The ugly side of NAT - Excentis (2024)

Today, Network Address Translators (or NAT) devices are everywhere. Their rapid rise towards universal adoption was not part of a planned effort. Instead, it was fueled by the continued growth of the internet and the corresponding depletion of the IPv4 address space. Besides obvious advantages, such as IP address reuse and hiding of internal network topologies, NAT technology has some important drawbacks as well. This blog post takes a closer look at these downsides.

History of NAT

The concept of Network Address Translation was first described in a 1994 memo (calledRFC 1631) by Kjeld Egevang and Paul Francis. The objective ofNAT was to createa mechanism allowing IPv4 addresses to be shared across numerous devices. Although IPv4 was capable of uniquely addressing some 4.4 billion devices, it was already evident in 1992 that the world was heading down a path of very intensive deployment of IP-based devices. IPv4 would neverbe able to coverthe full range of future device deployment. Using NAT could help overcome this imminentaddress exhausting.

In addition, it was intended that NATs could be deployed incrementally within the Internet, without causing changes to hosts or other routers. After all, the original RFC describes NAT as a measure capable of“providing temporarily relief while other, more complex and far-reaching solutions are worked out.”

Two decades later, with the long term solution (IPv6) defined for over 15 years and its deployment finally commencing, NAT still dominates the edges of the internet landscape and is still being deployed.

Advantages (Killer features)

A lot of information has been written about the advantages of NAT so here is a summary:

  • it preventsthe shortage of IPv4 addresses.
  • it provides a basic level of security. Only traffic that was initiated from behind the NAT at the LAN side will be forwarded.
  • it separates the internal IP network from the public IP address provided by the internet service provider (ISP), so switching between ISPs becomes easy.

Disadvantages (Killer issues)

NAT doesn’t only bring good things, ithas some disadvantages as well. Because NAT was developed as a temporary technology, it was not designed with new technologies and protocols in mind. Those protocols therefore haveto add a kind of intelligence to overcome these issues.

No strict specification of implementation

IETF was not in favourof standardizing the NAT behaviour, as this would only encourage its deployment. They saw this technology only as a “temporary measure”. Therefore the original specification remained at a general level. However, this forced each NAT implementer into making local decisions as how the NAT should behave under specific circ*mstances.

We now enjoy a network with widespread deployment of an active device that does not have consistent implementations and, in the worst cases, exhibits non-deterministic behavior. This has made the deployment of certain applications on the internet, such asvoice-based applications, incredibly difficult.

Peer-to-peer communication

NAT cannot support applications where the initiator lies on the “outside”. Because the local addresses behind the NATare private they can’tbe routed across the internet. Therefore it’s impossible for the external device to direct any packet to that device behind the NAT in order to initiate a session. This implies that peer-to-peer services, such as voice, cannot work unaltered in a NAT environment.The protocol has to implement its own way to overcome this problem.

The generic approach here for applications to traverse NATs in the “wrong” direction is for the inside device to forge a connection to the outside agent, and for the inside device to then establish what NAT translated address has been used, and the nature of the NAT in the path, and then republish this address as the local entity’s published service rendezvous point. Sounds fragile? Unfortunately, it is. Passive FTP is one of those implementations. In the VoIP world they use ICE (Interactive ConnectionEstablishment) and STUN servers (Session Traversal Utilities for NAT) to discover the presence of the Network Address Translator and to obtain the mapped (public) IP address (NAT address) and port number that the NAT has allocated for the application’s UDP connections to remote hosts. Skype uses SuperNodes, which are on a public IP, to traverse a NAT and relay the call.

IP Fragmentation and out-of-order

When an IP packet is bigger than the Maximum Transmission Unit (MTU) of the interface, it gets fragmented into smaller frames. The TCP or UDP header is foundonly in the initial IP fragment(see Frame 1 on picture below). The subsequent IP packet fragments do not contain a copy of the transport layer packet header(Frame 2 to Frame N).

The ugly side of NAT - Excentis (1)

NAT devices do not have a clear and uniform response to this fragmentation, as they normally rely on the (now missing) TCP/UDP header of each arriving frame for translation. Some of themattempt packet reassembly as if they were the end host and perform the NAT translation only when the original IP packet is reassembled. Of course the reassembled packet may itself be too large to be forwarded, in which case the NAT is forced to further fragment the packet. Other NAT devices do not attempt packet reassembly, but rely on apacket fragment translation stateindicating how subsequent fragments must be translated.

