This slideware is 2011 by SI6 Networks. Permission to use this slideware is granted only for personal use
|
|
|
- Brook Mathews
- 10 years ago
- Views:
Transcription
1 Copyright notice This slideware is 2011 by SI6 Networks Permission to use this slideware is granted only for personal use Permission to distribute this slideware is granted only without any modifications to the slides set For any other uses, please contact:
2 Contents This slideware contains part of the materials used for the training Hacking IPv6 Networks taught during the DEEPSEC 2011 Conference. More inforamation available at:
3 Hacking IPv6 Networks Fernando Gont DEEPSEC 2011 Vienna, Austria. November 15-16, 2011
4 About I have worked in security assessment of communication protocols for: UK NISCC (National Infrastructure Security Co-ordination Centre) UK CPNI (Centre for the Protection of National Infrastructure) Currently working for SI6 Networks ( Member of R+D group CEDI at UTN/FRH Involved in the Internet Engineering Task Force (IETF) More information at:
5 Agenda (I) Objectives of this training Motivation for IPv6, and current state of affairs Brief comparision between IPv6 and IPv4 IPv6 Addressing Architecture IPv6 Header Fields IPv6 Extension Headers IPv6 Options Internet Control Message Protocol version 6 (ICMPv6) Neighbor Discovery for IPv6 IPv6 Address Resolution Stateless Address Auto-configuration (SLAAC)
6 Agenda (II) IPsec Multicast Listener Discovery Dynamic Host Configuration Protocol version 6 (DHCPv6) DNS support for IPv6 IPv6 firewalls Transition/co-existence technologies (6to4, Teredo, ISATAP, etc.) Network reconnaissance in IPv6 Security Implications of IPv6 on IPv4-only networks IPv6 deployment considerations Key areas in which further work is needed Some conclusions
7 Brief introduction to IPv6
8 So... what is this IPv6 thing about? IPv6 was developed to address the exhaustion of IPv4 addresses IPv6 has not yet seen broad/global deployment (current estimations are that IPv6 traffic is less than 1% of total traffic) However, general-purpose OSes have shipped with IPv6 support for a long time hence part of your network is already running IPv6! Additionaly, ISPs and other organizations have started to take IPv6 more seriosly, partly as a result of: Exhaustion of the IANA IPv4 free pool Awareness activities such as the World IPv6 Day Imminent exhaustion of the free pool of IPv4 addresses at the different RIRs It looks like IPv6 is finally starting to take off...
9 Motivation for this training A lot of myths have been created around IPv6 security: Security as a key component of the protocol Change from network-centric to host-centric paradigm Increased use of IPsec etc. They hace lead to a general misunderstanding of the security properties of IPv6, thus negatively affecting the emerging (or existing) IPv6 networks. This training separates fudge from fact, and offers a more realistic view of IPv6 security At a conceptual level, it is meant to influence the way in which you think about IPv6 security (and IPv6 in general) We will also reproduce some attacks and play with configuration information, to keep it real ( walk the talk )
10 Some general considerations about IPv6 security
11 Some interesting aspects about IPv6 We have much less experience with IPv6 than with IPv4 IPv6 implementations are much less mature than their IPv4 counterparts. Security products (firewalls, NIDS, etc.) have less support for IPv6 than for IPv4 The complexity of the resulting network will greatly increase during the transition/co-existence period: Two internetworking protocols (IPv4 and IPv6) Increased use of NATs Increased use of tunnels Use of a plethora of transition/co-existence mechanisms Lack of trained human resources and even then, IPv6 will be in many cases the only option on the table to remain in this business
12 Brief comparision between IPv6 and IPv4
13 Brief comparision between IPv6 and IPv4 IPv6 and IPv4 are very similar in terms of functionality (but not in terms of mechanisms) IPv4 IPv6 Addressing 32 bits 128 bits Address Resolution ARP ICMPv6 NS/NA (+ MLD) Autoconfiguration DHCP & ICMP RS/RA ICMPv6 RS/RA & DHCPv6 (recommended) (+ MLD) Fault Isolation ICMP ICMPv6 IPsec support Optional Recommended (not mandatory) Fragmentation Both in hosts and routers Only in hosts
14 Brief comparision of IPv4 and IPv6 (II) Header formats:
15 IPv6 header fields Basic header fields
16 IPv6 header Fixed-length (40-bytes) header
17 Version Identifies the Internet Protocol version number ( 6 for IPv6) It should match the Protocol specified by the underlying link-layer protocol If not, link-layer access controls could be bypassed All implementations tested so far properly validate this field Must admit I've learned it the hard way :-)
18 Traffic Class Same as IPv4 s Differentiated Services No additional Quality of Service (QoS) feature in IPv6 (sorry) Traffic Class could be leveraged to receive differentiated service The Traffic Class should be policed at the network edge In summary, no differences with respect to IPv4 QoS
19 Flow Label Finding the transport-protocol port-numbers con probe to be difficult in IPv6 The Flow Label is thus meant help with load sharing The three-tuple {Source Address, Destination Address, Flow Label} identifies a communication flow Currently unused by many stacks Some stacks simply set it to 0 for all packets Other stacks set it improperly Specification of this header field has just been published: Potential vulnerabilities depend on predictable Flow: Might be leveraged to perform dumb (stealth) address scans Might be leveraged to perform Denial of Service attacks
20 Payload Length Specifies the length of the IPv6 payload (not of the entire packet) Maximum IPv6 packet is bytes. However, IPv6 Jumbograms can be specified. A number of sanity checks need to be performed. e.g.: The IPv6 Payload Length cannot be larger than the payload size reported by the link-layer protocol All stacks seem to properly validate this field
21 Next Header Identifies the header/protocol type following this header. IPv6 options are included in extension headers These headers sit between the IPv6 header and the upper-layer protocol There may be multiple instances of multiple extension headers Hence, IPv6 follow a header chain type structure. e.g., N H =60 IP v 6 H e ai Pd ev r6 H eader N H =60 N H =06 D e s tin a tio n O p tio n s D e s t ihn ae at i do en r O p t i o n s H eader D e s t. O p tio n s D eh se t a. do e pr t i o n s H eader TC P S egm ent TC P S egm ent
22 Hop Limit Analogous to IPv4 s Time to Live (TTL) Identifies the number of network links that a packet may traverse Packets are discarded when the Hop Limit is decremented to 0. Different OSes use different defaults for the Hop Limit (typically a power of two: 64, 128, etc.) Could (in theory) be leveraged for: Detecting the Operating System of a remote node Fingerprinting a remote physical device Locating a node in the network topology Evading Network Intrusion Detection Systems (NIDS) Reducing the attack exposure of some hosts/applications
23 Hop Limit: Fingerprinting the remote OS Devices There are a few default values for the Hop Limit in different OSes Based on the received Hop Limit, the original Hop Limit can be inferred Example: We receive packets with a Hop Limit of 60 We can infer the original Hop Limit was 64 We can determine a set of possible remote OSes Note: mostly useless, since: There is only a reduced number of default Hop Limit values Fingerprinting graularity is too coarse
24 Hop Limit: Fingerprinting Physical Devices If packets originating from the same IPv6 addresses contain very different Hop Limits, they might be originated by different devices. Example: We see this traffic: We infer: Packets from FTP server 2001:db8::1 arrive with a Hop Limit of 60 Packets from web server 2001:db8:::2 arrive with a Hop Limit of 124 FTP server sets the Hop Limit to 64, and is 4 routers away Web server sets the Hop Limit to 128, and is 4 routers away Note: mostly useless, since: It requires different OSes or different locations behind the middle-box There is only a reduced number of default Hop Limit values
25 Hop Limit: Locating a Node Basic idea: if we are receiving packets from a node and assume that it is using the default Hop Limit, we can infer the orginal Hop Limit If we have multple sensors, we can triangulate the position of the node Source Hop Limit A 61 B 61 C 61 D 62 F is the only node that is: 3 routers from A 3 routers from B 3 routers from C 2 routers from D
26 Hop Limit: Evading NIDS Basic idea: the attacker sets the Hop Limit to a value such that the NIDS sensor receives the packet, but the target host does not. Counter-measure: Normalize the Hop Limit at the network edge (to 64) or block incomming packets with very small Hop Limits (e.g., smaller than 10)
27 Hop Limit: Improving Security (GTSM) GTSM: Generalized TTL Security Mechanism The Hop Limit is set to 255 by the source host Named after the IPv4 TTL field, but same concept applies to IPv6 It reduces the host/application exposure to attacks The receiving host requires the Hop Limit of incoming packets to be of a minimum value (255 for link-local applications) Packets that do not pass this check are silently dropped This mechanism is employed by e.g., BGP and IPv6 Neighbor Discovery Example: 12:12: ::20c:29ff:fe49:ebdd > ff02::1:ff00:1: icmp6: neighbor sol: who has 2004::1(src lladdr: 00:0c:29:49:eb:dd) (len 32, hlim 255) 12:12: ::1 > 2004::20c:29ff:fe49:ebdd: icmp6: neighbor adv: tgt is 2004::1(RSO)(tgt lladdr: 00:0c:29:c0:97:ae) (len 32, hlim 255)
28 IPv6 Addressing Architecture
