From owner-nat@livingston.com Wed Dec 2 23:11:51 1998 Received: from bast.livingston.com (bast.livingston.com [149.198.247.2]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA16574 for ; Wed, 2 Dec 1998 23:11:50 -0500 (EST) Received: from server.livingston.com (server.livingston.com [149.198.1.70]) by bast.livingston.com (8.8.5/8.6.9) with ESMTP id TAA14190; Wed, 2 Dec 1998 19:59:38 -0800 (PST) Received: (from majordom@localhost) by server.livingston.com (8.8.5/8.6.9) id TAA02002 for nat-outgoing; Wed, 2 Dec 1998 19:54:54 -0800 (PST) Message-ID: <00a001be1e70$58e18e20$8a1bfea9@juan> To: From: "Rava Sociedad de Bolsa S.A." Subject: (NAT) e-bolsa - Rava Sociedad de Bolsa S.A. Date: Thu, 3 Dec 1998 00:28:31 -0300 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_009D_01BE1E57.33945620" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 4.72.3110.5 X-MimeOLE: Produced By Microsoft MimeOLE V4.72.3110.3 Sender: owner-nat@livingston.com Precedence: bulk Reply-To: "Rava Sociedad de Bolsa S.A." This is a multi-part message in MIME format. ------=_NextPart_000_009D_01BE1E57.33945620 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Hola, que tal, bienvenido al mundo de la Bolsa v=EDa Internet !!!! =20 Si, la manera de llegar al Mercado de Valores de Buenos Aires a trav=E9s = de su PC sin moverse de su casa u oficina, no importando el lugar = distante que se encuentre de la city porte=F1a, ha llegado a la = Argentina, al igual que en Estados Unidos. =20 Porque desde este momento Ud. est=E1 invitado a operar a trav=E9s de = Rava Sociedad de Bolsa S.A., a trav=E9s de su exclusivo sistema e-bolsa, = implementado y dise=F1ado por nosotros, para brindarle toda la = informaci=F3n necesaria para realizar sus operaciones con =E9xito, sin = pisar nuestras oficinas, por medio de la red de redes. =20 A trav=E9s de e-bolsa Ud. conocer=E1 informaci=F3n diaria de balances, = su cartera de inversiones, su cuenta corriente, accesos a sitios de = empresas de inter=E9s, tendr=E1 acceso a programas shareware para = realizar an=E1lisis t=E9cnico y sus bases de datos para alimentarlos, y = todo lo referente para realizar operaciones de Bolsa con confimaci=F3n = en minutos del detalle de la misma. =20 Para ello, le env=EDo este e-mail con el objeto de verificar su casilla = de correo electr=F3nico al pedirle que me lo responda, invitarlo a = visitar nuestra p=E1gina de web para conocerla, y se registre si no lo = hizo. =20 Adem=E1s el objeto del mismo es darle a conocer la direcci=F3n de = nuestro web site, que se accede en www.ebolsa.com.ar y nuestro nuevo = e-mail, que se adapta a nuestro domino registrado: ebolsa@rava.com.ar , = en el cual responderemos cualquier inquietud. =20 Sin otro particular, y agradeciendo vuestra atenci=F3n, esperamos su = respuesta. =20 Juan Carlos Rava - Rava Sociedad de Bolsa S.A. e-mail: ebolsa@rava.com.ar home page: www.ebolsa.com.ar 25 de Mayo 277 - Piso 5 - (1002) Capital Federal - ARGENTINA TE: 343-9421/9605 - 342-0923/4158 =20 ------=_NextPart_000_009D_01BE1E57.33945620 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
Hola, que tal, bienvenido al mundo de la Bolsa = vía=20 Internet !!!!
 
Si, la manera de llegar al Mercado de Valores de = Buenos Aires=20 a través de su PC sin moverse de su casa u oficina, no importando = el=20 lugar distante que se encuentre de la city porteña, ha llegado a = la=20 Argentina, al igual que en Estados Unidos.
 
Porque desde este momento Ud. está invitado a = operar a=20 través de Rava Sociedad de Bolsa S.A., a través de su = exclusivo=20 sistema e-bolsa, implementado y diseñado por nosotros, para = brindarle=20 toda la información necesaria para realizar sus operaciones con=20 éxito, sin pisar nuestras oficinas, por medio de la red de=20 redes.
 
A través de e-bolsa Ud. conocerá=20 información diaria de balances, su cartera de inversiones, su = cuenta=20 corriente, accesos a sitios de empresas de interés, tendrá = acceso=20 a programas shareware para realizar análisis técnico y sus = bases=20 de datos para alimentarlos, y todo lo referente para realizar = operaciones de=20 Bolsa con confimación en minutos del detalle de la = misma.
 
Para ello, le envío este e-mail con el objeto = de=20 verificar su casilla de correo electrónico al pedirle que me lo = responda,=20 invitarlo a visitar nuestra página de web para conocerla, y se = registre=20 si no lo hizo.
 
Además el objeto del mismo es darle a conocer = la=20 dirección de nuestro web site,  que se accede en www.ebolsa.com.ar  y nuestro = nuevo=20 e-mail, que se adapta a nuestro domino registrado: ebolsa@rava.com.ar  , en el = cual=20 responderemos cualquier inquietud.
 
Sin otro particular, y agradeciendo vuestra = atención,=20 esperamos su respuesta.
 
Juan Carlos Rava - Rava = Sociedad de Bolsa=20 S.A.
e-mail: ebolsa@rava.com.ar
home page: = www.ebolsa.com.ar
25 de Mayo = 277 - Piso 5=20 - (1002) Capital Federal - ARGENTINA
TE: 343-9421/9605 -=20 342-0923/4158
 
