Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

The Reality of Network Address Translators

Type
Audio
Tags
network
Authors
Harald Welte
Event
Chaos Communication Congress 21th (21C3) 2004
Indexed on
Mar 27, 2013
URL
http://ftp.ccc.de/congress/21c3/audio/072%20The%20Reality%20of%20Network%20Address%20Translators.mp3
File name
072%20The%20Reality%20of%20Network%20Address%20Translators.mp3
File size
26.7 MB
MD5
f17968501feeae230ad27dbd17a79796
SHA1
80c89c76fe80f78ea8448c31953cb450a735dd94

NAT's are ubiquitous in todays Internet. Unfortunately the IETF missed to recognize this reality. Due to this lack of standardizaiton, NAT's pose an enormous threat to the paradigm shift from client-server to peer-to-peer. The presentation covers proposed solutions. NATs are ubiquitous in todays Internet, not only built into so-called DSL or WLAN Routers within customer premises, but also in the corporate environment. The dream of an end-to-end transparent network has died one NAT at at time. Unfortunately the IETF missed to recognize this reality for a long time. This means that there are no up-to-date informations (like best current practice RFC's) specifying how an implementor should implement Network Address Translation. This lack of standardization leads to different NAT behaviour from implementor to implementor. Tradiditonal IP based protocols are built around the client-server paradigm, and NAT's are designed for this. However, recently protocols and applications based on the peer-to-peer paradigm are becomming more and more common. And this is where NAT's become a major problem, especially since they don't expose any standardized deterministic behaviour. Many approaches have been designed, usually with H.323 or SIP as driving force behind them. FCP, Midcom, NSIS, STUN - just to name a few examples. None of them works in all, or even the majority of all cases. In fact the author of this presentation believes it is impossible to solve the problem without making assumptions on some common behaviour of all NAT implementations. The recently published draft-audet-nat-behave tries to be a first candidate of such a behavioral specification. It is scheduled to evolve into a BCP RFC on NAT behaviour in 2005. The presentation will present the fundamental problem, look at different classes of NAT's, their behaviour, and give an overview about the proposed solutions.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !