netfilter/nf_conntrack_l3proto_ipv6.c | 14 + net/ipv6/netfilter/nf_nat_l3proto_ipv6.c | 285 +++++++++ net/ipv6/netfilter/nf_nat_proto_icmpv6.c | 87 +++ net/netfilter/Kconfig | 34 ++ net/netfilter/Makefile | 15 + net/netfilter/core.c | 5 + net/netfilter/ipvs/ip_vs_ftp.c | 1 + net/netfilter/nf_conntrack_amanda.c | 5 +- net/netfilter/nf_conntrack_core.c | 7 + net/netfilter/nf_conntrack_ftp.c | 3 +- net/netfilter/nf_conntrack_h323_main.c | 232 +++++--- net/netfilter/nf_conntrack_irc.c | 6 +- net/netfilter/nf_conntrack_netlink.c | 30 +- net/netfilter/nf_conntrack_pptp.c | 18 +- net/netfilter/nf_conntrack_proto_tcp.c | 8 +- net/netfilter/nf_conntrack_sip.c | 119 +++-- net/netfilter/nf_conntrack_tftp.c | 3 +- net/{ipv4 => }/netfilter/nf_nat_amanda.c | 4 +- net/{ipv4 => }/netfilter/nf_nat_core.c | 621 ++++++++++---------- net/{ipv4 => }/netfilter/nf_nat_ftp.c | 33 +- net/{ipv4 => }/netfilter/nf_nat_helper.c | 121 ++--- net/netfilter/nf_nat_proto_common.c | 112 ++++ net/{ipv4 => }/netfilter/nf_nat_proto_dccp.c | 58 +- net/{ipv4 => }/netfilter/nf_nat_proto_sctp.c | 55 +- net/{ipv4 => }/netfilter/nf_nat_proto_tcp.c | 42 +- net/{ipv4 => }/netfilter/nf_nat_proto_udp.c | 44 +- net/{ipv4 => }/netfilter/nf_nat_proto_udplite.c | 60 +- net/{ipv4 => }/netfilter/nf_nat_proto_unknown.c | 15 +- net/netfilter/xt_nat.c | 185 ++++++ 85 files changed, 3132 insertions(+), 1635 deletions(-) ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [RFC PATCH 00/18] netfilter: IPv6 NAT 2011-11-24 16:57 kaber @ 2011-11-28 17:14 ` Stephen Clark 2011-11-28 20:25 ` Ulrich Weber 2011-11-29 12:32 ` Patrick McHardy 2011-12-23 13:08 ` Pablo Neira Ayuso 1 sibling, 2 replies; 21+ messages in thread From: Stephen Clark @ 2011-11-28 17:14 UTC (permalink / raw) To: kaber; +Cc: netfilter-devel, netdev, ulrich.weber On 11/24/2011 11:57 AM, kaber@trash.net wrote: > The following patches contain the updated IPv6 NAT patchset forward ported > to 3.2-rc3. Changes since last posting: > > - Layer 4 protocol registration has been fixed to work properly with modular > layer 4 protocol modules > > - an inverted condition in the ip6t_NETMAP checkentry function causing > rule addition to always fail has been fixed > > - use of HH_DATA_ALIGN in IPv6 headroom reallocation after rerouting to fix > unaligned data access on Tile, as suggested by Eric > > - nla_policy fix has been moved to a separate patch > > The patchset is also available at: > > git://github.com/kaber/nf-nat-ipv6.git master > > Last open point is IPv6 fragmentation handling, I'll implement my suggested > method of storing the biggest fragment size seen during reassembly in the CB > and using that as a hard limit during refragmentation over the weekend. > > > Patrick McHardy (18): > netfilter: nf_nat: export NAT definitions to userspace > netfilter: nf_nat: use hash random for bysource hash > netfilter: nf_nat: add missing nla_policy entry for CTA_NAT_PROTO attribute > netfilter: nat: remove module reference counting from NAT protocols > netfilter: nf_nat: remove obsolete code from nf_nat_icmp_reply_translation() > netfilter: nf_nat: remove obsolete check in nf_nat_mangle_udp_packet() > netfilter: ctnetlink: remove dead NAT code > netfilter: conntrack: restrict NAT helper invocation to IPv4 > netfilter: nf_nat: add protoff argument to packet mangling functions > netfilter: add protocol independant NAT core > netfilter: ipv6: expand skb head in ip6_route_me_harder after oif change > net: core: add function for incremental IPv6 pseudo header checksum updates > netfilter: ipv6: add IPv6 NAT support > netfilter: ip6tables: add MASQUERADE target > netfilter: ip6tables: add REDIRECT target > netfilter: ip6tables: add NETMAP target > netfilter: nf_nat: support IPv6 in FTP NAT helper > netfilter: nf_nat: support IPv6 in amanda NAT helper > > include/linux/netfilter.h | 14 +- > include/linux/netfilter/Kbuild | 1 + > include/linux/netfilter/nf_conntrack_amanda.h | 1 + > include/linux/netfilter/nf_conntrack_ftp.h | 1 + > include/linux/netfilter/nf_conntrack_h323.h | 15 +- > include/linux/netfilter/nf_conntrack_irc.h | 1 + > include/linux/netfilter/nf_conntrack_pptp.h | 2 + > include/linux/netfilter/nf_conntrack_sip.h | 12 +- > .../linux/netfilter/nf_conntrack_tuple_common.h | 27 + > include/linux/netfilter/nf_nat.h | 33 + > include/linux/netfilter/nfnetlink_conntrack.h | 8 +- > include/linux/netfilter_ipv4.h | 1 - > include/linux/netfilter_ipv4/Kbuild | 1 - > include/linux/netfilter_ipv4/nf_nat.h | 58 -- > include/net/addrconf.h | 2 +- > include/net/checksum.h | 3 + > include/net/netfilter/nf_conntrack_expect.h | 2 +- > include/net/netfilter/nf_conntrack_tuple.h | 1 - > include/net/netfilter/nf_nat.h | 8 +- > include/net/netfilter/nf_nat_core.h | 7 +- > include/net/netfilter/nf_nat_helper.h | 11 +- > include/net/netfilter/nf_nat_l3proto.h | 52 ++ > include/net/netfilter/nf_nat_l4proto.h | 72 +++ > include/net/netfilter/nf_nat_protocol.h | 74 --- > include/net/netfilter/nf_nat_rule.h | 15 - > include/net/netns/conntrack.h | 4 + > include/net/netns/ipv4.h | 2 - > include/net/netns/ipv6.h | 1 + > net/core/secure_seq.c | 1 + > net/core/utils.c | 20 + > net/ipv4/netfilter.c | 37 -- > net/ipv4/netfilter/Kconfig | 67 +-- > net/ipv4/netfilter/Makefile | 13 +- > net/ipv4/netfilter/ipt_MASQUERADE.c | 26 +- > net/ipv4/netfilter/ipt_NETMAP.c | 21 +- > net/ipv4/netfilter/ipt_REDIRECT.c | 23 +- > .../{nf_nat_standalone.c => iptable_nat.c} | 266 ++++----- > net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c | 8 +- > net/ipv4/netfilter/nf_nat_h323.c | 83 ++-- > net/ipv4/netfilter/nf_nat_irc.c | 4 +- > net/ipv4/netfilter/nf_nat_l3proto_ipv4.c | 281 +++++++++ > net/ipv4/netfilter/nf_nat_pptp.c | 31 +- > net/ipv4/netfilter/nf_nat_proto_common.c | 126 ---- > net/ipv4/netfilter/nf_nat_proto_gre.c | 36 +- > net/ipv4/netfilter/nf_nat_proto_icmp.c | 26 +- > net/ipv4/netfilter/nf_nat_rule.c | 214 ------- > net/ipv4/netfilter/nf_nat_sip.c | 121 ++-- > net/ipv4/netfilter/nf_nat_tftp.c | 1 - > net/ipv6/addrconf.c | 2 +- > net/ipv6/netfilter.c | 8 + > net/ipv6/netfilter/Kconfig | 48 ++ > net/ipv6/netfilter/Makefile | 7 + > net/ipv6/netfilter/ip6t_MASQUERADE.c | 135 +++++ > net/ipv6/netfilter/ip6t_NETMAP.c | 94 +++ > net/ipv6/netfilter/ip6t_REDIRECT.c | 98 +++ > net/ipv6/netfilter/ip6table_nat.c | 319 ++++++++++ > net/ipv6/netfilter/nf_conntrack_l3proto_ipv6.c | 14 + > net/ipv6/netfilter/nf_nat_l3proto_ipv6.c | 285 +++++++++ > net/ipv6/netfilter/nf_nat_proto_icmpv6.c | 87 +++ > net/netfilter/Kconfig | 34 ++ > net/netfilter/Makefile | 15 + > net/netfilter/core.c | 5 + > net/netfilter/ipvs/ip_vs_ftp.c | 1 + > net/netfilter/nf_conntrack_amanda.c | 5 +- > net/netfilter/nf_conntrack_core.c | 7 + > net/netfilter/nf_conntrack_ftp.c | 3 +- > net/netfilter/nf_conntrack_h323_main.c | 232 +++++--- > net/netfilter/nf_conntrack_irc.c | 6 +- > net/netfilter/nf_conntrack_netlink.c | 30 +- > net/netfilter/nf_conntrack_pptp.c | 18 +- > net/netfilter/nf_conntrack_proto_tcp.c | 8 +- > net/netfilter/nf_conntrack_sip.c | 119 +++-- > net/netfilter/nf_conntrack_tftp.c | 3 +- > net/{ipv4 => }/netfilter/nf_nat_amanda.c | 4 +- > net/{ipv4 => }/netfilter/nf_nat_core.c | 621 ++++++++++---------- > net/{ipv4 => }/netfilter/nf_nat_ftp.c | 33 +- > net/{ipv4 => }/netfilter/nf_nat_helper.c | 121 ++--- > net/netfilter/nf_nat_proto_common.c | 112 ++++ > net/{ipv4 => }/netfilter/nf_nat_proto_dccp.c | 58 +- > net/{ipv4 => }/netfilter/nf_nat_proto_sctp.c | 55 +- > net/{ipv4 => }/netfilter/nf_nat_proto_tcp.c | 42 +- > net/{ipv4 => }/netfilter/nf_nat_proto_udp.c | 44 +- > net/{ipv4 => }/netfilter/nf_nat_proto_udplite.c | 60 +- > net/{ipv4 => }/netfilter/nf_nat_proto_unknown.c | 15 +- > net/netfilter/xt_nat.c | 185 ++++++ > 85 files changed, 3132 insertions(+), 1635 deletions(-) > > -- > To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html > > Probabably a dumb question but are these patches for natting ipv6 to ipv6 or ipv4 to ipv6? -- "They that give up essential liberty to obtain temporary safety, deserve neither liberty nor safety." (Ben Franklin) "The course of history shows that as a government grows, liberty decreases." (Thomas Jefferson) ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [RFC PATCH 00/18] netfilter: IPv6 NAT 2011-11-28 17:14 ` Stephen Clark @ 2011-11-28 20:25 ` Ulrich Weber 2011-11-28 20:55 ` richard -rw- weinberger 2011-11-28 22:03 ` Amos Jeffries 2011-11-29 12:32 ` Patrick McHardy 1 sibling, 2 replies; 21+ messages in thread From: Ulrich Weber @ 2011-11-28 20:25 UTC (permalink / raw) To: sclark46@earthlink.net, kaber@trash.net Cc: netfilter-devel@vger.kernel.org, netdev@vger.kernel.org Am 28.11.11 18:14 schrieb "Stephen Clark" unter <sclark46@earthlink.net>: >Probabably a dumb question but are these patches for natting ipv6 to >ipv6 or ipv4 to ipv6? These patches are for natting IPv6 addresses behind whole IPv6 subnets or just behind one IPv6 address. This is useful for multiple Internet uplinks, where you want full control on the router what connections are sent over which interface. Or its quite easy to setup Load Balancing rules or create a DMZ. There a lots of use casesŠ If you are looking for IPv4->IPv6 or IPv6->IPv4, there are multiple implementations. Two examples: IPv6->IPv4: http://ecdysis.viagenie.ca IPv4->IPv6: http://www.ivi2.org Best regards Ulrich -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [RFC PATCH 00/18] netfilter: IPv6 NAT 2011-11-28 20:25 ` Ulrich Weber @ 2011-11-28 20:55 ` richard -rw- weinberger 2011-11-28 22:03 ` Amos Jeffries 1 sibling, 0 replies; 21+ messages in thread From: richard -rw- weinberger @ 2011-11-28 20:55 UTC (permalink / raw) To: Ulrich Weber Cc: sclark46@earthlink.net, kaber@trash.net, netfilter-devel@vger.kernel.org, netdev@vger.kernel.org On Mon, Nov 28, 2011 at 9:25 