------=_NextPart_000_009D_01BE1E57.33945620-- - To unsubscribe, email 'majordomo@livingston.com' with 'unsubscribe nat' in the body of the message. From owner-nat@livingston.com Thu Dec 3 14:43:58 1998 Received: from bast.livingston.com (bast.livingston.com [149.198.247.2]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA28759 for ; Thu, 3 Dec 1998 14:43:58 -0500 (EST) Received: from server.livingston.com (server.livingston.com [149.198.1.70]) by bast.livingston.com (8.8.5/8.6.9) with ESMTP id LAA17095; Thu, 3 Dec 1998 11:41:11 -0800 (PST) Received: (from majordom@localhost) by server.livingston.com (8.8.5/8.6.9) id LAA17716 for nat-outgoing; Thu, 3 Dec 1998 11:39:26 -0800 (PST) X-Lotus-FromDomain: 3COM@3COM-MWGATE From: "Mike Borella" To: nat@livingston.com cc: "David Grabelsky" , "Ikhlaq Sidhu" Message-ID: <862566CD.0068A2AF.00@mwgate02.mw.3com.com> Date: Thu, 3 Dec 1998 13:27:58 -0600 Subject: (NAT) Host NAT issues Mime-Version: 1.0 Content-type: text/plain; charset=us-ascii Content-Disposition: inline Sender: owner-nat@livingston.com Precedence: bulk Reply-To: "Mike Borella" A couple of notes regarding the recent host NAT draft: - We presented distributed NAT (DNAT) at the Chicago IETF in the ngtrans WG. Host NAT is DNAT with only some very minor modifications. Interested parties should look at: http://search.ietf.org/internet-drafts/draft-borella-aatn-dnat-01.txt - DNAT has been implemented (from the draft description) by a third party. It works quite well. - The draft makes some incorrect comments about DNAT. In particular, the authors claim that DNAT does not allow the sharing on multiple IP addresses, but it does. This misconception seems to be the motivating factor of the (very minor) differences between DNAT and host NAT. In case it isn't obvious, my point is that this scheme has already been proposed and presented at IETF. I do not think that host NAT is significantly different from DNAT, though I'll happily entertain arguments to the contrary. -Mike - To unsubscribe, email 'majordomo@livingston.com' with 'unsubscribe nat' in the body of the message. From owner-nat@livingston.com Fri Dec 4 17:36:17 1998 Received: from bast.livingston.com (bast.livingston.com [149.198.247.2]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA04167 for ; Fri, 4 Dec 1998 17:36:16 -0500 (EST) Received: from server.livingston.com (server.livingston.com [149.198.1.70]) by bast.livingston.com (8.8.5/8.6.9) with ESMTP id OAA14665; Fri, 4 Dec 1998 14:32:49 -0800 (PST) Received: (from majordom@localhost) by server.livingston.com (8.8.5/8.6.9) id OAA15506 for nat-outgoing; Fri, 4 Dec 1998 14:26:48 -0800 (PST) X-Spoof-Warning: ccrl.sj.nec.com [131.241.79.5] does not match with monet.ccrl.sj.nec.com [131.241.79.5] Date: Fri, 4 Dec 1998 14:21:58 -0800 (PST) From: Jeffrey Lo To: Mike Borella cc: nat@livingston.com, David Grabelsky , Ikhlaq Sidhu Subject: Re: (NAT) Host NAT issues In-Reply-To: <862566CD.0068A2AF.00@mwgate02.mw.3com.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-nat@livingston.com Precedence: bulk Reply-To: Jeffrey Lo Hi, This is sent in response to a recent comment about HNAT draft proposed to NAT workgroup. We are particularly interested larger scale deployment of private addressing. A case where a band of global IP addresses are managed by the address manager, which may or may not reside on the Host-NAT-Server. We realised the existence of DNAT draft and attempted to apply Port Distribution Protocol (PDP) proposed in draft-borella-aatn-dnat-01.txt in our scenario. It is during this attempt that we find PDP insufficient and does not support dynamic global IP address assignment. Hence our primary motivation is to propose a more generic protocol that serves a greater majority of the NAT community. As a result, we are proposing Dynamic Bindings Acquisition Protocol (BDAP). Having said these, we do not deny the fact that DBAP support port assignment as well and could be used in places where PDP is used. Another motivation for our draft is the fact that we feel PDP lacks many important features which are fundamental for larger scale operation. We don't see our differences as being minor but rather fundamental. To state some of the differences: Error Reporting It is important for accurate error reporting so that Host-NAT-Clients know about source of error. For example, is a request denied due to resource reasons, policy reasons or other miscellaneous reasons. This is not possible with PDP. Max. Leased Time It is important for Host-NAT-Client to be able to negotiate a lease time interval with Host-NAT-Server. This is especially important in scenarios where address management and NAT are performed by different authority. One example is the case when private addressing is adopted by an ISP and it wishes to delegate global address lease on an enterprise basis. In this case, Host-NAT-Clients deamons may not be situated in end host but may be some access routers. In this case, such global leasing may be directly connected to billing. In the current PDP, it is unclear how this is done apart from some default interval pre-selected during configuration. BindID This is vital for both efficient indexing and serves as an identifier if a Host-NAT-Client requests for more than one binds from a Host-NAT-Server. For example, we know that IPSEC ESP does not work with NAPT, a Host-NAT-Client may be using a port range for IPSEC AH. When an application is started requiring ESP security, a global address needs to be acquired. BindID is required to correctly identify bindings on Host-NAT-Server. It seems to us that PDP only supports a single port range bind at this moment. Although not a major motivation, BindID also introduces a layer of protection against security attacks. If you have some ideas or implementations that suits our purpose, we would be glad to hear about it. We feel that it is unfair for the authors to claim something that has not being documented. Thanks. Jeff On Thu, 3 Dec 1998, Mike Borella wrote: > > > A couple of notes regarding the recent host NAT draft: > > - We presented distributed NAT (DNAT) at the Chicago IETF in the > ngtrans WG. Host NAT is DNAT with only some very minor modifications. > Interested parties should look at: > > http://search.ietf.org/internet-drafts/draft-borella-aatn-dnat-01.txt > > - DNAT has been implemented (from the draft description) by a third party. > It works quite well. > > - The draft makes some incorrect comments about DNAT. In particular, > the authors claim that DNAT does not allow the sharing on multiple IP > addresses, but it does. This misconception seems to be the motivating > factor of the (very minor) differences between DNAT and host NAT. > > In case it isn't obvious, my point is that this scheme has already > been proposed and presented at IETF. I do not think that host NAT is > significantly different from DNAT, though I'll happily entertain > arguments to the contrary. > > -Mike > > > - > To unsubscribe, email 'majordomo@livingston.com' with > 'unsubscribe nat' in the body of the message. > - To unsubscribe, email 'majordomo@livingston.com' with 'unsubscribe nat' in the body of the message. From owner-nat@livingston.com Sun Dec 6 21:57:52 1998 Received: from bast.livingston.com (bast.livingston.com [149.198.247.2]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA06180 for ; Sun, 6 Dec 1998 21:57:50 -0500 (EST) Received: from server.livingston.com (server.livingston.com [149.198.1.70]) by bast.livingston.com (8.8.5/8.6.9) with ESMTP id SAA19700; Sun, 6 Dec 1998 18:54:44 -0800 (PST) Received: (from majordom@localhost) by server.livingston.com (8.8.5/8.6.9) id SAA18713 for nat-outgoing; Sun, 6 Dec 1998 18:51:01 -0800 (PST) X-Lotus-FromDomain: 3COM@3COM-MWGATE From: "Mike Borella" To: Jeffrey Lo cc: nat@livingston.com, "David Grabelsky" , "Ikhlaq Sidhu" Message-ID: <862566D3.0008896F.00@mwgate02.mw.3com.com> Date: Sun, 6 Dec 1998 20:39:38 -0600 Subject: Re: (NAT) Host NAT issues Mime-Version: 1.0 Content-type: text/plain; charset=us-ascii Content-Disposition: inline Sender: owner-nat@livingston.com Precedence: bulk Reply-To: "Mike Borella" Jeff, The framework that is used by DNAT, and now host-NAT, consists of several fundamental ideas: - Tunneling between a router or device with a public IP address and an end host. - Using TCP/UDP ports or some other mechansim or combinations thereof to uniquely identify hosts from the private address space. - Assignment of global IP addresses to hosts for them to use when talking with the outside world. In proposing DNAT, our goal was to allow end-to-end communication through a NAT box. As it turns out, it is in theory possible to get end-to-end IPSEC working with DNAT as well as Mobile IP. The fact that this framework can be extended to support the services that host-NAT offers attests to its power. The PDP was meant just to distribute port numbers. Nothing else. In our way of thinking, assignment of an IP address or other parameters to a host might as well occur using an existing extensible protocol, such as DHCP or as part of a tunnel establishment, rather than reproducing existing functionality. These parameters may require renegotiation. See the "Perspectives" section of the DNAT draft for a discussion of this. The PDP is not limited in any sense. I recently started writing a draft about the general framework of end-to-end communication through a NAT, listing the issues that any solution must address. Here are some of the most relevant issues: - Unique Determination of Local Destination Address - Negotiation and/or Specification of Demultiplexing Fields - Assignment of Parameters to Hosts by Some Device - Tunnel Use and Establishment There is more than one solution to each of these issues, leading to some number of possible DNAT-like implementations, each of which are probably incompatible with the rest. In terms of where this should go within the IETF, I think that both the DNAT and Host-NAT drafts are too specific in how they describe solutions to the end-to-end issues. Perhaps what is needed is a generic end-to-end NAT solution with UDP-based setup and negotiation between the hosts and router or some other device. Using attribute value pairs, arbitrary parameters could be set up and negotiated through a "control channel" with a much more flexible packet format. This approach may re-invent the wheel to some respect, but it would be far more general than what we currently have. -Mike Jeffrey Lo on 12/04/98 04:21:58 PM To: Mike Borella/MW/US/3Com cc: nat@livingston.com, David Grabelsky/MW/US/3Com, Ikhlaq Sidhu/MW/US/3Com Subject: Re: (NAT) Host NAT issues Hi, This is sent in response to a recent comment about HNAT draft proposed to NAT workgroup. We are particularly interested larger scale deployment of private addressing. A case where a band of global IP addresses are managed by the address manager, which may or may not reside on the Host-NAT-Server. We realised the existence of DNAT draft and attempted to apply Port Distribution Protocol (PDP) proposed in draft-borella-aatn-dnat-01.txt in our scenario. It is during this attempt that we find PDP insufficient and does not support dynamic global IP address assignment. Hence our primary motivation is to propose a more generic protocol that serves a greater majority of the NAT community. As a result, we are proposing Dynamic Bindings Acquisition Protocol (BDAP). Having said these, we do not deny the fact that DBAP support port assignment as well and could be used in places where PDP is used. Another motivation for our draft is the fact that we feel PDP lacks many important features which are fundamental for larger scale operation. We don't see our differences as being minor but rather fundamental. To state some of the differences: Error Reporting It is important for accurate error reporting so that Host-NAT-Clients know about source of error. For example, is a request denied due to resource reasons, policy reasons or other miscellaneous reasons. This is not possible with PDP. Max. Leased Time It is important for Host-NAT-Client to be able to negotiate a lease time interval with Host-NAT-Server. This is especially important in scenarios where address management and NAT are performed by different authority. One example is the case when private addressing is adopted by an ISP and it wishes to delegate global address lease on an enterprise basis. In this case, Host-NAT-Clients deamons may not be situated in end host but may be some access routers. In this case, such global leasing may be directly connected to billing. In the current PDP, it is unclear how this is done apart from some default interval pre-selected during configuration. BindID This is vital for both efficient indexing and serves as an identifier if a Host-NAT-Client requests for more than one binds from a Host-NAT-Server. For example, we know that IPSEC ESP does not work with NAPT, a Host-NAT-Client may be using a port range for IPSEC AH. When an application is started requiring ESP security, a global address needs to be acquired. BindID is required to correctly identify bindings on Host-NAT-Server. It seems to us that PDP only supports a single port range bind at this moment. Although not