INFORMATION ASSURANCE AND THE TRANSITION TO IP VERSION 6 (IPV6)

Size: px
Start display at page:

Download "INFORMATION ASSURANCE AND THE TRANSITION TO IP VERSION 6 (IPV6)"

Transcription

1 Abstract This paper presents an analysis of IPv6 and its support protocols from the point of view of Information Assurance. It describes the IPv6 protocol suite, compares and contrasts it to the IPv4 protocol suite, and identifies IA issues that will arise during a migration of core networks from IPv4 to IPv6. It identifies decisions that will have to be made by policymakers, and provides recommendations on the best way to proceed. I. INTRODUCTION Recently, a customer asked us to provide basic guidance about the types of IA issues that a transition of core networks from IPv4 to IPv6 will raise and, as best we could determine, the severity of each issue and its urgency. This paper is a summary of our analysis. A. GENERAL APPROACH The focus of this paper is on IPv6 as a replacement for IPv4 and we approach the information assurance issues from that perspective. In particular, we assume that IPv4's IA properties are a known quantity and that over the years of using IPv4, users have developed a set of operating procedures to achieve an acceptable level of IA using IPv4 in their networks. Thus the key focus of this analysis is with aspects of IPv6 that substantially differ from IPv4 and may make IPv6's IA properties different from IPv4 (either positively or negatively) and/or may force changes in network operations (or, indeed, may make IPv6 more or less suitable for use). With this perspective in mind, we examine how IPv6 differs from IPv4, and for each difference consider the following IA issues: INFORMATION ASSURANCE AND THE TRANSITION TO IP VERSION 6 (IPV6) Does the difference make it easier or harder for a third party to send damaging or unwanted traffic to a system? We are particularly concerned with changes that make it easier to send such traffic anonymously, as it is difficult to take counteraction against anonymous traffic. Does the difference create or eliminate a covert channel? 1 Does the difference make the IP datagram more or less vulnerable to traffic analysis? Can a thirdparty observer learn more or less by observing an IPv6 traffic stream than he could learn observing the corresponding IPv4 traffic stream? 1 For a general overview of the use of IP fields as covert channels, see Covert Channels in the TCP/IP Suite. [1] Craig Partridge, Alfred W. Arsenault, and Stephen T. Kent BBN Technologies Cambridge. MA We emphasize that these questions are starting points. If we find an obvious IA issue that doesn't neatly fall into these categories, we examine it. So, for instance, we examine issues of IPv4 and IPv6 co-existing on the same network. B. A COMMENT ON IMPLEMENTATION ISSUES As Garfinkel points out in [2], implementation of IPv6 requires the development of substantial amounts of new hardware and software. History shows us repeatedly that all new hardware and software, no matter how carefully designed, analyzed and tested, will have some bugs. It is likely that some of these will manifest themselves as security vulnerabilities. Migration to IPv6 will have to deal with these, and be prepared to mitigate the bugs when they are found. At the same time, trying to predict where bugs might lie in an implementation is a highly speculative exercise. So, this paper does not talk much about possible implementation problems. II. IPV6 BASICS We start with an overview of what makes IPv6 different from IPv4. This discussion serves two purposes. First, it provides context as later sections consider IPv6 IA issues in various environments. Second, we can highlight some IA issues that arise simply as a consequence of IPv6 s differences from IPv4. A. DIFFERENCES BETWEEN IPV4 AND IPV6 As identified in RFC 2460[3], the primary differences between IPv4 and IPv6 include: (1) expanded addressing capabilities; (2) a simpler (but larger) header format; (3) a new way to handle options and extensions; (4) flow labeling; and (5) authentication and privacy We consider each of these changes. We look first at changes in the IPv6 base header, and then at changes in options and extensions caused by IPv6 s new way of handling options and extensions. B. BASE HEADER CHANGES 1. EXPANDED ADDRESSING CAPABILITIES The obvious issues in addressing come in two forms. First, the IPv6 addresses are much larger and the change in size makes a difference. The second issue is evaluating the IA implications of the new mix of addressing that IPv6 supports. IPv6 addresses are 128-bits long (16 bytes) versus IPv4 s 32-bit (4 byte) addresses. That difference in size raises a

2 number of issues. We consider them here in no particular order. One issue is that larger addresses make looking up an address more expensive in hardware and software that must process IP headers, e.g., routers, firewalls, and internet-layer crypto devices. Exactly how much more expensive depends on the context in which a lookup is being done. In a router, the lookup cost is typically about 40%-50% more expensive as the cost of lookups is logarithmic (so looking up twice as many bits adds only one more lookup) [4]. In devices that seek to do more sophisticated pattern matching, such as firewalls and security gateways, the lookup costs may be substantially higher. From a theoretical perspective, in a firewall, the search space grows as the square of the address size (because both source and destination addresses may be used to filter traffic). Pragmatically, we tend to restrict the filter space to avoid this kind of state space explosion, so the impact is likely to be less significant. However, it remains true that firewall and security gateway filters or rule sets will require more memory to support. Another issue with larger addresses is that they represent a larger potential information channel. Two examples illustrate this point. First, imagine the IP address fields as a covert channel. In IPv6, these fields represent 256 bits of information per packet sent, while in IPv4 the fields represent only 64 bits. The extent to which this covert channel is useful to an adversary will vary depending on the context in which the addresses are used; however, there is clearly much more for an attacker to work with in IPv6 addresses. The second example is more pragmatic. Some IPv6 address schemes assume that the low-order 8 bytes of the expanded IP address contain an IEEE EUI-64 MAC-layer identifier, which is typically taken from the network adapter chipset. IEEE EUI-64 identifiers are unique and are assigned to network adapter manufacturers as needed. Accordingly, if you know the EUI-64 identifier for a system, you can often make an educated guess about who manufactured the machine and what kind of system it is [5]. Having a user s system identified may be undesirable, especially if, for instance, the EUI-64 identifier can be used to identify hardware platforms with known or likely vulnerabilities [6], or to identify specialized equipment. (Note that, in IPv4, the EUI is not transmitted at the IP layer, so the degree of exposure of that information to adversaries presents less of a threat.) Thus this approach to assigning IPv6 addresses creates an OPSEC problem. Another problem is that the EUI-64 identifier can be used to trace a system as it moves from network to network[6] (e.g., a laptop that moves from a wired network to a wireless network). Pragmatically there s a solution: a proposed standard for using IPv6 with randomized identifiers for the low-order 8 bytes, described in RFC- 3041[6]. Of course, if the randomization is performed by untrusted software in a DHCP server, this represents another covert channel opportunity, one that might be difficult to monitor. Another approach to assigningipv6 addresses is described in RFC 3972[7], which calls for assigning these low order bits based on public key cryptographic mechanisms to improve security for mobile hosts. In addition to the difference in length, IPv6 has different types of addresses than IPv4. Some options for address assignment offer security benefits; others may result in new vulnerabilities. A clearly good change is that IPv6 has eliminated the concept of (scoped) broadcast addresses and replaced it with scoped multicast addresses. From a theoretical perspective, that s a good change, as it reduces the ability of systems to send unwanted traffic to all nodes on a network, an obvious DoS concern. From a practical perspective, the effect is small, as most firewalls and routers already refuse to forward most broadcast datagrams. A less clear change is the addition of anycast addresses. An anycast address is a way of advertising a service the idea is that any system that supports a particular service can join the anycast address and the network will route any datagrams addressed to the anycast address to the nearest participating system [8]. It is useful to contrast anycast with multicast for service location. A service can be provided by a multicast group. In that case, routers will send datagrams addressed to the multicast group to all servers that participate in the multicast group. This in itself is a DoS vulnerability, as it allows an attacker to send a few packets that will be replicated by routers (under some multicast implementation models) and delivered to a possibly large number of subscribers. Thus multicast represents a significant DoS concern, one that has not necessarily been improved by the transition from IPv4 to IPv6. Anycast is preferable to multicast from a DoS perspective, as it does not amplify traffic offered to the network. However, from an IA perspective, anycast often provides more information. In particular, if a server fails and it is part of a multicast group, we need not advertise that failure to the network datagrams addressed to the multicast group will be delivered to other servers in the multicast

3 group that can process those datagrams. In contrast, if a server fails and it is participating in an anycast address, we must inform the network that the server is no longer operational, as otherwise some datagrams will continue to be delivered to (but not served by) the server. Pragmatically, this is probably not a large IA issue. However, it does indicate the need to think about which services, especially battlefield services, use IPv6 anycast and which ones are supplied via IPv6 multicast. For instance, one might imagine that generic services (such as DNS servers) are advertised by anycast, because very little information is conveyed by an anycast address showing up, or going away. However, one might decide that command centers use multicast, as anything that might hint at how a command center is moving among networks is, probably, not information we want publicly visible. 2. SIMPLER BUT LARGER HEADER Because the IPv6 header contains substantially larger addresses, it is larger than the IPv4 header. But the IPv6 header actually supports fewer functions than IPv4. For example, options have been removed from the header and replaced by a nested-header approach that simplifies packet processing in routers. From an IA perspective, the most useful change is that IPv6 has eliminated fragmentation by intermediate nodes. Only the source may fragment an IPv6 datagram. That restriction reduces IA problems that are caused by fragmentation. For example, fragmentation by intermediate nodes provides yet another covert channel a router can signal information by fragmenting (or not) user traffic it processes. Since this would involve an attacker using traffic from another user to signal information, this would be a covert channel that would be very difficult to detect and close. 3. FLOW LABEL The flow label is the major new service in the IPv6 header. It is a 20-bit field, set by the sender, and used (in combination with the source address) as a short hand tag intended to make it easier for routers to identify and preferentially serve different traffic streams. An obvious potential security concern is that the flow label might be used as a covert channel (as its values are entirely at the discretion of the sender) across various boundary protection devices, e.g., IPsec Internet-layer crypto devices. This concern might be ameliorated by defining flow label creation rules and enforcing their use in a given system, to limit the resulting covert channel bandwidth. One should also explore the possibility that router code that examines and tracks flow labels may be vulnerable to various forms of denial or degradation of service attacks [2], since this code is relatively new and untested. For example, with a 20-bit field length, there are a million possible distinct flow labels, but a vendor may not have made provision to deal with this many labels simultaneously. C. OPTIONS AND EXTENSIONS In IPv4, most enhancements to IP service were implemented with options attached to the IP header. In IPv6, all options and enhancements are implemented through nested encapsulation, with each nesting having its own header. In principle, this nested header approach could enable better router and firewall processing of IPv6 header extensions (compared to options in IPv4). However, at least for the near term, it seems likely that the wide range of IPv6 header extensions and their nesting alternatives will result in increased opportunities for firewalls and routers to make errors in processing. The reasoning here is that developers have little or no experience in processing IPv6 headers, much less header extensions, and thus implementation errors are likely. In IPv4, option use is uncommon in practice 2. Routers direct IPv4 packets with options to management processors, out of fast path traffic flow. This provides a means of possibly overloading the management processors, which are also responsible for routing. Routers may be able to minimize the risk of this by rate limiting the slow path processing, since option use is so rare. However, if extension headers become commonly used in IPv6, this may affect router performance, as it might no longer be acceptable to treat packets containing extensions as second class citizens. Many firewalls are configured to discard IPv4 packets with options, or with certain classes of options. In the IPv4 context this rarely causes problems since options are rarely used. However, if extension headers are more commonly employed in the IPv6 context, this sort of behavior will not be acceptable. Thus firewalls will have to be prepared to examine these headers in more detail, and firewall configuration will become even more complex as a side 2 In large part this is because routers have long shunted any packets with options off the fast path, thus discouraging their use by hosts. It also was the case that network stacks often didn t offer an API to apps to invoke some of these options. We note that the same fate may await some IPv6 extension headers as well. Hosts must have network stack (hence OS-supported) APIs to give applications the ability to request extensions. Application writers have to make use of the extensions, via the APIs. Routers must not discriminate against hop-by-hop extensions (except where they require non-trivial router processing). Unless all of these are met, an IPv6 extension is not likely to be used in practice.

