On 3/24/10 3:44 PM, Rémi Denis-Courmont wrote:
This use of a firewall is perfectly legitimate because it is the link and interface itself that you are protecting. This is also illustrates how the hole punching method of operation begins to look essentially like a distributed IP stack between two devices. Gosh, I wish we had one (and only one) of those hole-punching protocols ready to go at the time of publishing this document.To be fair, the firewall would have one positive effect: my device would not need to wake up its radio interface when receiving bogus packets from the Internet. Those packets would be dropped before they get to the air radio interface. Personnally, I would in fact prefer firewall with hole punching either to firewall without hole punching or to no firewall at all.
Anyway, good technical point. Unfortunately, I don't see any discussion of this type in the current draft.
- Mark