a major motivation, BindID also introduces a layer of protection against security attacks. If you have some ideas or implementations that suits our purpose, we would be glad to hear about it. We feel that it is unfair for the authors to claim something that has not being documented. Thanks. Jeff On Thu, 3 Dec 1998, Mike Borella wrote: > > > A couple of notes regarding the recent host NAT draft: > > - We presented distributed NAT (DNAT) at the Chicago IETF in the > ngtrans WG. Host NAT is DNAT with only some very minor modifications. > Interested parties should look at: > > http://search.ietf.org/internet-drafts/draft-borella-aatn-dnat-01.txt > > - DNAT has been implemented (from the draft description) by a third party. > It works quite well. > > - The draft makes some incorrect comments about DNAT. In particular, > the authors claim that DNAT does not allow the sharing on multiple IP > addresses, but it does. This misconception seems to be the motivating > factor of the (very minor) differences between DNAT and host NAT. > > In case it isn't obvious, my point is that this scheme has already > been proposed and presented at IETF. I do not think that host NAT is > significantly different from DNAT, though I'll happily entertain > arguments to the contrary. > > -Mike > > > - > To unsubscribe, email 'majordomo@livingston.com' with > 'unsubscribe nat' in the body of the message. > - To unsubscribe, email 'majordomo@livingston.com' with 'unsubscribe nat' in the body of the message. From owner-nat@livingston.com Mon Dec 7 02:17:51 1998 Received: from bast.livingston.com (bast.livingston.com [149.198.247.2]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA15741 for ; Mon, 7 Dec 1998 02:17:50 -0500 (EST) Received: from server.livingston.com (server.livingston.com [149.198.1.70]) by bast.livingston.com (8.8.5/8.6.9) with ESMTP id XAA22955; Sun, 6 Dec 1998 23:15:04 -0800 (PST) Received: (from majordom@localhost) by server.livingston.com (8.8.5/8.6.9) id XAA28001 for nat-outgoing; Sun, 6 Dec 1998 23:15:26 -0800 (PST) Message-Id: <199812070715.XAA09794@theta2.ben2.ucla.edu> X-Sender: lixia@aurora.cs.ucla.edu X-Mailer: QUALCOMM Windows Eudora Pro Version 4.0 Date: Sun, 06 Dec 1998 23:10:04 -0800 To: Matt Holdrege From: Lixia Zhang Subject: Re: (NAT) Request to advance NAT drafts to Informational RFCs Cc: nat@livingston.com In-Reply-To: <3.0.5.32.19981129200023.00b31500@porky> References: <199811291535.HAA19710@theta2.ben2.ucla.edu> <3.0.5.32.19981127122346.00b0c3a0@porky> <365E7FF7.A436BADB@hursley.ibm.com> <199811262350.PAA25694@kc.livingston.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: owner-nat@livingston.com Precedence: bulk Reply-To: Lixia Zhang At 08:00 PM 11/29/98 , Matt Holdrege wrote: >At 07:32 AM 11/29/98 -0800, Lixia Zhang wrote: >>I strongly support Brian's position (that the NAT limitation document ought >>to move together with the definition document), and I feel "NAT >>Limitations" is a much better title. > >I felt that including the word "limitations" was limiting. :) If my choice of word does not fit well, then pick some other words, e.g. those suggested by others ("shortcoming" perhaps? I hope that is less limiting:-) >If we describe in plain technical words what NAT does to a protocol or >application, then the reader can clearly see for him or herself what is >going on. Definitely the writing should be in plain technical words on what NAT does. I was only talking about making the title more informative. ...... >>Would very much like to contribute. As I said at the Chicago plenary, >>because the difficulty in WG meeting scheduling and the conceived notion >>that people care about RSVP or QOS or diffserv would not be primarily >>concerned with NAT, I have not been able to make to NAT WG meetings due to >>schedule conflicts. I suspect that I am not the only one in this >situation. > >The NAT WG meets 365 days a year at nat@livingston.com. That is very true, and I think many (or most) people on the list indeed do just that. For some less fortunate people (myself included), however, our day job does not allow us to keep up with IETF email. For now I mostly take a quick look only during weekend, and very often there are several thousand msgs cumulated over the week. Quickly flipping thru msgs gives a sense of what's going on, however proposing detailed writing takes more time than I have. Attending WG meeting would be more time-efficient :-) But this time I will try to comment in writing (just for NAT:-) in next few weeks. > And the very nature >of contributions to the "protocol-issues" draft pretty much demand email >rather than just the spoken word. So please send your comments to Suresh >and myself and/or to the list. Hopefully folks who have contributions to >make will include as much technical info as possible. Suresh and I cannot >be experts on every protocol, which is why we are asking for input. - To unsubscribe, email 'majordomo@livingston.com' with 'unsubscribe nat' in the body of the message. From owner-nat@livingston.com Mon Dec 7 10:07:24 1998 Received: from bast.livingston.com (bast.livingston.com [149.198.247.2]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA18305 for ; Mon, 7 Dec 1998 10:07:23 -0500 (EST) Received: from server.livingston.com (server.livingston.com [149.198.1.70]) by bast.livingston.com (8.8.5/8.6.9) with ESMTP id HAA02858; Mon, 7 Dec 1998 07:03:30 -0800 (PST) Received: (from majordom@localhost) by server.livingston.com (8.8.5/8.6.9) id HAA19078 for nat-outgoing; Mon, 7 Dec 1998 07:03:36 -0800 (PST) From: Gabriel.Montenegro@eng.sun.com (Gabriel Montenegro) Message-Id: <199812071458.GAA05705@hsmpka.eng.sun.com> Date: Mon, 7 Dec 1998 10:01:10 -0800 To: "Mike Borella" , "Jeffrey Lo" Cc: "Ikhlaq Sidhu" , "David Grabelsky" , Subject: Re: (NAT) Host NAT issues X-Mailer: Sun NetMail 2.2.2 MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit Sender: owner-nat@livingston.com Precedence: bulk Reply-To: Gabriel.Montenegro@eng.sun.com (Gabriel Montenegro) Content-Transfer-Encoding: 7bit "Mike Borella" wrote: >Jeff, > >The framework that is used by DNAT, and now host-NAT, consists of several >fundamental ideas: > >- Tunneling between a router or device with a public IP address > and an end host. >- Using TCP/UDP ports or some other mechansim or combinations > thereof to uniquely identify hosts from the private address > space. >- Assignment of global IP addresses to hosts for them to use when > talking with the outside world. May I add one more to the list of proposals that share the above characteristics: Negotiated Address Reuse (NAR). > >In proposing DNAT, our goal was to allow end-to-end communication >through a NAT box. As it turns out, it is in theory possible to get >end-to-end >IPSEC working with DNAT as well as Mobile IP. The fact that this framework >can be extended to support the services that host-NAT offers attests to its >power. > The NAR draft talks about how to do ipsec and ip tunnels (including mobile ip tunnels). It was presented in chicago: http://www.ietf.org/proceedings/98aug/slides/mobileip-montenegro-slides-98aug/index.html I have also posted some comments to ipsec on where i see some issues here, in particular, IKE requires the source and destination port to be fixed, which does not allow the NAR/NAT box to map those ports to others in typical NAT fashion. I've added these comments and others to an updated version of the draft which did not make it out before the I-D deadline (if anyone's interested, just email me). >The PDP was meant just to distribute port numbers. Nothing else. In our >way of >thinking, assignment of an IP address or other parameters to a host might >as well occur using an existing extensible protocol, such as DHCP or as >part of a >tunnel establishment, rather than reproducing existing functionality. >These >parameters may require renegotiation. See the "Perspectives" >section of the DNAT draft for a discussion of this. The PDP is not >limited in any sense. > >I recently started writing a draft about the general framework of >end-to-end >communication through a NAT, listing the issues that any solution must >address. Here are some of the most relevant issues: > >- Unique Determination of Local Destination Address >- Negotiation and/or Specification of Demultiplexing Fields >- Assignment of Parameters to Hosts by Some Device >- Tunnel Use and Establishment fyi, the first two section in nar are a general framework based on a very simple but general model of two address spaces with a border control box in the middle as the basic building block. The last section details how one would go about negotiating the required stuff using SOCKS *extensions*, but the general framework stuff does not, of course, depend on this decision. > >There is more than one solution to each of these issues, leading to some >number of possible DNAT-like implementations, each of which >are probably incompatible with the rest. > >In terms of where this should go within the IETF, I think that both the >DNAT and >Host-NAT drafts are too specific in how they describe solutions to the >end-to-end issues. Perhaps what is needed is a generic end-to-end >NAT solution with UDP-based setup and negotiation between the hosts >and router or some other device. Using attribute value pairs, arbitrary >parameters could be set up and negotiated through a "control channel" >with a much more flexible packet format. This approach may re-invent >the wheel to some respect, but it would be far more general than what >we currently have. > >-Mike I sit typing this msg in the RUTS BOF, and I think this topic is terribly relevant. I do agree that we need a generic "border control" mechanism. I went the track of extending SOCKS for that (and presented it in the STP bof in Chicago). Both of you guys decided on UDP, but I've seen email on DNAT that would indicate that perhaps some of the reliabiility of TCP would have been useful. This is exactly the same decision point other folks are in: COPS, L2TP (udp), PPTP (tcp), nfsv4, radius (udp), diameter (udp, but extensions for reliability), HTTP, basically, in all these control protocols, it seems like what is needed is something in between udp and tcp, and if this RUTS bof ends up forming a WG, and producing a lightweight ruts protocol, I would strongly suggest we build our "border control" protocol on top of that. -gabriel - To unsubscribe, email 'majordomo@livingston.com' with 'unsubscribe nat' in the body of the message. From owner-nat@livingston.com Mon Dec 7 21:16:30 1998 Received: from bast.livingston.com (bast.livingston.com [149.198.247.2]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA22692 for ; Mon, 7 Dec 1998 21:16:29 -0500 (EST) Received: from server.livingston.com (server.livingston.com [149.198.1.70]) by bast.livingston.com (8.8.5/8.6.9) with ESMTP id SAA01406; Mon, 7 Dec 1998 18:11:24 -0800 (PST) Received: (from majordom@localhost) by server.livingston.com (8.8.5/8.6.9) id SAA06307 for nat-outgoing; Mon, 7 Dec 1998 18:10:02 -0800 (PST) Message-Id: <199812080132.UAA04648@morden.sandelman.ottawa.on.ca> To: nat@livingston.com, policy@raleigh.ibm.com, ietf-aaa@external.cisco.com CC: ipsec@tis.com Subject: (NAT) Host NAT issues and Security Policy Servers In-reply-to: Your message of "Sun, 06 Dec 1998 20:39:38 CST." <862566D3.0008896F.00@mwgate02.mw.3com.com> Date: Mon, 07 Dec 1998 20:32:19 -0500 From: Michael Richardson Sender: owner-nat@livingston.com Precedence: bulk Reply-To: Michael Richardson -----BEGIN PGP SIGNED MESSAGE----- [I'm going to appologize in advance for cross posting so widely. I'm feeling a bit like every working group I attend is dealing with the same problems. I also, due to fog, missed both nat and aaa this morning. I heard the aaa BOF didn't arrive at any clear conclusions, and I'm glad there wasn't a fire drill during the NAT meeting or someone might have been trampled. ] Mike> Jeff, Mike> The framework that is used by DNAT, and now host-NAT, Mike> consists of several fundamental ideas: Mike> - Tunneling between a router or device with a public IP address Mike> and an end host. DNAT specifically supported IPsec tunnelling to the NAT device. This is important to a number of environments where they actually want authenticated outbound firewall traversal. Mike> - Using TCP/UDP ports or some other mechansim or combinations Mike> thereof to uniquely identify hosts from the private address Mike> space. Mike> - Assignment of global IP addresses to hosts for them to use when Mike> talking with the outside world. I want to note that this problem is essentially *IDENTICAL* to do the IPsec road warrior configuration problem. It is also a variation of the problem that Luis et al. designed their security policy system to solve. (draft-ietf-ipsec-sps-00.txt coming to a draft directory near you. I don't have the URL handy right now) Mike> The PDP was meant just to distribute port numbers. Nothing Mike> else. In our way of thinking, assignment of an IP address Mike> or other parameters to a host might as well occur using an Mike> existing extensible protocol, such as DHCP or as part of a Mike> tunnel establishment, rather than reproducing existing Mike> functionality. These parameters