IPv6 Infrastructure Security
|
|
|
- Anastasia Golden
- 10 years ago
- Views:
Transcription
1 IPv6 Infrastructure Security 2013 North American IPv6 Summit Jeffrey L Carrell Network Conversions Network Security Consultant IPv6 SME/Trainer 1 Agenda IPv6 address fundamentals Operating Systems support ICMPv6 - Router Advertisement IPv6 address autoconfiguration & processes Security concerns and threats IPv6 First Hop Security IPv6 Attack tools Resources IPv6 FHS mitigation demonstration 2 1
2 What is an IPv6 Address? IPv6 addresses are very different than IPv4 addresses in the size, numbering system, and delimiter between the numbers 128bit -vs- 32bit hexadecimal -vs- decimal colon and double colon -vs- period (or dot for the real geeks) Valid IPv6 addresses are comprised of hexadecimal numbers (0-9 & a-f), with colons separating groups of four numbers, with a total of eight groups (each group is known as quads, quartets, or chunks ) 2001:0db8:1010:61ab:f005:ba11:00da:11a5 2001:0000:0000:0A52:0000:0000:0000:3D16 64bits for Network Identifier 64bits for Interface Identifier default state operation 3 Interface ID from MAC Company ID Manufacturer Data F 00 IEEE 48-Bit MAC Address FF FE 64 3F 00 Expand to EUI th bit inverted 0xFFFE inserted FF FE 64 3F 00 Invert the Global Bit 0219:71FF:FE64:3F00 Modified EUI-64 Interface ID 4 2
3 Switch/Router operating systems May require software upgrade Generally disabled by default Generally uses M-EUI-64 Interface address May have client DHCPv6 support Generally no IPv6 Temporary address configured Generally support DHCPv6 relay on router interface May have DHCPv6 server If using IPv6 static routes, must use Link-Local addresses for next hop for ICMPv6 Redirect to work 5 Server operating systems Microsoft Server 2003 Must be manually installed Uses M-EUI-64 Interface address, no client DHCPv6 support CLI configuration only Limited server application support no: AD, DHCPv6, RDP, Exchange, SQL, ftp 2008/2012 Enabled by default RFC 4941 privacy Interface addresses by default No IPv6 Temporary address configured GUI or CLI configuration Most (if not all) server applications support IPv6 Linux Longest support, generally most server applications 6 3
4 Client operating systems Microsoft Windows XP w/sp2 - must install IPv6 protocol Uses M-EUI-64 Interface address, no client DHCPv6 support CLI configuration only Vista, 7, 8 - enabled by default RFC 4941 privacy Interface addresses by default GUI and CLI configuration Apple Mac OS X Mac OS X native and enabled by default Uses M-EUI-64 Interface address by default, no client DHCPv6 support ** DHCPv6 support in Lion!!!!!! GUI and CLI configuration Linux Generally enabled by default 7 Network peripherals Printers VoIP phones Network cameras Embedded systems ** More manufacturers are supporting IPv6 in their devices *** and IPv6 ready or supported does not mean the same thing to everybody!!! 8 4
5 ICMPv6 - Router Advertisement Router Advertisement (RA) [key components] M flag managed address configuration flag (for stateful (DHCPv6) autoconfig) O flag other configuration flag (for stateless DHCPv6 autoconfig) Prf flag router preference flag (ska priority) Router Lifetime lifetime associated with the default router Prefix Length number of bits in the prefix A flag autonomous address-configuration flag (for SLAAC) L flag on-link flag Valid Lifetime length of time the address is valid for use in preferred and deprecated states Preferred Lifetime length of time the address is valid for new communications Prefix IPv6 address prefix For additional info, see RFC IPv6 autoconfiguration options Address Autoconfiguration Method Link-Local (always configured) ICMPv6 RA (Type 134) Flags M Flag O Flag ICMPv6 RA (Type 134) ICMPv6 Option Prefix Info A Flag L Flag N/A N/A N/A N/A Prefix Derived from Internal (fe80::/64) Interface ID Derived from M-EUI-64 or Privacy Other Configuration Options (DNS, time, tftp, etc) Manual assigned Off Off Off On Manual Manual Manual SLAAC Off Off On On RA M-EUI-64 or Privacy Number of IPv6 Addresses on interface Manual 1 Manual 2 (LL, manual) 3 (LL, IPv6, IPv6 temp) Stateful (DHCPv6) On N/R Off On DHCPv6 DHCPv6 DHCPv6 2 (LL, DHCPv6) Stateless DHCPv6 Off On On On RA M-EUI-64 or Privacy DHCPv6 3 (LL, IPv6, IPv6 temp) Combination Stateless & DHCPv6 On N/R On On RA and DHCPv6 M-EUI-64 or Privacy and DHCPv6 DHCPv6 4 (LL, IPv6, IPv6 temp, DHCPv6) 10 5
6 Router Advertisement packet 11 Router Advertisement packet 12 6
7 Router Advertisement packet 13 IPv6 address autoconfiguration Assigning an IPv6 address: Link-Local (automatically assigned when IPv6 is enabled) Based on prefix fe80::/10, assigned as fe80::/64 Interface ID (64 bit host portion) derived from either: Modified IEEE EUI-64 format (RFC 4291) Derived from MAC address Privacy format (RFC 4941) Derived from random number generator NOTE: Requires no routers, no DHCPv6 servers, no additional network systems support. 14 7
8 IPv6 address autoconfiguration, con t Assigning an IPv6 address: Autoconfiguration Autoconfiguration SLAAC (Stateless address autoconfiguration), generally a /64 Uses prefix information from Router Advertisement Interface ID (64 bit host portion) derived from either: Modified IEEE EUI-64 format (RFC 4291) Derived from MAC address Privacy format (RFC 4941) Derived from random number generator Generally creates 2 global addresses Cryptographically generated (RFC 3972) Secure/unique interface ID Stateful generally via DHCPv6 (RFC 3315) 15 IPv6 SLAAC process A node sends a multicast Router Solicitation message to the all-routers address FF02::2 Router(s) respond with Router Advertisement message containing A & L flags on and prefix(es) for stateless autoconfiguration The node configures its own IPv6 address(es) with the advertised prefix(es), plus a locally-generated Interface ID Node checks whether the selected address(es) is(are) unique (Duplicate Address Detection) If unique, the address(es) is(are) configured on interface Note no DNS automatically configured 16 8
9 IPv6 Stateful (DHCPv6) process A node sends a multicast Router Solicitation message to the all-routers address FF02::2 Router(s) respond with Router Advertisement message containing M & L flags on for stateful autoconfiguration The node sends a multicast Solicit message to the all-dhcp relay agents and servers address FF02::1:2 DHCPv6 server(s) responds with Advertise message(s) containing IPv6 address and lifetimes The node sends a Request est message to confirm and seeking other information DHCPv6 server responds with Reply message Node checks whether the selected address is unique (Duplicate Address Detection) If unique, the address is configured on interface 17 Router Advertisement packet (Stateful/DHCPv6) 18 9
10 IPv6 Stateful (DHCPv6) process DHCPv6Solicit = DHCPv6Advertise = DHCPv6Request = DHCPDiscover (IPv4) DHCPOffer (IPv4) DHCPRequest (IPv4) DHCPv6Reply = DHCPAck (IPv4) 19 Key difference in DHCP/DHCPv6 Default gateway DHCP configurable Router option in scope DHCPv6 no configurable Router option in scope (possible future, but no client OS support yet) An IPv6 node derives its default gateway from the router s Link-Local Local address when the L flag is set in the Prefix information field of an RA (! not from the network prefix!) 20 10
11 IPv6 address autoconfiguration, con t Assigning an IPv6 address: Autoconfiguration, con t Stateless DHCPv6 Uses prefix information from Router Advertisement Interface ID (64 bit host portion) derived from either: Modified IEEE EUI-64 format (RFC 4291) Derived from MAC address Privacy format (RFC 4941) Derived from random number generator Cryptographically generated (RFC 3972) Secure/unique interface ID Uses DHCPv6 for other information DNS, time server, tftp or download server, etc 21 IPv6 Stateless DHCPv6 process A node sends a multicast Router Solicitation message to the all-routers address FF02::2 Router(s) respond with Router Advertisement message containing A & L flags on and prefix(es), and O flag on for stateless DHCPv6 autoconfiguration The node configures its own IPv6 address(es) with the advertised prefix(es), plus a locally-generated Interface ID The node sends a multicast Information-Request message to the all-dhcp relay agents and servers address FF02::1:2 DHCPv6 server responds with Reply message Node checks whether the selected address is unique (Duplicate Address Detection) If unique, the address is configured on interface 22 11
12 Router Advertisement packet (Stateless DHCPv6) 23 Security concerns If EUI-64 based address, can determine manufacturer of interface, which may lead to what type of device it is, and where in the network in may be located. Since IPv6 is enabled by default in many operating systems and devices, simple scan of network will provide tons of info Many tools already available for exploitation of devices/systems Easy to spoof clients with rogue RA If there is a Temporary IPv6 address (in addition to a regular configured IPv6 address), it is used for outbound communications by the client. Temporary IPv6 addresses can change frequently
13 IPv6 Threats to access networks IPv6 uses ICMPv6 for many LAN operations Stateless auto-configuration IPv6 equivalent of IPv4 ARP New multicast addresses that can enable an attacker to identify key resources on a network Spoofed RAs can renumber hosts, have hosts drop an IPv6 address, or initiate a MITM attack with redirect DHCPv6 spoofing Force nodes to believe all addresses are onlink 25 ICMPv6 is Required for IPv6 Type Description 1 Destination unreachable 2 Packet too big Traceroute 3 Time exceeded 4 Parameter problem Ping 128 Echo Request 129 Echo Reply 130 Multicast Listener Query Multicast Listener Discovery 131 Multicast Listener Report Prefix Advertisement 132 Multicast Listener Done 133 Router Solicitation (RS) 134 Router Advertisement (RA) 135 Neighbor Solicitation (NS) 136 Neighbor Advertisement (NA) 137 Redirect message ARP replacement 26 13
14 IPv6 First Hop Security When IPv6 is implemented on the LAN (access layer), certain switch ports are known to have only traditional end-node user devices attached (computers, phones, printers, etc). It can be safely assumed that these end-node user devices will not serve as either a router or DHCPv6 server. Therefore, a best practice recommendation is for switches to be configured in such a way that both RAs and DHCPv6 server packets are filtered on these end-node user ports to protect the network link operations. 27 IPv6 infrastructure security options, aka First Hop Security Some common access layer platforms Manufacturer HP Comware 5 (former 3Com/H3C) HP ProVision ASIC platforms Cisco IOS 12.2 (older 3560/3750) Cisco IOS 15.x (newer 3750E) Juniper JUNOS (EX series) DHCPv6 Snooping ND Snooping IPv6 Source Guard Yes Yes Yes RA-Guard (RFC6105) Yes (ND Detection) SeND (RFC3971) No No Yes No No No No (manual ACL) No Yes Yes (DHCPv6 Guard) Yes Yes Yes <future> <future> <future> Source manufacturer public documents 28 14
15 RA-Guard HP ProVision switch(config)# ipv6 ra-guard ports <intf> specific ports that will block RA s Cisco IOS switch(config-if)# ipv6 nd raguard attach-policy applied on specific ports that will accept RA s Not widely implemented yet Can be circumvented by modifying IPv6 Extension Headers 29 Rogue RA & DHCPv6 port ACL ipv6 access-list stop-ra-dhcpv6 remark deny all traffic DHCPv6 server to client deny udp any eq 547 any eq 546 remark deny Router Advertisements deny icmp any any router-advertisement permit any any interface gigabitethernet 1/0/1 switchport ipv6 traffic-filter stop-ra-dhcpv6 in Example for Cisco IOS 30 15
16 IPv6 ACL implicit rules Manufacturers default implicit ACL rules are not always the same, be careful! Cisco IOS: implicit entries exist at the end of each IPv6 ACL to allow neighbor discovery and deny all other IPv6: permit icmp any any nd-na permit icmp any any nd-ns deny ipv6 any any therefore if you add deny ipv6 any any log at the end of an IPv6 ACL, you must manually re-apply the 2 ND permits before the deny. Provision: implicit entry only denies all other IPv6 Comware: implicit entry allows all other IPv6 31 DHCPv6 Attack mitigation Rogue DHCPv6 server providing malicious information (ADVERTISE or REPLY) to users DHCPv6 Snooping Port ACL (PACL) to prevent rogue RAs and DHCPv6 from user ports Pool consumption attack / many SOLICIT messages ND Snooping IPv6 Source Guard Also throttle these messages to lower bandwidth Scanning Use randomized node identifiers or larger pool if leased addresses are assigned sequentially 32 16
17 Unknown external connections Deny packets for transition techniques / tunnels t i not in use Deny IPv4 protocol 41 forwarding unless that is exactly what is intended unless using 6to4 tunneling Deny UDP 3544 forwarding unless you are using Teredo-based tunneling 33 IPv6 ACL to protect management access on VTY ipv6 access-list mgmt-vty remark permit mgmt to local net only permit ipv6 2001:db8:0:1::/64 any line vty 0 4 ipv6 access-class mgmt-vty in Example for Cisco IOS 34 17
18 IPv6 Attack tools Attack Toolkits THC-IPv6 30 tools! SI6 Networks IPv6 Toolkit 2 dozen tools! Scanners Nmap, halfscan6 (older) Packet forgery Scapy DoS Tools (older) 6tunneldos, 4to6ddos, Imps6-tools 35 Resources Guide to TCP/IP, 4 th Edition (Published September 2012) Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide (Published March 2012) 36 18
19 Resources IPv6 Fundamentals (Published October 2012) Understanding IPv6, 3 rd Edition (Published June 2012) 37 Resources IPv6 Security (Published December 2008) IPv6 for Enterprise Networks (Published April 2011) 38 19
20 IPv6 FHS mitigation demonstration RA-Guard RA-Guard via ACL DHCPv6 ACLs Mgmt access ACLs Windows 7 Pro Windows Server 2008-R2 DHCPv6, DNS, IIS Windows 7 Pro HP 3500 Cisco C3750 ATTACKER radvd / dhcpv6 39 Thank You for Attending! Jeffrey L Carrell Network Security Consultant [email protected] 40 20
IPv6 Infrastructure Security Jeffrey L Carrell Network Conversions Network Security Consultant, IPv6 SME/Trainer
IPv6 Infrastructure Security Jeffrey L Carrell Network Conversions Network Security Consultant, IPv6 SME/Trainer 1 IPv6 Infrastructure Security v1.1 - Copyright 2013 Jeffrey L. Carrell Agenda IPv6 address
IPv6 Virtual Labs: How to & Lessons s Learned. IPv6 Virtual Labs:
IPv6 Virtual Labs: How to & Lessons s Learned ed Jeffrey L Carrell Network Conversions Network Consultant IPv6 SME/Trainer [email protected] Twitter: @JeffCarrell_v6 1 IPv6: Build Your Own Lab
IPv6 for SMB s: Easy or Hard?
IPv6 for SMB s: Easy or Hard? Jeffrey L Carrell Network Conversions Network Security Consultant 1 Agenda IPv6 address Network applications Network utilities Server operating systems Client operating systems
IPv6 Security. Scott Hogg. Global Technology Resources, Inc. Director of Technology Solutions CCIE #5133, CISSP #4610
IPv6 Security Scott Hogg Global Technology Resources, Inc. Director of Technology Solutions CCIE #5133, CISSP #4610 IPv6 Security Latent Threat Even if you haven t started using IPv6 yet, you probably
IPv6 First Hop Security Protecting Your IPv6 Access Network
IPv6 First Hop Security Protecting Your IPv6 Access Network What You Will Learn This paper provides a brief introduction to common security threats on IPv6 campus access networks and will explain the value
Recent advances in IPv6 insecurities Marc van Hauser Heuse Deepsec 2010, Vienna. 2010 Marc Heuse <[email protected]>
Recent advances in IPv6 insecurities Marc van Hauser Heuse Deepsec 2010, Vienna 2010 Marc Heuse Hello, my name is The future is here already Let s start with the basics IPv4 4 octets 4.294.967.296
IP(v6) security. Matěj Grégr. Brno University of Technology, Faculty of Information Technology. Slides adapted from Ing.
IP(v6) security Matěj Grégr Brno University of Technology, Faculty of Information Technology Slides adapted from Ing. Tomáš Podermański What is IP security? Encryption? Authentication? Authorization? Surveillance?
IPv6 Functionality. Jeff Doyle IPv6 Solutions Manager [email protected]
IPv6 Functionality Jeff Doyle IPv6 Solutions Manager [email protected] Copyright 2003 Juniper Networks, Inc. Agenda ICMPv6 Neighbor discovery Autoconfiguration Agenda ICMPv6 Neighbor discovery Autoconfiguration
IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. [email protected]
1 IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. [email protected] Agenda What has not changed between IPv4 and IPv6 traces What has changed between IPv4 and
IPv6 Fundamentals: A Straightforward Approach
IPv6 Fundamentals: A Straightforward Approach to Understanding IPv6 Rick Graziani Cisco Press 800 East 96th Street Indianapolis, IN 46240 IPv6 Fundamentals Contents Introduction xvi Part I: Background
Security Assessment of Neighbor Discovery for IPv6
Security Assessment of Neighbor Discovery for IPv6 Fernando Gont project carried out on behalf of UK Centre for the Protection of National Infrastructure LACNIC XV 15 al 20 de Mayo de 2011. Cancún, México
Joe Davies. Principal Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group June 1, 2011
Joe Davies Principal Writer Windows Server Information Experience Presented at: Seattle Windows Networking User Group June 1, 2011 2011 Microsoft Corporation IPv6 addressing and DNS review IPv6 subnetting
Implementing DHCPv6 on an IPv6 network
Implementing DHCPv6 on an IPv6 network Benjamin Long [email protected] 8-11-2009 Implementing DHCPv6 on an IPv6 network 2 Table of Contents DHCPv6 Overview...3 Terms used by DHCPv6...3 DHCPv6 Message
Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.
Presentation_ID 2001, Cisco Systems, Inc. All rights reserved. 1 IPv6 Security Considerations Patrick Grossetete [email protected] Dennis Vogel [email protected] 2 Agenda Native security in IPv6 IPv6 challenges
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
Chapter 3 Configuring Basic IPv6 Connectivity
Chapter 3 Configuring Basic IPv6 Connectivity This chapter explains how to get a ProCurve Routing Switch that supports IPv6 up and running. To configure basic IPv6 connectivity, you must do the following:
IPv6 Security Best Practices. Eric Vyncke [email protected] Distinguished System Engineer
IPv6 Best Practices Eric Vyncke [email protected] Distinguished System Engineer security 2007 Cisco Systems, Inc. All rights reserved. Cisco CPub 1 Agenda Shared Issues by IPv4 and IPv6 Specific Issues
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
IPv6 Security Nalini Elkins, CEO Inside Products, Inc. [email protected]
1 IPv6 Security Nalini Elkins, CEO Inside Products, Inc. [email protected] Agenda Hackers are already aware of the security vulnerabilities in IPv6, and there are implications across all
Discovering IPv6 with Wireshark. presented by Rolf Leutert
Discovering IPv6 with Wireshark presented by Rolf Leutert Instructor: Rolf Leutert, Network Expert & Trainer Leutert NetServices Troubleshooting & Trainings Zürich-Airport, Switzerland Sniffer certified
IPv6 Hardening Guide for Windows Servers
IPv6 Hardening Guide for Windows Servers How to Securely Configure Windows Servers to Prevent IPv6-related Attacks Version: 1.0 Date: 22/12/2014 Classification: Public Author(s): Antonios Atlasis TABLE
IPv6 INFRASTRUCTURE SECURITY WORKSHOP SESSION 10 BUILDING IPv6 INFRASTRUCTURE NETWORK SECURITY
IPv6 INFRASTRUCTURE SECURITY WORKSHOP SESSION 10 BUILDING IPv6 INFRASTRUCTURE NETWORK SECURITY Alastair JOHNSON July 2013 INTRODUCTION This module will cover network infrastructure security relating to:
IPv6 Addressing and Subnetting
APNIC elearning: IPv6 Addressing and Subnetting Contact: [email protected] eip602_v1.0 Overview IPv6 Address Text Representation IPv6 Addressing Structure IPv6 Address Management Hierarchy Local Addresses
Eric Vyncke, Distinguished Engineer, [email protected]. 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1
Eric Vyncke, Distinguished Engineer, [email protected] 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 2 Sometimes,
IPv6 Security Analysis
CENTER FOR CONVERGENCE AND EMERGING NETWORK TECHNOLOGIES CCENT School of Information Studies Syracuse University IPv6 Security Analysis TECHNICAL REPORT: T.R. 2014-002 Authored by: Jose Gonzalo Bejar (revised
Vulnerabili3es and A7acks
IPv6 Security Vulnerabili3es and A7acks Inherent vulnerabili3es Less experience working with IPv6 New protocol stack implementa3ons Security devices such as Firewalls and IDSs have less support for IPv6
About the Technical Reviewers
About the Author p. xiii About the Technical Reviewers p. xv Acknowledgments p. xvii Introduction p. xix IPv6 p. 1 IPv6-Why? p. 1 IPv6 Benefits p. 2 More Address Space p. 2 Innovation p. 3 Stateless Autoconfiguration
IPv6 Security from point of view firewalls
IPv6 Security from point of view firewalls János Mohácsi 09/June/2004 János Mohácsi, Research Associate, Network Engineer NIIF/HUNGARNET Contents Requirements IPv6 firewall architectures Firewalls and
How To Protect Your Network From A Malicious Attack On A Vpn 6 Ipv6 Ipvv6 Router From A Rogue Router (Vpn) From A Pwn 6 Attack (Ipv6) From An Ipv 6 Attack From A
IPV6 ATTACKS AND COUNTERMEASURES CDW Advanced Technology Services James Small, Principal Network/Security Consultant 800.800.4239 CDW.com/peoplewhogetit PROBLEMATIC APPROACHES TO IPV6 If I ignore it, nothing
IPv6 Associated Protocols
IPv6 Associated Protocols 1 New Protocols (1) New features are specified in IPv6 Protocol -RFC 2460 DS Neighbor Discovery (NDP) -RFC 4861 DS Auto-configuration : Stateless Address Auto-configuration -RFC
IPv6 in Axis Video Products
TECHNICAL NOTE REFERENCE DOCUMENT IPv6 in Axis Video Products Created: 2006-01-31 Last updated: 2006-05-29 TABLE OF CONTENTS DOCUMENT HISTORY... 2 1 IPV6 IN GENERAL... 3 1.1 The IPv6 address... 3 1.1.1
INLICHTINGEN DIENSTEN INLICHTINGEN DIENSTEN
Indien u hergebruik wenst te maken van de inhoud van deze presentatie, vragen wij u in het kader van auteursrechtelijke bescherming de juiste bronvermelding toe te passen. 17 juni 2014 De Reehorst in Ede
IPv6 Network Security. [email protected]
IPv6 Network Security [email protected] IPv6 Raising awareness about IPv6 IPv6 Basics Windows notes Windows Firewall Demo Linux(RHEL) Firewall Demo [Mac OS 10.7 Lion Firewall Notes] [AAAA record via
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
IPv6 Security. Scott Hogg, CCIE No. 5133 Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA
IPv6 Security Scott Hogg, CCIE No. 5133 Eric Vyncke Cisco Press Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA Contents Introduction xix Chapter 1 Introduction to IPv6 Security 3 Reintroduction
About Me. Work at Jumping Bean. Developer & Trainer Contact Info: Twitter @mxc4 Twitter @jumpingbeansa [email protected]
IPv6 & Linux About Me Work at Jumping Bean Developer & Trainer Contact Info: Twitter @mxc4 Twitter @jumpingbeansa [email protected] Goals & Motivation Why? Why IPv6? Why this talk? Information on
NICS IPv6 Best Practices Guide
NICS IPv6 Best Practices Guide Recommendations for Deploying IPv6 Version: 1.3 Date: April 22, 2014 [email protected] Document Change Log Date Version Change Author Affected Section 1/15/2014 1.0 Scott
Personal Firewall Default Rules and Components
Personal Firewall Default Rules and Components The Barracuda Personal Firewall comes with a default access ruleset. The following tables aim to give you a compact overview of the default rules and their
IPv6 Autoconfiguration Best Practice Document
IPv6 Autoconfiguration Best Practice Document Produced by the CESNET-led working group on IPv6 (CBPD117) Authors: Tomáš Podermański, Matěj Grégr August 2011 Original version 2011 English translation TERENA
OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS
OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS Eric Vyncke (@evyncke) Cisco Session ID: ARCH W01 Session Classification: Advanced Agenda Status of WorldWide IPv6 Deployment IPv6 refresher:
Firewalls und IPv6 worauf Sie achten müssen!
Firewalls und IPv6 worauf Sie achten müssen! Pascal Raemy CTO Asecus AG [email protected] Asecus AG Asecus AG Security (Firewall, Web-Gateway, Mail-Gateway) Application Delivery (F5 Neworks with BIGIP)
OS IPv6 Behavior in Conflicting Environments
OS IPv6 Behavior in Conflicting Environments Enno Rey, [email protected] @Enno_Insinuator #2 Who I Am Founder and managing director of vendor independent network consulting & security assessment company ERNW.
How To Compare Ipv6 And Ipv4 To Ipv5 (V1.2.0)
IPv6 and IPv4 Threat Comparison and Best- Practice Evaluation (v1.0) Sean Convery ([email protected]) Darrin Miller ([email protected]) Table of Contents 1 Introduction...2 1.1 Caveats...3 2 Overview of IPv4
Recent Advances in IPv6 Security. Fernando Gont
Recent Advances in IPv6 Security Fernando Gont About... Security researcher and consultant at SI6 Networks Have worked on security assessment on communications protocols for: UK NISCC (National Infrastructure
Basic IPv6 WAN and LAN Configuration
Basic IPv6 WAN and LAN Configuration This quick start guide provides basic IPv6 WAN and LAN configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N. For complete IPv6 configuration
IPv6 Secure Neighbor Discovery
IPv6 Secure Neighbor Discovery Andreas Hunkeler January 2015 Compass Security Schweiz AG Werkstrasse 20 Postfach 2038 CH-8645 Jona Tel +41 55 214 41 60 Fax +41 55 214 41 61 [email protected] www.csnc.ch IPv6
IPv6 for Cisco IOS Software, File 2 of 3: Configuring
IPv6 for Cisco IOS Software, File 2 of 3: Configuring This document provides configuration tasks for the Cisco implementation of IP version 6 (IPv6) in the Cisco IOS software and includes the following
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
Linux as an IPv6 dual stack Firewall
Linux as an IPv6 dual stack Firewall Presented By: Stuart Sheldon [email protected] http://www.actusa.net http://www.stuartsheldon.org IPv6 2001:0DB8:0000:0000:021C:C0FF:FEE2:888A Address format: Eight 16
CloudEngine Series Switches. IPv6 Technical White Paper. Issue 01 Date 2014-02-19 HUAWEI TECHNOLOGIES CO., LTD.