29 Brief Overview The main driver for IPv6 is its increased address space IPv6 uses 128-bit address (vs. IPv4's 32-bit addresses) Similarly to IPv4, Addresses are aggregated into prefixes (for routing purposes) There are different address types (unicast, anycast, and multicast) There are different address scopes (link-local, global, etc.) However, at any given time, several IPv6 addresses, of multiple types and scopes are used. For example, One or more unicast link-local address One or more global unicast address One or more link-local address
30 IPv6 Address Types The address type can be identified as follows: Address Type IPv6 prefix Unspecified ::/128 Loopback ::1/128 Multicast FF00::/8 Link-local unicast FE80::/10 Unique Local Unicast FC00::/7 Global Unicast (everything else)
31 IPv6 Address Types Unicast Addresses
32 Unicast Addresses Global unicast Link-local unicast Meant for communication within a network link/segment Site-local unicast Meant for communication on the public Internet Deprecated (were meant to be valid only within a site) Unique Local unicast Are expected to be globally unique, but not routable on the public Internet
33 Global Unicast Addresses Syntax of the global unicast addresses: n bits m bits Global Routing Prefix Subnet ID 128-n-m bits Interface ID The interface ID is typically 64-bis The Interface-ID can be selected with different criteria: Use modified EUI-64 format identifiers (embed the MAC address) Privacy Addresses (or some of their variants) Manually-configured (e.g., 2001:db8::1) As specified by some specific transition-co-existence technology
34 Link-local Unicast Addresses Syntax of the link-local unicast addresses: 64 bits Link Local Unicast Prefix 64 bits Interface ID The Link-Local Unicast Prefix is fe80::/64 The interface ID is typically set to the modified EUI-64 format identifiers (embed the MAC address)
35 Unique-local Unicast Addresses Syntax of the unique-local unicast addresses: n bits ULA Prefix m bits Subnet ID 128-n-m bits Interface ID The interface ID is typically 64-bis The Interface-ID can be selected with different criteria: Use modified EUI-64 format identifiers (embed the MAC address) Privacy Addresses (or some of their variants) Manually-configured (e.g., fc00::1, fc00::2, etc.) As specified by some specific transition-co-existence technology
36 Modified EUI-64 Identifiers They are constructed from e.g. Ethernet addresses. The word fffe is inserted between the OUI and the rest of the Ethernet They are constructed from e.g. Ethernet addresses: The universal (bit 6, left to right) is set to 1 The word 0xfeff is inserted between the OUI and the rest of the address Example: Ethernet address: 00:1b:38:83:d8:3c We set bit 6 to 1, and get: 02:1b:38:83:d8:3c We insert the word 0xfffe and get: 021b 38ff fe83 d83c This would lead to e.g. the IPv6 address: fe80::21b:38ff:fe83:d83c
37 IPv6 Address Types Multicast Addresses
38 Multicast Addresses Identify a set of nodes Can be of different scopes (interface local, link-local, global, etc.) Some examples: Multicast address Use FF01:0:0:0:0:0:0:1 All nodes (interface-local) FF01:0:0:0:0:0:0:2 All routers (interface-local) FF02:0:0:0:0:0:0:1 All nodes (link-local) FF02:0:0:0:0:0:0:2 All routers (link-local) FF05:0:0:0:0:0:0:2 All routers (site-local) FF02:0:0:0:0:1:FF00::/104 Solicited-Node
39 Solicited-node multicast addresses Used for address resolution (Neighbor Discovery) They avoid the use of broadcasts, which degrade network performance They are constructed from the prefix ff02:0:0:0:0:1:ff00::/104 The least-significant 24 bits are copied from the original address Example: We have the IPv6 address fc00::1::21b:38ff:fe83:d83c The resulting solicited-node multicast address is: ff02::1:ff83:d83c
40 Mapping IPv6 multicast to Ethernet The mapping of IPv6 multicast addresses to Ethernet addresses is straightforward (no protocol is needed) The first two bytes of the Ethernet address are set to 33:33 The address is completed with the four least-significant bytes of the IPv6 address Example: We have the IPv6 multicast address ff02::1:ff83:d83c The resulting multicast Ethernet address is: 33:33:ff:83:d8:3c
41 IPv6 Address Types Anycast Addresses
42 Anycast Addresses Identify a node belonging to a set of nodes (e.g., some DNS server, some DHCP server, etc.) Packets sent to an anycast address are sent only to one of those nodes (the nearest one, as from the point of view of the routing protocols). Only a few anycast addresses have been specified: Subnet-router
43 IPv6 Addressing Implications on End-to-End Conectivity
44 Brief overview The IPv4 Internet was based on the so-called End to End principle: Dumb network, smart hosts Any node can establish a communication instance with any other node in the network The network does not care about what is inside internet-layer packets It is usually argued that the end-to-end principle allows for innovation Deployment of some devices (mostly NATs) have basically elimintated the end-to-end property of the Internet With the increased IPv6 address space, it is expected that each device will have a globally-unique address, and NATs will be no longer needed.
45 Some considerations Myth: IPv6 will return the End-to-End principle to the Internet It is assumed that the possibility of glbal-addresses for every host will return the End-to-End principle to the Internet. However, Global-addressability does not necessarily imply end-to-end connectivity. Most production networks don t really care about innovation, but rather about getting work done. Users expect to use in IPv6 the same services currently available for IPv4 without end-to-end connectivity (web, , social networks, etc.) Thus, End-to-end connectivity is not necessarily a desired property in a production network (e.g., may increase host exposure unnecessarily) A typical IPv6 subnet will be protected by a stateful firewall that only allows return traffic
46 IPv6 Addressing Implications on Network Reconnaissance
47 Implications on brute-force scanning If we assume that host addresses are uniformly distributed over the subnet address space (/64), IPv6 brute force scans would be virtually impossible. However, experiments (*) have shown that this is not necessarily the case IPv6 addresses are usually follow some of the following patterns: SLAAC (Interface-ID based on the MAC address) IPv4-based (e.g., 2001:db8:: ) Low byte (e.g., 2001:db8::1, 2001:db8::2, etc.) Privacy Addresses (Random Interface-IDs) Wordy (e.g., 2001:db8::dead:beef) Related to specific transition-co-existence technologies(e.g., Teredo) (*) Malone, D Observations of IPv6 Addresses. Passive and Active Measurement Conference (PAM 2008, LNCS 4979), April 2008.
48 Some real-world data. [Malone, 2008] (*) measures how IPv6 addreses are assigned to hosts and routers: Hosts Address Type Routers Percentage Address Type Percentage SLAAC 50% Low-byte IPv4-based 20% IPv4-based 5% Teredo 10% SLAAC 1% 70% Low-byte 8% Wordy <1% Privacy 6% Privacy <1% Wordy <1% Teredo <1% Other <1% Other <1% (*) Malone, D Observations of IPv6 Addresses. Passive and Active Measurement Conference (PAM 2008, LNCS 4979), April 2008.
49 What about virtualization? (bonus track) Virtual machines get virtual network interfaces VirtualBox selects MAC addresses from the following OUI: 08:00:27 Automatically-generated addresses in VMWare ESX Server: Use the OUI: 00:05:69 Two bytes of the addresses are taken from the IPv4 address of the host Least significant byte taken from a hash of the VM's configuration file name Manually-generated addresses in VMWare ESX Server: Use the OUI: 00:50:56
50 Some Conclusions and Advice IPv6 addresses can be very predictable In general, a node does not need to be publicly reachable (e.g., servers), unpredictable addresses are desirable For servers, security-wise the policy of selection of IPv6 addresses is irrelevant For clients, in most scenarios the use of privacy extensions (or some variant of it) is generally desirable In any case, always consider whether it would be applicable to enforce a packet filtering policy (i.e., if possible, do not rely on security through obscurity)
51 Network reconnaissance with multicast Multicast addresses can be leveraged for reconnaissance Unfortunately (or not) these addresses can only be used locally Example with the all-nodes link-local multicast address: ping6 ff02::1%eth0 Example with the all-routers link-local multicast address: ping6 ff02::2%em0
52 IPv6 Extension Headers
53 IPv6 Extension Headers IPv6 has a fixed header any options must be included in extension headers So far, the following Extension Headers have been standardized: Hop-byHop Options Routing Fragment Encapsulating Security Payload (ESP) Authentication Destination Options By separating the options into different header, each node processes only the options meant for them (e.g. hosts vs. routers)
54 IPv6 Extension Headers Fragment Header
55 Fragmentation Header The fixed IPv6 header does not include support for fragmentation/reassembly If needed, such support is added by an Extension Header (Fragmentation Header, NH=44) 8 bits Next Header 8 bits Reserved 13 bits 2b 1b Fragment Offset Res M Identification Fragment Offset: offset of the data following this header, relative to the start of the fragmentable part of the original packet M: More Fragments bit, as in the IPv4 header Identification: together with the Source Address and Destination Address identifies fragments that correspond to the same packet
56 Fragmentation Example (legitimate) ping6 output % ping6 s ::1 PING 2004::1(2004::1) 1800 data bytes 1808 bytes from 2004::1: icmp_seq=1 ttl=64 time=0.973 ms ::1 ping statistics --1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.973/0.973/0.973/0.000 ms tcpdump output 20:35: IP6 2004::5e26:aff:fe33:7063 > 2004::1: ICMP6, echo request, seq 1, length :35: IP6 2004::5e26:aff:fe33:7063 > 2004::1: 20:35: IP6 2004::1 > 2004::5e26:aff:fe33:7063: ICMP6, echo reply, seq 1, length :35: IP6 2004::1 > 2004::5e26:aff:fe33:7063: frag (01448) frag ( ) frag (01232) frag ( )