may require renegotiation. Mike> See the "Perspectives" section of the DNAT draft for a Mike> discussion of this. The PDP is not limited in any sense. The SPS policy server could well assign numbers. And yes, DHCP could do it. This was suggested for client configuration in the road warrior case. In addition, extensions to ISAKMP are being suggested to do client configuration. Mike> I recently started writing a draft about the general Mike> framework of end-to-end communication through a NAT, listing Mike> the issues that any solution must address. Here are some of Mike> the most relevant issues: I want to point out that IPsec security gateways are essentially stateful routers. Alas, we reinvent ATM! As such, the end-to-end issues with NAT and with IPsec are essentially the same. (ignoring the fact that NAT and IPsec often sit on the same box) As far as I'm concerned, the IP address in protocol problem typified by FTP, IRC (dcc), RealX, is less of a problem. These problems are simple and easily solved both at the NAT stage (after protocol design) and at the protocol design stage. But, getting rid of IP addresses in the TCP data flow doesn't solve anything: The question that should be asked by the IAB is does ICMP work through a NAT/IPsec box. The real issue is not, can NAT work in the presence of end-to-end IPSEC (DNAT and host-NAT are existence proofs that it is possible to do something), nor is the issue that IPsec makes traditional NAT hard to do, but that IPsec and NAT both introduce stateful routing. diffserv tries to not introduce more state. I think, the model that we have essentially converged upon in IPsec, NAT, diffserv, intserv, rap, aaa, qos... is of the end host going out to the network *policy* server and saying: "I'd like to do X" The policy server responds and says: "I'll let you do X, but to do so you will have to perform the following things: A, B, C." If I'm not mistaken (and I probably am, since the closest I ever got to an actual telephone switch, a DMS100, was when I once fixed the test guy's lab Xterminal many years ago), SS7 provides similar types of conversations. To recap, there are multiple protocols (or proposals) so far for carrying questions from the end systems to the intermediate systems: 1. RSVP 2. ISAKMP 3. host NAT, DNAT, DHCP 4. router/prefix discovery stuff in v6. 5. BBN's SPS protocol 6. SOCKS 7. ARP, ND [You may think that ARP doesn't belong, but I think that it does because it is something that one does prior to sending a packet to the node in question. There is no IS unless you consider a bridge to be a layer 2 IS] From intermediate systems to policy servers we have: 1. COPS 2. SPS 3. radius 4. AAA 5. did I miss something? A significant thing about the SPS work is that it operates both from ES to IS, and from IS to IS, and from IS to policy server. In addition, it permits *discovery* of IS systems and associated policy servers in the forwarding path, which isn't something that I see in the other protocols. I would like to see COPS and SPS merged somehow, and I wonder if this can provide the common AAA protocol, as well as the common DNAT/host-NAT, IPsec tunnel end point discovery, ... protocol. I don't know what this does to RSVP in the diffserv border router model. hmm. Pizza is here. ] At IETF43. Continental sucks |1 Fish/2 Fish[ ] Michael Richardson, Sandelman Software Works, Ottawa, ON |Red F./Blow F[ ] mcr@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |strong crypto[ ] panic("Just another NetBSD/notebook using, kernel hacking, security guy"); [ -----BEGIN PGP SIGNATURE----- Version: 2.6.3ia Charset: latin1 Comment: Processed by Mailcrypt 3.4, an Emacs/PGP interface iQBVAwUBNmyBlx4XQavxnHg9AQH2AgH/f5ltwjZS94Tiw3z8fJReRyBJXCiypQbX si7pz5NxK+TnQxj5DwmeJydFAxd8hTaYhEzA7eSLyPa7zn0B34MZQg== =IusE -----END PGP SIGNATURE----- - To unsubscribe, email 'majordomo@livingston.com' with 'unsubscribe nat' in the body of the message. From owner-nat@livingston.com Mon Dec 7 22:01:38 1998 Received: from bast.livingston.com (bast.livingston.com [149.198.247.2]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA22981 for ; Mon, 7 Dec 1998 22:01:33 -0500 (EST) Received: from server.livingston.com (server.livingston.com [149.198.1.70]) by bast.livingston.com (8.8.5/8.6.9) with ESMTP id SAA02368; Mon, 7 Dec 1998 18:57:21 -0800 (PST) Received: (from majordom@localhost) by server.livingston.com (8.8.5/8.6.9) id SAA08683 for nat-outgoing; Mon, 7 Dec 1998 18:53:43 -0800 (PST) Message-Id: <3.0.5.32.19981207185009.00a00910@porky> X-Sender: mhold@porky X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32) Date: Mon, 07 Dec 1998 18:50:09 -0800 To: Michael Richardson From: Matt Holdrege Subject: Re: (NAT) Host NAT issues and Security Policy Servers Cc: nat@livingston.com, policy@raleigh.ibm.com, ietf-aaa@external.cisco.com, ipsec@tis.com In-Reply-To: <199812080132.UAA04648@morden.sandelman.ottawa.on.ca> References: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: owner-nat@livingston.com Precedence: bulk Reply-To: Matt Holdrege At 08:32 PM 12/7/98 -0500, Michael Richardson wrote: >-----BEGIN PGP SIGNED MESSAGE----- > > > [I'm going to appologize in advance for cross posting so widely. >I'm feeling a bit like every working group I attend is dealing with >the same problems. > I also, due to fog, missed both nat and aaa this morning. I heard >the aaa BOF didn't arrive at any clear conclusions, and I'm glad there >wasn't a fire drill during the NAT meeting or someone might have been >trampled. ] Sorry to reply to such a cross-post, but I didn't want anyone to read this and think that we had a NAT meeting. NAT did not meet today and will meet as scheduled, Wednesday at 1pm. Matt Holdrege http://www.ascend.com matt@ascend.com - To unsubscribe, email 'majordomo@livingston.com' with 'unsubscribe nat' in the body of the message. From owner-nat@livingston.com Tue Dec 8 06:31:28 1998 Received: from bast.livingston.com (bast.livingston.com [149.198.247.2]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA03645 for ; Tue, 8 Dec 1998 06:31:27 -0500 (EST) Received: from server.livingston.com (server.livingston.com [149.198.1.70]) by bast.livingston.com (8.8.5/8.6.9) with ESMTP id DAA10648; Tue, 8 Dec 1998 03:27:49 -0800 (PST) Received: (from majordom@localhost) by server.livingston.com (8.8.5/8.6.9) id DAA03200 for nat-outgoing; Tue, 8 Dec 1998 03:26:40 -0800 (PST) From: info@malebox.net Date: Tue, 8 Dec 1998 02:06:28 -0800 Message-Id: <199812081006.CAA22607@kryten.type3.net> To: info@malebox.net Subject: (NAT) Hi Sender: owner-nat@livingston.com Precedence: bulk Reply-To: info@malebox.net Visitors... Men Only -> http://209.80.18.32 For All -> http://209.80.18.222 WEBMASTERS: Come in and post your banner - it's FREE! Click here -> http://thumbs.malebox.net/topsites/mbpost.html Have Fun! /////////////////////////////////////////////////////////////////////////////// If you wish to be removed from future mailings, please reply with the subject "Remove" and our software will automatically block you from future mailings. //////////////////////////////////////////////////////////////////////////////// - To unsubscribe, email 'majordomo@livingston.com' with 'unsubscribe nat' in the body of the message. From owner-nat@livingston.com Tue Dec 8 07:08:35 1998 Received: from bast.livingston.com (bast.livingston.com [149.198.247.2]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA03764 for ; Tue, 8 Dec 1998 07:08:35 -0500 (EST) Received: from server.livingston.com (server.livingston.com [149.198.1.70]) by bast.livingston.com (8.8.5/8.6.9) with ESMTP id EAA11142; Tue, 8 Dec 1998 04:03:44 -0800 (PST) Received: (from majordom@localhost) by server.livingston.com (8.8.5/8.6.9) id EAA04659 for nat-outgoing; Tue, 8 Dec 1998 04:02:59 -0800 (PST) Message-ID: <366D14BA.DA31E8DA@hursley.ibm.com> Date: Tue, 08 Dec 1998 11:59:54 +0000 From: Brian E Carpenter Organization: IBM Internet Division X-Mailer: Mozilla 4.04 [en] (Win95; I) MIME-Version: 1.0 To: nat@livingston.com CC: Michael Richardson Subject: Re: (NAT) Host NAT issues and Security Policy Servers References: <199812080132.UAA04648@morden.sandelman.ottawa.on.ca> Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: owner-nat@livingston.com Precedence: bulk Reply-To: Brian E Carpenter Content-Transfer-Encoding: 7bit Just replying to NAT list: I want to observe that e2e IPSEC and e2e NAT share an annoying characteristic: you have to modify the software in the hosts. If NAT has an advantage, it's the same one as gateway IPSEC: you only have to put the magic in the gateways. That's why traditional NAT has been fairly widely deployed. Figuring out how to live with traditional NAT is a very different game from trying to deploy DNAT/HNAT/whatever. Michael Richardson wrote: ... > The real issue is not, can NAT work in the presence of end-to-end > IPSEC (DNAT and host-NAT are existence proofs that it is possible > to do something), nor is the issue that IPsec makes traditional NAT > hard to do, but that IPsec and NAT both introduce stateful > routing. diffserv tries to not introduce more state. They introduce state, but I don't see how it can be called stateful routing. It's more like call state. By the same token, traditional NAT and gateway IPSEC introduce single points of failure. Diffserv also may cause state to be created at certain boundary nodes such as classifiers and shapers; it's stateless in the core. Brian Carpenter - To unsubscribe, email 'majordomo@livingston.com' with 'unsubscribe nat' in the body of the message. From owner-nat@livingston.com Tue Dec 8 18:14:18 1998 Received: from bast.livingston.com (bast.livingston.com [149.198.247.2]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA10845 for ; Tue, 8 Dec 1998 18:14:18 -0500 (EST) Received: from server.livingston.com (server.livingston.com [149.198.1.70]) by bast.livingston.com (8.8.5/8.6.9) with ESMTP id PAA09289; Tue, 8 Dec 1998 15:10:13 -0800 (PST) Received: (from majordom@localhost) by server.livingston.com (8.8.5/8.6.9) id PAA19421 for nat-outgoing; Tue, 8 Dec 1998 15:10:52 -0800 (PST) X-Lotus-FromDomain: 3COM@3COM-MWGATE From: "Mike Borella" To: Brian E Carpenter cc: nat@livingston.com, Michael Richardson Message-ID: <862566D4.007D80DF.00@mwgate02.mw.3com.com> Date: Tue, 8 Dec 1998 16:59:16 -0600 Subject: Re: (NAT) Host NAT issues and Security Policy Servers Mime-Version: 1.0 Content-type: text/plain; charset=us-ascii Content-Disposition: inline Sender: owner-nat@livingston.com Precedence: bulk Reply-To: "Mike Borella" This is an issue of finding the lesser evil. If you are in a situation in which you require some form of NAT with end-2-end characteristics, you can either not deploy anything, or bite the bullet and modify your hosts. -Mike Brian E Carpenter on 12/08/98 05:59:54 AM Please respond to Brian E Carpenter To: nat@livingston.com cc: Michael Richardson (Mike Borella/MW/US/3Com) Subject: Re: (NAT) Host NAT issues and Security Policy Servers Just replying to NAT list: I want to observe that e2e IPSEC and e2e NAT share an annoying characteristic: you have to modify the software in the hosts. If NAT has an advantage, it's the same one as gateway IPSEC: you only have to put the magic in the gateways. That's why traditional NAT has been fairly widely deployed. Figuring out how to live with traditional NAT is a very different game from trying to deploy DNAT/HNAT/whatever. - To unsubscribe, email 'majordomo@livingston.com' with 'unsubscribe nat' in the body of the message. From owner-nat@livingston.com Tue Dec 8 22:12:49 1998 Received: from bast.livingston.com (bast.livingston.com [149.198.247.2]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA12479 for ; Tue, 8 Dec 1998 22:12:44 -0500 (EST) Received: from server.livingston.com (server.livingston.com [149.198.1.70]) by bast.livingston.com (8.8.5/8.6.9) with ESMTP id TAA25177; Tue, 8 Dec 1998 19:08:07 -0800 (PST) Received: (from majordom@localhost) by server.livingston.com (8.8.5/8.6.9) id TAA20264 for nat-outgoing; Tue, 8 Dec 1998 19:07:10 -0800 (PST) Message-Id: <199812082206.RAA01462@morden.sandelman.ottawa.on.ca> To: nat@livingston.com Subject: Re: (NAT) Host NAT issues and Security Policy Servers In-reply-to: Your message of "Tue, 08 Dec 1998 11:59:54 GMT." <366D14BA.DA31E8DA@hursley.ibm.com> Date: Tue, 08 Dec 1998 17:05:55 -0500 From: Michael Richardson Sender: owner-nat@livingston.com Precedence: bulk Reply-To: Michael Richardson -----BEGIN PGP SIGNED MESSAGE----- >>>>> "Brian" == Brian E Carpenter writes: Brian> Just replying to NAT list: Brian> I want to observe that e2e IPSEC and e2e NAT share an Brian> annoying characteristic: you have to modify the software in Brian> the hosts. This is, in my opinion, why there is no point in providing *any* help in IPsec for traditional NAT. Similar arguments apply to all the things that IPsec makes hard (diffserv in particular comes to mind). Brian> If NAT has an advantage, it's the same one as gateway Brian> IPSEC: you only have to put the magic in the Brian> gateways. That's why traditional NAT has been fairly widely Brian> deployed. Figuring out how to live with traditional NAT is Brian> a very different game from trying to deploy Brian> DNAT/HNAT/whatever. Agreed. Brian> They