Issue 01 Date 2014-02-19 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
Getting started with IPv6 on Linux
Getting started with IPv6 on Linux Jake Edge LWN.net [email protected] LinuxCon North America 19 August 2011 History and Motivation IPng project July 1994 IPv6 - RFC 2460 December 1998 IPv5 - Internet Stream
IPv6 Diagnostic and Troubleshooting
8 IPv6 Diagnostic and Troubleshooting Contents Introduction.................................................. 8-2 ICMP Rate-Limiting........................................... 8-2 Ping for IPv6 (Ping6)..........................................
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
- IPv6 Addressing - (References: http://cc.uoregon.edu/cnews/spring2001/whatsipv6.html; http://en.wikipedia.org/wiki/ipv6)
1 IPv6 Basics - IPv6 Addressing - The most widespread implementation of IP currently is IPv4, which utilizes a 32-bit address. Mathematically, a 32-bit address can provide roughly 4 billion unique IP addresses
Investigation of DHCP Packets using Wireshark
Investigation of DHCP Packets using Wireshark Mohsin khan Faculty of Telecommunication Engineering and Environment Birmingham City University England Saleh Alshomrani Faculty of Computing and IT King Abdulaziz
Step-by-Step Guide for Setting Up IPv6 in a Test Lab
Step-by-Step Guide for Setting Up IPv6 in a Test Lab Microsoft Corporation Published: July, 2006 Author: Microsoft Corporation Abstract This guide describes how to configure Internet Protocol version 6
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
Configuring DHCP Snooping
CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration examples.
A Sampling of Internetwork Security Issues Involving IPv6
A Sampling of Internetwork Security Issues Involving IPv6 John Kristoff [email protected] FIRST 2013 John Kristoff Team Cymru 1 Agenda diff -u ipv4 ipv6 head What is the netsec community working on? How do
HP 5120 SI Switch Series
HP 5120 SI Switch Series Layer 3 - IP Services Command Reference Part number: 5998-1810 Software version: Release 1505 Document version: 6W102-20121111 Legal and notice information Copyright 2012 Hewlett-Packard
Security Implications of the Internet Protocol version 6 (IPv6)
Security Implications of the Internet Protocol version 6 (IPv6) Fernando Gont UTN/FRH BSDCan 2010 Ottawa, ON, Canada, May 13-14, 2010 Agenda Ongoing work on IPv6 security at UK CPNI Brief comparision of
Practical Security Assessment of IPv6 Networks and Devices. Fernando Gont
Practical Security Assessment of IPv6 Networks and Devices Fernando Gont About I have done a fair share of IPv6 standardization work I have published and maintain the SI6 Networks IPv6 Toolkit I run the
IPv6 Network Reconnaissance:
IPv6 Network Reconnaissance: Theory & Practice Fernando Gont Overview IPv6 changes the Network Reconnaissance game Brute force address scanning attacks undesirable (if at all possible) Security guys will
Keywords: IPv6, transition, security, network, IPv4 security of IPv6 still has a long way to go.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Outline of Ipv6
19531 - Telematics. 9th Tutorial - IP Model, IPv6, Routing
19531 - Telematics 9th Tutorial - IP Model, IPv6, Routing Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 06. January, 2011 Institute of Computer Science Telematics
SSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
Neighbour Discovery in IPv6
Neighbour Discovery in IPv6 Andrew Hines Topic No: 17 Email: [email protected] Organiser: Christian Schindelhauer University of Paderborn Immatriculation No: 6225220 August 4, 2004 1 Abstract
Tomás P. de Miguel DIT-UPM. dit UPM
Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability
Windows 7 Resource Kit
Windows 7 Resource Kit Mitch Tulloch, Tony Northrup, and Jerry Honeycutt To learn more about this book, visit Microsoft Learning at http://www.microsoft.com/mspress/books/ 9780735627000 2009 Microsoft
Host Configuration (Linux)
: Location Date Host Configuration (Linux) Trainer Name Laboratory Exercise: Host Configuration (Linux) Objectives In this laboratory exercise you will complete the following tasks: Check for IPv6 support
IPv6 Addressing. Awareness Objective. IPv6 Address Format & Basic Rules. Understanding the IPv6 Address Components
IPv6 Addressing Awareness Objective IPv6 Address Format & Basic Rules Understanding the IPv6 Address Components Understanding & Identifying Various Types of IPv6 Addresses 1 IPv4 Address SYNTAX W. X.
