Security Implications of the Internet Protocol version 6 (IPv6)
|
|
|
- Janel Bradley
- 10 years ago
- Views:
Transcription
1 Security Implications of the Internet Protocol version 6 (IPv6) Fernando Gont UTN/FRH BSDCan 2010 Ottawa, ON, Canada, May 13-14, 2010
2 Agenda Ongoing work on IPv6 security at UK CPNI Brief comparision of IPv4 and IPv6 IPv6 addressing Fragmentation and Reassembly Internet Control Message Protocol version 6 (ICMPv6) Address Resolution State-less autoconfiguration Personal Rant on IPv6 security Questions and (hopefully) answers
3 Ongoing work on IPv6 security at UK CPNI (or what we re doing on v6 security )
4 Ongoing work on IPv6 security at CPNI The UK CPNI (Centre for the Protection of National Infrastructure) is currently working on a security assessment of the IPv6 protocol suite Similar project to the one we carried out years ago on TCP and IPv4: Security assessment of the protocol specifications Security assessment of common implementation strategies Production of assessment/proof-of-concept tools Publication of best practices documents Currently cooperating with vendors and other parties If you re working on a IPv6 implementation, I d like to hear from you
5 Brief Comparision of IPv4 & IPv6 (or what the small differences are )
6 Brief comparision of IPv4 and IPv6 (I) IPv4 and IPv6 are very similar in terms of functionality Addressing Auto-configuration Address resolution IPsec support Fragmentation IPv4 32 bits DHCP & RS/RA ARP Optional Both in hosts and routers IPv6 128 bits ICMPv6 RS/RA & DHCPv6 (opt) ICMPv6 Mandatory Only in hosts
7 Brief comparision of IPv4 and IPv6 (II) Header formats:
8 IPv6 addressing (or the actual motivator for IPv6 )
9 TypesofIPv6addresses Unicast addresses Identify a single interface Packets are delivered to a single interface Multicast addresses: Identify a set of interfaces Packets are delivered to that set of interfaces Anycast addresses Identify a set of interfaces Packets are delivered to one interface of the aforementioned set Syntactically indistiguishable from Unicast Addresses IPv6 has a Scoped Address Architecture, e.g., it supports: Link-local addresses Global addresses
10 Global unicast addresses Address format: n bits m bits 128-n-m bits Global Routing Prefix Subnet ID Interface ID The Interface ID is typically 64 bits When stateless autoconfiguration is used for network interfaces that have Ethernet Addresses, the Interface ID is set to a value derived from that address (modified EUI-64 format)
11 Global addresses & Reconnaissance Myth: It is unfeasible to brute-force scan an IPv6 network for alive nodes, as the IPv6 address space is so large. Such a scan would take ages! [Malone, 2008] (*) measured IPv6 address assignement patterns For hosts, 50% autoconf, 20% IPv4-based, 10% Teredo, 8% low-byte For infrastructure, 70% low-byte, 5% IPv4-based Anyway, think about compromised hosts (e.g., botnets): once a host is compromised, brute-force scanning becomes trivial (sniffing, etc.) Size matters only if you use it properly! ;-) (*) Malone, D Observations of IPv6 Addresses. Passive and Active Measurement Conference (PAM 2008, LNCS 4979), April 2008.
12 Fragmentation and Reassembly (or what we re doing on v6 security )
13 Fragmentation & Reassembly The fixed IPv6 header does not include support for fragmentation/reassembly If needed, such support is added by an Extension Header (Fragmentation Header) 8 bits 8 bits 13 bits 2b 1b Next Header Reserved Fragment Offset Res M Identification Fragment Offset: offset of the data following this header, relative to the start of the fragmentable part of the original packet M: More Fragments bit, as in the IPv4 header Identification: together with the Source Address and Destination Address identifies fragments that correspond to the same packet
14 Security Implications of IPv6 fragmentation Someare thesameas foripv4fragmentation: Stateful operation for a stateless protocol: risk of exhausting kernel memory! Others are different: The Identification field is much larger: chances of IP ID collisions are reduced Not all packets carry an Identification number: hence it does not leak information so easily (e.g., think about dumb scan, etc.) Overlapping fragments have been recently forbidden (RFC 5722) although it s unclear the benefits of this.