PM, Ulrich Weber <Ulrich.Weber@sophos.com> wrote: > IPv6->IPv4: > > http://ecdysis.viagenie.ca Is this solution stable? The last time I've tested it it had no SMP locking at all... -- Thanks, //richard ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [RFC PATCH 00/18] netfilter: IPv6 NAT 2011-11-28 20:25 ` Ulrich Weber 2011-11-28 20:55 ` richard -rw- weinberger @ 2011-11-28 22:03 ` Amos Jeffries 2011-11-29 9:19 ` Ulrich Weber 1 sibling, 1 reply; 21+ messages in thread From: Amos Jeffries @ 2011-11-28 22:03 UTC (permalink / raw) To: Ulrich Weber; +Cc: sclark46, kaber, netfilter-devel, netdev On Mon, 28 Nov 2011 20:25:48 +0000, Ulrich Weber wrote: > Am 28.11.11 18:14 schrieb "Stephen Clark" unter: > >>Probabably a dumb question but are these patches for natting ipv6 to >>ipv6 or ipv4 to ipv6? > > These patches are for natting IPv6 addresses behind whole IPv6 > subnets > or just behind one IPv6 address. > > This is useful for multiple Internet uplinks, where you want full > control > on the router what connections are sent over which interface. Or its > quite > easy to setup Load Balancing rules or create a DMZ. There a lots of > use > casesŠ I'm going to dare to call FUD on those statements... * Load Balancing - what is preventing your routing rules or packet marking using the same criteria as the NAT changer? nothing. Load balancing works perfectly fine without NAT. * outgoing packet control - packets will happily leave the "wrong" interface after NAT unless you add routing and firewall controls separate to NAT. Packet control works *better* without NAT erasing original IP information resulting in mistakenly NAT'ed packets go out the wrong interface. I have long been of the opinion that all NAT really offers is the ability to easily and cleanly multi-home several global public prefixes from a unified PI space. This is a very important aspect for some networks, even with plentiful IPv6 addresses. Claims and use of NAT as a security, load balancing, and routing control is where most of the nasty side effects and behaviours are streaming in from. AYJ -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [RFC PATCH 00/18] netfilter: IPv6 NAT 2011-11-28 22:03 ` Amos Jeffries @ 2011-11-29 9:19 ` Ulrich Weber 2011-11-29 12:23 ` Jan Engelhardt 0 siblings, 1 reply; 21+ messages in thread From: Ulrich Weber @ 2011-11-29 9:19 UTC (permalink / raw) To: Amos Jeffries Cc: sclark46@earthlink.net, kaber@trash.net, netfilter-devel@vger.kernel.org, netdev@vger.kernel.org Please dont' let this deviate to a flame war. I just said there are use cases, nothing more, nothing less. This is software. There are lots of ways to archive the same goal. Every solution has its pro and cons, its not always black and white. On 28.11.2011 23:03, Amos Jeffries wrote: > I'm going to dare to call FUD on those statements... > * Load Balancing - what is preventing your routing rules or packet > marking using the same criteria as the NAT changer? nothing. Load > balancing works perfectly fine without NAT. > Nothing, you archive the same in a different way. However keep in mind that not all computers out there run Linux. Its quite simple to setup NAT rules, they work with every OS. On the other hand, balancing by changing MAC address or IPv6inIPv6 Tunnels can be a headache, getting this going with Windows, Mac, Solaris and so on. Issues with DAD and source address selection doesn't make it easier. Have a look at net/netfilter/ipvs/ip_vs_xmit.c. There is a reason, why NAT for IPv6 is already in the Kernel since three years. > * outgoing packet control - packets will happily leave the "wrong" > interface after NAT unless you add routing and firewall controls > separate to NAT. Packet control works *better* without NAT erasing > original IP information resulting in mistakenly NAT'ed packets go out > the wrong interface. > > I fully agree. NAT can not replace your firewall rules. However with NAT you could get some kind of anonymity. Think of Tor: If your server/client operates with private IP addresses, your public IP address is still masked after a security breach. > I have long been of the opinion that all NAT really offers is the > ability to easily and cleanly multi-home several global public prefixes > from a unified PI space. This is a very important aspect for some > networks, even with plentiful IPv6 addresses. Also in my opinion the most important reason for NAT. Cheers Ulrich -- Ulrich Weber | ulrich.weber@sophos.com | Senior Software Engineer Astaro - a Sophos company | Amalienbadstr 41 | 76227 Karlsruhe | Germany Phone +49-721-25516-0 | Fax –200 | www.astaro.com ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [RFC PATCH 00/18] netfilter: IPv6 NAT 2011-11-29 9:19 ` Ulrich Weber @ 2011-11-29 12:23 ` Jan Engelhardt 2011-11-29 13:24 ` Amos Jeffries 2011-11-29 21:38 ` Krzysztof Olędzki 0 siblings, 2 replies; 21+ messages