4 effect. This will likely result in more configurationinduced vulnerabilities in firewalls. Since many firewalls are not configured to tightly constrain outbound traffic, the presence of extension headers offers more opportunities to exfiltrate data from enclaves. Similar concerns arise in the context of IPsec, re covert channel opportunities, although use of ESP in tunnel mode will lessen the covert channel concerns because it will make the headers not visible to firewalls. Per RFC 2460, the following extension headers must be supported by a conforming IPv6 implementation: Hop-by- Hop Options; Routing (Type 0); Fragment; Destination Options; Authentication and Encapsulating Security Payload. We address each of these header types and its IA implications in turn. 1. HOP-BY-HOP OPTIONS The only two hop-by-hop options defined in RFC-2460 are Pad1 (add one octet of padding to an options header) and PadN (add N >1 octet of padding to an options header). Neither of these appears to have a serious IA impact. It may be possible to use the PadN option to achieve a covert channel by using more padding than is required to pad to the appropriate byte boundary. However such excess padding is easily detected and the potential channel data rate is quite modest, so this threat seems small. Another hop-by-hop option, the router alert option, is defined by RFC-2711[9]. This option alerts transit routers to more closely examine the contents of an IP datagram. This option is useful for situations where a datagram addressed to a particular destination contains information that may require special processing by routers along the path. For example, protocols such as RSVP use control datagrams that, while addressed to a particular destination, contain information that needs to be examined, and in some cases updated, by routers along the path between the source and destination. It is desirable to forward regular datagrams as rapidly as possible, while ensuring that the router processes these special control datagrams appropriately. The presence of the router alert option in an IPv6 datagram informs the router that the contents of this datagram are of interest to the router and to handle any control data accordingly. The absence of this option in an IPv6 datagram informs the router that the datagram does not contain information needed by the router and hence can be safely routed without further datagram parsing. The IA impact of this option is that any datagrams with it included will require the router to examine upper-layer contents of the datagram. Thus, it will increase the router s processing load, and could lead to denial of service attacks on routers. Designers will need to decide whether or not to support this option, and if so, to enable ISPs to rate limit its use at (specific) routers. 2. ROUTING The Routing header is used by an IPv6 source to list one or more intermediate nodes to be visited on the way to a packet's destination. Only the Type 0 routing header is defined in RFC The function provided by the routing header is very similar to IPv4's Loose Source and Record Route options. As such, the Routing header has significant security implications. If an attacker is familiar with the system topology, supporting the routing header might allow him to route around firewalls or security gateways. Additionally, this header can guarantee an attacker that IPv6 datagrams will be processed by specific routers, allowing those routers to be targeted by denial of service and distributed denial of service attacks. Biondi and Ebalard [10] recently showed how the Routing Header can be used to carry out advanced network discovery attacks, then to launch various Denial of Service attacks against specific nodes, even when those nodes are defended by the use of anycast. We generally recommend that the routing header NOT be supported, for these and related security reasons. 3. FRAGMENT As noted previously, IPv6 removes support for fragmentation of datagrams at intermediate nodes in the route. Datagrams can be fragmented only at the source node. A fragmenting source divides a datagram into fragments and then places each fragment into a complete IPv6 datagram, with a Fragment Header as an extension header after the IPv6 header. The Fragment header is patterned after the fragmentation fields in the IPv4 header and includes a fragmentation offset (13 bits) and fragmentation identifier (32 bits vs. IPv4 s 16 bits). Either the fragmentation offset or the fragmentation identifier, or both, can be used as covert channels. 4. DESTINATION OPTIONS The Destination Options header is used to carry optional information that need be examined only by a packet's destination node(s). The only destination options defined in RFC-2460 are the Pad1 and PadN options, described above. There are no significant IA implications of either of these options. 5. SECURITY EXTENSIONS The IPv6 specification requires that conforming implementations include extension headers to support the

5 IPsec Authentication Header (AH) and the Encapsulating Security Payload (ESP). These extension headers are actually distinct protocols, defined in a series of RFCs [11, 12, 13]. These protocols are already widely supported in the IPv4 context, so the mandated support for them in IPv6 does not represent a significant change from the IPv4 context. III. IPV6 SUPPORT PROTOCOLS An internet protocol requires a set of supporting protocols to perform functions such as address assignment, router discovery, and routing. As part of the transition to IPv6, the Internet standards community has chosen to reexamine the protocols used in IPv4 and, in some cases, replace them rather than simply extending them. We briefly consider the most notable changes here. A. NEIGHBOR DISCOVERY IPv4 has a suite of protocols to support the discovery of addresses and routers. IPv6 replaces these protocols with a single protocol called Neighbor Discovery[14]. The IPv6 Neighbor Discovery protocol corresponds to a combination of the IPv4 protocols ARP[15], ICMP Router Discovery[16], and ICMP Redirect[16]. The features of Neighbor Discovery are of key concern for IA, as they determine, in large part, how well any node is connected, and over which paths it sends its data. We discuss each mechanism in detail below. 1. ROUTER DISCOVERY Router discovery allows hosts to locate the routers on their local sub-network. Router discovery eliminates the need for hosts to snoop routing protocols (or use DHCP) to determine the first hop router address. This may improve a system s IA posture, as it limits the complex protocol interactions that sometimes lead to security vulnerabilities. 2. PREFIX DISCOVERY In IPv6, router advertisements carry prefixes for a link; there is no need to have a separate mechanism to configure the netmask, as is required for IPv4 networks. This lessens the chances of a configuration error introducing vulnerabilities into the network. Conversely, spoofed router advertisements accepted by local hosts could prevent communication by these hosts. If the hosts were properly, manually, configured; or configured via a properly-functioning DHCP implementation, they would have been able to communicate. 3. PARAMETER DISCOVERY IPv6 routers can advertise a Maximum Transmission Unit (MTU) for hosts to use on the link, ensuring that all nodes use the same MTU value on links lacking a well-defined MTU. This helps limit accidental DoS attacks caused by a mis-configured host repeatedly attempting to send datagrams larger than the path MTU, resulting in the repeated discarding of these datagrams. Here too, the potential of spoofed MTU advertisements would enable degradation of service attacks against hosts. Since IPv4 hosts can adjust MTU based on path measurements, it is not clear if the automated MTU configuration vulnerability represents a significant concern. 4. ADDRESS RESOLUTION An important part of routing is figuring out what link level address goes with a particular IPv6 address. In IPv4 networks, using the Address Resolution Protocol (ARP) typically solves this. In IPv6, router advertisements carry link-layer addresses. There is no ARP-equivalent for IPv6. This simplifies the overall system design. It eliminates the possibility of an attacker on the local link hijacking ARP responses to gain access to information. It limits denial of service attacks by limiting the possibility of ARP cache poisoning. Moreover, the cleaner and simpler design of IPv6 s approach helps to eliminate some of the complexities involved in having two protocols (IPv4 and ARP) being interdependent. Since ARP cache attacks have been a concern in many contexts, this represents a possibly significant IA improvement, if router advertisements can be authenticated. Significant work is now being done in the IETF s Secure Inter-Domain Routing (SIDR) Working Group on the authentication of router advertisements. [17] This work will result in the necessary infrastructure for public keybased authentication of router advertisements. Finally, placing address resolution at a higher layer makes the protocol more media-independent than ARP and makes it possible to use standard IP authentication and integrity mechanisms as appropriate. The major challenge here is managing cryptographic authentication data, so that hosts can verify the source of this traffic. 5. NEXT-HOP DETERMINATION Given a particular destination, to which router should a host send a datagram? The combination of router discovery and redirection provides this service. Section 8 discusses how IPv6 supports redirection. 6. NEIGHBOR DOWN/UNREACHABLE In IPv4 there is no generally agreed upon protocol or mechanism for Neighbor Unreachability Detection. In IPv6, neighbor unreachability detection is part of the base protocol suite. This significantly improves the robustness of packet delivery in the presence of failing or attacked routers, partially failing or partitioned links, and nodes that