57 Security Implications Some are the same as for IPv4 fragmentation: Stateful operation for a stateless protocol: risk of exhausting kernel memory if the fragment reassembly buffer is not flushed properly Predictable Identification values (CVE ) allow for: stealth port scanning technique DoS attacks (IPv6 ID collisions) Others are different: The Identification field is much larger: chances of IP ID collisions are reduced Note: Overlapping fragments have been recently forbidden (RFC 5722) but they are still allowed by many OSes
58 Fragment Header IPv6 idle scan
59 Example of Predictable Identification values tcpdump output (% ping6 s ::1 ) 1. IP6 (hlim 64, next-header Fragment (44) payload length: 1456) 2004::5e26:aff:fe33:7063 > 2004::1: frag (0x a:01448) ICMP6, echo request, length 1448, seq 1 2. IP6 (hlim 64, next-header Fragment (44) payload length: 368) 2004::5e26:aff:fe33:7063 > 2004::1: frag (0x a: ) 3. IP6 (hlim 64, next-header Fragment (44) payload length: 1240) 2004::1 > 2004::5e26:aff:fe33:7063: frag (0x4973fb3d:01232) ICMP6, echo reply, length 1232, seq 1 4. IP6 (hlim 64, next-header Fragment (44) payload length: 584) 2004::1 > 2004::5e26:aff:fe33:7063: frag (0x4973fb3d: ) 5. IP6 (hlim 64, next-header Fragment (44) payload length: 1456) 2004::5e26:aff:fe33:7063 > 2004::1: frag (0x b:01448) ICMP6, echo request, length 1448, seq 2 6. IP6 (hlim 64, next-header Fragment (44) payload length: 368) 2004::5e26:aff:fe33:7063 > 2004::1: frag (0x b: ) 7. IP6 (hlim 64, next-header Fragment (44) payload length: 1240) 2004::1 > 2004::5e26:aff:fe33:7063: frag (0x2b4d7741:01232) ICMP6, echo reply, length 1232, seq 2 8. IP6 (hlim 64, next-header Fragment (44) payload length: 584) 2004::1 > 2004::5e26:aff:fe33:7063: frag (0x2b4d7741: )
60 Revision TCP Connection-Establishment Connection-established Connection-rejected
61 Forged TCP Connection-Establishment Open port Closed port
62 IPv6 Idle Scan Open port Closed port
63 IPv6 Idle Scan This dumb scan technique allows for a very stealthy port scan It only requires an inactive host to be used as zombie Clearly, we didn t learn the lesson from IPv4
64 sysctl s for frag/reassembly net.inet6.ip6.maxfragpackets: maximum number of fragmented packets the node will accept (defaults to 200 in OpenBSD and 2160 in FreeBSD) 0: the node does not accept fragmented traffic -1: there s no limit on the number of fragmented packets net.inet6.ip6.maxfrags: maximum number of fragments the node will accept (defaults to 200 in OpenBSD and 2160 in FreeBSD) 0: the node will not accept any fragments -1: there is no limit on the number of fragments
65 IPv6 Extension Headers Hop-by-Hop Options
66 Hop-by-Hop Options Header Identified by a Next Header of 0. Carries options meant for routers So far, only Router Alert option has been specified This header may lead to a DoS at the intervening routers Should be policed at the network edge 8 bits Next Header 8 bits Length Options
67 IPv6 Extension Headers Destination Options
68 Destination options Header Identified by a Next Header of 60. Carries options meant for the destination nodes Only some experimental options have been specified Should probably be policed at the network edge 8 bits Next Header 8 bits Length Options
69 IPv6 Extension Headers Routing Header
70 Routing Header Identified by a Next Header of 43 Meant to lists nodes that must be visited on the way to the packet's destination 8 bits Next Header 8 bits Length 8 bits Routing Type Type-specific data 8 bits Segments Left
71 Routing Type 0 IPv6 version of IPv4 Source Routing Can be far more damaging (many more addresses can be specified) Deprecated for current implementations
72 IPv6 Extension Headers Implications on Firewalls
73 Brief Overview of the IPv4 Situation IPv4 has a variable-length (20-60 bytes) header, and a minimum MTU of 68 bytes.
74 Brief Overview of the IPv4 Situation IPv4 has a variable-length (20-60 bytes) header, and a minimum MTU of 68 bytes. The following information can be assumed to be present on every packet:
75 Brief Overview of the IPv6 Situation The variable length-header has been replaced by a fixed-length (40 bytes) header Any IPv6 options are included in extension headers that form a header chain For example, N H =60 IP v 6 IP v 6 H eader Header N H =06 D e s t. O p t io n s D e s t. O p tio n s H eader H eader TCP Segm ent TCP Segm ent
76 Problem Statement The specifications allow for the use of multiple extension headers, even of the same type and implementations support this. Thus, the structure of the resulting packet becomes increasingly complex, and packet filtering becomes virtually impossible. For example: N H =60 IP v 6 H e ai dp ev r6 H eader N H =60 N H =06 D e s tin a tio n O p tio n s D e s t ihn ae at i do en r O p t i o n s H eader D e s t. O p tio n s D eh se t a. do e pr t i o n s H eader TC P S egm ent TC P S egm ent
77 Problem Statement (II) Example of Destination Options and Fragmentation: Original Packet N H =60 IP v 6 H e ai dp ev r6 H eader N H =44 First Fragment IP v 6 H e ai dp ev r6 H eader N H =44 Second Fragment N H =06 IP v 6 H e ai dp ev r6 H eader D e s tin a tio n O p tio n s D e s t i Hn ae ta i do en r O p t i o n s H eader N H =60 F ra g m e n t HF er aa gd me r e n t H eader TC P S egm ent TC P S egm ent N H =06 D e s tin a tio n O p tio n s D e s t ihn ae ta i do en r O p t i o n s H eader N H =60 F ra g m e n t HF er aa gd me r e n t H eader D e s t. O p t. HD ee as dt.e Or p t. H eader TC P S egm ent TC P S egm ent
78 Problem Statement (III) Two Destination Options headers, and a Fragment Header: Original Packet N H =60 IP v 6 H e ai dp ev r6 H eader N H =44 First Fragment IP v 6 H e ai dp ev r6 H eader N H =44 Second Fragment N H =60 IP v 6 H e ai dp ev r6 H eader N H =06 D e s tin a tio n O p tio n s D e s t ihn ea at i do en r O p t i o n s H eader N H =60 F ra g m e n t HF er aa gd me r e n t H eader N H =60 D e s t. O p tio n s D eh se t a. do e pr t i o n s H eader TC P S egm ent TC P S egm ent N H =60 D e s t. O p tio n s D eh se t a. do epr t i o n s H eader N H =06 F ra g m e n t D. O p t. D e s t. O p tio n s D eh se t a. do e pr t i o n s HF er aa gd me r e n t HD d. r O. p t. H eader H d r. H eader TC P S egm ent TC P S egm ent
79 Possible Countermeasures Use a stateful firewall that reassembles the fragments, and then applies the packet filtering rules Filter (in firewalls and/or hosts) packets with specific combinations of extension headers: Packets with multiple extension headers (e.g., more than 5) Packets that combine fragmentation and other extension headers Packets which are fragmented and do not contain the upper-layer header in the first fragment. If filtering is to be performed in layer-2 devices (e.g., RA-Guard), the possible counter-measures are reduced e.g., it's not possible to do fragment reasembly at layer-2!
80 Some Conclusions With the current state of affairs, it ay be easy to circumvent IPv6 firewalls. We expect firewalls will block (at the very least) packets with specific combinations of extension headers. The result will be: less flexibility, possibly preventing any use of IPv6 exntesion headers
81 Internet Control Message Protocol version 6 (ICMPv6)
82 Internet Control Message Protocol version 6 ICMP is a core protocol of the IPv6 suite, and is used for: Fault isolation (ICMPv6 errors) Troubleshooting (ICMPv6 echo request/response) Address Resolution Stateless address autoconfiguration ICMPv6 is mandatory for IPv6 operation
83 ICMPv6 Error Messages
84 Fault Isolation (ICMPv6 error messages) A number of ICMPv6 error messages are specified in RFC 4443: Destination Unreachable No route to destination Beyond scope of source address Port Unreachable, etc. Packet Too Big Time Exceeded Parameter Problem Hop Limit Exceeded in Transit Fragment reassembly time exceeded Erroneous header field encountered Unrecognized Nect Header type encountered Unrecognized IPv6 option encountered ICMP Redirect Clearly, most of them parallel their ICMP counter-parts
85 Hop Limit Exceeded in Transit Are generated when the Hop Limit of a packet is decremented to 0. Typically leveraged by traceroute tool Example: % traceroute 2004:1::30c:29ff:feaf:1958 traceroute to 2004:1::30c:29ff:feaf:1958 (2004:1::30c:29ff:feaf:1958) from 2004::5e26:aff:fe33:7063, port 33434, from port 60132, 30 hops max, 60 byte packets :: ms ms ms :: ms!h ms!h ms!h
86 Hop Limit Exceeded in Transit (II) Tcpdump trace: 1. IP6 (hlim 1, next-header UDP (17) payload length: 20) 2004::5e26:aff:fe33: > 2004:1::30c:29ff:feaf: : [udp sum ok] UDP, length IP6 (hlim 64, next-header ICMPv6 (58) payload length: 68) 2004::1 > 2004::5e26:aff:fe33:7063: [icmp6 sum ok] ICMP6, time exceeded intransit, length 68 for 2004:1::30c:29ff:feaf: IP6 (hlim 2, next-header UDP (17) payload length: 20) 2004::5e26:aff:fe33: > 2004:1::30c:29ff:feaf: : [udp sum ok] UDP, length IP6 (hlim 64, next-header ICMPv6 (58) payload length: 68) 2004::1 > 2004::5e26:aff:fe33:7063: [icmp6 sum ok] ICMP6, destination unreachable, length 68, unreachable address 2004:1::30c:29ff:feaf:1958
87 Hop Limit Exceeded in Transit (III) Use of traceroute6 for network reconnaissance could be mitigated by: filtering outgoing Hop Limit Exceeded in transit at the network perimeter, or, by normalizing the Hop Limit of incoming packets at the network perimeter Note: NEVER normalize the Hop Limit to 255 (or other large value) use 64 instead
88 ICMPv6 Connection-Reset Attacks Some ICMPv6 messages are assumed to indicate hard errors Some stacks used to abort TCP connections when hard errors were received No stacks were found vulnerable to these attacks We learned the lesson from IPv4 good!
