Comment by Dagger2

5 days ago

NAT doesn't act as a security perimeter, and not having NAT doesn't mean that your devices are exposed to the Internet.

NAT is about dealing with address space shortages, not security.

This gaslighting keeps being repeated, but fact of the matter is that any consumer/home network will be exposed to the internet if they're using SOHO equipment via IPv6 and won't be via IPv4.

And huge % of SOHO routers won't even allow configuring IPv6 firewall which makes security a disaster.

  • > any consumer/home network will be exposed to the internet if they're using SOHO equipment via IPv6 and won't be via IPv4.

    Only if the ISP does no egress filtering. Most mobile carriers I’ve used deny inbound connections.

    • I don't think "IPv6 is safe because ISP is blocking all your ingress traffic" is a positive argument for an IP standard that's supposed to enable every device to be routable on the internet without things like NAT.

      (Also, why the fsck would I want to have an ISP that does that?)

  • It keeps getting repeated precisely because it isn't gaslighting. And yet we still see people claiming that NAT is security.

    The only reason those networks aren't exposed to the whole Internet on v4 is because they're using RFC1918, not because of NAT -- but that still leaves them exposed to some outside networks, so routers come with firewalls, which act as an actual security boundary.

    And they won't be exposed on v6, because those exact same firewalls work their magic on v6 too.

    NAT doesn't provide and isn't needed for security. Its main security contribution is to confuse people about how secure their network is.

    • NAT effectively stops inbound connectivity at the NAT edge. A system could be a dozen hops beyond that and no inbound traffic can reach it.

      IPv6 (without any NAT) means that the source and destination are fully routable.

      How folks DON'T see this as a functional component of security is beyond me.

      1 reply →