in thread From: Jan Engelhardt @ 2011-11-29 12:23 UTC (permalink / raw) To: Ulrich Weber Cc: Amos Jeffries, sclark46@earthlink.net, kaber@trash.net, netfilter-devel@vger.kernel.org, netdev@vger.kernel.org On Tuesday 2011-11-29 10:19, Ulrich Weber wrote: > On 28.11.2011 23:03, Amos Jeffries wrote: >> I'm going to dare to call FUD on those statements... >> * Load Balancing - what is preventing your routing rules or packet >> marking using the same criteria as the NAT changer? nothing. Load >> balancing works perfectly fine without NAT. Source address selection, having to occur on the source, would require that the source has to know all the parameters that a {what would have been your NAT GW} would need to know, which means you have to (a) collect and/or (b) distribute this information. Given two uplinks that only allow a certain source network address (different for each uplink), combined with the desire to balance on utilization, (a) a client is not in the position to easily obtain this data unless it is the router for all participants itself, (b) the clients needs to cooperate, and one cannot always trust client devices, or hope for their technical cooperation (firewalled themselves off). Yes, NAT is evil, but if you actually think about it, policies are best applied where [the policy] originates from. After all, we also don't do LSRR, instead, routers do the routing, because they just know much better. > I fully agree. NAT can not replace your firewall rules. > > However with NAT you could get some kind of anonymity. Same network prefix, some cookies, or a login form. Blam, identified, or at least (Almost-)Uniquely Identified Visitor tagging. Everybody should come out of their worshipping NAT for anonymity now - at best, that is an Emperor's Clothes' kind of anonymity. > Think of Tor: If your server/client operates with private IP addresses, > your public IP address is still masked after a security breach. If one's tor peer was busted, they would have the address. ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [RFC PATCH 00/18] netfilter: IPv6 NAT 2011-11-29 12:23 ` Jan Engelhardt @ 2011-11-29 13:24 ` Amos Jeffries 2011-11-29 21:38 ` Krzysztof Olędzki 1 sibling, 0 replies; 21+ messages in thread From: Amos Jeffries @ 2011-11-29 13:24 UTC (permalink / raw) To: Jan Engelhardt Cc: Ulrich Weber, sclark46@earthlink.net, kaber@trash.net, netfilter-devel@vger.kernel.org, netdev@vger.kernel.org On 30/11/2011 1:23 a.m., Jan Engelhardt wrote: > On Tuesday 2011-11-29 10:19, Ulrich Weber wrote: >> On 28.11.2011 23:03, Amos Jeffries wrote: >>> I'm going to dare to call FUD on those statements... >>> * Load Balancing - what is preventing your routing rules or packet >>> marking using the same criteria as the NAT changer? nothing. Load >>> balancing works perfectly fine without NAT. > Source address selection, having to occur on the source, would > require that the source has to know all the parameters that a {what > would have been your NAT GW} would need to know, which means you have > to (a) collect and/or (b) distribute this information. Given two > uplinks that only allow a certain source network address (different > for each uplink), combined with the desire to balance on utilization, > (a) a client is not in the position to easily obtain this data unless > it is the router for all participants itself, There you are adding a straw-man component into the mix. "Given two uplinks that only allow a certain source network address ", yes I agree, NAT is the sugar that makes these uplinks work. Irrelevant of load balancing. In the same way the security != NAT, so too load balancing != NAT. As I'm sure you are all well aware. Looking back at Ulrichs' original statement after reading yours it's clear he probably meant that (I hope so at least). The first reading though was that NAT by itself provided easy load balancing and DMZ. I argue neither for or against validity of NAT. Just the Fuzziness Uncertainty and Doubt created by the particular statement was of a high amount. > (b) the clients needs > to cooperate, and one cannot always trust client devices, or hope for > their technical cooperation (firewalled themselves off). > > >> I fully agree. NAT can not replace your firewall rules. >> >> However with NAT you could get some kind of anonymity. > Same network prefix, some cookies, or a login form. Blam, identified, > or at least (Almost-)Uniquely Identified Visitor tagging. > > Everybody should come out of their worshipping NAT for anonymity > now - at best, that is an Emperor's Clothes' kind of anonymity. > >> Think of Tor: If your server/client operates with private IP addresses, >> your public IP address is still masked after a security breach. > If one's tor peer was busted, they would have the address. > -- > To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [RFC PATCH 00/18] netfilter: IPv6 