6 change their link-layer addresses. For instance, mobile nodes can move off-link without losing any connectivity due to stale ARP caches. When a router or other node is under a denial of service attack, neighboring nodes can determine more easily that it is not responding or is responding slowly, and can more easily route around it. However, if authentication is not used, the neighbor down/unreachable protocol can be spoofed[18]. The neighbor down/unreachable protocol is executed when there is a sufficiently long delay receiving upper-layer traffic or when a node stops receiving replies from a peer. The node sends a Neighbor Solicitation (NS) message to the peer. If it does not receive a Neighbor Advertisement (NA) response in a specified time, the node deletes the peer s cache entry. If NS and NA messages are not authenticated, an attacker can spoof NA messages as if they were from the peer, and thus cause the node to consider the peer as still being reachable and keep trying to send traffic to it. This is a denial of service attack. 7. DUPLICATE ADDRESS DETECTION Two or more nodes on the same network using the same unicast internet address are usually the sign of a misconfigured host (or network). However, grabbing (falsely advertising) addresses (especially of servers) is also an effective denial of service attack or a means to cause traffic to be erroneously redirected. As a result, knowing when an address is being used by more than one node is an important function. The IETF has specified (in RFC- 2461[14]) that the Neighbor Discovery protocol is to be used to detect cases when an address is use by multiple nodes. The discovery mechanism is not secure, in the sense that it is still possible to capture a server s IP address. However it makes capture more difficult, and more likely to be swiftly discovered. There s a subtle IA issue. Strictly speaking, under RFC- 2461, a node is required to shut down use of an address that it discovers is in use by another node. If the node is hostile, presumably the node will not stop using the address rather it will be the properly operating node that shuts down. In some situations, that may not be the desired behavior. If a server s address is being stolen, if may be desirable for the server to stay up and fight to hold onto its address. While this is the standard behavior in IPv4, in IPv6 it can only be achieved if Neighbor Discovery uses IPsec authenticated datagrams. This will generally require the use of public key-based authentication (e.g., based on a PKI), as shared-secret based authentication will not scale well for large internets. 8. REDIRECTION Redirection is directing a host to a different router to provide a better path to a specified destination. In IPv4 networks, this is accomplished through ICMP redirect messages. In IPv6, redirects contain the link-layer address of the new first hop; separate address resolution is not needed upon receiving a redirect. Multiple prefixes can be associated with the same link. By default, hosts learn all on-link prefixes from Router Advertisements. However, routers may be configured to omit some or all prefixes from Router Advertisements. In such cases, hosts assume that destinations are off-link and send traffic to routers. A router can then issue redirects as appropriate. Unlike IPv4, the recipient of an IPv6 redirect assumes that the new next-hop is on-link. In IPv4, a host ignores redirects specifying a next-hop that is not on-link according to the link's network mask. The IPv6 redirect mechanism is expected to be useful on non-broadcast and shared media links in which it is undesirable or not possible for nodes to know all prefixes for on-link destinations. As part of the Internet standards process, protocol specifications are required to consider security issues, and this specification has undergone an above average security analysis. The analysis points out that it is better than the corresponding IPv4 protocols and that, in IPv6, it is possible to set up a network where all Neighbor Discovery messages are authenticated using IPsec. The original Neighbor Discovery specification, however, required manual configuration of point-wise security associations between hosts and first-hop routers, which is impractical in large networks. This was corrected in RFC 3971[19], where extensions were added to Neighbor Discovery to make use of a Public Key Infrastructure that attests to the ownership of IP address blocks. Such a PKI is already under development in the IETF s SIDR working group[17]. B. ADDRESS ASSIGNMENT IPv6 supports two different modes of address assignment. One is stateless and uses information from Neighbor Discovery to allow each node to autonomously assign itself an address (the scheme is described in RFC 2462[20]). The other is stateful and uses the Dynamic Host Configuration Protocol (DHCP), modified for IPv6, described in RFC-3315[21]. Both address assignment schemes are known to be vulnerable to denial of service attacks in the absence of authenticated datagrams. So far, no study seems to have been performed on the co-existence of the two schemes

7 and which scheme might be preferred for system operation. IV. IPV6 AND IPV4 CO-EXISTENCE A key IA question is exactly how IPv6 and IPv4 will coexist on one network. There are many proposed approaches. The discussion in this section is motivated by a simple policy: we would expect that if an application or node cannot use a particular service or protocol under IPv4, it should not be able to do so under IPv6 (and vice-versa). Now this statement is clearly simplistic. There are situations where permitting a service to be run with only one protocol by not the other makes sense. But the policy is a useful starting assumption and clarifies many issues. A. Running IPv4 and IPv6 Side-by-Side One approach is to run a network in a dual mode, with routers supporting both IPv4 and IPv6. The challenge, then, is keeping the IPv4 and IPv6 domains consistent. In general, we would probably like to be sure that if we exclude IPv4 traffic from a particular site, e.g., via a firewall rule set, that we exclude IPv6 traffic from that site as well. Since the IPv4 and IPv6 address spaces are distinct, ensuring that kind of consistency is difficult. There will be routers and firewalls that block out the IPv4 space, but not the IPv6 space, or vice-versa. This problem is compounded by IPv4-IPv6 translation (see below). There is a need for tools or mechanisms that will keep IPv4 and IPv6 devices consistent. B. IPv4-IPv6 Translation IPv4-IPv6 translation relies on the existence of special gateways that convert IPv4 datagrams to IPv6 datagrams and vice-versa. The appeal of translation is that it eases service availability issues. Translation allows a new IPv6 device to reach an existing IPv4 service. Translation is an IA headache. It effectively creates a backdoor, in that IPv6 traffic that would be blocked could be converted by a translator into IPv4 traffic that would be accepted. This could occur because of inconsistent firewall and filtering rules as noted above, or simply because while an IPv6 device sits in a banned address space, the translator sits in an unrestricted IPv4 space and thus converts the banned IPv6 address into an acceptable IPv4 address. C. Handling IPv6 Islands During a transition period, there will likely be islands of IPv6 networks within a larger IPv4 network. There are a number of schemes to support IPv6 islands. Here we briefly discuss two approaches, 6to4 and Teredo, to illustrate some of the issues. 6to4 is an elegant and very simple way to connect IPv6 islands across an IPv4 backbone. The basic idea is that each IPv6 island has a specific IPv4 router that connects the IPv6 island to the larger IPv4 network. The key trick is to embed the 32-bit IPv4 address of this router into some of the bits of the IPv6 address. The elegance of 6to4 is that IPv6 routing is naturally piggybacked on the existing IPv4 routing. From an IA perspective, the fact that the IPv4 and IPv6 addresses are from the same space may encourage consistent treatment of IPv4 and IPv6 traffic. However, the simplicity of 6to4 means that it is trivial for an IPv6 device to send traffic to any IPv4 device and it is equally trivial for any IPv4 device to tunnel datagrams into an IPv6 enclave. The dangers of the IPv6-to-IPv4 traffic are minimal, as all datagrams will take the form of IPv6 datagrams embedded in IPv4 datagrams and thus if the receiving does not support IPv6, the datagram is largely harmless. But the IPv4-to-IPv6 attack is more serious any IPv4 device can introduce any IPv6 datagram it desires into the IPv6 island. Teredo is an IPv6 tunneling approach developed by Microsoft. The goal of Teredo is to support 6to4-style service in networks that do not have the resources to place a dedicated 6to4 router at their edge and, indeed, may be behind IPv4 NAT boxes. To avoid problems with NAT boxes, Teredo places IPv6 datagrams inside UDP datagrams. And, to avoid the need for an IPv6 router, it enables any host to become an IPv6 router. Pragmatically, Teredo s IA issues are largely the same as 6to4, with the added complication that any device can now act as a router. The ability to make hosts into routers at will is an administrative nightmare, as each new host added to a network implies the appearance of a new IPv6 router that must be configured according to local IA practices. V. CONCLUSIONS In general, IPv6 appears to be somewhat better than IPv4 at addressing several IA issues. Our analysis suggests there will have to be a set of IA protocol profiles that enumerate how IPv6 and its supporting protocols should be used. While initial drafts of some of these profiles could be written now, the final form of each of these profiles will depend on the completion of additional studies.