89 ICMPv6 PMTUD Attacks ICMPv6 PTB messages are used for Path-MTU discovery The security implications of these messages are well-known (remember ICMP attacks against TCP back in 2004?) The mitigations are straightforward: Validate the received ICMPv6 messages (TCP SEQ #, etc.) Many implementations fail to properly validate ICMPv6 messages The Path-MTU is never reduced to less than 1280 bytes But a Fragment Header will be included in all further packets This can be leveraged for exploiting fragmentation-relaetd attacks
90 ICMPv6 Redirects ICMP redirects are very similar to the ICMP counterpart, except for: The Hop Limit is required to be 255 this reduces exposure. There are no network redirects ICMPv6 redirects are an optimization hence they can be disabled with no interoperability implications Most stacks enable them by default In *BSDs, ICMPv6 Redirect processing is controlled with the sysctl net.inet6.icmp6.rediraccept.
91 ICMPv6 Informational Messages
92 ICMPv6 Informational Echo Request/Echo response: Used to test node reachability ( ping6 ) Widely supported, although disabled by default in some OSes Node Information Query/Response Specified by RFC 4620 as Experimental, but supported (and enabled by default) in KAME. Not supported in other stacks Used to obtain node names or addresses.
93 ICMPv6 Echo Request/Echo response Used for the ping6 tool, for troubleshooting Also usually exploited for network reconnaissance Some implementations ignore incoming ICMPv6 echo requests Example: % ping6 2004::1 PING 2004::1(2004::1) 56 data bytes 64 bytes from 2004::1: icmp_seq=1 ttl=64 time=28.4 ms ::1 ping statistics --1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = /28.460/28.460/0.000 ms tcpdump output 1. IP6 2004::5e26:aff:fe33:7063 > 2004::1: ICMP6, echo request, seq 1, length IP6 2004::1 > 2004::5e26:aff:fe33:7063: ICMP6, echo reply, seq 1, length 64
94 sysctl s for ICMPv6 Echo Request No sysctl s in BSD s or Linux ICMPv6 Echo requests can nevertheless be filtered in firewalls Might want to filter ICMPv6 Echo Requests in hosts (but not in routers)
95 Node Information Query/Response Specified in RFC 4620 as Experimental, but included (and enabled by default) in KAME Allows nodes to request certain network information about a node in a server-less environment Queries are sent with a target name or address (IPv4 or IPv6) Queried information may include: node name, IPv4 addresses, or IPv6 addresses Node Information Queries can be sent with the ping6 command ( w and -b options)
96 Node Information Query/Response (II) Response to Node Information Queries is controlled by the sysctl net.inet6.icmp6.nodeinfo: 0: Do not respond to Node Information queries 1: Respond to FQDN queries (e.g., ping6 w ) 2: Respond to node addresses queries (e.g., ping6 a ) 3: Respond to all queries net.inet6.icmp6.nodeinfo defaults to 1 in OpenBSD, and to 3 in FreeBSD. My take: unless you really need your nodes to support Node Information messages, disable it (i.e., sysctl w net.inet6.icmp6.nodeinfo=0).
97 Some examples with ICMPv6 NI (I) Query node names $ ping6 -w ff02::1%vic0 PING6(72= bytes) fe80::20c:29ff:feaf:194e%vic0 --> ff02::1%vic0 41 bytes from fe80::20c:29ff:feaf:194e%vic0: openbsd46.my.domain. 30 bytes from fe80::20c:29ff:fe49:ebdd%vic0: freebsd 41 bytes from fe80::20c:29ff:feaf:194e%vic0: openbsd46.my.domain. 30 bytes from fe80::20c:29ff:fe49:ebdd%vic0: freebsd 41 bytes from fe80::20c:29ff:feaf:194e%vic0: openbsd46.my.domain. 30 bytes from fe80::20c:29ff:fe49:ebdd%vic0: freebsd --- ff02::1%vic0 ping6 statistics --3 packets transmitted, 3 packets received, +3 duplicates, 0.0% packet loss
98 Some examples with ICMPv6 NI (II) Query addresses $ ping6 -a Aacgls ff02::1%vic0 PING6(72= bytes) fe80::20c:29ff:feaf:194e%vic0 --> ff02::1%vic0 76 bytes from fe80::20c:29ff:fe49:ebdd%vic0: fe80::20c:29ff:fe49:ebdd(ttl=infty) ::1(TTL=infty) fe80::1(ttl=infty) 76 bytes from fe80::20c:29ff:fe49:ebdd%vic0: fe80::20c:29ff:fe49:ebdd(ttl=infty) ::1(TTL=infty) fe80::1(ttl=infty) 76 bytes from fe80::20c:29ff:fe49:ebdd%vic0: fe80::20c:29ff:fe49:ebdd(ttl=infty) ::1(TTL=infty) fe80::1(ttl=infty) --- ff02::1%vic0 ping6 statistics --3 packets transmitted, 3 packets received, 0.0% packet loss
99 Some examples with ICMPv6 NI (III) Use the NI multicast group $ ping6 -I vic0 -a Aacgls -N freebsd PING6(72= bytes) fe80::20c:29ff:feaf:194e%vic0 --> ff02::1%vic0 76 bytes from fe80::20c:29ff:fe49:ebdd%vic0: fe80::20c:29ff:fe49:ebdd(ttl=infty) ::1(TTL=infty) fe80::1(ttl=infty) 76 bytes from fe80::20c:29ff:fe49:ebdd%vic0: fe80::20c:29ff:fe49:ebdd(ttl=infty) ::1(TTL=infty) fe80::1(ttl=infty) 76 bytes from fe80::20c:29ff:fe49:ebdd%vic0: fe80::20c:29ff:fe49:ebdd(ttl=infty) ::1(TTL=infty) fe80::1(ttl=infty) --- ff02::1%vic0 ping6 statistics --3 packets transmitted, 3 packets received, 0.0% packet loss
100 Neighbor Discovery for IPv6
101 Neighbor Discovery for IPv6 Address Resolution
102 Address Resolution in IPv6 Employs ICMPv6 Neighbor Solicitation and Neighbor Advertisement It (roughly) works as follows: Host A sends a NS: Who has IPv6 address fc01::1? 2. Host B responds with a NA: I have IPv6 address, and the corresponding MAC address is 06:09:12:cf:db: Host A caches the received information in a Neighbor Cache for some period of time (this is similar to IPv4 s ARP cache) 4. Host A can now send packets to Host B 1.
103 Neighbor Solicitation Messages ICMPv6 messages of Type 135, Code 0 Used to solicit the mapping of an IPv6 address to a link-layer address Only allowed option so far: Source Link-layer address Type Code Checksum Reserved // Target Address // Options
104 Neighbor Advertisement Messages ICMPv6 messages of Typo 136, Code 0 Use to informa the maping of a IPv6 address to a link-layer address Only allowed option so far: Target Link-layer address Type Code Checksum RSO Reserved Target Address Options
105 Source/Target Link-layer Address Options The Source Link-layer Address contains the link-layer address corresponding to the Source Address of the packet The Target Link-layer address contains the link-layer address correspondign to the Target Address of the Neighbor Solicitation message Type Length Link-Layer Address Type: 1 for Source Link-layer Address 2 for Target Link-layer Address
106 Sample Address Resolution Traffic % ping6 2004::1 12:12: ::20c:29ff:fe49:ebdd > ff02::1:ff00:1: icmp6: neighbor sol: who has 2004::1(src lladdr: 00:0c:29:49:eb:dd) (len 32, hlim 255) 12:12: ::1 > 2004::20c:29ff:fe49:ebdd: icmp6: neighbor adv: tgt is 2004::1(RSO)(tgt lladdr: 00:0c:29:c0:97:ae) (len 32, hlim 255) 12:12: ::20c:29ff:fe49:ebdd > 2004::1: icmp6: echo request (len 16, hlim 64) 12:12: ::1 > 2004::20c:29ff:fe49:ebdd: icmp6: echo reply (len 16, hlim 64)
107 ndisc6: Neighbor Discovery diagnostic tool Can be used to send NS for a particular address Example: $ /bin/rdisc6 vboxnet0 Soliciting ff02::2 (ff02::2) on vboxnet0... Hop limit : 64 ( 0x40) Stateful address conf. : No Stateful other conf. : No Router preference : medium Router lifetime : 1800 (0x ) seconds Reachable time : unspecified (0x ) Retransmit time : unspecified (0x ) Source link-layer address: 08:00:27:F9:73:04 Prefix : 2000:1::/64 Valid time : (0x00278d00) seconds Pref. time : (0x00093a80) seconds from fe80::a00:27ff:fef9:7304
108 Neighbor Cache Stores information learned from the Address Resolution mechanism Each entry (IPv6 address, link-layer address) can be in one of the following states: NC entry state Semantics INCOMPLETE Add. Res. Is in progress (not yet determined) REACHABLE Neighbor is reachable STALE Not known to be reachable DELAY Not known to be reachable (wait for indication) PROBE Not known to be reachble (probes being sent)
109 Neighbor Cache (contents in *BSD) Sample output of ndp a (BSDs): % ndp -a Neighbor 2004:1::f8dd:347d:8fd8:1d2c fe80::20c:29ff:fec0:97b8%em1 2004:1::20c:29ff:fe49:ebe7 fe80::20c:29ff:fe49:ebe7%em1 2004::1 2004::20c:29ff:fe49:ebdd fe80::20c:29ff:fe49:ebdd%em0 fe80::20c:29ff:fec0:97ae%em0 2004::d13e:2428:bae7:5605 Linklayer Address 0:c:29:49:eb:e7 0:c:29:c0:97:b8 0:c:29:49:eb:e7 0:c:29:49:eb:e7 0:c:29:c0:97:ae 0:c:29:49:eb:dd 0:c:29:49:eb:dd 0:c:29:c0:97:ae 0:c:29:49:eb:dd Netif em1 em1 em1 em1 em0 em0 em0 em0 em0 Expire permanent 23h48m16s permanent permanent 23h49m27s permanent permanent 23h48m16s permanent S R S R R S R R S R Flags R R R
110 Neighbor Cache (contents in Linux) Sample output of ip -6 neigh show (Linux): $ ip -6 neigh show fe80::a00:27ff:fef9:7304 dev vboxnet0 lladdr 08:00:27:f9:73:04 router STALE 2000::4000 dev vboxnet0 lladdr 11:22:33:44:55:66 PERMANENT 2000:1::1 dev vboxnet0 lladdr 08:00:27:f9:73:04 router REACHABLE fe80::fc8d:15ed:7f43:68ea dev wlan0 lladdr 00:21:5c:0b:5d:61 router STALE