NAT 2011-11-29 12:23 ` Jan Engelhardt 2011-11-29 13:24 ` Amos Jeffries @ 2011-11-29 21:38 ` Krzysztof Olędzki 2011-11-29 22:15 ` Eric Dumazet ` (2 more replies) 1 sibling, 3 replies; 21+ messages in thread From: Krzysztof Olędzki @ 2011-11-29 21:38 UTC (permalink / raw) To: Jan Engelhardt Cc: Ulrich Weber, Amos Jeffries, sclark46@earthlink.net, kaber@trash.net, netfilter-devel@vger.kernel.org, netdev@vger.kernel.org On 2011-11-29 13:23, Jan Engelhardt wrote: > > On Tuesday 2011-11-29 10:19, Ulrich Weber wrote: >> On 28.11.2011 23:03, Amos Jeffries wrote: >>> I'm going to dare to call FUD on those statements... >>> * Load Balancing - what is preventing your routing rules or packet >>> marking using the same criteria as the NAT changer? nothing. Load >>> balancing works perfectly fine without NAT. > > Source address selection, having to occur on the source, would > require that the source has to know all the parameters that a {what > would have been your NAT GW} would need to know, which means you have > to (a) collect and/or (b) distribute this information. Given two > uplinks that only allow a certain source network address (different > for each uplink), combined with the desire to balance on utilization, > (a) a client is not in the position to easily obtain this data unless > it is the router for all participants itself, (b) the clients needs > to cooperate, and one cannot always trust client devices, or hope for > their technical cooperation (firewalled themselves off). > > Yes, NAT is evil, but if you actually think about it, policies are > best applied where [the policy] originates from. After all, we also > don't do LSRR, instead, routers do the routing, because they just > know much better. > >> I fully agree. NAT can not replace your firewall rules. >> >> However with NAT you could get some kind of anonymity. > > Same network prefix, some cookies, or a login form. Blam, identified, > or at least (Almost-)Uniquely Identified Visitor tagging. But without NAT you have pretty big chance to have the same IPv6 *suffix* everywhere, based on you MAC address. In your Home, your Work, in a Cafe or in a hotel during your vacations in Portugal. So yes, NAT is not a perfect solution but it really helps you privacy. Best regards, Krzysztof Olędzki -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [RFC PATCH 00/18] netfilter: IPv6 NAT 2011-11-29 21:38 ` Krzysztof Olędzki @ 2011-11-29 22:15 ` Eric Dumazet 2011-11-29 23:59 ` Krzysztof Olędzki 2011-11-29 22:21 ` Jan Engelhardt 2011-11-30 0:05 ` Ben Hutchings 2 siblings, 1 reply; 21+ messages in thread From: Eric Dumazet @ 2011-11-29 22:15 UTC (permalink / raw) To: Krzysztof Olędzki Cc: Jan Engelhardt, Ulrich Weber, Amos Jeffries, sclark46@earthlink.net, kaber@trash.net, netfilter-devel@vger.kernel.org, netdev@vger.kernel.org Le mardi 29 novembre 2011 à 22:38 +0100, Krzysztof Olędzki a écrit : > But without NAT you have pretty big chance to have the same IPv6 > *suffix* everywhere, based on you MAC address. In your Home, your Work, > in a Cafe or in a hotel during your vacations in Portugal. So yes, NAT > is not a perfect solution but it really helps you privacy. > Good point, but we can change MAC address (use a random one) on most NIC, cant we ? ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [RFC PATCH 00/18] netfilter: IPv6 NAT 2011-11-29 22:15 ` Eric Dumazet @ 2011-11-29 23:59 ` Krzysztof Olędzki 0 siblings, 0 replies; 21+ messages in thread From: Krzysztof Olędzki @ 2011-11-29 23:59 UTC (permalink / raw) To: Eric Dumazet Cc: Jan Engelhardt, Ulrich Weber, Amos Jeffries, sclark46@earthlink.net, kaber@trash.net, netfilter-devel@vger.kernel.org, netdev@vger.kernel.org On 2011-11-29 23:15, Eric Dumazet wrote: > Le mardi 29 novembre 2011 à 22:38 +0100, Krzysztof Olędzki a écrit : > >> But without NAT you have pretty big chance to have the same IPv6 >> *suffix* everywhere, based on you MAC address. In your Home, your Work, >> in a Cafe or in a hotel during your vacations in Portugal. So yes, NAT >> is not a perfect solution but it really helps you privacy. >> > > Good point, but we can change MAC address (use a random one) on most > NIC, cant we ? Sure, but the problem is that you first need to know that you should do it and you need to be able to do it - think of cell phones, tablets, etc. Best regards, Krzysztof Oledzki -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [RFC PATCH 00/18] netfilter: IPv6 NAT 2011-11-29 21:38 ` Krzysztof Olędzki 2011-11-29 22:15 ` Eric Dumazet @ 2011-11-29 22:21 ` Jan Engelhardt 2011-11-30 0:21 ` Krzysztof Olędzki 2011-11-30 0:05 ` Ben Hutchings 2 siblings, 1 reply; 21+ messages in thread From: Jan Engelhardt @ 2011-11-29 22:21 UTC (permalink / raw) To: Krzysztof Olędzki Cc: Ulrich Weber, Amos Jeffries, sclark46@earthlink.net, kaber@trash.net, netfilter-devel@vger.kernel.org, netdev@vger.kernel.org On Tuesday 2011-11-29 22:38, Krzysztof Olędzki wrote: >> >> Same network prefix, some cookies, or a login form. Blam, identified, >> or at least (Almost-)Uniquely Identified Visitor tagging. > > But without NAT you have pretty big chance to have the same IPv6 *suffix* > everywhere, based on you MAC address. Everywhere? No, one small village of indomitable Gauls.