introduce state, but I don't see how it can be called Brian> stateful routing. It's more like call state. By the same If I don't route my packets back to the same border router, they don't work. I, as a host, must always send the same packets in the same direction. I can not fail over to another route that I learn via BGP, etc. Brian> Diffserv also may cause state to be created at certain Brian> boundary nodes such as classifiers and shapers; it's Brian> stateless in the core. Yes. This is why diffserv wins where RSVP failed because it is clear how to put some state in IS at the borders, and ideally, move it all the way back to the ES. DNAT/host-NAT does the same thing for NAT. ] At IETF43. It's sure humid. |1 Fish/2 Fish[ ] Michael Richardson, Sandelman Software Works, Ottawa, ON |Red F./Blow F[ ] mcr@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |strong crypto[ ] panic("Just another NetBSD/notebook using, kernel hacking, security guy"); [ -----BEGIN PGP SIGNATURE----- Version: 2.6.3ia Charset: latin1 Comment: Processed by Mailcrypt 3.4, an Emacs/PGP interface iQBVAwUBNm2iuB4XQavxnHg9AQHSAwH/aZVqBts5Hl5moIUBAof5H+5BCRO1bteJ mJ80YktxTdpIxBGBMey96yvUYVxhlRuFVNH/ZIp5myYKfRGSxmy3Wg== =Qrlo -----END PGP SIGNATURE----- - To unsubscribe, email 'majordomo@livingston.com' with 'unsubscribe nat' in the body of the message. From owner-nat@livingston.com Wed Dec 9 00:05:37 1998 Received: from bast.livingston.com (bast.livingston.com [149.198.247.2]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA21744 for ; Wed, 9 Dec 1998 00:05:36 -0500 (EST) Received: from server.livingston.com (server.livingston.com [149.198.1.70]) by bast.livingston.com (8.8.5/8.6.9) with ESMTP id VAA29460; Tue, 8 Dec 1998 21:01:48 -0800 (PST) Received: (from majordom@localhost) by server.livingston.com (8.8.5/8.6.9) id VAA29351 for nat-outgoing; Tue, 8 Dec 1998 21:00:18 -0800 (PST) Date: Tue, 8 Dec 1998 20:59:13 -0800 (PST) From: Jeffrey Lo To: Mike Borella cc: Jeffrey Lo , nat@livingston.com, David Grabelsky , Ikhlaq Sidhu Subject: Re: (NAT) Host NAT issues In-Reply-To: <862566D3.0008896F.00@mwgate02.mw.3com.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-nat@livingston.com Precedence: bulk Reply-To: Jeffrey Lo Mike, > I recently started writing a draft about the general framework of > end-to-end > communication through a NAT, listing the issues that any solution must > address. Here are some of the most relevant issues: > > - Unique Determination of Local Destination Address > - Negotiation and/or Specification of Demultiplexing Fields > - Assignment of Parameters to Hosts by Some Device > - Tunnel Use and Establishment Sorry for the short delay in replying to this email. Yes, a framework document is needed. > In terms of where this should go within the IETF, I think that both the > DNAT and > Host-NAT drafts are too specific in how they describe solutions to the > end-to-end issues. Perhaps what is needed is a generic end-to-end > NAT solution with UDP-based setup and negotiation between the hosts > and router or some other device. Using attribute value pairs, arbitrary > parameters could be set up and negotiated through a "control channel" > with a much more flexible packet format. This approach may re-invent > the wheel to some respect, but it would be far more general than what > we currently have. I agree that some form of "control protocol" would be necessary. That's what we have been trying to drive at. In particular, the following issues should be considered. 1. Built on existing protocol (DHCP, ICMP, COPS??) Is there already something in the existing protocols that we can exploit or do we absolutely have to build from scratch? 2. Generality Where should the line be drawn? How much do we want the protocol to do? 3. Extensibility In the context of HNAT/DNAT, the protocol should enables the following. 1. Acquisition of multiplexing fields Global IP address, TCP/UDP port, Protocol ID 2. Negotiation of tunnel types A default tunnel type could probably be chosen 3. Negotiation of HNAT related parameters Max Lease Time, NAT Type 4. Registration of client agent and specification of client type Client ID assignment 5. Subnet enquiry? I think using a common control protocol like this would ensure interoperability. Framework and protocol should probably be addressed in separate documents. Thanks. Jeff > > > Hi, > > This is sent in response to a recent comment about HNAT draft proposed to > NAT workgroup. > > We are particularly interested larger scale deployment of private > addressing. A case where a band of global IP addresses are managed by the > address manager, which may or may not reside on the Host-NAT-Server. We > realised the existence of DNAT draft and attempted to apply Port > Distribution Protocol (PDP) proposed in draft-borella-aatn-dnat-01.txt in > our scenario. It is during this attempt that we find PDP insufficient and > does not support dynamic global IP address assignment. Hence our primary > motivation is to propose a more generic protocol that serves a > greater majority of the NAT community. As a result, we are proposing > Dynamic Bindings Acquisition Protocol (BDAP). Having said these, we do not > deny the fact that DBAP support port assignment as well and could be used > in places where PDP is used. > > Another motivation for our draft is the fact that we feel PDP lacks many > important features which are fundamental for larger scale operation. We > don't see our differences as being minor but rather fundamental. To state > some of the differences: > > Error Reporting > It is important for accurate error reporting so that Host-NAT-Clients know > about source of error. For example, is a request denied due to resource > reasons, policy reasons or other miscellaneous reasons. This is not > possible with PDP. > > Max. Leased Time > It is important for Host-NAT-Client to be able to negotiate a lease time > interval with Host-NAT-Server. This is especially important in scenarios > where address management and NAT are performed by different authority. > One example is the case when private addressing is adopted by an ISP and > it wishes to delegate global address lease on an enterprise basis. In > this case, Host-NAT-Clients deamons may not be situated in end host but > may be some access routers. In this case, such global leasing may be > directly > connected to billing. In the current PDP, it is unclear how this is done > apart from some default interval pre-selected during configuration. > > BindID > This is vital for both efficient indexing and serves as an identifier if a > Host-NAT-Client requests for more than one binds from a Host-NAT-Server. > For example, we know that IPSEC ESP does not work with NAPT, a > Host-NAT-Client > may be using a port range for IPSEC AH. When an application is started > requiring ESP security, a global address needs to be acquired. BindID is > required to correctly identify bindings on Host-NAT-Server. It > seems to us that PDP only supports a single port range bind at > this moment. Although not a major motivation, BindID also introduces a > layer of protection against security attacks. > > If you have some ideas or implementations that suits our purpose, we would > be glad to hear about it. We feel that it is unfair for the authors to > claim something that has not being documented. > > Thanks. > > Jeff > > > On Thu, 3 Dec 1998, Mike Borella wrote: > > > > > > > A couple of notes regarding the recent host NAT draft: > > > > - We presented distributed NAT (DNAT) at the Chicago IETF in the > > ngtrans WG. Host NAT is DNAT with only some very minor modifications. > > Interested parties should look at: > > > > > http://search.ietf.org/internet-drafts/draft-borella-aatn-dnat-01.txt > > > > - DNAT has been implemented (from the draft description) by a third > party. > > It works quite well. > > > > - The draft makes some incorrect comments about DNAT. In particular, > > the authors claim that DNAT does not allow the sharing on multiple IP > > addresses, but it does. This misconception seems to be the motivating > > factor of the (very minor) differences between DNAT and host NAT. > > > > In case it isn't obvious, my point is that this scheme has already > > been proposed and presented at IETF. I do not think that host NAT is > > significantly different from DNAT, though I'll happily entertain > > arguments to the contrary. > > > > -Mike > > > > > > - > > To unsubscribe, email 'majordomo@livingston.com' with > > 'unsubscribe nat' in the body of the message. > > > > > > > > > - > To unsubscribe, email 'majordomo@livingston.com' with > 'unsubscribe nat' in the body of the message. > - To unsubscribe, email 'majordomo@livingston.com' with 'unsubscribe nat' in the body of the message. From owner-nat@livingston.com Sun Dec 13 16:44:52 1998 Received: from bast.livingston.com (bast.livingston.com [149.198.247.2]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA04535 for ; Sun, 13 Dec 1998 16:44:51 -0500 (EST) Received: from server.livingston.com (server.livingston.com [149.198.1.70]) by bast.livingston.com (8.8.5/8.6.9) with ESMTP id NAA19960; Sun, 13 Dec 1998 13:40:39 -0800 (PST) Received: (from majordom@localhost) by server.livingston.com (8.8.5/8.6.9) id NAA12460 for nat-outgoing; Sun, 13 Dec 1998 13:38:35 -0800 (PST) From: jbisaccio@cyberusa.net Date: Sun, 13 Dec 1998 13:36:45 -0800 (PST) Message-Id: <199812132136.NAA19918@bast.livingston.com> To: jbisaccio@cyberusa.net Subject: (NAT) QLM for IT Reduces Cost & Guarantees Certainty of Application Development Sender: owner-nat@livingston.com Precedence: bulk Reply-To: jbisaccio@cyberusa.net Press Release: KSA's QLM for IT insures rapid application development and lower expense for IT organizations. Contact: Joe Bisaccio, VP Marketing, 1.888.597.9284 (toll free), http://12.21.216.219 KSA's Quantum Leap Methodology for IT Decreases Development Time and Expense for Information Technology Development Organizations Newton, Mass., December 9, 1998 - Kalman Saffran Associates, Inc. (KSA), a leading developer of state-of-the-art products and complex IT systems for data communications, telecommunications, financial, and interactive/CATV industries, today announced the availability of its new Quantum Leap Methodology (QLM(tm) ) for IT. QLM for IT is an innovative process for information technology organizations looking to decrease expense and speed application development. Using QLM for IT, KSA increases productivity and certainty by pre-empting the mistakes that have historically created barriers to IT project success. Successful application of QLM for IT allows upper management to refocus on strategic planning and IT objectives, and away from budget and schedule overruns. At the same time the methodology sharpens an organization's focus on assessment, implementation, verification, customization and quantification. This approach allows KSA to guarantee speedy results and high quality. "KSA can offer two services utilizing QLM for IT," said Kalman Saffran, President of Kalman Saffran Associates, Inc. "Our engineers can analyze your system, customize our QLM for IT methodology to your needs, and train your people, or we can utilize QLM for IT and provide you with the best design solution that is guaranteed to save you time and expense." Since 1978, KSA has assisted the end users of computer systems and networks in industries such as banking, healthcare, insurance and manufacturing in specifying, designing, coding, testing and integrating cutting-edge technologies. KSA's formula is based on a scientific methodology derived from best practices implemented for such industry leading companies as Fidelity Investments and State Street Bank, as well as processes used for engineering product development by such companies as Cisco Systems, Lucent, and Nortel. KSA's unique combination of a highly developed technology coupled with its finely tuned knowledge-base produces optimal results for IT organizations in a broad set of companies. KSA's extensive cross-industry experience and proven track record in IT development provides customers with the best possible solutions for their system designs. Using QLM for IT methodology guarantees increased profitability for companies by rapidly improving outdated systems, allowing the use of current staff levels to handle increased information requirements, and upgrading customer services in a timely manner. In addition, by having KSA create a more updated, powerful system design, productivity increases. While keeping costs low, KSA can create a highly evolved system, or train a client's existing staff according to their needs, as consistent, reliable information systems are critical in today's competitive markets. Pricing and Availability: The QLM for IT offering is available starting at $20,000. Companies interested in QLM for IT analysis and recommendations or learning more about KSA's comprehensive training program should call 1.888.597.9284 About Kalman Saffran Associates, Inc. Established in 1978, Kalman Saffran Associates, Inc. (KSA) is a leading complex IT systems design and OEM product development firm that rapidly innovates systems and creates products for premier companies in the data communications, telecommunications, financial, and interactive/CATV industries. To ensure success, KSA applies a proven, advanced engineering methodology to all projects. KSA has a staff of more than 100, including engineers specializing in today's "building block" technologies such as OOP, CASE, SONET/SDH, ATM, xDSL, fiber optics, MPEG and PCI. KSA's clients include industry leaders such as AT&T, Lucent, Nortel, Cisco Systems, Fidelity Investments, State Street Bank, Bay Networks, 3COM, Scientific-Atlanta, PictureTel, Hewlett Packard, Alcatel, Compaq and Motorola, among many others. For further information, visit KSA at http://12.21.216.219 - To unsubscribe, email 'majordomo@livingston.com' with 'unsubscribe nat' in the body of the message. From owner-nat@livingston.com Mon Dec 14 07:25:38 1998 Received: from bast.livingston.com (bast.livingston.com [149.198.247.2]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA18166 for ; Mon, 14 Dec 1998 07:25:37 -0500 (EST) Received: from server.livingston.com (server.livingston.com [149.198.1.70]) by bast.livingston.com (8.8.5/8.6.9) with ESMTP id EAA02083; Mon, 14 Dec 1998 04:18:01 -0800 (PST) Received: (from majordom@localhost) by server.livingston.com (8.8.5/8.6.9) id EAA17696 for nat-outgoing; Mon, 14 Dec 1998 04:16:37 -0800 (PST) From: dnoel@mailccip.ccip.fr (d.noel (preau)) To: Subject: (NAT) =?iso-8859-1?Q?communaut=E9s_virtuelles?