This form of behavior becomes a problem when IP fragments arrive out of order, i.e. when some fragments are received before the first IP packet fragment. In such cases, the NAT often has little choice but to silently discard the out of order fragments.

IPSEC

IPSec(InternetProtocolSecurity) uses a cryptographic hash value for data integrity. But NAT changes the IP packet, thus invalidating those integrity checks.

There is a solution, however, in NAT Traversal or NAT-T. Basically, NAT-T (RFC 3947 and 3948) detects the presence of any NAT devices between two hosts and encapsulates the IPsec traffic in a possible second UDP using a non-IPsec port number. Now when this packet arrives at the NAT, it can safely alter the IP header and UDP header for its translation without invalidating the IPSec integrity checks.

The ugly side of NAT - Excentis (2)

Conclusion

Despite their shortcomings, despite the problems NATs create for numerous applications and their users, and despite alack of standardization, NAT continues to be an important part of the future of the internet. The benefits still seem to outweigh the disadvantagesand its widespread adoption in turn creates a major incentive for application developers to take NAT into account and cope with its inherent problems.

  • Category:NAT

Reader interactions

2 Replies to “The ugly side of NAT”

  1. The ugly side of NAT - Excentis (3)

    LucJune 18, 2017 at 7:40 am

    great,

    Reply

  2. The ugly side of NAT - Excentis (4)

    Eric ChewJune 27, 2017 at 7:41 am

    I’ve been trying to wrap my head around NAT, this article helped me gain a little more understanding. Thanks for writing it!

    Reply

Leave a Reply

The ugly side of NAT - Excentis (2024)

FAQs

Is it safe to use Wireshark? ›

Wireshark is a safe tool used by government agencies, educational institutions, corporations, small businesses and nonprofits alike to troubleshoot network issues. Additionally, Wireshark can be used as a learning tool.

Is Wireshark a packet sniffer? ›

Wireshark is a type of packet sniffer (also known as a network protocol analyzer, protocol analyzer, and network analyzer).

Does Wireshark capture all the traffic on the network? ›

Download the latest Wireshark version and install it on the YSoft SafeQ server. Once installed, run it. Notes: Wireshark is able to capture only the network communication that is visible to the server where it is installed.

How to read Wireshark capture packets? ›

Wireshark shows you three different panes for inspecting packet data. The Packet List, the top pane, lists all the packets in the capture. When you click on a packet, the other two panes change to show you the details about the selected packet. You can also tell if the packet is part of a conversation.

What do hackers use Wireshark for? ›

Wireshark can also be used as a tool for hackers. This usually involves reading and writing data transmitted over an unsecure or compromised network.

Is the use of Wireshark is legal or illegal? ›

Wireshark is legal, it becomes illegal when you monitor a network that you don't have authorization to monitor. Well sneaking into others resources is not legal at all. If you use it in your own network or with the targets permission the usage may become legal.

Is Wireshark a security risk? ›

Wireshark is implemented in ANSI C, which is vulnerable to security problems like buffer overflows (compared to more securely designed languages like Java or C#). ANSI C is used for several reasons; the main reason is performance, as Wireshark is often used to work with huge amounts of data.

What are the disadvantages of Wireshark? ›

Disadvantages of WireShark tool

1- Potential to exhaust resources: Analyzing network traffic is a resource-intensive task and can therefore lead to resource exhaustion and system slowdown, especially if the network traffic volume is large.

Can Wireshark detect viruses? ›

Identifying malware traffic using Wireshark involves analyzing the captured network packets to identify patterns, behaviors, and indicators of compromise (IoCs). Examine DNS traffic for suspicious domain names. Look for traffic using non-standard or uncommon protocols. Analyze HTTP and HTTPS traffic for anomalies.

What is better than Wireshark? ›

We have compiled a list of solutions that reviewers voted as the best overall alternatives and competitors to Wireshark, including SolarWinds Network Performance Monitor, Paessler PRTG, PingPlotter, and Nagios Network Analyzer. Have you used Wireshark before?