^^^^^^^^W $ ip a 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP qlen 1000 link/ether 00:0d:93:9e:08:78 brd ff:ff:ff:ff:ff:ff inet6 2001:638:600:8810:d070:3a36:464e:b3db/64 scope global temporary dynamic valid_lft 583732sec preferred_lft 64732sec inet6 2001:638:600:8810:d9f5:18f5:4fc1:9a20/64 scope global temporary deprecated dynamic valid_lft 497938sec preferred_lft 0sec [...] Same suffix? Certainly not with contemporary configurations (and Linux did this quite on its own there). In fact, now that there is almost v6-NAT in the kernel, I fear that users who are blinded by NAT now make the problem worse by actually feeding perfectly good Privacy Extension Addresses into a n:1-configured SNAT/MASQUERADE target instead of a NETMAP. > In your Home, your Work, in a Cafe or in > a hotel during your vacations in Portugal. -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [RFC PATCH 00/18] netfilter: IPv6 NAT 2011-11-29 22:21 ` Jan Engelhardt @ 2011-11-30 0:21 ` Krzysztof Olędzki 2011-11-30 10:07 ` Jan Engelhardt 0 siblings, 1 reply; 21+ messages in thread From: Krzysztof Olędzki @ 2011-11-30 0:21 UTC (permalink / raw) To: Jan Engelhardt Cc: Ulrich Weber, Amos Jeffries, sclark46@earthlink.net, kaber@trash.net, netfilter-devel@vger.kernel.org, netdev@vger.kernel.org On 2011-11-29 23:21, Jan Engelhardt wrote: > > On Tuesday 2011-11-29 22:38, Krzysztof Olędzki wrote: >>> >>> Same network prefix, some cookies, or a login form. Blam, identified, >>> or at least (Almost-)Uniquely Identified Visitor tagging. >> >> But without NAT you have pretty big chance to have the same IPv6 *suffix* >> everywhere, based on you MAC address. > > Everywhere? No, one small village of indomitable Gauls.^^^^^^^^W > > $ ip a > 2: eth0:<BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP qlen 1000 > link/ether 00:0d:93:9e:08:78 brd ff:ff:ff:ff:ff:ff > inet6 2001:638:600:8810:d070:3a36:464e:b3db/64 scope global temporary dynamic > valid_lft 583732sec preferred_lft 64732sec > inet6 2001:638:600:8810:d9f5:18f5:4fc1:9a20/64 scope global temporary deprecated dynamic > valid_lft 497938sec preferred_lft 0sec > [...] > > Same suffix? Certainly not with contemporary configurations (and > Linux did this quite on its own there). In fact, now that there is > almost v6-NAT in the kernel, I fear that users who are blinded by NAT > now make the problem worse by actually feeding perfectly good Privacy > Extension Addresses into a n:1-configured SNAT/MASQUERADE target > instead of a NETMAP. What if: 1. You or your users don't have modern OS on your device so there is no DHCPv6 or rfc3041/4941 support? 2. It is not enabled by default and you are not aware of this? 3. You need to have static addresses in your network for access control? Best regards, Krzysztof Olędzki -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [RFC PATCH 00/18] netfilter: IPv6 NAT 2011-11-30 0:21 ` Krzysztof Olędzki @ 2011-11-30 10:07 ` Jan Engelhardt 2011-12-01 7:01 ` Krzysztof Olędzki 0 siblings, 1 reply; 21+ messages in thread From: Jan Engelhardt @ 2011-11-30 10:07 UTC (permalink / raw) To: Krzysztof Olędzki Cc: Ulrich Weber, Amos Jeffries, sclark46@earthlink.net, kaber@trash.net, netfilter-devel@vger.kernel.org, netdev@vger.kernel.org On Wednesday 2011-11-30 01:21, Krzysztof Olędzki wrote: >>> >>>>>However with NAT you could get some kind of anonymity. >>> >>>But without NAT you have pretty big chance to have the same IPv6 >>>*suffix* everywhere, based on you MAC address. without NAT you have >>>pretty big chance to have the same IPv6 *suffix* everywhere, based on >>>you MAC address. >> >>Same suffix? Certainly not with [PrivExt...] > >What if: > >1. You or your users don't have modern OS on your device so there is no >DHCPv6 or rfc3041/4941 support? Dedicated separate program (that's what you would probably do on Windows XP which lacks DHCPv6, PrivExt and also does not even allow manually setting an address via GUI). >3. You need to have static addresses in your network for access control? Access control can be done based on MAC within a broadcast domain so you don't have to eschew Privacy Extensions if you can do so. -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [RFC PATCH 00/18] netfilter: IPv6 NAT 2011-11-30 10:07 ` Jan Engelhardt @ 2011-12-01 7:01 ` Krzysztof Olędzki 0 siblings, 0 replies; 21+ messages in thread From: Krzysztof Olędzki @ 2011-12-01 7:01 UTC (permalink / raw) To: Jan Engelhardt Cc: Ulrich Weber, Amos Jeffries, sclark46@earthlink.net, kaber@trash.net, netfilter-devel@vger.kernel.org, netdev@vger.kernel.org