15 sysctl s for frag/reassembly net.inet6.ip6.maxfragpackets: maximum number of fragmented packets the node will accept (defaults to 200 in OpenBSD and 2160 in FreeBSD) 0: the node does not accept fragmented traffic -1: there s no limit on the number of fragmented packets net.inet6.ip6.maxfrags: maximum number of fragments the node will accept (defaults to 200 in OpenBSD and 2160 in FreeBSD) 0: thenodewillnotacceptanyfragments -1: there is no limit on the number of fragments
16 ICMPv6 (or Internet Control Protocol version 6 )
17 Internet Control Message Protocol version 6 ICMP is a core protocol of the IPv6 suite, and is used for: Fault isolation (ICMPv6 errors) Troubleshooting (ICMPv6 echo request/response) Address Resolution Stateless address autoconfiguration Contrary to ICMPv4, ICMPv6 is mandatory for IPv6 operation
18 Fault Isolation (ICMPv6 error messages) A number of ICMPv6 error messages are specified in RFC 4443: Destination Unreachable No route to destination Beyond scope of source address Port Unreachable, etc. Packet Too Big Time Exceeded Hop Limit Exceeded in Transit Fragment reassembly time exceeded Parameter Problem Erroneous header field encountered Unrecognized Nect Header type encountered Unrecognized IPv6 option encountered Clearly, most of them parallel their ICMP counter-parts
19 ICMPv6 hard errors Some implementation could potentially extrapolate the concept of ICMP(v4) hard errors to ICMPv6 errors (for connections in the synchronized states) BSD-derived implementations don t Good! ;-)
20 ICMPv6 Packet Too Big ICMPv6 PTB messages are used for Path-MTU discovery The security implications of these messages are well-known (remember draft-ietf-tcpm-icmp-attacks back in 2004?) The mitigations are straightforward: Check the embedded TCP SEQ and, even better, do not honor the ICMP PTB if there s progress on the connection (see draft-ietf-tcpm-icmp-attacks) Anyway, the MTU should not be reduced to a value less than If a smaller MTU is reported, the receiving node is just required to include a frag header. sysctl s (OpenBSD) net.inet6.icmp6.mtudisc_hiwat (defaults to 1280): Maximum number of routes created in response to ICMP PTBs net.inet6.icmp6.mtudisc_lowat (defaults to 256): Maximum number of routes created in response to (unverified) ICMP PTBs
21 ICMPv6 redirects ICMP redirects are very similar to the ICMP counterpart, except for: The Hop Limit is required to be 255 ICMPv6 redirects are an optimization hence they can be disabled with no interoperability implications Whether ICMPv6 are accepted is controlled in *BSD s with the sysctl net.inet6.icmp6.rediraccept. In OpenBSD, it defaults to 1 (on).
22 Node Information Query/Response Specified in RFC 4620 as Experimental, but included (and enabled by default) in KAME Allows nodes to request certain network information about a node in a server-less environment Queries are sent with a target name or address (IPv4 or IPv6) Queried information may include: node name, IPv4 addresses, or IPv6 addresses Node Information Queries can be sent with the ping6 command ( -a and -b options)
23 Node Information Query/Response (II) Response to Node Information Queries is controlled by the sysctl net.inet6.icmp6.nodeinfo: 0: Do not respond to Node Information queries 1: Respond to FQDN queries (e.g., ping6 w ) 2: Respond to node addresses queries (e.g., ping6 a ) 3: Respond to all queries net.inet6.icmp6.nodeinfo defaults to 1 in OpenBSD, and to 3 in FreeBSD. My take: unless you really need your nodes to support Node Information messages, disable it (i.e., sysctl w net.inet6.icmp6-nodeinfo=0).
24 Address Resolution (or mapping from IPv6 to link-layer )
25 Address Resolution Employs the Neighbor Discovery Protocol (ICMPv6) Every node maintains a Neighbor Cache, which contains the mappings from IPv6 address to link-layer address, and the state (e.g., REACHABLE, STALE, etc.) of each entry. A node creates an entry in the Neighbor Cache for the target address (in the INCOMPLETE state), and sends a Neighbor Solicitation to the corresponding Solicited-node multicast address The target node responds with a Neighbor Advertisement that includes its link layer address The node stores the link layer address information in the corresponding Neighbor Cache Entry, and marks the entry as Reachable. Reachability information for Neighbor Cache entries is updated based on feedback received from the upper layer, or as a result of probe packets
26 Some Address Resolution games Neighbor Cache Poisoning attacks the v6 version of V4 s ARP cache poisoning The attacker simply listens to Neighbor Solicitations for Target addresses he is interested in, and responds with Neighbor Advertisements that contain his own link-layer address Advertising special link-layer addresses, e.g., The broadcast Ethernet address (ff:ff:ff:ff:ff:ff) Multicast Ethernet addresses (e.g., 33:33:00:00:01) The link-layer address of the node sending the Neighbor Solicitation this introduces a forwarding loop if the victim is a router! All BSD variants tested don t check for these special addresses! Not much support in layer-2 security boxes to mitigate these attacks Open source tools do exist. E.g., NDPMon, available at:
27 sysctl s for Neighbor Discovery (OpenBSD) net.inet6.ip6.neighborgcthresh (defaults to 2048): Maximum number of entries in the Neighbor Cache net.inet6.icmp6.nd6_prune (defaults to 1): Interval between Neighbor Cache babysitting (in seconds). net.inet6.icmp6.nd6_delay (defaults to 5): specifies the DELAY_FIRST_PROBE_TIME constant from RFC net.inet6.icmp6.nd6_umaxtries (defaults to 3): specifies the MAX_UNICAST_SOLICIT constant from RFC 4861 net.inet6.icmp6.nd6_mmaxtries (defaults to 3): specifies the MAX_MULTICAST_SOLICIT constant from RFC net.inet6.icmp6.nd6_useloopback (defaults to 1): If non-zero, uses the loopback interface for local traffic. net.inet6.icmp6.nd6_maxnudhint (defaults to 0): Maximum number of upper-layer reachability hints before normal ND is performed.
28 Stateless address autoconfiguration (or what we re doing on v6 security )
29 Auto-configuration Employs the Neighbor Discovery Protocol (ICMPv6 messages) DHCPv6 is optional. Basic autoconfiguration The node sends a multicast Router Solicitation message to the all-routers Routers respond with prefixes for autoconfiguration The node configures its own IPv6 address(es) with the advertised prefixes, plus a locally-generated Interface ID Checks whether the selected address(es) are unique (Duplicate Address Detection) If unique, the address is configured.
30 Address autoconfiguration flowchart
31 Other autoconf information Source Link-Layer Address option: advertises the link-layer address of the sender Prefix Information option: advertises on-link prefixes, and prefixes to be used for stateless address autoconfiguration. Route Information Option: Advertises more specific routes. Recursive DNS Server option: Advertises a caching DNS server MTU option: Advertises the MTU to be used for this link
32 Some address autoconf games Rogue router: an attacker could send solicited/unsolicited Router Advertisements: Advertise itself as a default router Advertise bogus prefixes for on-link determination/autoconfiguration Advertise more specific routes through his malicious node Impersonate another router and cause victim nodes to remove it from their routing table Exploiting Duplicate Address Detection Simply respond to all Neighbor Solicitations that are part of the DAD, and cause address autoconfiguration to fail Some (not all) of this vulnerabilities can be exploited with THC s IPv6 attack suite
33 sysctl s for autoconf (OpenBSD) net.inet6.ip6.accept_rtadv (defaults to 1): Controls whether Router Advertisements are accepted. net.inet6.ip6.dad_count (defaults to 1): Number of DAD probes sent when an interface is first brought up net.inet6.ip6.maxifprefixes (defaults to 16): Maximum number of prefixes per interface. net.inet6.ip6.maxifdefrouters (defaults to 16): maximum number fo default routers per interface.
34 Autoconf addresses & Privacy Addresses selected as part of stateless autoconfiguration contain a modified version of the MAC address of the interface The MAC address is globally-unique, and non-changing (OUI assigned by the IEEE to the vendor, plus a 3-byte number selected by the vendor) There were concerns that autoconf addresses hurt privacy, as they could be used to correlate network activity Privacy addresses (RFC 4941) were introduced for that purpose They basically set the Interface ID to a random number, and are short They are short-lived They tend to be painful for the purpose of logging
35 sysctl s for Privacy Addresses Privacy extensions for autoconf is implemented in FreeBSD (but not in, e.g., OpenBSD) These sysctl s control their operation: net.inet6.ip6.use_tempaddr (defaults to 0) Controls whether Privacy addresses are configured net.inet6.ip6.temppltime (defaults to 86400) Specifies the preferred lifetime for privacy addresses net.inet6.ip6.tempvltime (defaults to ) Specifies the valid lifetime for privacy addresses net.inet6.ip6.prefer_tempaddr (defaults to 0) Controls whether privacy addresses are preferred (i.e., whether outgoing conections should use privacy addresses)
36 Personal rant on IPv6 security (or what s missing in the IPv6 arena? )
37 Key areas in which further work is needed IPv6 Resiliency Implementations have not really been the target of attackers, yet Only a handful of publicly available attack tools Lots of vulnerabilities and bugs still to be discovered. IPv6 support in security devices IPv6 transport is not broadly supported in security devices (firewalls, IDS/IPS, etc.) This is key to be able enforce security policies comparable with the IPv4 counterparts Education/Training Pushing people to Enable IPv6 point-and-click style is simply insane. Training is needed for engineers, technicians, security personnel, etc., before the IPv6 network is running.
38 Questions?
39 Acknowledgements UK CPNI, for their continued support BSDCan 2010 organizers, for their support to present at this conference Fernando Gont
The Truth about IPv6 Security
The Truth about IPv6 Security Fernando Gont UTN/FRH FutureNet: MPLS, Ethernet and Beyond Boston, MA, USA, May 10-13, 2010 Agenda Brief comparision of IPv4 and IPv6 A few myths about IPv6 security Transition
Security Assessment of Neighbor Discovery for IPv6
Security Assessment of Neighbor Discovery for IPv6 Fernando Gont project carried out on behalf of UK Centre for the Protection of National Infrastructure LACNIC XV 15 al 20 de Mayo de 2011. Cancún, México
IPv6 Hardening Guide for OS-X
IPv6 Hardening Guide for OS-X How to Configure Mac OS-X to Prevent IPv6-related Attacks Version: 1.0 Date: 29/01/2015 Classification: Public Author(s): Antonios Atlasis TABLE OF CONTENT 1 HANDLING... 4
IPv6 Associated Protocols
IPv6 Associated Protocols 1 New Protocols (1) New features are specified in IPv6 Protocol -RFC 2460 DS Neighbor Discovery (NDP) -RFC 4861 DS Auto-configuration : Stateless Address Auto-configuration -RFC
IPv6 Fundamentals: A Straightforward Approach
IPv6 Fundamentals: A Straightforward Approach to Understanding IPv6 Rick Graziani Cisco Press 800 East 96th Street Indianapolis, IN 46240 IPv6 Fundamentals Contents Introduction xvi Part I: Background
IPv6 Functionality. Jeff Doyle IPv6 Solutions Manager [email protected]
IPv6 Functionality Jeff Doyle IPv6 Solutions Manager [email protected] Copyright 2003 Juniper Networks, Inc. Agenda ICMPv6 Neighbor discovery Autoconfiguration Agenda ICMPv6 Neighbor discovery Autoconfiguration
Recent Advances in IPv6 Security. Fernando Gont
Recent Advances in IPv6 Security Fernando Gont About... Security researcher and consultant at SI6 Networks Have worked on security assessment on communications protocols for: UK NISCC (National Infrastructure
IPv6 Network Reconnaissance:
IPv6 Network Reconnaissance: Theory & Practice Fernando Gont Overview IPv6 changes the Network Reconnaissance game Brute force address scanning attacks undesirable (if at all possible) Security guys will
Hacking IPv6 Networks
Hacking IPv6 Networks Fernando Gont (UTN/FRH, Argentina) Hack In Paris 2011 Paris, France. June 14-17, 2011 Agenda (I) Objectives of this training Motivation for IPv6 Brief comparision between IPv6 and
IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. [email protected]
1 IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. [email protected] Agenda What has not changed between IPv4 and IPv6 traces What has changed between IPv4 and
IPv6 Network Reconnaissance:
IPv6 Network Reconnaissance: Theory & Practice Fernando Gont About... I have worked in security assessment of communication protocols for: UK NISCC (National Infrastructure Security Co-ordination Centre)
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
IPv6 Hardening Guide for Windows Servers
IPv6 Hardening Guide for Windows Servers How to Securely Configure Windows Servers to Prevent IPv6-related Attacks Version: 1.0 Date: 22/12/2014 Classification: Public Author(s): Antonios Atlasis TABLE
Tomás P. de Miguel DIT-UPM. dit UPM
Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability
Practical Security Assessment of IPv6 Networks and Devices. Fernando Gont
Practical Security Assessment of IPv6 Networks and Devices Fernando Gont About I have done a fair share of IPv6 standardization work I have published and maintain the SI6 Networks IPv6 Toolkit I run the
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
Chapter 3 Configuring Basic IPv6 Connectivity
Chapter 3 Configuring Basic IPv6 Connectivity This chapter explains how to get a ProCurve Routing Switch that supports IPv6 up and running. To configure basic IPv6 connectivity, you must do the following:
About the Technical Reviewers
About the Author p. xiii About the Technical Reviewers p. xv Acknowledgments p. xvii Introduction p. xix IPv6 p. 1 IPv6-Why? p. 1 IPv6 Benefits p. 2 More Address Space p. 2 Innovation p. 3 Stateless Autoconfiguration
Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.
Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.2 COMPARISONS OF IP HEADER FORMATS 2.3 EXTENSION HEADERS 2.3.1 Options
Types of IPv4 addresses in Internet
Types of IPv4 addresses in Internet PA (Provider Aggregatable): Blocks of addresses that may be sub-assigned to other ISPs or to other companies that also may leased the addresses to their customers May
CloudEngine Series Switches. IPv6 Technical White Paper. Issue 01 Date 2014-02-19 HUAWEI TECHNOLOGIES CO., LTD.
Issue 01 Date 2014-02-19 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
IP(v6) security. Matěj Grégr. Brno University of Technology, Faculty of Information Technology. Slides adapted from Ing.
IP(v6) security Matěj Grégr Brno University of Technology, Faculty of Information Technology Slides adapted from Ing. Tomáš Podermański What is IP security? Encryption? Authentication? Authorization? Surveillance?
This slideware is 2011 by SI6 Networks. Permission to use this slideware is granted only for personal use
Copyright notice This slideware is 2011 by SI6 Networks Permission to use this slideware is granted only for personal use Permission to distribute this slideware is granted only without any modifications
Windows 7 Resource Kit
Windows 7 Resource Kit Mitch Tulloch, Tony Northrup, and Jerry Honeycutt To learn more about this book, visit Microsoft Learning at http://www.microsoft.com/mspress/books/ 9780735627000 2009 Microsoft
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
gianluca.verin verin@libero. @libero.itit Vicenza.linux.it\LinuxCafe 1
gianluca.verin verin@libero. @libero.itit Vicenza.linux.it\LinuxCafe 1 Agenda IPv6 Basics Connecting to 6Bone Why do we need IPv6? IPv6 Introduction-Transition IPv6 and open source community Future applications
IPv6 Security Best Practices. Eric Vyncke [email protected] Distinguished System Engineer
IPv6 Best Practices Eric Vyncke [email protected] Distinguished System Engineer security 2007 Cisco Systems, Inc. All rights reserved. Cisco CPub 1 Agenda Shared Issues by IPv4 and IPv6 Specific Issues
Vulnerabili3es and A7acks
IPv6 Security Vulnerabili3es and A7acks Inherent vulnerabili3es Less experience working with IPv6 New protocol stack implementa3ons Security devices such as Firewalls and IDSs have less support for IPv6
Personal Firewall Default Rules and Components
Personal Firewall Default Rules and Components The Barracuda Personal Firewall comes with a default access ruleset. The following tables aim to give you a compact overview of the default rules and their
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
IPv6 Security from point of view firewalls
IPv6 Security from point of view firewalls János Mohácsi 09/June/2004 János Mohácsi, Research Associate, Network Engineer NIIF/HUNGARNET Contents Requirements IPv6 firewall architectures Firewalls and
IPv6 Security Analysis
CENTER FOR CONVERGENCE AND EMERGING NETWORK TECHNOLOGIES CCENT School of Information Studies Syracuse University IPv6 Security Analysis TECHNICAL REPORT: T.R. 2014-002 Authored by: Jose Gonzalo Bejar (revised
Implementing DHCPv6 on an IPv6 network
Implementing DHCPv6 on an IPv6 network Benjamin Long [email protected] 8-11-2009 Implementing DHCPv6 on an IPv6 network 2 Table of Contents DHCPv6 Overview...3 Terms used by DHCPv6...3 DHCPv6 Message
IPv6 Infrastructure Security
IPv6 Infrastructure Security 2013 North American IPv6 Summit Jeffrey L Carrell Network Conversions Network Security Consultant IPv6 SME/Trainer 1 Agenda IPv6 address fundamentals Operating Systems support
IPv6 First Hop Security Protecting Your IPv6 Access Network
IPv6 First Hop Security Protecting Your IPv6 Access Network What You Will Learn This paper provides a brief introduction to common security threats on IPv6 campus access networks and will explain the value
19531 - Telematics. 9th Tutorial - IP Model, IPv6, Routing
19531 - Telematics 9th Tutorial - IP Model, IPv6, Routing Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 06. January, 2011 Institute of Computer Science Telematics
IPv6 Security. Scott Hogg, CCIE No. 5133 Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA
IPv6 Security Scott Hogg, CCIE No. 5133 Eric Vyncke Cisco Press Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA Contents Introduction xix Chapter 1 Introduction to IPv6 Security 3 Reintroduction
Technology Brief IPv6 White Paper.
Technology Brief White Paper. Page 1 of 37 Table of Contents 1 Overview... 3 1.1 Background... 3 1.2 Advantages of... 5 2 Packet... 9 2.1 Basic Header... 9 2.1.1 Extension Headers... 11 2.1.2 ICMP Packet...
Internet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
Firewalls und IPv6 worauf Sie achten müssen!
Firewalls und IPv6 worauf Sie achten müssen! Pascal Raemy CTO Asecus AG [email protected] Asecus AG Asecus AG Security (Firewall, Web-Gateway, Mail-Gateway) Application Delivery (F5 Neworks with BIGIP)
Security Assessments of IPv6 Networks and Firewalls
Security Assessments of IPv6 Networks and Firewalls Fernando Gont Marc Heuse IPv6 Kongress 2013 Frankfurt, Germany. June 6-7, 2013 About Fernando Gont Security researcher and consultant at SI6 Networks
OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS
OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS Eric Vyncke (@evyncke) Cisco Session ID: ARCH W01 Session Classification: Advanced Agenda Status of WorldWide IPv6 Deployment IPv6 refresher:
Neighbour Discovery in IPv6
Neighbour Discovery in IPv6 Andrew Hines Topic No: 17 Email: [email protected] Organiser: Christian Schindelhauer University of Paderborn Immatriculation No: 6225220 August 4, 2004 1 Abstract
How To Compare Ipv6 And Ipv4 To Ipv5 (V1.2.0)
IPv6 and IPv4 Threat Comparison and Best- Practice Evaluation (v1.0) Sean Convery ([email protected]) Darrin Miller ([email protected]) Table of Contents 1 Introduction...2 1.1 Caveats...3 2 Overview of IPv4
Getting started with IPv6 on Linux
Getting started with IPv6 on Linux Jake Edge LWN.net [email protected] LinuxCon North America 19 August 2011 History and Motivation IPng project July 1994 IPv6 - RFC 2460 December 1998 IPv5 - Internet Stream
ITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
Joe Davies. Principal Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group June 1, 2011
Joe Davies Principal Writer Windows Server Information Experience Presented at: Seattle Windows Networking User Group June 1, 2011 2011 Microsoft Corporation IPv6 addressing and DNS review IPv6 subnetting
IPv6 for Cisco IOS Software, File 2 of 3: Configuring
IPv6 for Cisco IOS Software, File 2 of 3: Configuring This document provides configuration tasks for the Cisco implementation of IP version 6 (IPv6) in the Cisco IOS software and includes the following
TESTING IPV6 ROUTERS WITH THE NEIGHBOR DISCOVERY PROTOCOL
TESTING IPV6 ROUTERS WITH THE NEIGHBOR DISCOVERY PROTOCOL Jenny Koo B.A.Sc Electrical and Computer Engineering University of British Columbia, 1999 PROJECT SUBMllTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS
ICSA Labs Network Protection Devices Test Specification Version 1.3
Network Protection Devices Test Specification Version 1.3 August 19, 2011 www.icsalabs.com Change Log Version 1.3 August 19, 2011 added general configuration note to default configuration in Firewall section
IPv6 Infrastructure Security Jeffrey L Carrell Network Conversions Network Security Consultant, IPv6 SME/Trainer
IPv6 Infrastructure Security Jeffrey L Carrell Network Conversions Network Security Consultant, IPv6 SME/Trainer 1 IPv6 Infrastructure Security v1.1 - Copyright 2013 Jeffrey L. Carrell Agenda IPv6 address
IPv6 Diagnostic and Troubleshooting
8 IPv6 Diagnostic and Troubleshooting Contents Introduction.................................................. 8-2 ICMP Rate-Limiting........................................... 8-2 Ping for IPv6 (Ping6)..........................................
IPv6 associated protocols. Piers O Hanlon
IPv6 associated protocols Piers O Hanlon Contributions Main authors Jean-Marc Barozet, Cisco, France Faycal Hadj, Cisco, France Patrick Grossetete, Cisco, France Gunter Van de Velde, Cisco, Belgium Bernard
Router Security Configuration Guide Supplement - Security for IPv6 Routers
Report Number: I33-002R-06 Router Security Configuration Guide Supplement - Security for IPv6 Routers A supplement to the NSA Router Security Configuration Guide offering security principles and guidance
IPv6 Security ::/0. Poland MUM Warsaw March, 2012 Eng. Wardner Maia Brazil
IPv6 Security ::/0 Poland MUM Warsaw March, 2012 Eng. Wardner Maia Brazil Introduction Name: Wardner Maia Country: Brazil Electronic/Telecommunications Engineer Internet Service Provider since 1995 Training
IPv6 Network Security. [email protected]
IPv6 Network Security [email protected] IPv6 Raising awareness about IPv6 IPv6 Basics Windows notes Windows Firewall Demo Linux(RHEL) Firewall Demo [Mac OS 10.7 Lion Firewall Notes] [AAAA record via
Recent advances in IPv6 insecurities Marc van Hauser Heuse Deepsec 2010, Vienna. 2010 Marc Heuse <[email protected]>
Recent advances in IPv6 insecurities Marc van Hauser Heuse Deepsec 2010, Vienna 2010 Marc Heuse Hello, my name is The future is here already Let s start with the basics IPv4 4 octets 4.294.967.296
IPv6 Advantages. www.compaq.com. Yanick Pouffary. [email protected]
IPv6 Advantages Yanick Pouffary [email protected] IPv6 FORUM A world-wide consortium of leading Internet vendors and Research and Education Networks The IPv6 FORUM mission To promote IPv6 in order
IPv6 Addressing. Awareness Objective. IPv6 Address Format & Basic Rules. Understanding the IPv6 Address Components
IPv6 Addressing Awareness Objective IPv6 Address Format & Basic Rules Understanding the IPv6 Address Components Understanding & Identifying Various Types of IPv6 Addresses 1 IPv4 Address SYNTAX W. X.