8 VI. REFERENCES [1] M. Kang, I. Moskowitz, and D. Lee, A network version of the pump. Proc. IEEE Symp. Security and Privacy, pp , May [2] S. Garfinkel, Internet 6.0, Technology Review, MIT Press, January [3] S. Deering and R. Hinden, Internet Protocol, Version 6 (IPv6) Specification, RFC 2460, December 1998 [4] M. Waldvogel, G. Varghese, J. Turner and B. Plattner, Scalable High Speed IP Routing Lookups, Proc. ACM SIGCOMM '97, Cannes France, September [5] IEEE publishes a table mapping from OUI (first part of EUI) to manufacturer. [6] T. Narten, and R. Draves, Privacy Extensions for Stateless Address Auto-configuration in IPv6, RFC 3041, January 2001 [7] T. Aura, Cryptographically Generated Addresses (CGA), RFC 3972, March [8] C. Partridge, T. Mendez, and W. Milliken. Host Anycasting Service, RFC 1546, November [9] C. Partridge and A. Jackson, IPv6 Router Alert Option, RFC-2711, October 1999 [10] P. Biondi and A. Ebalard, Fun with IPv6 Routing Headers, Proc. CanSecWest 2007, Vancouver, CA, April 2007 [11] S. Kent, K. Seo, Security Architecture for the Internet Protocol, RFC 4301, December 2005 [12] S. Kent, IP Authentication Header, RFC 4302, December 2005 [13] S. Kent, IP Encapsulating Security Payload (ESP), RFC 4303, December 2005 [14] T. Narten, E. Nordmark, and W. Simpson, Neighbor Discovery for IP Version 6 (IPv6), RFC 2461, December 1998 [15] D. Plummer, An Ethernet Address Resolution Protocol -- or --Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware, RFC 826, November 1982 [16] J. Postel, Internet Control Message Protocol, RFC 792, September 1981 [17] M. Lepinski, S. Kent, and R. Barnes, An Infrastructure to Support Secure Internet Routing, Internet Draft draft-ietf-sidr-arch-01.txt, 8 July 2007 [18] P. Nikander, J. Kempf, E. Nordmark, IPv6 Neighbor Discovery (ND) Trust Models and Threats, RFC 3756, May [19] J. Arkko, J. Kempf, B. Zill, and P. Nikander, Secure Neighbor Discovery Protocol (SEND), RFC 3971, March [20] S. Thomson and T. Narten, IPv6 Stateless Address Autoconfiguration, RFC 2462, December 1998 [21] R. Droms, J. Bound, B. Volz, T. Lemon, C. Perkins, and M. Carney, Dynamic Host Configuration Protocol for IPv6 (DHCPv6), RFC-3315, July 2003

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

Neighbour Discovery in IPv6

Neighbour Discovery in IPv6 Neighbour Discovery in IPv6 Andrew Hines Topic No: 17 Email: hines@zitmail.uni-paderborn.de Organiser: Christian Schindelhauer University of Paderborn Immatriculation No: 6225220 August 4, 2004 1 Abstract

More information

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas IPv6 Fundamentals Chapter 1: Introduction ti to IPv6 Copyright Cisco Academy Yannis Xydas The Network Today The Internet of today is much different that it was 30, 15 or 5 years ago. 2 Technology Tomorrow

More information

Introduction to IP v6

Introduction to IP v6 IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation

More information

SEcure Neighbour Discovery: A Report

SEcure Neighbour Discovery: A Report SEcure Neighbour Discovery: A Report Arun Raghavan (Y6111006) CS625: Advanced Computer Networks Abstract The IPv6 [5] Neighbour Discovery [12] protocol is used by nodes in IPv6 for such purposes as discover

More information

IPv6 Fundamentals: A Straightforward Approach

IPv6 Fundamentals: A Straightforward Approach IPv6 Fundamentals: A Straightforward Approach to Understanding IPv6 Rick Graziani Cisco Press 800 East 96th Street Indianapolis, IN 46240 IPv6 Fundamentals Contents Introduction xvi Part I: Background

More information

IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. Nalini.elkins@insidethestack.com

IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. Nalini.elkins@insidethestack.com 1 IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. Nalini.elkins@insidethestack.com Agenda What has not changed between IPv4 and IPv6 traces What has changed between IPv4 and

More information

ProCurve Networking IPv6 The Next Generation of Networking

ProCurve Networking IPv6 The Next Generation of Networking ProCurve Networking The Next Generation of Networking Introduction... 2 Benefits from... 2 The Protocol... 3 Technology Features and Benefits... 4 Larger number of addresses... 4 End-to-end connectivity...

