Beware: NAT Traversal is a Simple and Efficient Approach to Open Firewall Holes
DOI:
https://doi.org/10.5752/P.2316-9451.2020v8n2p29-41Keywords:
Network address translation. NAT traversal. Hole punching. Firewall traversal. Network transparency. Security holes.Abstract
NAT traversal techniques allow processes with private, non-routable IP addresses to communicate with other processes outside the network secured limits. Techniques such as UDP Hole Punching have been standardized by the IETF, and using tunnels based on those techniques it is easy to allow application processes on top of any transport protocol, including TCP, to both start and receive packets from the Internet across NAT devices. However, as a side effect those techniques also freely proceed through firewalls. In this work we describe how it is possible to configure any server running on any port (no firewall configuration required) to establish connections initiated at arbitrary Internet clients, making unauthorized services easily available. We also show that the process is lightweight, in particular after the initial setup is concluded, thus virtually supporting any type of unauthorized applications.
Downloads
Downloads
Published
How to Cite
Issue
Section
License
I (we) submit the present work, an original and unpublished manuscript, from my (our) authorship, to Abakós - Magazine of Interdisciplinary Studies on Science and Informatics, and I (we) agree that the copyright related to this work will become property of PUC Minas Publisher. No partial or full reproduction is allowed, by any means (printed or electronic), dissociated from Abakós. Any reproduction requires prior written authorization granted by the Editor.
I (we) declare there is no type of interest conflict among the subject theme, author(s), organization(s), institution(s) and person(s).
I (we) recognize that Abakós is licensed under CREATIVE COMMONS:
Licença Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported (CC BY-NC-ND 3.0).