- IPv6 Addressing - (References: http://cc.uoregon.edu/cnews/spring2001/whatsipv6.html; http://en.wikipedia.org/wiki/ipv6)
1 IPv6 Basics - IPv6 Addressing - The most widespread implementation of IP currently is IPv4, which utilizes a 32-bit address. Mathematically, a 32-bit address can provide roughly 4 billion unique IP addresses
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
Network Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
Industry Automation White Paper Januar 2013 IPv6 in automation technology
Table of contents: 1 Why another White Paper IPv6?... 3 2 IPv6 for automation technology... 3 3 Basics of IPv6... 3 3.1 Turning point/initial situation... 3 3.2 Standardization... 4 3.2.1 IPv6 address
Host Configuration (Linux)
: Location Date Host Configuration (Linux) Trainer Name Laboratory Exercise: Host Configuration (Linux) Objectives In this laboratory exercise you will complete the following tasks: Check for IPv6 support
Lecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
IPv6 Protocols & Standards. ISP/IXP Workshops
IPv6 Protocols & Standards ISP/IXP Workshops 1 So what has really changed? Expanded address space Address length quadrupled to 16 bytes Header Format Simplification Fixed length, optional headers are daisy-chained
Troubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
SEcure Neighbour Discovery: A Report
SEcure Neighbour Discovery: A Report Arun Raghavan (Y6111006) CS625: Advanced Computer Networks Abstract The IPv6 [5] Neighbour Discovery [12] protocol is used by nodes in IPv6 for such purposes as discover
- IPv4 Addressing and Subnetting -
1 Hardware Addressing - IPv4 Addressing and Subnetting - A hardware address is used to uniquely identify a host within a local network. Hardware addressing is a function of the Data-Link layer of the OSI
unisys ClearPath Enterprise Servers TCP/IP Implementation and Operations Guide ClearPath MCP 16.0 April 2014 3787 7693 222
unisys ClearPath Enterprise Servers TCP/IP Implementation and Operations Guide ClearPath MCP 16.0 April 2014 3787 7693 222 NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THIS DOCUMENT. Any product or related
IPv6 Security Nalini Elkins, CEO Inside Products, Inc. [email protected]
1 IPv6 Security Nalini Elkins, CEO Inside Products, Inc. [email protected] Agenda Hackers are already aware of the security vulnerabilities in IPv6, and there are implications across all
ERserver. iseries. Networking TCP/IP setup
ERserver iseries Networking TCP/IP setup ERserver iseries Networking TCP/IP setup Copyright International Business Machines Corporation 1998, 2002. All rights reserved. US Government Users Restricted
Internetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
IPv6 Addressing and Subnetting
APNIC elearning: IPv6 Addressing and Subnetting Contact: [email protected] eip602_v1.0 Overview IPv6 Address Text Representation IPv6 Addressing Structure IPv6 Address Management Hierarchy Local Addresses
ACHILLES CERTIFICATION. SIS Module SLS 1508
ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security
IPv6 in Axis Video Products
TECHNICAL NOTE REFERENCE DOCUMENT IPv6 in Axis Video Products Created: 2006-01-31 Last updated: 2006-05-29 TABLE OF CONTENTS DOCUMENT HISTORY... 2 1 IPV6 IN GENERAL... 3 1.1 The IPv6 address... 3 1.1.1
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
IP Address Classes (Some are Obsolete) 15-441 Computer Networking. Important Concepts. Subnetting 15-441 15-641. Lecture 8 IP Addressing & Packets
Address Classes (Some are Obsolete) 15-441 15-441 Computer Networking 15-641 Class A 0 Network ID Network ID 8 16 Host ID Host ID 24 32 Lecture 8 Addressing & Packets Peter Steenkiste Fall 2013 www.cs.cmu.edu/~prs/15-441-f13
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
Detecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
Network layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
About Me. Work at Jumping Bean. Developer & Trainer Contact Info: Twitter @mxc4 Twitter @jumpingbeansa [email protected]
IPv6 & Linux About Me Work at Jumping Bean Developer & Trainer Contact Info: Twitter @mxc4 Twitter @jumpingbeansa [email protected] Goals & Motivation Why? Why IPv6? Why this talk? Information on
IP Routing Features. Contents
7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................