More information

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express

More information

19531 - Telematics. 9th Tutorial - IP Model, IPv6, Routing

19531 - Telematics. 9th Tutorial - IP Model, IPv6, Routing 19531 - Telematics 9th Tutorial - IP Model, IPv6, Routing Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 06. January, 2011 Institute of Computer Science Telematics

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security

Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security Yvette E. Gelogo 1, Ronnie D. Caytiles 1 and Byungjoo Park 1 * 1Multimedia Engineering Department,

More information

Tomás P. de Miguel DIT-UPM. dit UPM

Tomás P. de Miguel DIT-UPM. dit UPM Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability

More information

IPv6 Associated Protocols

IPv6 Associated Protocols IPv6 Associated Protocols 1 New Protocols (1) New features are specified in IPv6 Protocol -RFC 2460 DS Neighbor Discovery (NDP) -RFC 4861 DS Auto-configuration : Stateless Address Auto-configuration -RFC

More information

IPv6 First Hop Security Protecting Your IPv6 Access Network

IPv6 First Hop Security Protecting Your IPv6 Access Network IPv6 First Hop Security Protecting Your IPv6 Access Network What You Will Learn This paper provides a brief introduction to common security threats on IPv6 campus access networks and will explain the value

More information

IPv6 Functionality. Jeff Doyle IPv6 Solutions Manager jeff@juniper.net

IPv6 Functionality. Jeff Doyle IPv6 Solutions Manager jeff@juniper.net IPv6 Functionality Jeff Doyle IPv6 Solutions Manager jeff@juniper.net Copyright 2003 Juniper Networks, Inc. Agenda ICMPv6 Neighbor discovery Autoconfiguration Agenda ICMPv6 Neighbor discovery Autoconfiguration

More information

ITL BULLETIN FOR JANUARY 2011

ITL BULLETIN FOR JANUARY 2011 ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division

More information

Mobility on IPv6 Networks

Mobility on IPv6 Networks Mobility on IPv6 Networks Pedro M. Ruiz Project Manager Agora Systems S.A. Global IPv6 Summit Madrid 13-15 March 2002 Pedro M. Ruiz (c) Agora Systems S.A, 2002 1 Outline Motivation MIPv6 architecture MIPv6

More information

IPv6 Advantages. www.compaq.com. Yanick Pouffary. Yanick.Pouffary@compaq.com

IPv6 Advantages. www.compaq.com. Yanick Pouffary. Yanick.Pouffary@compaq.com IPv6 Advantages Yanick Pouffary Yanick.Pouffary@compaq.com IPv6 FORUM A world-wide consortium of leading Internet vendors and Research and Education Networks The IPv6 FORUM mission To promote IPv6 in order

More information

Moonv6 Test Suite. IPv6 Firewall Network Level Interoperability Test Suite. Technical Document. Revision 1.0

Moonv6 Test Suite. IPv6 Firewall Network Level Interoperability Test Suite. Technical Document. Revision 1.0 Moonv6 Test Suite IPv6 Firewall Network Level Interoperability Test Suite Technical Document Revision 1.0 IPv6 Consortium 121 Technology Drive, Suite 2 InterOperability Laboratory Durham, NH 03824-3525

More information

Network Security TCP/IP Refresher

Network Security TCP/IP Refresher Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)

More information

CloudEngine Series Switches. IPv6 Technical White Paper. Issue 01 Date 2014-02-19 HUAWEI TECHNOLOGIES CO., LTD.

CloudEngine Series Switches. IPv6 Technical White Paper. Issue 01 Date 2014-02-19 HUAWEI TECHNOLOGIES CO., LTD. Issue 01 Date 2014-02-19 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

8.2 The Internet Protocol

8.2 The Internet Protocol TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface

More information

Types of IPv4 addresses in Internet

Types of IPv4 addresses in Internet Types of IPv4 addresses in Internet PA (Provider Aggregatable): Blocks of addresses that may be sub-assigned to other ISPs or to other companies that also may leased the addresses to their customers May

More information

Overview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features

Overview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features Overview Lecture 16: IP variations: IPv6, multicast, anycast Next generation IP: IPv6 6lowpan and the Internet of Things IP multicast IP anycast Practical considerations throughout I think we have a problem

More information

Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.

Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2. Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.2 COMPARISONS OF IP HEADER FORMATS 2.3 EXTENSION HEADERS 2.3.1 Options

More information

Moonv6 Test Suite DRAFT

Moonv6 Test Suite DRAFT Moonv6 Test Suite DHCP Interoperability Test Suite DRAFT Technical Document Revision 0.1 IPv6 Consortium 121 Technology Drive, Suite 2 InterOperability Laboratory Durham, NH 03824-3525 Research Computing

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Personal Firewall Default Rules and Components

Personal Firewall Default Rules and Components Personal Firewall Default Rules and Components The Barracuda Personal Firewall comes with a default access ruleset. The following tables aim to give you a compact overview of the default rules and their

More information

Internet Protocol Version 6 (IPv6)

Internet Protocol Version 6 (IPv6) Internet Protocol Version 6 (IPv6) Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 14-1 Overview

More information

(Refer Slide Time: 01:38 01:37)

(Refer Slide Time: 01:38 01:37) Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No: 29 IP Version 6 & Mobile IP Good day, in the last lecture we discussed

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

- IPv4 Addressing and Subnetting -

- IPv4 Addressing and Subnetting - 1 Hardware Addressing - IPv4 Addressing and Subnetting - A hardware address is used to uniquely identify a host within a local network. Hardware addressing is a function of the Data-Link layer of the OSI

More information

Managing the Co-existing Network of IPv6 and IPv4 under Various Transition Mechanisms

Managing the Co-existing Network of IPv6 and IPv4 under Various Transition Mechanisms Managing the Co-existing Network of IPv6 and IPv4 under Various Transition Mechanisms I-Ping Hsieh Shang-Juh Kao Department of Computer Science National Chung-Hsing University 250 Kuo-Kuang Rd., Taichung,

More information

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7 20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic

More information

Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP)

Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP) Tik-110.350 Computer Networks (3 cr) Spring 2000 Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP) Professor Arto Karila Helsinki University of Technology E-mail: Arto.Karila@hut.fi

More information

Chapter 9. IP Secure

Chapter 9. IP Secure Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.

More information

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) Yao-Chung Chang, Han-Chieh Chao, K.M. Liu and T. G. Tsuei* Department of Electrical Engineering, National Dong Hwa University Hualien, Taiwan, Republic

More information

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date IPv4 and IPv6 Integration Formation IPv6 Workshop Location, Date Agenda Introduction Approaches to deploying IPv6 Standalone (IPv6-only) or alongside IPv4 Phased deployment plans Considerations for IPv4

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS Eric Vyncke (@evyncke) Cisco Session ID: ARCH W01 Session Classification: Advanced Agenda Status of WorldWide IPv6 Deployment IPv6 refresher:

More information

Technology Brief IPv6 White Paper.

Technology Brief IPv6 White Paper. Technology Brief White Paper. Page 1 of 37 Table of Contents 1 Overview... 3 1.1 Background... 3 1.2 Advantages of... 5 2 Packet... 9 2.1 Basic Header... 9 2.1.1 Extension Headers... 11 2.1.2 ICMP Packet...