111 Address Resolution some attacks...
112 Man in the Middle or Denial of Service They are the IPv6 version of IPv4 s ARP cache poisoning Without proper authentication mechanisms in place, its trivial for an attacker to forge Neighbor Discovery messages Attack: Listen to incoming Neighbor Solicitation messages, with the victim s IPv6 address in the Target Address field When a NS is received, respond with a forged Neighbor Advertisement If the Target Link-layer address corresponds to a non-existing node, traffic is dropped, resulting in a DoS. If the Target Link-layer address is that of the attacker, he can perform a man in the middle attack.
113 Sniffing in a switched network Rather than trying to overflow the switch table, a more elegant attack can be performedmap the target addresses to either: The broadcast Ethernet address (ff:ff:ff:ff:ff:ff) Multicast Ethernet addresses (e.g., 33:33:00:00:01) This will cause traffic to be sent to all nodes (including the attacker and the legitimate recipient) All BSD variants tested don t check for these special addresses!
114 Introduce a forwarding loop at a router Respond the Neighbor solicitation sent by a router The router will receive a copy of the packet it sends (assuming the NIC allows this) The Hop Limit of the packet will be decremented, and the packet will be resent The process will be repeated until the the Hop Limit is decremented to 0.
115 Overflowing the Neighbor Cache Some implementations (e.g., FreeBSD and NetBSD) don t enforce limits on the number of entries that can be created in the Neighbor Cache All kernel memory can be tied for the Neighbor Cache, leading to a system panic. Attack: Send a large number of Neighbor Solicitation messages with a Source Link-layer address For each received packet, the victim host creates an entry in the neighbor Cache And if entries are added at a faster rate than old entries are pruned from the Neighbor Cache...
116 Overflowing the Neighbor Cache (II)
117 Some sysctl s for Neighbor Discovery (OpenBSD) net.inet6.ip6.neighborgcthresh (defaults to 2048): Maximum number of entries in the Neighbor Cache net.inet6.icmp6.nd6_prune (defaults to 1): Interval between Neighbor Cache babysitting (in seconds). net.inet6.icmp6.nd6_delay (defaults to 5): specifies the DELAY_FIRST_PROBE_TIME constant from RFC net.inet6.icmp6.nd6_umaxtries (defaults to 3): specifies the MAX_UNICAST_SOLICIT constant from RFC 4861 net.inet6.icmp6.nd6_mmaxtries (defaults to 3): specifies the MAX_MULTICAST_SOLICIT constant from RFC net.inet6.icmp6.nd6_useloopback (defaults to 1): If non-zero, uses the loopback interface for local traffic. net.inet6.icmp6.nd6_maxnudhint (defaults to 0): Maximum number of upper-layer reachability hints before normal ND is performed.
118 Address Resolution countermeasures
119 Secure Neighbor Discovery (SeND) SeND a cryptographic approach to the problem of forged Neighbor Solicitation messages Certification paths certify the authority of routers Cryptographically-Generated Addresses (CGA) bind IPv6 addresses to an assymetric key pair RSA signatures protect all Neighbor Discovery messages However, SeND is hard to deploy: Not widely supported The requirement of a PKI is a key obstacle for its deployment
120 Neighbor Discovery traffic monitoring Some tools keep (e.g., NDPMon) record of the legitimate mappings (IPv6 -> Ethernet), and sound an alarm if the mapping changes This is similar to arpwatch in IPv4 However, these tools can be trivially evaded: ND runs on top of IPv6 Packets may contain IPv6 Extension Headers Packets may be fragmented And since traffic occurs in the local network, there is no "man in the middle" to reassemble the packets or "normalize" them
121 Neighbor Discovery traffic monitoring (II) An arbitrary number of Extension headers can be inserted to make traffic monitoring harder The monitor tool would need to follow the entire header chain to "spot" the Neighbor Discovery messages. N H =60 IP v 6 IP v 6 H eader H eader N H =58 D e s tin a tio n O p tio n s D e s tin a tio n O p tio n s H eader H eader IC M P v 6 IC M P v 6 R o u te r R o u te r A d v e r tis e m e n t A d v e r tis e m e n t
122 Neighbor Discovery traffic monitoring (III) Combination of a Destination Options Header and fragmentation: NH=60 Original Packet IP v 6 H e a I dp ev r6 Header NH=44 First Fragment IP v 6 H e a I Pd ev 6r Header NH=44 Second Fragment NH=58 IP v 6 H e a I Pd ev 6r Header IC M P v 6 R IoCu Mt e Pr v 6 A d v e r Rt i os eu mt e er n t A d v e rtis e m e n t D e s tin a tio n O p tio n s D e s t ihn ea at ido en r O p t i o n s Header NH=60 F ra g m e n t HF er aa dg em r e n t Header NH=58 D e s tin a tio n O p tio n s D e s t ihn ea at ido en r O p t i o n s Header Can only tell there s ICMv6 inside NH=60 F ra g m e n t HF er aa dg em r e n t Header D e s t. O p t. HD e e a s dt.e Or p t. Header IC M P v 6 R IoCu Mt e Pr v 6 A d v e r Rt i so eu mt e er n t A d v e r tis e m e n t Can only tell there s Dest. Opt. Hdr inside!
123 Neighbor Discovery traffic monitoring (IV) Two Destination Options headers, and fragmentation: N H =60 Original Packet IP v 6 H e ai Pd ev r6 H eader N H =44 First Fragment IP v 6 H e ai dp ev r6 H eader N H =44 Second Fragment N H =60 IP v 6 H e ai dp ev r6 H eader N H =58 D e s tin a tio n O p tio n s D e s t ihn ae at i do en r O p t i o n s H eader N H =60 F ra g m e n t HF er aa gd me r e n t H eader N H =60 D e s t. O p tio n s D eh se t a. do e pr t i o n s H eader IC M P v 6 R IoC u Mt epr v 6 A d v e r Rt i so eu mt e er n t A d v e r tis e m e n t N H =60 Can only tell there s Dest. Opt. Hdr inside! D e s t. O p tio n s D eh se t a. do e pr t i o n s H eader N H =58 F ra g m e n t D. O p t. D e s t. O p tio n s D eh se t a. do e pr t i o n s HF er aa gd me r e n t HD d. r O. p t. H eader H d r. H eader IC M P v 6 R IoC u Mt epr v 6 A d v e r Rt i so eu mt e er n t A d v e rtis e m e n t Can only tell there s Dest. Opt. Hdr inside!
124 Restricting access to the local network Neighbor Discovery traffic is limited to the local network Separation of systems in different networks limits the damage an attacker can cause This is not always possible, but still desirable
125 Static Neighbor Cache entries Static entries can be including in the Neighbor Cache This is similar to static entries in the ARP Cache en IPv4 If a static NC entry is present for an IPv6, the host need not employ Neighbor Discovery Beware that some implementations used to remain vulnerable to ND attacks anyway!