= Date: Mon, 14 Dec 1998 13:08:44 +0100 Message-Id: <63B396933DCDD111ADF500A0C9AB51F20E4C21@APP_PREAU_02> Mime-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 8bit X-Priority: 3 (Normal) X-Msmail-Priority: Normal X-Mailer: Microsoft Outlook 8.5, Build 4.71.2173.0 Importance: Normal X-Mimeole: Produced By Microsoft MimeOLE V4.72.3110.3 Sender: owner-nat@livingston.com Precedence: bulk Reply-To: dnoel@mailccip.ccip.fr (d.noel (preau)) Content-Transfer-Encoding: 8bit Chers Citoyens, Chères Citoyennes, Lassé(e)s de vivre en basse réalité ? Fatigué(e)s du monde actuel, de sa pesanteur et de sa gravité ? Curieux(se) d'autres modes et d'autres mondes, avides de rencontres insolites et d'échanges imprévus... Evadez-vous, connectez-vous et rejoignez, avec Sophie Davidas, directrice de Mediatid, Sylvain Huet, directeur technique de Cryo Networks, Daniel Padouin, Commissaire Principal au Service d'Enquêtes sur les Fraudes aux Technologies de l'Information, et Franck Veillon, chef du projet Visioforum et chargé d'études en réalité virtuelle au DSI/CNRS, les Communautés virtuelles L'embarquement pour les mondes aura lieu le Mardi 15 décembre de 19h30 à 21h30 en l'Amphithéâtre de l'IPAG 184 boulevard Saint-Germain Paris 6ème Métro / Parking Saint-Germain des Prés Entrée libre Rens. (suivre mondes en puissance) Dominique Noël : antonin@wanadoo.fr 06 09 04 10 37 Pascal Michel 01 45 87 55 13 - To unsubscribe, email 'majordomo@livingston.com' with 'unsubscribe nat' in the body of the message. From owner-nat@livingston.com Sun Dec 20 04:16:57 1998 Received: from bast.livingston.com (bast.livingston.com [149.198.247.2]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA01064 for ; Sun, 20 Dec 1998 04:16:57 -0500 (EST) Received: from server.livingston.com (server.livingston.com [149.198.1.70]) by bast.livingston.com (8.8.5/8.6.9) with ESMTP id BAA23330; Sun, 20 Dec 1998 01:12:07 -0800 (PST) Received: (from majordom@localhost) by server.livingston.com (8.8.5/8.6.9) id BAA24691 for nat-outgoing; Sun, 20 Dec 1998 01:08:48 -0800 (PST) From: al7h@mailcity.com Date: Sun, 20 Dec 1998 03:27:04 -0600 (CST) Message-Id: <199812200927.DAA20613@mexpru.mcsa.net.mx> To: connie@excite.com Subject: (NAT) re: Your Account info. Sender: owner-nat@livingston.com Precedence: bulk Reply-To: al7h@mailcity.com ADULTS ONLY! Looking for the hottest ADULT ACTION? Looking for the net's youngest women? CLICK HERE to enter http://209.67.19.98/girlsgirlsgirls1/index.html Only $3.95 to Join ! Live Voyeur Feeds 1000's of Hot Young Teen Pix Updated every 2 weeks Live Sex Feeds with Chat 6 Live Teen Girl Strip Tease Feeds Live Nude Chat with Sound using Real Player Full Length Porno Movies with Sound in Vivo and Real Player Format Masturbation Video's of our hottest young models and there favorite vibrators. Bio's on all the girls Email all the models and tell them you fantasies and get a personal reply ! CLICK HERE to enter http://209.67.19.98/girlsgirlsgirls1/index.html - To unsubscribe, email 'majordomo@livingston.com' with 'unsubscribe nat' in the body of the message. From owner-nat@livingston.com Tue Dec 22 16:21:15 1998 Received: from bast.livingston.com (bast.livingston.com [149.198.247.2]) by ietf.org (8.8.5/8.8.7a) with ESMTP id QAA08071 for ; Tue, 22 Dec 1998 16:21:14 -0500 (EST) Received: from server.livingston.com (server.livingston.com [149.198.1.70]) by bast.livingston.com (8.8.5/8.6.9) with ESMTP id NAA27664; Tue, 22 Dec 1998 13:16:38 -0800 (PST) Received: (from majordom@localhost) by server.livingston.com (8.8.5/8.6.9) id NAA19875 for nat-outgoing; Tue, 22 Dec 1998 13:15:41 -0800 (PST) Message-Id: <199812222113.QAA07825@ietf.org> Mime-Version: 1.0 Content-Type: Multipart/Mixed; Boundary="NextPart" To: IETF-Announce:; Cc: nat@livingston.com From: Internet-Drafts@ietf.org Subject: (NAT) I-D ACTION:draft-ietf-nat-snmp-alg-00.txt Date: Tue, 22 Dec 1998 16:13:33 -0500 Sender: owner-nat@livingston.com Precedence: bulk Reply-To: Internet-Drafts@ietf.org --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Network Address Translators Working Group of the IETF. Title : An SNMP Application Level Gateway for Payload Address Translation Author(s) : D. Raz, B. Sugla Filename : draft-ietf-nat-snmp-alg-00.txt Pages : 15 Date : 14-Dec-98 The SNMP Application Level Gateway for Payload Address Translation (SALG-PAT) is a feature by which IP addresses in the payload of SNMP packets are statically mapped from one group to another, transparent to management application. This is a specific case of Application Level Gateway, ALG, as described in [SH 98] and [SE 98]. When combined with basic NAT, this document describes a mechanism by which a management device can manage multiple networks that use conflicting IP addresses. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-nat-snmp-alg-00.txt Internet-Drafts are also available by anonymous FTP. Login with the username "anonymous" and a password of your e-mail address. After logging in, type "cd internet-drafts" and then "get draft-ietf-nat-snmp-alg-00.txt". Internet-Drafts directories are located at: Africa: ftp.is.co.za Europe: ftp.nordu.net ftp.nic.it Pacific Rim: munnari.oz.au US East Coast: ftp.ietf.org US West Coast: ftp.isi.edu Internet-Drafts are also available by mail. Send a message to: mailserv@ietf.org. In the body type: "FILE /internet-drafts/draft-ietf-nat-snmp-alg-00.txt". NOTE: The mail server at ietf.org can return the document in MIME-encoded form by using the "mpack" utility. To use this feature, insert the command "ENCODING mime" before the "FILE" command. To decode the response(s), you will need "munpack" or a MIME-compliant mail reader. Different MIME-compliant mail readers exhibit different behavior, especially when dealing with "multipart" MIME messages (i.e. documents which have been split up into multiple messages), so check your local documentation on how to manipulate these messages. Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Multipart/Alternative; Boundary="OtherAccess" --OtherAccess Content-Type: Message/External-body; access-type="mail-server"; server="mailserv@ietf.org" Content-Type: text/plain Content-ID: <19981222153441.I-D@ietf.org> ENCODING mime FILE /internet-drafts/draft-ietf-nat-snmp-alg-00.txt --OtherAccess Content-Type: Message/External-body; name="draft-ietf-nat-snmp-alg-00.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <19981222153441.I-D@ietf.org> --OtherAccess-- --NextPart-- - To unsubscribe, email 'majordomo@livingston.com' with 'unsubscribe nat' in the body of the message. From owner-nat@livingston.com Thu Dec 24 02:27:46 1998 Received: from bast.livingston.com (bast.livingston.com [149.198.247.2]) by ietf.org (8.8.5/8.8.7a) with ESMTP id CAA26633 for ; Thu, 24 Dec 1998 02:27:46 -0500 (EST) Received: from server.livingston.com (server.livingston.com [149.198.1.70]) by bast.livingston.com (8.8.5/8.6.9) with ESMTP id XAA20595; Wed, 23 Dec 1998 23:20:54 -0800 (PST) Received: (from majordom@localhost) by server.livingston.com (8.8.5/8.6.9) id XAA17288 for nat-outgoing; Wed, 23 Dec 1998 23:17:35 -0800 (PST) Message-Id: <3.0.5.32.19981223231348.00b5b660@porky> X-Sender: mhold@porky X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32) Date: Wed, 23 Dec 1998 23:13:48 -0800 To: nat@livingston.com From: Matt Holdrege Subject: (NAT) RUTS email list Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: owner-nat@livingston.com Precedence: bulk Reply-To: Matt Holdrege [apologies for duplicates] At the Orlando IETF there was a BOF on Requirements for Unicast Transport/ Sessions ("RUTS"), the goal of which was to develop a better understanding of why a number of IETF efforts wind up building custom protocols on top of UDP rather than using TCP. There's now a mailing list, ruts@lbl.gov, for further discussion of the requirements considerations that cause these efforts to decide on something other than TCP. To subscribe, send email to ruts-request@lbl.gov with the subject "subscribe". Note that there's not yet any traffic on the list. We'll be sending draft minutes of the BOF and a summary to the list in a few days, though. Also, please note that the main purpose of the list is to discuss *requirements* and *not* transport protocol proposals or tweaks for addressing those requirements, per the appended mailing list "welcome" message. Vern & Scott The RUTS mailing list is for exploring the application requirements that lead various IETF efforts to develop new forms of reliable transport protocols because they perceive TCP is inadequate for those requirements. The focus is on clear-and-present *requirements* for unicast and reliable (or "near-reliable") transport/sessions and on existing TCP mechanisms that can in fact address some of those requirements. Discussions of general transport protocol features or specific alternative transport protocols (except as they illustrate requirements) are out of scope. Matt Holdrege http://www.ascend.com matt@ascend.com - To unsubscribe, email 'majordomo@livingston.com' with 'unsubscribe nat' in the body of the message. From owner-nat@livingston.com Mon Dec 28 11:53:14 1998 Received: from bast.livingston.com (bast.livingston.com [149.198.247.2]) by ietf.org (8.8.5/8.8.7a) with ESMTP id LAA23317 for ; Mon, 28 Dec 1998 11:53:14 -0500 (EST) Received: from server.livingston.com (server.livingston.com [149.198.1.70]) by bast.livingston.com (8.8.5/8.6.9) with ESMTP id IAA10194; Mon, 28 Dec 1998 08:47:34 -0800 (PST) Received: (from majordom@localhost) by server.livingston.com (8.8.5/8.6.9) id IAA24061 for nat-outgoing; Mon, 28 Dec 1998 08:45:51 -0800 (PST) Message-ID: <015a01be3282$28e535c0$730064c0@PVDS.defense.multichauss.com> From: "Paul van der Schueren" To: Date: Mon, 28 Dec 1998 17:50:22 +0100 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0157_01BE328A.8A880C00" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 4.72.3110.5 X-MimeOLE: Produced By Microsoft MimeOLE V4.72.3110.3 Sender: owner-nat@livingston.com Precedence: bulk Reply-To: "Paul van der Schueren" This is a multi-part message in MIME format. ------=_NextPart_000_0157_01BE328A.8A880C00 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable OFFRE DE STAGE =20 Grande Distribution=20 Nous recherchons : Des stagiaires (1=E8re ou 2=E8me ann=E9e) Vous assisterez les responsables commerciaux r=E9gionaux , et vous vous = familiariserez avec les m=E9thodes du commerce moderne . Vous prendrez en charge pendant deux mois la direction d=92un point de = vente et de son =E9quipe. Vous =EAtes capable de vous int=E9grer dans une =E9quipe jeune et = dynamique. Les responsabilit=E9s ne vous font pas peur. Vous =EAtes = extraverti et aimez le commerce de masse, c=92est vous que nous = recherchons. Postes =E0 pourvoir : Marseille, Lyon (St-Priest,Villefranche), Tours = (Chambray), Annecy, Bordeaux, Valenciennes, Blois, Tours, Chartres, = Albi, Orl=E9ans, St-Quentin, N=EEmes, Poitiers, Angoul=EAme, Troyes, = Lille (V-Asq,Wattignies) , Valenciennes (Anzin),Laval , Toulon = (LaValette), B=E9ziers, St-Etienne, Avignon (Sorgues), Bourges, = Ch=E2teauroux, Le Mans, Niort, Strasbourg (Vendenheim), Metz, Brest, = St-Malo, Orange, Dijon, Toulouse (Portet, Roques), Narbonne, = Clermont-Ferrand (Aubi=E8re), Arles, Al=E8s, Voiron, Paris et banlieue = (Lagny, Pontault-C, Cr=E9teil, Saulx-l-Ch, V=E9lizy, Fresnes, St- Denis, = Ste-Genevi=E8ve). ( liste compl=E8te sur www.multichauss.com/listemag.htm ) Indemnit=E9 de stage conventionnelle. Merci d=92adresser votre candidature =E0 MULTICHAUSS S.A. DRH Patricia Coulange Le Guillaumet 60 avenue du pr=E9sident Wilson 92046 PARIS LA DEFENSE CEDEX 70 t=E9l : 01 47 76 23 46=20 fax: 01 40 90 95 92 E-mail : PC@Multichauss.com ------=_NextPart_000_0157_01BE328A.8A880C00 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable

OFFRE DE STAGE

 
=20

Grande Distribution

 

 

Nous recherchons :

 

Des stagiaires (1ère ou = 2ème=20 année)

 

Vous assisterez les responsables commerciaux régionaux , et = vous vous=20 familiariserez avec les méthodes du commerce moderne=20 .

Vous prendrez en charge pendant deux mois la direction d’un point de vente=20 et de son équipe.

Vous êtes capable de vous intégrer dans une = équipe jeune=20 et dynamique. Les responsabilités ne vous font pas peur. Vous = êtes=20 extraverti et aimez le commerce de masse, c’est vous que nous=20 recherchons.

Postes à pourvoir : = Marseille, Lyon=20 (St-Priest,Villefranche), Tours (Chambray), Annecy, Bordeaux, = Valenciennes,=20 Blois, Tours, Chartres, Albi, Orléans, St-Quentin, Nîmes, = Poitiers,=20 Angoulême, Troyes, Lille (V-Asq,Wattignies) , Valenciennes = (Anzin),Laval ,=20 Toulon (LaValette), Béziers, St-Etienne, Avignon (Sorgues), = Bourges,=20 Châteauroux, Le Mans, Niort, Strasbourg (Vendenheim), Metz, Brest, = St-Malo, Orange, Dijon, Toulouse (Portet, Roques), Narbonne, = Clermont-Ferrand=20 (Aubière), Arles, Alès, Voiron, Paris et banlieue (Lagny,=20 Pontault-C, Créteil, Saulx-l-Ch, Vélizy, Fresnes, St- = Denis,=20 Ste-Geneviève).

( liste complète sur www.multichauss.com/listemag.htm )

Indemnité de stage conventionnelle.

 

Merci d’adresser votre candidature à

 

MULTICHAUSS S.A.