More information

IPv6 Security Best Practices. Eric Vyncke evyncke@cisco.com Distinguished System Engineer

IPv6 Security Best Practices. Eric Vyncke evyncke@cisco.com Distinguished System Engineer IPv6 Best Practices Eric Vyncke evyncke@cisco.com Distinguished System Engineer security 2007 Cisco Systems, Inc. All rights reserved. Cisco CPub 1 Agenda Shared Issues by IPv4 and IPv6 Specific Issues

More information

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking

More information

Security of IPv6 and DNSSEC for penetration testers

Security of IPv6 and DNSSEC for penetration testers Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

Internet Protocol Address

Internet Protocol Address SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give

More information

CIRA s experience in deploying IPv6

CIRA s experience in deploying IPv6 CIRA s experience in deploying IPv6 Canadian Internet Registration Authority (CIRA) Jacques Latour Director, Information Technology Ottawa, April 29, 2011 1 About CIRA The Registry that operates the Country

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Moonv6 Test Suite. IPv6 Firewall Functionality and Interoperablility Test Suite. Technical Document. Revision 0.6

Moonv6 Test Suite. IPv6 Firewall Functionality and Interoperablility Test Suite. Technical Document. Revision 0.6 Moonv6 Test Suite IPv6 Firewall Functionality and Interoperablility Test Suite Technical Document Revision 0.6 IPv6 Consortium 121 Technology Drive, Suite 2 InterOperability Laboratory Durham, NH 03824-3525

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

Introduction to IPv6 and Benefits of IPv6

Introduction to IPv6 and Benefits of IPv6 Introduction to IPv6 and Benefits of IPv6 Ammar Yasir Korkusuz 2012 Bogazici University, Electrical-Electronics Engineering Department MSc. Student EE 545 TERM PROJECT Abstract: IPv6 is a new internet

More information

Network Working Group Request for Comments: 4942. Ericsson P. Savola CSC/Funet September 2007. IPv6 Transition/Coexistence Security Considerations

Network Working Group Request for Comments: 4942. Ericsson P. Savola CSC/Funet September 2007. IPv6 Transition/Coexistence Security Considerations Network Working Group Request for Comments: 4942 Category: Informational E. Davies Consultant S. Krishnan Ericsson P. Savola CSC/Funet September 2007 Status of This Memo IPv6 Transition/Coexistence Security

More information

Firewalls und IPv6 worauf Sie achten müssen!

Firewalls und IPv6 worauf Sie achten müssen! Firewalls und IPv6 worauf Sie achten müssen! Pascal Raemy CTO Asecus AG pascal.raemy@asecus.ch Asecus AG Asecus AG Security (Firewall, Web-Gateway, Mail-Gateway) Application Delivery (F5 Neworks with BIGIP)

More information

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Internetworking. Problem: There is more than one network (heterogeneity & scale) Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication

More information

Securing IPv6 Neighbor and Router Discovery Jari Arkko Ericsson Research NomadicLab L M Ericsson FIN-02420 JORVAS, FINLAND +358-9-299-1

Securing IPv6 Neighbor and Router Discovery Jari Arkko Ericsson Research NomadicLab L M Ericsson FIN-02420 JORVAS, FINLAND +358-9-299-1 Securing IPv6 Neighbor and Router Discovery Jari Arkko Ericsson Research NomadicLab L M Ericsson FIN-02420 JORVAS, FINLAND +358-9-299-1 jari.arkko@ericsson.com Tuomas Aura Microsoft Research Cambridge

More information

IPv6 Transition and Security Threat Report. Emin Çalışkan

IPv6 Transition and Security Threat Report. Emin Çalışkan IPv6 Transition and Security Threat Report Emin Çalışkan Tallinn 2014 This publication is a product of the NATO Cooperative Cyber Defence Centre of Excellence (the Centre). It does not necessarily reflect

More information

Internet Protocol version 4 Part I

Internet Protocol version 4 Part I Internet Protocol version 4 Part I Claudio Cicconetti International Master on Information Technology International Master on Communication Networks Engineering Table of Contents

More information

Securing IP Networks with Implementation of IPv6

Securing IP Networks with Implementation of IPv6 Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle

More information

Request for Comments: 1788 Category: Experimental April 1995

Request for Comments: 1788 Category: Experimental April 1995 Network Working Group W. Simpson Request for Comments: 1788 Daydreamer Category: Experimental April 1995 Status of this Memo ICMP Domain Name Messages This document defines an Experimental Protocol for

More information

IPv6 Hardening Guide for Windows Servers

IPv6 Hardening Guide for Windows Servers IPv6 Hardening Guide for Windows Servers How to Securely Configure Windows Servers to Prevent IPv6-related Attacks Version: 1.0 Date: 22/12/2014 Classification: Public Author(s): Antonios Atlasis TABLE

More information

Securing IPv6. What Students Will Learn:

Securing IPv6. What Students Will Learn: Securing IPv6 When it comes to IPv6, one of the more contentious issues is IT security. Uninformed analysts, anit-v6 pundits, and security ne're-do-wells have created a mythos that IPv6 is inherently less

More information

IP Anycast: Point to (Any) Point Communications. Draft 0.3. Chris Metz, chmetz@cisco.com. Introduction

IP Anycast: Point to (Any) Point Communications. Draft 0.3. Chris Metz, chmetz@cisco.com. Introduction IP Anycast: Point to (Any) Point Communications Draft 0.3 Chris Metz, chmetz@cisco.com Introduction The Internet supports several different communication paradigms. Unicast is defined as a point-to-point

More information

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4) Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Mobility Management in DECT/IPv6 Networks

Mobility Management in DECT/IPv6 Networks Mobility Management in DECT/IPv6 Networks Sarantis Paskalis 1, Georgios Lampropoulos 1, and Georgios Stefanou 1 Department of Informatics and Telecommunications University of Athens, Greece Abstract. The

More information

04 Internet Protocol (IP)

04 Internet Protocol (IP) SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery

More information

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA) Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same

More information

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode 13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4

More information

Tunnel Broker System Using IPv4 Anycast

Tunnel Broker System Using IPv4 Anycast Tunnel Broker System Using IPv4 Anycast Xin Liu Department of Electronic Engineering Tsinghua Univ. lx@ns.6test.edu.cn Xing Li Department of Electronic Engineering Tsinghua Univ. xing@cernet.edu.cn ABSTRACT

More information

An Overview of IPv6 CHAPTER

An Overview of IPv6 CHAPTER 56982_CH02I 12/12/97 3:29 PM Page 23 2 CHAPTER 2 An Overview of IPv6 This second chapter is meant to provide a general overview of the IPv6 protocol and of the way network layer protocols operate. These

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

unisys ClearPath Enterprise Servers TCP/IP Implementation and Operations Guide ClearPath MCP 16.0 April 2014 3787 7693 222

unisys ClearPath Enterprise Servers TCP/IP Implementation and Operations Guide ClearPath MCP 16.0 April 2014 3787 7693 222 unisys ClearPath Enterprise Servers TCP/IP Implementation and Operations Guide ClearPath MCP 16.0 April 2014 3787 7693 222 NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THIS DOCUMENT. Any product or related

More information

Security with IPv6 Explored. U.S. IPv6 Summit 20032. Renée e Esposito Booz Allen Hamilton Richard Graveman RFG Security