On 2011-11-30 11:07, Jan Engelhardt wrote: > > On Wednesday 2011-11-30 01:21, Krzysztof Olędzki wrote: >>>> >>>>>> However with NAT you could get some kind of anonymity. >>>> >>>> But without NAT you have pretty big chance to have the same IPv6 >>>> *suffix* everywhere, based on you MAC address. without NAT you have >>>> pretty big chance to have the same IPv6 *suffix* everywhere, based on >>>> you MAC address. >>> >>> Same suffix? Certainly not with [PrivExt...] >> >> What if: >> >> 1. You or your users don't have modern OS on your device so there is no >> DHCPv6 or rfc3041/4941 support? > > Dedicated separate program (that's what you would probably do on > Windows XP which lacks DHCPv6, PrivExt and also does not even allow > manually setting an address via GUI). Too much effort. Really. >> 3. You need to have static addresses in your network for access control? > > Access control can be done based on MAC within a broadcast domain so > you don't have to eschew Privacy Extensions if you can do so. Maybe if you have a very small network - just one or two subnets, one router... Again - maybe. It is definitely not going to work on a large, multisite network with many intermediate routers. All you can do on edge devices is checking client's MAC, requring 802.1X and making sure that IP matches MAC (and possibly DHCP lease) and similar things. Best regards, Krzysztof Olędzki -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [RFC PATCH 00/18] netfilter: IPv6 NAT 2011-11-29 21:38 ` Krzysztof Olędzki 2011-11-29 22:15 ` Eric Dumazet 2011-11-29 22:21 ` Jan Engelhardt @ 2011-11-30 0:05 ` Ben Hutchings 2011-11-30 0:30 ` Krzysztof Olędzki 2 siblings, 1 reply; 21+ messages in thread From: Ben Hutchings @ 2011-11-30 0:05 UTC (permalink / raw) To: Krzysztof Olędzki Cc: Jan Engelhardt, Ulrich Weber, Amos Jeffries, sclark46@earthlink.net, kaber@trash.net, netfilter-devel@vger.kernel.org, netdev@vger.kernel.org On Tue, 2011-11-29 at 22:38 +0100, Krzysztof Olędzki wrote: > On 2011-11-29 13:23, Jan Engelhardt wrote: > > > > On Tuesday 2011-11-29 10:19, Ulrich Weber wrote: > >> On 28.11.2011 23:03, Amos Jeffries wrote: > >>> I'm going to dare to call FUD on those statements... > >>> * Load Balancing - what is preventing your routing rules or packet > >>> marking using the same criteria as the NAT changer? nothing. Load > >>> balancing works perfectly fine without NAT. > > > > Source address selection, having to occur on the source, would > > require that the source has to know all the parameters that a {what > > would have been your NAT GW} would need to know, which means you have > > to (a) collect and/or (b) distribute this information. Given two > > uplinks that only allow a certain source network address (different > > for each uplink), combined with the desire to balance on utilization, > > (a) a client is not in the position to easily obtain this data unless > > it is the router for all participants itself, (b) the clients needs > > to cooperate, and one cannot always trust client devices, or hope for > > their technical cooperation (firewalled themselves off). > > > > Yes, NAT is evil, but if you actually think about it, policies are > > best applied where [the policy] originates from. After all, we also > > don't do LSRR, instead, routers do the routing, because they just > > know much better. > > > >> I fully agree. NAT can not replace your firewall rules. > >> > >> However with NAT you could get some kind of anonymity. > > > > Same network prefix, some cookies, or a login form. Blam, identified, > > or at least (Almost-)Uniquely Identified Visitor tagging. > > But without NAT you have pretty big chance to have the same IPv6 > *suffix* everywhere, based on you MAC address. In your Home, your Work, > in a Cafe or in a hotel during your vacations in Portugal. So yes, NAT > is not a perfect solution but it really helps you privacy. If you enable NAT on your own network, how does this help when you use all those other networks that may not use NAT or may have a predictable mapping from MAC address to public IPv6 address? Instead you need to deal with this on the mobile device itself, using the RFC3041 privacy extensions. Ben. -- Ben Hutchings, Staff Engineer, Solarflare Not speaking for my employer; that's the marketing department's job. They asked us to note that Solarflare product names are trademarked. ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [RFC PATCH 00/18] netfilter: IPv6 NAT 2011-11-30 0:05 ` Ben Hutchings @ 2011-11-30 0:30 ` Krzysztof Olędzki 0 siblings, 0 replies; 21+ messages in thread From: Krzysztof Olędzki @ 2011-11-30 0:30 UTC (permalink / raw) To: Ben Hutchings Cc: Jan Engelhardt, Ulrich Weber, Amos Jeffries, sclark46@earthlink.net, kaber@trash.net, netfilter-devel@vger.kernel.org, netdev@vger.kernel.org On 2011-11-30 01:05, Ben Hutchings wrote: > On Tue, 2011-11-29 at 22:38 +0100, Krzysztof Olędzki wrote: >> On 2011-11-29 13:23, Jan Engelhardt wrote: >>> >>> On Tuesday 2011-11-29 10:19, Ulrich Weber wrote: >>>> On 28.11.2011 23:03, Amos Jeffries wrote: >>>>> I'm going to dare to call FUD on those statements... >>>>> * Load Balancing - what is preventing your routing rules or packet >>>>> marking using the same criteria as the NAT changer? nothing. Load >>>>> balancing works perfectly fine without NAT. >>> >>> Source address selection, having to occur on the source, would >>> require that the source has to know all the parameters that a {what >>> would have been your NAT GW} would need to know, which means you have >>> to (a) collect and/or (b) distribute this information. Given two >>> uplinks that only allow a certain source network address (different >>> for each uplink), combined with the desire to balance on utilization, >>> (a) a client is not in the position to easily obtain this data unless >>> it is the router for all participants itself, (b) the clients needs >>> to cooperate, and one cannot always trust client devices, or hope for >>> their technical cooperation (firewalled themselves off). >>> >>> Yes, NAT is evil, but if you actually think about it, policies are >>> best applied where [the policy] originates from. After all, we also >>> don't do LSRR, instead, routers do the routing, because they just >>> know much better. >>> >>>> I fully agree. NAT can not replace your firewall rules. >>>> >>>> However with NAT you could get some kind of anonymity. >>> >>> Same network prefix, some cookies, or a login form. Blam, identified, >>> or at least (Almost-)Uniquely Identified Visitor tagging. >> >> But without NAT you have pretty big chance to have the same IPv6 >> *suffix* everywhere, based on you MAC address. In your Home, your Work, >> in a Cafe or in a hotel during your vacations in Portugal. So yes, NAT >> is not a perfect solution but it really helps you privacy. > > If you enable NAT on your own network, how does this help when you use > all those other networks that may not use NAT or may have a predictable > mapping from MAC address to public IPv6 address? Oh, I understand your point. But I'm looking at it from the other side as I'm here to protect my users. ;) Best regards, Krzysztof Olędzki -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [RFC PATCH 00/18] netfilter: IPv6 NAT 2011-11-28 17:14 ` Stephen Clark 2011-11-28 20:25 ` Ulrich Weber @ 2011-11-29 12:32 ` Patrick McHardy 1 sibling, 0 replies; 21+ messages in thread From: Patrick McHardy @ 2011-11-29 12:32 UTC (permalink / raw) To: sclark46; +Cc: netfilter-devel, netdev, ulrich.weber On 28.11.2011 18:14, Stephen Clark wrote: > On 11/24/2011 11:57 AM, kaber@trash.net wrote: >> The following patches contain the updated IPv6 NAT patchset forward >> ported >> to 3.2-rc3. ... >> >> >> > Probabably a dumb question but are these patches for natting ipv6 to > ipv6 or ipv4 to ipv6? IPv6 to IPv6. I haven't really considered IPv6 to IPv4 yet. ^ permalink raw reply [flat|nested] 21+ messages in thread
* Re: [RFC PATCH 00/18] netfilter: IPv6 NAT 2011-11-24 16:57 kaber 2011-11-28 17:14 ` Stephen Clark @ 2011-12-23 13:08 ` Pablo Neira Ayuso 1 sibling, 0 replies; 21+ messages in thread From: Pablo Neira Ayuso @ 2011-12-23 13:08 UTC (permalink / raw) To: kaber; +Cc: netfilter-devel, netdev, ulrich.weber Hi Patrick, On Thu, Nov 24, 2011 at 05:57:11PM +0100, kaber@trash.net wrote: > The following patches contain the updated IPv6 NAT patchset forward ported > to 3.2-rc3. I've applied patches from 1 to 7. They are independent of the IPv6 NAT support so they are safe to be applied. Please, rebase your tree once they have hit davem's tree. Make sure you rebase your tree before final submission of the IPv6 NAT support. Thanks! ^ permalink raw reply [flat|nested] 21+ messages in thread
end of thread, other threads:[~2011-12-23 13:09 UTC | newest] Thread overview: 21+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2011-11-29 12:50 Re[2]: [RFC PATCH 00/18] netfilter: IPv6 NAT Hans Schillstrom 2011-11-29 14:05 ` Patrick McHardy -- strict thread matches above, loose matches on Subject: below -- 2011-11-24 16:57 kaber 2011-11-28 17:14 ` Stephen Clark 2011-11-28 20:25 ` Ulrich Weber 2011-11-28 20:55 ` richard -rw- weinberger 2011-11-28 22:03 ` Amos Jeffries 2011-11-29 9:19 ` Ulrich Weber 2011-11-29 12:23 ` Jan Engelhardt 2011-11-29 13:24 ` Amos Jeffries 2011-11-29 21:38 ` Krzysztof Olędzki 2011-11-29 22:15 ` Eric Dumazet 2011-11-29 23:59 ` Krzysztof Olędzki 2011-11-29 22:21 ` Jan Engelhardt 2011-11-30 0:21 ` Krzysztof Olędzki 2011-11-30 10:07 ` Jan Engelhardt 2011-12-01 7:01 ` Krzysztof Olędzki 2011-11-30 0:05 ` Ben Hutchings 2011-11-30 0:30 ` Krzysztof Olędzki 2011-11-29 12:32 ` Patrick McHardy 2011-12-23 13:08 ` Pablo Neira Ayuso
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).