126 Static Neighbor Cache entries in BSDs The Neighbor Cache is manipulated with the "ndp" command Static entries are added as follows: # ndp s IPV6ADDR MACADDR If IPV6ADDR is a link-local address, an interface index is specified as follows: # ndp s IPV6ADDR%IFACE MACADDR
127 Static Neighbor Cache entries in Linux The Neighbor Cache is manipulated with the "ip" command. Static entries are added as follows: sudo ip neigh add to IPV6ADDR lladdr MACADDR dev IFACE nud permanent Verify the results with: ip -6 neigh show
128 IPv6 Stateless Address Autoconfiguration (SLAAC)
129 Stateless Address Autoconfiguration It works (roughly) as follows: The host configures a link-local address 2. It checks that the address is unique i.e., it performs Duplicate Address Detection (DAD) for that address 1. Sends a NS, and waits for any answers The host sends a Router Solicitation message 2. When a Router Advertisement is received, it configures a tentative IPv6 address 3. It checks that the address is unique i.e., it performs Duplicate Address Detection (DAD) for that address Sends a NS, and waits for any answers If the address is unique, it typically becomes a preferred address
130 Address Autoconfiguration flowchart
131 Router Solicitation Messages ICMPv6 messages of Type 133, Code 0 Used to solicit network configuration information to local routers Only allowed option so far: Source Link-layer Address Type Code Checksum Reserved Options
132 Router Advertisement Messages ICMPv6 messages of Type 134, Code 0 Used to announce network configuration information to local hosts Type Code Checksum Cur Hop Limit MOHPrfResvd Router Lifetime Reachable Time Retrans Timer Options
133 Possible Options in RA messages ICMPv6 Router Advertisements may contain the following options: Source Link-layer address Prefix Information MTU Route Information Recursive DNS Server Usually, they include many of them
134 Prefix Information Option Identified by a Type of 3 Specifies on-link and auto-configuration prefixes Type Length Prefix Length LARReserved Valid Lifetime Preferred Lifetime Reserved // Prefix //
135 Router Information Option Identified by a Type of 24 Advertises specific routes, with different priorities Type Length Prefix Length ResvdPrfResvd Route Lifetime Prefix (Variable Length)
136 MTU Option Identified by a Type of 5 Specifies the MTU to be used for this link Type Length Reserved MTU
137 RDNSS Option Identified by a Type of 24 Used to advertise recursive DNS servers Type Length Reserved Lifetime : Addresses of IPv6 Recursive DNS Servers :
138 Sample Configuration Sample output of ifconfig a (BSDs): # ifconfig -a em0: flags=8843<up,broadcast,running,simplex,multicast> metric 0 mtu 1500 options=9b<rxcsum,txcsum,vlan_mtu,vlan_hwtagging,vlan_hwcsum> ether 00:0c:29:49:eb:dd inet netmask 0xffffff00 broadcast inet6 fe80::20c:29ff:fe49:ebdd%em0 prefixlen 64 scopeid 0x1 inet6 2004::20c:29ff:fe49:ebdd prefixlen 64 autoconf inet6 2004::d13e:2428:bae7:5605 prefixlen 64 autoconf temporary nd6 options=23<performnud,accept_rtadv,auto_linklocal> media: Ethernet autoselect (1000baseT <full-duplex>) status: active lo0: flags=8049<up,loopback,running,multicast> metric 0 mtu options=3<rxcsum,txcsum> inet netmask 0xff inet6 ::1 prefixlen 128 inet6 fe80::1%lo0 prefixlen 64 scopeid 0x5 nd6 options=21<performnud,auto_linklocal>
139 Sample Configuration Sample output of netstat r p ip6 (BSDs): # netstat r p ip6 Internet6: Destination Gateway :: localhost default fe80::20c:29ff:fec localhost localhost ::ffff: localhost 2004:1:: link#2 2004:1::20c:29ff:f link#2 2004:1::f8dd:347d: link#2 fe80:: localhost fe80::%em1 link#2 fe80::20c:29ff:fe4 link#2 fe80::%lo0 link#5 fe80::1%lo0 link#5 ff01:1:: fe80::20c:29ff:fe4 ff01:2:: fe80::20c:29ff:fe4 ff01:5:: localhost ff02:: localhost ff02::%em1 fe80::20c:29ff:fe4 ff02::%lo0 localhost Flags UGRS UG UH UGRS U UHS UHS UGRS U UHS U UHS U U U UGRS U U Netif Expire lo0 => em1 lo0 lo0 em1 lo0 lo0 lo0 em1 lo0 lo0 lo0 em0 em1 lo0 lo0 em1 lo0
140 Neighbor Cache (prefixes in *BSD) Sample output of ndp p (BSDs): % ndp -p 2004::/64 if=em0 flags=lao vltime= , pltime=604800, expire=29d23h57m4s, ref=2 advertised by fe80::20c:29ff:fec0:97ae%em0 (reachable) 2004:1::/64 if=em1 flags=lao vltime= , pltime=604800, expire=29d23h50m34s, ref=2 advertised by fe80::20c:29ff:fec0:97b8%em1 (reachable) fe80::%em1/64 if=em1 flags=lao vltime=infinity, pltime=infinity, expire=never, ref=0 No advertising router fe80::%em0/64 if=em0 flags=lao vltime=infinity, pltime=infinity, expire=never, ref=0 No advertising router fe80::%lo0/64 if=lo0 flags=lao vltime=infinity, pltime=infinity, expire=never, ref=0 No advertising router
141 Neighbor Cache (default routers in *BSD) Sample output of ndp r (BSDs): % ndp -r fe80::20c:29ff:fec0:97b8%em1 if=em1, flags=, pref=medium, expire=20m23s fe80::20c:29ff:fec0:97ae%em0 if=em0, flags=, pref=medium, expire=26m53s
142 IPv6 SLAAC some sample attacks
143 Disable an Existing Router Forge a Router Advertisement message that impersontes the local router Set the Router Lifetime to 0 (or some other small value) As a result, the victim host will remove the router from the default routers list
144 Exploit DAD for Denial of Service Listen to Neighbor Solicitation messages with the Source Address set to the IPv6 unspecified address (::). When such a message is received, respond with a Neighbor Advertisement message As a resul, the address will be considered non-unique, and DAD will fail. The host will not be able to use that tentative address
145 Advertise Malicious Network Parameters An attacker could advertise malicious network parameters for the purpose of Denial of Service or performance-degrading. For example, it could advertise a very small Current Hop Limit such that packets be discarded by the intervenning routers
146 Possible countermeasures Deploy SeND (SEcure Neighbor Discovery) Monitor Neighbor Discovery traffic (e.g., with NDPMon) Restrict access to the local network Deploy Router Advertisement Guard (RA-Guard)
147 Router Advertisement Guard Many organizations employ RA-Guard as the first line of defense against attacks based on forged Router-Advertisements RA-Guard works (roughly) as follows: A layer-2 device is configured such that it accepts Router Advertisements on a specified port. Router Advertisement messages received on other port are silently dropped (At layer-2) The RA-Guard mechanism relies on the device s ability to identify Router Advertisement messages
148 Problem Statement The specifications allow for the use of multiple extension headers, even of the same type and implementations support this. This is even allowed for Neighbor Discovery messages, that currently make no legitimate use of IPv6 Extension Headers. Thus, the structure of the resulting packet becomes increasingly complex, and packet filtering becomes virtually impossible.
149 RA-Guard: Evasion technique #1 RA-Guard implementations fail to process the entire IPv6 header chain N H =60 IP v 6 IP v 6 H eader H eader N H =58 D e s tin a tio n O p tio n s D e s tin a tio n O p tio n s H eader H eader IC M P v 6 IC M P v 6 R o u te r R o u te r A d v e r tis e m e n t A d v e r tis e m e n t
150 RA-Guard: Evasion technique #2 Combination of a Destination Options Header and fragmentation: NH=60 Original Packet IP v 6 H e a I dp ev r6 Header NH=44 First Fragment IP v 6 H e a I Pd ev 6r Header NH=44 Second Fragment NH=58 IP v 6 H e a I dp ev r6 Header IC M P v 6 R IoCu Mt e Pr v 6 A d v e r Rt i so eu mt e er n t A d v e rtis e m e n t D e s tin a tio n O p tio n s D e s t Hi n ea at ido en r O p t i o n s Header NH=60 F ra g m e n t HF er aa dg em r e n t Header NH=58 D e s tin a tio n O p tio n s D e s t ihn ea at ido en r O p t i o n s Header Can only tell there s ICMv6 inside NH=60 F ra g m e n t HF er aa gd me r e n t Header D e s t. O p t. HD e e a s dt.e Or p t. Header IC M P v 6 R oi Cu Mt e Pr v 6 A d v e r Rt i so eu mt e er n t A d v e rtis e m e n t Can only tell there s Dest. Opt. Hdr inside!
151 RA-Guard: Evasion technique #2(++) Two Destination Options headers, and fragmentation: N H =60 Original Packet IP v 6 H e ai dp ev r6 H eader N H =44 First Fragment IP v 6 H e ai dp ev r6 H eader N H =44 Second Fragment N H =60 IP v 6 H e ai Pd ev r6 H eader N H =58 D e s tin a tio n O p tio n s D e s t ihn ea at i do en r O p t i o n s H eader N H =60 F ra g m e n t HF er aa gd me r e n t H eader N H =60 D e s t. O p tio n s D eh se t a. do e pr t i o n s H eader IC M P v 6 R IoC umt epr v 6 A d v e r Rt i so eu mt e er n t A d v e rtis e m e n t N H =60 Can only tell there s Dest. Opt. Hdr inside! D e s t. O p tio n s D eh se t a. do e pr t i o n s H eader N H =58 F ra g m e n t D. O p t. D e s t. O p tio n s D eh se t a. do e pr t i o n s HF er aa gd me r e n t HD d. r O. p t. H eader H d r. H eader IC M P v 6 R IoC umt epr v 6 A d v e r Rt i so eu mt e er n t A d v e r tis e m e n t Can only tell there s Dest. Opt. Hdr inside!
152 Some comments about RA-Guard The use of a single Destination Options header is enough to evade most implementations of RA-Guard. If a Fragment Header is combined with two Destination Options headers, it becomes impossible for layer-2 device to filter forged Router Advertisements. This technique can also be exploited to circumvent Neighbor Discover monitoring tools such as NDPMon See my ongoing work on RA-Guard evasion: Or
153 Some sysctl s for autoconf (OpenBSD) net.inet6.ip6.accept_rtadv (defaults to 1): Controls whether Router Advertisements are accepted. net.inet6.ip6.dad_count (defaults to 1): Number of DAD probes sent when an interface is first brought up net.inet6.ip6.maxifprefixes (defaults to 16): Maximum number of prefixes per interface. net.inet6.ip6.maxifdefrouters (defaults to 16): maximum number fo default routers per interface.
154 IPv6 super-cookies When SLAAC is employed, the Interface ID is set to a Modified EUI64 Identifier (based on the MAC address) Since MAC addresses are globally-unique, this results in a supercookie (no, I didn't coin the term myself :-)) Hosts can be traced as they move from one network to another The prefix will change, but the globally-unique Interface Identifier will remain the same
155 IPv6 Privacy Extensions To MITIGate this privacy issue, Privacy Extensions for SLAAC were standardized (RFC 4941) Basically, the MAC-derived ID is replaced with a randomlygenerated ID, and addresses are regenerated over time This may be undesirable in some scenarios, since it makes logging harder Some OSes use (?) an alternative scheme: The Interface ID is selected from a result of a hash function over the prefix and some secret value Addresses are constant for any given prefix But the Interface-ID changes as the host moves This approach has the best of the two worlds
156 sysctl s for Privacy Addresses Privacy extensions for autoconf is implemented in FreeBSD (but not in, e.g., OpenBSD) These sysctl s control their operation: net.inet6.ip6.use_tempaddr (defaults to 0) net.inet6.ip6.temppltime (defaults to 86400) Specifies the preferred lifetime for privacy addresses net.inet6.ip6.tempvltime (defaults to ) Controls whether Privacy addresses are configured Specifies the valid lifetime for privacy addresses net.inet6.ip6.prefer_tempaddr (defaults to 0) Controls whether privacy addresses are preferred (i.e., whether outgoing conections should use privacy addresses)
157 Dynamic Host Configuration Protocol version 6 (DHCPv6)
158 Brief Overview IPv6 version of DHCPv4: mechanism for stateful configuration It implements prefix delegation, such that a DHCPv6 server can assign not only an IPv6 address, but also an IPv6 prefix. It is an optional mechanism which is invoked only if specified by Router Advertisement messages. It used to be the only mechanism available to advertise recursive DNS servers It can be exploited in a similar way to Router Advertisement messages. It suffers the same problems as IPv6 SLAAC: If no authentication is enforced, it is trivial for an attacker to forge DHCPv6 packets Layer2- mitigations can be easily circumvented with the same techniques as for RA-Guard
159 Multicast Listener Discovery
160 Brief Overview A generic protocol that allows hosts to inform local routers which multicast groups they are interested in. Routers use the infomation to decide which packets must be forwarded to the local segment. Since Neighbor Discovery uses multicast addresses (the solicitednode multicast addresse), MLD is used by all IPv6 nodes In practice, they only use for MLD with Neighbor Discovery is MLDsnooping switches switches that interpret MLD packet to decide on which ports packets should be forwarded. Potential issues: If a MLD-snooping switch is employed, MLD could be exploited for Denial of Service attacks. MLDv2 implements per-source filtering capabilities, and greatly increases the complexity of MLD(v1). Security-wise, MLDv1 should be preferred.
161 IPsec Support
162 Brief overview and considerations Myth: IPv6 is more secure than IPv4 because security was incorporated in the design of the protocol, rather than as an addon This myth originated from the fact that IPsec support is mandatory for IPv6, but optional for IPv4 In practice, this is irrelevant: What is mandatory is IPsec support, not IPsec usage. And nevertheless, many IPv4 implementations support IPsec, while there exist IPv6 implementations that do not support IPsec. Virtually all the same IPsec deployment obstacles present in IPv4 are also present in IPv6. The IETF has acknowledged this fact, and is currently changing IPsec support in IPv6 to optional Conclusion: there is no reason to expect increased use of IPsec as a result of IPv6 deployment
163 DNS support for IPv6
164 Brief Overview AAAA (Quad-A) records enable the mapping of domain names to IPv6 addresses The zone ip6.arpa is used for the reverse mapping (i.e., IPv6 addresses to domain names) DNS transport can be IPv4 and/or IPv6 Troubleshooting tools such as dig already include support for IPv6 DNS features Security implications: Increased size of DNS responses due to larger addresses might be exploited for DDos attacks
165 Looking for IPv6-enabled hosts The dig tool can be used to investigate IPv6-related DNS Reseource Records. Example: $ dig aaaa ; <<>> DiG <<>> aaaa ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ; IN AAAA ;; ANSWER SECTION: IN AAAA 2a02:27f8:1025:18::232 ;; Query time: 1 msec ;; SERVER: #53( ) ;; WHEN: Wed Nov 16 01:04: ;; MSG SIZE rcvd: 65
166 IPv6 reverse mapping The dig tool can be also used to obtain the reverse mappings. Example: $ dig -x 2a02:27f8:1025:18::232 ; <<>> DiG <<>> -x 2a02:27f8:1025:18::232 ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ; f a.2.ip6.arpa. IN PTR ;; ANSWER SECTION: f a.2.ip6.arpa IN PTR srv01.bbserve.nl. ;; Query time: 269 msec ;; SERVER: #53( ) ;; WHEN: Wed Nov 16 01:12: ;; MSG SIZE rcvd: 120
167 IPv6 Transition Co-Existence Technologies
168 IPv6 Transition/Co-existence Technologies Original transition plan: deploy IPv6 before we ran out of IPv4 addresses, and eventually turn off IPv4 when no longer needed it didn t happen The current transition/co-existence plan is based on a toolbox: Dual-stack Tunnels Translation Their use is intented for different networks setups Dual-stack is enabled by default in most general-purpose OSes Some transition mechanisms (e.g. Teredo an ISATAP) are enabled by default in smoe OSes (e.g. Windows Vista and Windows 7)
169 Transition Technologies Dual Stack
170 Dual-stack Each node supports both IPv4 and IPv6 Domain names include both A and AAAA (Quad A) records IPv4 or IPv6 are used as needed Dual-stack was the original transition co-existence plan, and still is the recommended strategy for servers Virtually all popular operating systems include native IPv6 support enabled by default
171 Exploiting Native IPv6 Support An attacker can connect to an IPv4-only network, and forge IPv6 Router Advertisement messages. (*) The IPv4-only hosts would configure IPv6 connectivity IPv6 could be leveraged to evade network security controls (if the network ignores IPv6) Possible counter-measures: Implement IPv6 security controls, even on IPv4-only networks. Disable IPv6 support in nodes that are not expected to use IPv6 (*)
172 Exploiting Native IPv6 Support (II) Some applications may be IPv6-enabled, but may have unexpected behaviors when IPv6 is employed. They may crash, fail to log users (*), etc. Example: Possible counter-measures: Implement IPv6 security controls, even on IPv4-only networks. Disable IPv6 support in nodes that are not expected to use IPv6 (*) Gmail complete anonymity possible with IPv6. Post to the full-disclosure mailing-list. Available at:
173 Transition Technologies Tunnels
174 Tunnels Use the existing IPv4 Internet to transport IPv6 packets from/to IPv6 islands Tunnels can be: configured: some sort of manual configuration is needed automatic: the tunnel end-points are derived from the IPv6 addresses Configured tunnels: 6in4 Tunnel broker Automatic tunnels: ISATAP 6to4 6rd Teredo
175 6in4 The tunnel endpoints must be manually configured Management can be tedious Security may be used as needed (e.g., IPsec) May operate across NATs (e.g. IPsec UDP encapsulation, or if the DMZ function is employed)
176 Tunnel broker The Tunnel Broker is model to aid the dynamic establishment of tunnels (i.e., relieve the administrator from manual configuration) The TB is used to manage the creation, modification or deletion of a tunnel Example: Tunnel Broker with the Tunnel Setup Protocol (TSP)
177 Tunnel Broker: Sample Implementation Gogoc is a tunnel broker implementation It even allows anonymous tunnel establishment (no account needed) Install it, and welcome to the IPv6 Internet! Privacy concerns: Beware that all your traffic will most likely follow a completely different path from your normal IPv4 traffic.
178 ISATAP: Brief Overview Intra-Site Automatic Tunnel and Addressing Protocol Aims at enabling IPv6 deployment withing a site with no IPv6 infrastructure -- does not work across NATs
179 ISATAP: Address format ISATAP uses normal global prefixes However, a special format is specified for the Interface ID, such that it encodes the IPv4 address of the ISATAP host ug IPv4 address ISATAP hosts learn the IPv4 address of the ISATAP router by resolving the name isatap. On the other hand, when an ISATAP router receives a native IPv6 packet destined to one of its ISATAP hosts, it learns the hosts' IPv4 address from the Interface ID
180 Exploting ISATAP Microsoft implementations learn the IPv4 address of the ISATAP router by resolving the name isatap (via DNS and others) An attacker could forge name resolution responses to: Impersonate a legitimate ISATAP router Enable IPv6 connectivity in an otherwise IPv4-only network This could be used in conjunction with other attacks (e.g. forging DNS responses such that they contain AAAA records)
181 6to4: Brief overview Enables IPv6 deployment in sites with no global IPv6 connectivity - does not work across NATs (unless the DMZ function is used) 6to4 architecture:
182 6to4: Address format 6to4 addresses use the special prefix 2002::/16 They encode the tunnel endpoint in part of the network prefix On the IPv6 world, they are treated as normal addresses The prefix can be used for autoconfiguration Packets are router towards ASes advertising reachability to the 2002::/ bits V4ADDR Subnet Interface ID
183 6to4: Packets originating at 6to4 hosts Packets originate at a 6to4 host as native IPv6 packets A 6to4 router encapsulates the packet in IPv4, and sets the IPv4 Destination Address to: that of a 6to4 relay (if the IPv6 destination is a native IPv6 host) That of the corresponding 6to4 router (if the IPv6 Destination is a 6to4 host) The receiving 6to4 relay decapsulates the packets and forwards them on the native IPv6 network The receiving 6to4 router decapsulates the packets, and forwards them on the 6to4-powered IPv6 network.