DRH

Patricia Coulange

Le Guillaumet

60 avenue du président Wilson

92046 PARIS LA DEFENSE CEDEX 70

tél : 01 47 76 23 46

fax: 01 40 90 95 92 E-mail : PC@Multichauss.com

------=_NextPart_000_0157_01BE328A.8A880C00-- - To unsubscribe, email 'majordomo@livingston.com' with 'unsubscribe nat' in the body of the message. From owner-nat@livingston.com Mon Dec 28 17:35:01 1998 Received: from bast.livingston.com (bast.livingston.com [149.198.247.2]) by ietf.org (8.8.5/8.8.7a) with ESMTP id RAA00219 for ; Mon, 28 Dec 1998 17:34:59 -0500 (EST) Received: from server.livingston.com (server.livingston.com [149.198.1.70]) by bast.livingston.com (8.8.5/8.6.9) with ESMTP id OAA19202; Mon, 28 Dec 1998 14:30:36 -0800 (PST) Received: (from majordom@localhost) by server.livingston.com (8.8.5/8.6.9) id OAA27531 for nat-outgoing; Mon, 28 Dec 1998 14:29:51 -0800 (PST) From: Pyda Srisuresh Message-Id: <199812282229.OAA27524@server.livingston.com> Subject: Re: (NAT) Host NAT issues and Security Policy Servers To: mcr@sandelman.ottawa.on.ca Date: Mon, 28 Dec 1998 14:29:47 -0800 (PST) Cc: nat@livingston.com, policy@raleigh.ibm.com In-Reply-To: <199812080132.UAA04648@morden.sandelman.ottawa.on.ca> from "Michael Richardson" at Dec 7, 98 08:32:19 pm Content-Type: text Sender: owner-nat@livingston.com Precedence: bulk Reply-To: Pyda Srisuresh Hi, Sorry to be late on this thread. Still catching up with my e-mail after the IETF. I mostly agree with the observations in your e-mail below. But, I would like to add a couple of comments. 1. Clearly, an IP packet traversing the Internet is subject to Policy based networking. There are a variety of policies in place. IPsec, QOS, NAT, firewall, BGP etc. to name a few and many of these policies require some kind of state on the enforcement nodes. At the same time as policy based networking is becoming pervasive, there is growing desire to make end-nodes smarter and network/policy aware. To that end, the SPS draft identifies a mechanism to offer policy service to end nodes and intermediate nodes alike. However, SPS is only a policy server, not an enforcement point. You do need protocols and enforcement points that execute specific policies. In particular, a Host-NAT protocol that can be used by private hosts to attain temporary external address to connect to external nodes is required. 2. There are parallels between Host-NAT and Mobile-IP. I agree. But, there are many differences. The goal of Mobile-IP is to preserve home-address based connectivity as a node roams outside its network. To that end, a MN uses a temporary Care-of-Address to tunnel home-address based end-to-end packets to HA. The goal of Host-NAT, on the other hand, is to facilitate end-to-end packets without requiring translation enroute. To that end, a Host-NAT-client uses temporarily assigned external address to frame end-to-end packets (not to encapsulate in). Unlike Mobile-IP, Host-NATs deal predominantly with private address spaces. In the case of Host-NAPT, multiple private nodes share the same global address with different TCP/UDP port. Also, Unlike a Home Agent (HA) node in Mobile-IP, a NAT node serving as Host-NAT server does not need to be a tunnel end point to route end-to-end packets within private realm. (Ref: NAT Terminology draft for alternative forms of Host-NAT operation). 3. I also agree with Brian Carpenter's observation (in a follow-on e-mail) that Host-NAT, Mobile-IP, IPsec and other end-to-end preservation softwares share the characteristic of requiring mods to host software (unlike traditional NAT). cheers, suresh > > -----BEGIN PGP SIGNED MESSAGE----- > > > [I'm going to appologize in advance for cross posting so widely. > I'm feeling a bit like every working group I attend is dealing with > the same problems. > I also, due to fog, missed both nat and aaa this morning. I heard > the aaa BOF didn't arrive at any clear conclusions, and I'm glad there > wasn't a fire drill during the NAT meeting or someone might have been > trampled. ] > > Mike> Jeff, > > Mike> The framework that is used by DNAT, and now host-NAT, > Mike> consists of several fundamental ideas: > > Mike> - Tunneling between a router or device with a public IP address > Mike> and an end host. > > DNAT specifically supported IPsec tunnelling to the NAT device. This > is important to a number of environments where they actually want > authenticated outbound firewall traversal. > > Mike> - Using TCP/UDP ports or some other mechansim or combinations > Mike> thereof to uniquely identify hosts from the private address > Mike> space. > Mike> - Assignment of global IP addresses to hosts for them to use when > Mike> talking with the outside world. > > I want to note that this problem is essentially *IDENTICAL* to do > the IPsec road warrior configuration problem. It is also a variation > of the problem that Luis et al. designed their security policy system to > solve. (draft-ietf-ipsec-sps-00.txt coming to a draft directory near > you. I don't have the URL handy right now) > > Mike> The PDP was meant just to distribute port numbers. Nothing > Mike> else. In our way of thinking, assignment of an IP address > Mike> or other parameters to a host might as well occur using an > Mike> existing extensible protocol, such as DHCP or as part of a > Mike> tunnel establishment, rather than reproducing existing > Mike> functionality. These parameters may require renegotiation. > Mike> See the "Perspectives" section of the DNAT draft for a > Mike> discussion of this. The PDP is not limited in any sense. > > The SPS policy server could well assign numbers. > And yes, DHCP could do it. This was suggested for client > configuration in the road warrior case. > In addition, extensions to ISAKMP are being suggested to do client > configuration. > > Mike> I recently started writing a draft about the general > Mike> framework of end-to-end communication through a NAT, listing > Mike> the issues that any solution must address. Here are some of > Mike> the most relevant issues: > > I want to point out that IPsec security gateways are essentially > stateful routers. Alas, we reinvent ATM! As such, the end-to-end > issues with NAT and with IPsec are essentially the same. (ignoring the > fact that NAT and IPsec often sit on the same box) > As far as I'm concerned, the IP address in protocol problem typified > by FTP, IRC (dcc), RealX, is less of a problem. These problems are > simple and easily solved both at the NAT stage (after protocol design) > and at the protocol design stage. But, getting rid of IP addresses in > the TCP data flow doesn't solve anything: The question that should be > asked by the IAB is does ICMP work through a NAT/IPsec box. > > The real issue is not, can NAT work in the presence of end-to-end > IPSEC (DNAT and host-NAT are existence proofs that it is possible > to do something), nor is the issue that IPsec makes traditional NAT > hard to do, but that IPsec and NAT both introduce stateful > routing. diffserv tries to not introduce more state. > > I think, the model that we have essentially converged upon in IPsec, > NAT, diffserv, intserv, rap, aaa, qos... is of the end host going out > to the network *policy* server and saying: "I'd like to do X" > The policy server responds and says: "I'll let you do X, but to do > so you will have to perform the following things: A, B, C." > If I'm not mistaken (and I probably am, since the closest I ever got to > an actual telephone switch, a DMS100, was when I once fixed the test > guy's lab Xterminal many years ago), SS7 provides similar types of > conversations. > > To recap, there are multiple protocols (or proposals) so far for > carrying questions from the end systems to the intermediate systems: > 1. RSVP > 2. ISAKMP > 3. host NAT, DNAT, DHCP > 4. router/prefix discovery stuff in v6. > 5. BBN's SPS protocol > 6. SOCKS > 7. ARP, ND > > [You may think that ARP doesn't belong, but I think that it does > because it is something that one does prior to sending a packet to the > node in question. There is no IS unless you consider a bridge to be a > layer 2 IS] > > From intermediate systems to policy servers we have: > 1. COPS > 2. SPS > 3. radius > 4. AAA > 5. did I miss something? > > A significant thing about the SPS work is that it operates both from > ES to IS, and from IS to IS, and from IS to policy server. In > addition, it permits *discovery* of IS systems and associated policy > servers in the forwarding path, which isn't something that I see in > the other protocols. > I would like to see COPS and SPS merged somehow, and I wonder if > this can provide the common AAA protocol, as well as the common > DNAT/host-NAT, IPsec tunnel end point discovery, ... protocol. I don't > know what this does to RSVP in the diffserv border router model. > > hmm. Pizza is here. > > ] At IETF43. Continental sucks |1 Fish/2 Fish[ > ] Michael Richardson, Sandelman Software Works, Ottawa, ON |Red F./Blow F[ > ] mcr@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |strong crypto[ > ] panic("Just another NetBSD/notebook using, kernel hacking, security guy"); [ > > > > > > > -----BEGIN PGP SIGNATURE----- > Version: 2.6.3ia > Charset: latin1 > Comment: Processed by Mailcrypt 3.4, an Emacs/PGP interface > > iQBVAwUBNmyBlx4XQavxnHg9AQH2AgH/f5ltwjZS94Tiw3z8fJReRyBJXCiypQbX > si7pz5NxK+TnQxj5DwmeJydFAxd8hTaYhEzA7eSLyPa7zn0B34MZQg== > =IusE > -----END PGP SIGNATURE----- > - > To unsubscribe, email 'majordomo@livingston.com' with > 'unsubscribe nat' in the body of the message. > - To unsubscribe, email 'majordomo@livingston.com' with 'unsubscribe nat' in the body of the message. From owner-nat@livingston.com Mon Dec 28 19:13:59 1998 Received: from bast.livingston.com (bast.livingston.com [149.198.247.2]) by ietf.org (8.8.5/8.8.7a) with ESMTP id TAA00684 for ; Mon, 28 Dec 1998 19:13:58 -0500 (EST) Received: from server.livingston.com (server.livingston.com [149.198.1.70]) by bast.livingston.com (8.8.5/8.6.9) with ESMTP id QAA21514; Mon, 28 Dec 1998 16:09:34 -0800 (PST) Received: (from majordom@localhost) by server.livingston.com (8.8.5/8.6.9) id QAA06363 for nat-outgoing; Mon, 28 Dec 1998 16:09:08 -0800 (PST) From: Pyda Srisuresh Message-Id: <199812290009.QAA06355@server.livingston.com> Subject: Re: (NAT) Host NAT issues To: jlo@polke.neclab.com Date: Mon, 28 Dec 1998 16:09:03 -0800 (PST) Cc: Mike_Borella@mw.3com.com, jlo@ccrl.sj.nec.com, nat@livingston.com, David_Grabelsky@mw.3com.com, Ikhlaq_Sidhu@mw.3com.com In-Reply-To: from "Jeffrey Lo" at Dec 8, 98 08:59:13 pm Content-Type: text Sender: owner-nat@livingston.com Precedence: bulk Reply-To: Pyda Srisuresh Mike, Jeff, Gabriel et. al, Host-NAT framework/requirements draft is fine. The goal is to find, design or converge on a protocol that enables Host-NAT operation. Jeff has apparantly identified some requirements in the e-mail below and in his HNAT draft. So did Mike and Gabriel in their respective DNAT and NAR drafts. There is some commonality amongst the three drafts. There is also plenty of room for making the requirements firm. I suggest gathering requirements specifically for Host-NAT and Host-NAPT. If the resulting protocol happens to have wider applicability beyond Host-NAT, that is fine. But, wider applicability in itself should not be the goal. The NAT-API draft has requirements/framework for wider applicability (including ALGs, Host-NAT clients and management applications) as far as NAT interfacing is concerned. I suggest, you take a look at (a) NAT Terminology draft, and (b) NAT API draft for some additional thoughts. Have a nice day. cheers, suresh > > > Mike, > > > I recently started writing a draft about the general framework of > > end-to-end > > communication through a NAT, listing the issues that any solution must > > address. Here are some of the most relevant issues: > > > > - Unique Determination of Local Destination Address > > - Negotiation and/or Specification of Demultiplexing Fields > > - Assignment of Parameters to Hosts by Some Device > > - Tunnel Use and Establishment > > Sorry for the short delay in replying to this email. Yes, a framework > document is needed. > > > In terms of where this should go within the IETF, I think that both the > > DNAT and > > Host-NAT drafts are too specific in how they describe solutions to the > > end-to-end issues. Perhaps what is needed is a generic end-to-end > > NAT solution with UDP-based setup and negotiation between the hosts > > and router or some other device. Using attribute value pairs, arbitrary > > parameters could be set up and negotiated through a "control channel" > > with a much more flexible packet format. This approach may re-invent > > the wheel to some respect, but it would be far more general than what > > we currently have. > > I agree that some form of "control protocol" would be necessary. That's > what we have been trying to drive at. In particular, the following issues > should be considered. > > 1. Built on existing protocol (DHCP, ICMP, COPS??) > Is there already something in the existing protocols that we can > exploit or do we absolutely have to build from scratch? > 2. Generality > Where should the line be drawn? How much do we want the protocol to do? > 3. Extensibility > > In the context of HNAT/DNAT, the protocol should enables the following. > > 1. Acquisition of multiplexing fields > Global IP address, TCP/UDP port, Protocol ID > > 2. Negotiation of tunnel types > A default tunnel type could probably be chosen > > 3. Negotiation of HNAT related parameters > Max Lease Time, NAT Type > > 4. Registration of client agent and specification of client type > Client ID assignment > > 5. Subnet enquiry? > > I think using a common control protocol like this would ensure > interoperability. > > Framework and protocol should probably be addressed in separate documents. > > Thanks. > > Jeff > > > > > > > Hi, > > > > This is sent in response to a recent comment about HNAT draft proposed to > > NAT workgroup. > > > > We are particularly interested larger scale deployment of private > > addressing. A case where a band of global IP addresses are managed by the > > address manager, which may or may not reside on the Host-NAT-Server. We > > realised the existence of DNAT draft and attempted to apply Port > > Distribution Protocol (PDP) proposed in draft-borella-aatn-dnat-01.txt in > > our scenario. It is during this attempt that we find PDP insufficient and > > does not support dynamic global IP address assignment. Hence our primary > > motivation is to propose a more generic protocol that serves a > > greater majority of the NAT community. As a result, we are proposing > > Dynamic Bindings Acquisition Protocol (BDAP). Having said these, we do not > > deny the fact that DBAP support port assignment as well and could be used > > in places where PDP is used. > > > > Another motivation for our draft is the fact that we feel PDP lacks many > > important features which are fundamental for larger scale operation. We > > don't see our differences as being minor but rather fundamental. To state > > some of the differences: > > > > Error Reporting > > It is important for accurate error reporting so that Host-NAT-Clients know > > about source of error. For example, is a request denied due to resource > > reasons, policy reasons or other miscellaneous reasons. This is not > > possible with PDP. > > > > Max. Leased Time > > It is important for Host-NAT-Client to be able to negotiate a lease time > > interval with Host-NAT-Server. This is especially important in scenarios > > where address management and NAT are performed by different authority. > > One example is the case when private addressing is adopted by an ISP and > > it wishes to delegate global address lease on an enterprise basis. In > > this case, Host-NAT-Clients deamons may not be situated in end host but > > may be some access routers. In this case, such global leasing may be > > directly > > connected to billing. In the current PDP, it is unclear how this is done > > apart from some default interval pre-selected during configuration. > > > > BindID > > This is vital for both efficient indexing and serves as an identifier if a > > Host-NAT-Client requests for more than one binds from a Host-NAT-Server. > > For example, we know that IPSEC ESP does not work with NAPT, a > > Host-NAT-Client > > may be using a port range for IPSEC AH. When an application is started > > requiring ESP security, a global address needs to be acquired. BindID is > > required to correctly identify bindings on Host-NAT-Server. It > > seems to us that PDP only supports a single port range bind at > > this moment. Although not a major motivation, BindID also introduces a > > layer of protection against security attacks. > > > > If you have some ideas or implementations that suits our purpose, we would > > be glad to hear about it. We feel that it is unfair for the authors to > > claim something that has not being documented. > > > > Thanks. > > > > Jeff > > > > > > On Thu, 3 Dec 1998, Mike Borella wrote: > > > > > > > > > > > A couple of notes regarding the recent host NAT draft: > > > > > > - We presented distributed NAT (DNAT) at the Chicago IETF in the > > > ngtrans WG. Host NAT is DNAT with only some very minor modifications. > > > Interested parties should look at: > > > > > > > > http://search.ietf.org/internet-drafts/draft-borella-aatn-dnat-01.txt > > > > > > - DNAT has been implemented (from the draft description) by a third > > party. > > > It works quite well. > > > > > > - The draft makes some incorrect comments about DNAT. In particular, > > > the authors claim that DNAT does not allow the sharing on multiple IP > > > addresses, but it does. This misconception seems to be the motivating > > > factor of the (very minor) differences between DNAT and host NAT. > > > > > > In case it isn't obvious, my point is that this scheme has already > > > been proposed and presented at IETF. I do not think that host NAT is > > > significantly different from DNAT, though I'll happily entertain > > > arguments to the contrary. > > > > > > -Mike > > > > > > > > > - > > > To unsubscribe, email 'majordomo@livingston.com' with > > > 'unsubscribe nat' in the body of the message. > > > > > > > > > > > > > > > > > - > > To unsubscribe, email 'majordomo@livingston.com' with > > 'unsubscribe nat' in the body of the message. > > > > - > To unsubscribe, email 'majordomo@livingston.com' with > 'unsubscribe nat' in the body of the message. > - To unsubscribe, email 'majordomo@livingston.com' with 'unsubscribe nat' in the body of the message.