Can Wireshark manipulate things on the network? ›

Wireshark will not manipulate things on the network, it will only “measure” things from it.

Can Wireshark be used to steal sensitive information? ›

Yes. Hackers use Wireshark for network analysis or as a packet sniffer. It allows them to capture network packets traveling across a target's network to collect sensitive information, eavesdrop on communications, and gain insight into potential vulnerabilities they can exploit.

What are the drawbacks of using Wireshark? ›

Confusing User Interface: Some users have found the user interface of Wireshark to be confusing, suggesting that it can be improved to make it more user-friendly and intuitive. Steep Learning Curve: The software has a steep learning curve, with new users finding it overwhelming to see all the columns and colors.

Can Wireshark get your IP? ›

Address Resolution Protocol (ARP) requests can be used by Wireshark to get the IP address of an unknown host on your network. ARP is a broadcast request that's meant to help the client machine map out the entire host network.

What is the disadvantage of Wireshark tool? ›

Disadvantages of WireShark tool

1- Potential to exhaust resources: Analyzing network traffic is a resource-intensive task and can therefore lead to resource exhaustion and system slowdown, especially if the network traffic volume is large.

Is network sniffing illegal? ›

Packet sniffing is illegal when access to data packets is unauthorized. Hackers use packet sniffing to monitor and steal data, which is also an illegal use of packet sniffing.

Top Articles
7 Bad Money Habits and How to Break Them - Experian
The "Four P's" of Due Diligence
Sdn Md 2023-2024
Exclusive: Baby Alien Fan Bus Leaked - Get the Inside Scoop! - Nick Lachey
jazmen00 x & jazmen00 mega| Discover
Patreon, reimagined — a better future for creators and fans
Loves Employee Pay Stub
Tv Guide Bay Area No Cable
Wausau Marketplace
Autobell Car Wash Hickory Reviews
Waive Upgrade Fee
Amateur Lesbian Spanking
Geometry Escape Challenge A Answer Key
Pollen Count Central Islip
13 The Musical Common Sense Media
Transformers Movie Wiki
The Connecticut Daily Lottery Hub
Jack Daniels Pop Tarts
Local Dog Boarding Kennels Near Me
Most McDonald's by Country 2024
Craigslist Blackshear Ga
Troy Bilt Mower Carburetor Diagram
Ratchet & Clank Future: Tools of Destruction
Rochester Ny Missed Connections
Wnem Tv5 Obituaries
480-467-2273
Tokyo Spa Memphis Reviews
55Th And Kedzie Elite Staffing
Motorcycle Blue Book Value Honda
Danielle Moodie-Mills Net Worth
Pronóstico del tiempo de 10 días para San Josecito, Provincia de San José, Costa Rica - The Weather Channel | weather.com
Umn Biology
Jackass Golf Cart Gif
Infinite Campus Asd20
Login.castlebranch.com
Ezstub Cross Country
Rock Salt Font Free by Sideshow » Font Squirrel
RFK Jr., in Glendale, says he's under investigation for 'collecting a whale specimen'
Maybe Meant To Be Chapter 43
Dr. John Mathews Jr., MD – Fairfax, VA | Internal Medicine on Doximity
Myfxbook Historical Data
SF bay area cars & trucks "chevrolet 50" - craigslist
Blackwolf Run Pro Shop
Fifty Shades Of Gray 123Movies
Anhedönia Last Name Origin
'The Night Agent' Star Luciane Buchanan's Dating Life Is a Mystery
Cabarrus County School Calendar 2024
St Als Elm Clinic
Makemkv Key April 2023
Osrs Vorkath Combat Achievements
Gameplay Clarkston
Latest Posts
Article information

Author: Rueben Jacobs

Last Updated:

Views: 5925

Rating: 4.7 / 5 (77 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Rueben Jacobs

Birthday: 1999-03-14

Address: 951 Caterina Walk, Schambergerside, CA 67667-0896

Phone: +6881806848632

Job: Internal Education Planner

Hobby: Candle making, Cabaret, Poi, Gambling, Rock climbing, Wood carving, Computer programming

Introduction: My name is Rueben Jacobs, I am a cooperative, beautiful, kind, comfortable, glamorous, open, magnificent person who loves writing and wants to share my knowledge and understanding with you.