Security with IPv6 Explored. U.S. IPv6 Summit 20032. Renée e Esposito Booz Allen Hamilton Richard Graveman RFG Security Security with IPv6 Explored U.S. IPv6 Summit 20032 December 8-11, 8 2003 Renée e Esposito Booz Allen Hamilton Richard Graveman RFG Security IPv6 Security: Outline 1 Internet Security 2 IPv6: Core Protocols

More information

ACHILLES CERTIFICATION. SIS Module SLS 1508

ACHILLES CERTIFICATION. SIS Module SLS 1508 ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security

More information

Vulnerabili3es and A7acks

Vulnerabili3es and A7acks IPv6 Security Vulnerabili3es and A7acks Inherent vulnerabili3es Less experience working with IPv6 New protocol stack implementa3ons Security devices such as Firewalls and IDSs have less support for IPv6

More information

IPv6 Security. Scott Hogg, CCIE No. 5133 Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA

IPv6 Security. Scott Hogg, CCIE No. 5133 Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA IPv6 Security Scott Hogg, CCIE No. 5133 Eric Vyncke Cisco Press Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA Contents Introduction xix Chapter 1 Introduction to IPv6 Security 3 Reintroduction

More information

Linux Network Security

Linux Network Security Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols

More information

IETF IPv6 Request for Comments (RFCs) Updated 2008-12-01

IETF IPv6 Request for Comments (RFCs) Updated 2008-12-01 IETF IPv6 Request for Comments (RFCs) Updated 2008-12-01 RFC Title 5380 Hierarchical Mobile IPv6 (HMIPv6) Mobility Management 5350 IANA Considerations for the IPv4 and IPv6 Router Alert Options 5340 OSPF

More information

Learn About Differences in Addressing Between IPv4 and IPv6

Learn About Differences in Addressing Between IPv4 and IPv6 > Learn About Differences in Addressing Between IPv4 and IPv6 IPv6 is the most recent generation of the Internet Protocol (IP) defined by the Internet Engineering Task Force (IETF). Initially defined in

More information

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same

More information

IP Address Classes (Some are Obsolete) 15-441 Computer Networking. Important Concepts. Subnetting 15-441 15-641. Lecture 8 IP Addressing & Packets

IP Address Classes (Some are Obsolete) 15-441 Computer Networking. Important Concepts. Subnetting 15-441 15-641. Lecture 8 IP Addressing & Packets Address Classes (Some are Obsolete) 15-441 15-441 Computer Networking 15-641 Class A 0 Network ID Network ID 8 16 Host ID Host ID 24 32 Lecture 8 Addressing & Packets Peter Steenkiste Fall 2013 www.cs.cmu.edu/~prs/15-441-f13

More information

Windows 7 Resource Kit

Windows 7 Resource Kit Windows 7 Resource Kit Mitch Tulloch, Tony Northrup, and Jerry Honeycutt To learn more about this book, visit Microsoft Learning at http://www.microsoft.com/mspress/books/ 9780735627000 2009 Microsoft

More information

Practical IPv6 Monitoring on Campus

Practical IPv6 Monitoring on Campus Practical IPv6 Monitoring on Campus Best Practice Document Produced by the CESNET-led Working Group on Network Monitoring (CESNET BPD 132) Authors: Matěj Grégr, Petr Matoušek, Tomáš Podermański, Miroslav

More information

ICSA Labs Network Protection Devices Test Specification Version 1.3

ICSA Labs Network Protection Devices Test Specification Version 1.3 Network Protection Devices Test Specification Version 1.3 August 19, 2011 www.icsalabs.com Change Log Version 1.3 August 19, 2011 added general configuration note to default configuration in Firewall section

More information

Deploying IPv6 in 3GPP Networks. Evolving Mobile Broadband from 2G to LTE and Beyond. NSN/Nokia Series

Deploying IPv6 in 3GPP Networks. Evolving Mobile Broadband from 2G to LTE and Beyond. NSN/Nokia Series Brochure More information from http://www.researchandmarkets.com/reports/2379605/ Deploying IPv6 in 3GPP Networks. Evolving Mobile Broadband from 2G to LTE and Beyond. NSN/Nokia Series Description: Deploying

More information

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Threat Paper Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Federal Computer Incident Response Center 7 th and D Streets S.W. Room 5060 Washington,

More information

IMPLEMENTATION OF IPv6

IMPLEMENTATION OF IPv6 THESIS Ganesh Sharma IMPLEMENTATION OF IPv6 DEGREE PROGRAMME IN INFORMATION TECHNOLOGY ROVANIEMI UNIVERSITY OF APPLIED SCIENCES SCHOOL OF TECHNOLOGY Degree Programme in Information Technology Thesis IMPLEMENTATION

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse

More information

Module 2: Assigning IP Addresses in a Multiple Subnet Network

Module 2: Assigning IP Addresses in a Multiple Subnet Network Module 2: Assigning IP Addresses in a Multiple Subnet Network Contents Overview 1 Lesson: Assigning IP Addresses 2 Lesson: Creating a Subnet 19 Lesson: Using IP Routing Tables 29 Lesson: Overcoming Limitations

More information

Security Implications of the Internet Protocol version 6 (IPv6)

Security Implications of the Internet Protocol version 6 (IPv6) Security Implications of the Internet Protocol version 6 (IPv6) Fernando Gont UTN/FRH BSDCan 2010 Ottawa, ON, Canada, May 13-14, 2010 Agenda Ongoing work on IPv6 security at UK CPNI Brief comparision of

More information

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a traditional NAT? Un article de Le wiki des TPs RSM. Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with

More information

IP Routing Features. Contents

IP Routing Features. Contents 7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................

More information

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31 IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011

More information

We Are HERE! Subne\ng

We Are HERE! Subne\ng TELE 302 Network Design Lecture 21 Addressing Strategies Source: McCabe 12.1 ~ 12.4 Jeremiah Deng TELE Programme, University of Otago, 2013 We Are HERE! Requirements analysis Flow Analysis Logical Design

More information

IPv6 Security - Opportunities and Challenges

IPv6 Security - Opportunities and Challenges IPv6 Security - Opportunities and Challenges Thomas Scheffler Beuth Hochschule Berlin, Germany {scheffler@beuth-hochschule.de} The Basics Agenda 1 The Basics IPv6 Network Security ICMPv6 / Autoconfiguration

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Internet Protocols Fall 2005. Lectures 7-8 Andreas Terzis

Internet Protocols Fall 2005. Lectures 7-8 Andreas Terzis Internet Protocols Fall 2005 Lectures 7-8 Andreas Terzis Outline Internet Protocol Service Model Fragmentation Addressing Original addressing scheme Subnetting CIDR Forwarding ICMP ARP Address Shortage

More information