Exploiting First Hop Protocols to Own the Network. Rocket City TakeDownCon 2015. Paul Coggin Senior Principal Cyber Security Analyst @PaulCoggin
Exploiting First Hop Protocols to Own the Network Rocket City TakeDownCon 2015 Paul Coggin Senior Principal Cyber Security Analyst @PaulCoggin www.dynetics.com V## Goes Here 1 OSI and TCP/IP Model OSI
IPv6 End Station Addressing: Choosing SLAAC or DHCP Jeff Harrington - NYSERNet
IPv6 End Station Addressing: Choosing SLAAC or DHCP Jeff Harrington - NYSERNet 1 Important Planning Decisions Planning for IPv6 on Campus Three major areas need to be addressed during planning. There are
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Networking 4 Voice and Video over IP (VVoIP)
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1
Efficient Addressing Outline Addressing Subnetting Supernetting CS 640 1 IPV4 Global Addresses Properties IPv4 uses 32 bit address space globally unique hierarchical: network + host 7 24 Dot Notation 10.3.2.4
IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.
IP Addressing and Subnetting 2002, Cisco Systems, Inc. All rights reserved. 1 Objectives Upon completion, you will be able to: Discuss the Types of Network Addressing Explain the Form of an IP Address
IPv6 Fundamentals, Design, and Deployment
IPv6 Fundamentals, Design, and Deployment Course IP6FD v3.0; 5 Days, Instructor-led Course Description The IPv6 Fundamentals, Design, and Deployment (IP6FD) v3.0 course is an instructor-led course that
How to securely operate an IPv6 network
How to securely operate an IPv6 network https://tools.ietf.org/html/draft-ietf-opsec-v6-06 LACNIC 23 Enrique Davila [email protected] Released: May 2015 Agenda Ø Management Plane Ø Control Plane Routing
Technology Brief IPv6 White Paper.
Technology Brief White Paper. Page 1 of 37 Table of Contents 1 Overview... 3 1.1 Background... 3 1.2 Advantages of... 5 2 Packet... 9 2.1 Basic Header... 9 2.1.1 Extension Headers... 11 2.1.2 ICMP Packet...
Learn About Differences in Addressing Between IPv4 and IPv6
> Learn About Differences in Addressing Between IPv4 and IPv6 IPv6 is the most recent generation of the Internet Protocol (IP) defined by the Internet Engineering Task Force (IETF). Initially defined in
Types of IPv4 addresses in Internet
Types of IPv4 addresses in Internet PA (Provider Aggregatable): Blocks of addresses that may be sub-assigned to other ISPs or to other companies that also may leased the addresses to their customers May
IPv6 Security ::/0. Poland MUM Warsaw March, 2012 Eng. Wardner Maia Brazil
IPv6 Security ::/0 Poland MUM Warsaw March, 2012 Eng. Wardner Maia Brazil Introduction Name: Wardner Maia Country: Brazil Electronic/Telecommunications Engineer Internet Service Provider since 1995 Training
Chapter 3 LAN Configuration
Chapter 3 LAN Configuration This chapter describes how to configure the advanced LAN features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. This chapter contains the following sections
Are You Ready to Teach IPv6?
Are You Ready to Teach IPv6? William Saichek Orange Coast College Karl Dietrich Lansing Community College Giving Credit Where Credit is Due The slides, data and projects in this presentation were used,
Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University
Computer Networks Introduc)on to Naming, Addressing, and Rou)ng Week 09 College of Information Science and Engineering Ritsumeikan University MAC Addresses l MAC address is intended to be a unique identifier
Implementation IPV6 in Mikrotik RouterOS. by Teddy Yuliswar
Implementation IPV6 in Mikrotik RouterOS by Teddy Yuliswar YOGYAKARTA, OCTOBER 09 10, 2015 TEDDY YULISWAR Introduction q MTCNA, MTCRE, MTCTCE, MTCINE q Place of Hanging out : - Politeknik Negeri Padang
IPV6 DEPLOYMENT GUIDELINES FOR. ARRIS Group, Inc.
IPV6 DEPLOYMENT GUIDELINES FOR CABLE OPERATORS Patricio i S. Latini i ARRIS Group, Inc. Current IPv4 Situationti IANA has already assigned the last IPv4 Blocks to the RIRs. RIRs address exhaustion may