184 6to4: Packets originating from IPv6 hosts Packets are routed in the native IPv6 Internet towards ASes announcing reachability to the 2002::/16 prefix Those ASes have deployed 6to4 relays, which help bridge the IPv4 and the IP6 Internets They encapsulate the aforementioned packets in IPv4, and set the IPv4 Destination Address to the one encoded in the 6to4 address The 6to4 router decapsulates the IPv6 packets, and forwards it to the local IPv6 network The packet travels over the IPv4 Internet to the 6to4 router The IPv4 router decapsultes the IPv6 packet, and forwards it to the 6to4-powered IPv6 network
185 Problems with 6to4 Lots of poorly-managed 6to4 relays have been deployed In most cases they introduce PMTUD black-holes (e.g. as a result of ICMPv6 rate-limiting) Lack of control of which 6to4 relays are used make troubleshooting difficult Use of the 6to4 anycast address makes it difficult to identify a poorlymanaged relay in the 6to4 -> native IPv6 direction It is always difficult to troubleshoot problems in the native IPv6 -> 6to4 direction (the user has no control over which relay is used) Privacy concerns: 6to4 traffic might take a completely different path than IPv4 traffic
186 6rd: Brief overview 6rd stands for IPv6 rapid deployment Enables IPv6 deployment in a site with no IPv6 infrastructure Builds upon 6to4 but the whole system is implemented within a site
187 6rd: Address format 6rd uses no special prefixes normal IPv6 Global Unicast addresses are employed But the addresses encode the tunnel endpoint in the prefix This is only known to the 6rd routers Is transparent to the rest of the world 6rd address format: n bits o bits m bits 128-n-o-m bits rd prefix IPv4 address subnet ID interface ID <--- 6rd delegated prefix --->
188 Teredo: Brief overview Aims at providing IPv6 connectivity to individual hosts behind one or more NATs -- last resort mechanism for IPv6 connectivity It tunnels IPv6 packets over UDP/IPv4
189 Teredo: Brief overview (II) Each Teredo client is associated with a Teredo server The Teredo acts as an agent to the client, such that the client is reachable from the public Internet Teredo systems (hosts or relays) willing to send packets to the Teredo client talk with the corresponding Teredo server Holes will be punched in the NAT as needed Teredo is a smart transition mechanism... but the resulting performance is usually as bas as it could possibly get.
190 Teredo: Address format Teredo uses a special prefix The Teredo address encodes: The Teredo server's IPv4 address The Teredo client's IPv4 address The Teredo client's UDP port Teredo address format: Teredo Pref Server IPv4 Flags Port Client IPv
191 Securiy Implications of Teredo Teredo increases the host exposure to attack Hosts behind a NAT may become reachable from the public Internet Windows systems obtain the address of a Teredo serving by resolving teredo.ipv6.microsoft.com An attacker could impersonate a Teredo server if he can attack the DNS Privacy concerns: Teredo traffic might take a completely different path than IPv4 traffic
192 Transition Technologies Translation
193 Brief overview All of the previous transition/co-existence technologies require assignment of both IPv4 and IPv6 addresses But...what if there are no IPv4 addresses left? A number of technologies have been developed to share IPv4 addresses at a large scale: CGN (Carrier-Grade NAT) A+P Additionally, NAT64 has been developed, such that IPv6-only hosts can access IPv4-only hosts The future doesn t look like NAT-free..
194 Security impications Translation introduces a single point of failure in the network They will be interesting targets for attackers Since the have been recently developed, they are likely to be buggy
195 Security Implications of IPv6 on IPv4 Networks
196 Security Implications on IPv4 Networks Transition Technologies
197 Exploiting Transition Technologies Some systems (notably Windows) have support of trnasition technologies enabled by default. These technologies could be used to circumvent security controls. Technologies such as Teredo could increase the attack expoure of hosts Possible countermeasures: Enforce IPv6 security controls on IPv4 networks. Disable support of these technologies. Deploy packet filtering policies, such that these technologies are blocked.
198 Filtering IPv6 Transition Technologies Transition Technology Filtering rule Dual-Stack IPv6-in-IPv4 tunnels 6to4 Automatic (if network does not support IPv6) IPv4 Protocol == 41 IPv4.Protocol == 41 && IPv4.{src,dst} == /24 ISATAP IPv4 Protocol == 41 Teredo IPv4.dst == known_teredo_servers && UDP.DstPort == 3544 TSP IPv4.dst == known_teredo_servers && {TCP,UDP}.dst == 3653
199 IPv6 Network Reconnaissance
200 IPv6 Network Reconnaisance Host scanning
201 Leveraging IPv6 features ICMPv6 echo/request response Traceroute6 (based on ICMPv6 errors) ICMPv6 Node Information messages IPv6 options of type 10xxxxxx IPv6 multicast addresses Sniffing Special IPv4 addresses used for trasition technologies (e.g., Teredo)
202 Multicast addresses Multicast address (e.g. ff02::1) can be leveraged for host scanning However, some stacks (notably Windows Vista/7) do not respond to Echo Requests sent to multicast addresses Trick: send packets with unsupported options of type 10xxxxxx Even Windows Vista/7 responds to these! Note: Hosts will tipically respond using a link-local unicast (fe80::/10) address i.e., this technique does not discover global address Global addresses can be obtained, indirectly: Learn link-local addresses of hosts Learn global prefixes used in the subnet Form global addresses with the global prefixes and the Interface ID of the local address Check that the addresses actually exist
203 Application-layer protocols A number of applications may leak IPv6 addresses: headers P2P applications Together with maling-list archives and popular search engines, they may be an interesting vector for network reconnaisance
204 Example of application-layer leakeage Sample header: X-ClientAddr: Received: from srv01.bbserve.nl (srv01.bbserve.nl [ ]) by venus.xmundo.net (8.13.8/8.13.8) with ESMTP id p93ar0e for Mon, 3 Oct :53: Received: from [2001:5c0:1000:a::943] by srv01.bbserve.nl with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.76) (envelope-from <[email protected]>) id 1RAg8k-0000Qf-Hu; Mon, 03 Oct :52: Message-ID: <[email protected]> Date: Mon, 03 Oct :52: From: Fernando Gont <[email protected]> Organization: SI6 Networks User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-us; rv: ) Gecko/ Thunderbird/ MIME-Version: 1.0 To: Fernando Gont <[email protected]> Subject: Prueba
205 DNS IPv6 addresses can be obtained by querying the DNS for AAAA records. Many sites currently use domain names such as ipv6* For example, you may google for site:ipv6* and site:ip6*
206 Network Neighborhood protocols mdns is increasily used for discovering peers on the same network. Not IPv6-specific, but could be employed with IPv6, too. Hosts announce themselves on the network, for ocassional networking. This provides yet another vector for network reconnaissance
207 IPv6 Network Reconnaisance Port scanning
208 IPv6 port-scanning IPv6 port scanning remains the same as in IPv4 Nmap may be used for such purpose # nmap -6 -p n 2000:db8::1 80/tcp open http 135/tcp open msrpc 445/tcp open microsoft-ds 554/tcp open rtsp 1025/tcp open NFS-or-IIS 1026/tcp open LSA-or-nterm 1027/tcp open IIS 1030/tcp open iad1 1032/tcp open iad3 1034/tcp open unknown 1035/tcp open unknown 1036/tcp open unknown 1755/tcp open wms 9464/tcp open unknown
209 Key areas in which further work is needed
210 Key areas in which further work is needed IPv6 resiliency Implementations have not really been the target of attackers, yet Only a handful of publicly available attack tools Lots of vulnerabilities and bugs still to be discovered. IPv6 support in security devices IPv6 transport is not broadly supported in security devices (firewalls, IDS/IPS, etc.) This is key to be able enforce security policies comparable with the IPv4 counterparts Education/Training Pushing people to Enable IPv6 point-and-click style is simply insane. Training is needed for engineers, technicians, security personnel, etc., before the IPv6 network is running. 20 million engineers need IPv6 training, says IPv6 Forum The IPv6 Forum - a global consortium of vendors, ISPs and national research & Education networks - has launched an IPv6 education certification programme in a bid to address what it says is an IPv6 training infrastructure that is "way too embryonic to have any critical impact. (
211 Some Conclusions
212 Some conclusions Beware of IPv6 marketing and mythology! assumption is the mother of all...err...problems :-) While IPv6 provides similar features than IPv4, it uses different mechanisms and the devil is in the small details The security implications of IPv6 should be considered before it is deployed (not after!) Most systems have IPv6 support enabled by default, and this has implications on IPv4-only networks! Even if you are not planning to deploy IPv6 in the short term, most likely you will eventually do it It is time to learn about and experiment with IPv6!
213 Questions?
214 Thank you! Fernando Gont IPv6 Hackers mailing-list
Security Implications of the Internet Protocol version 6 (IPv6)
Security Implications of the Internet Protocol version 6 (IPv6) Fernando Gont UTN/FRH BSDCan 2010 Ottawa, ON, Canada, May 13-14, 2010 Agenda Ongoing work on IPv6 security at UK CPNI Brief comparision of
Hacking IPv6 Networks
Hacking IPv6 Networks Fernando Gont (UTN/FRH, Argentina) Hack In Paris 2011 Paris, France. June 14-17, 2011 Agenda (I) Objectives of this training Motivation for IPv6 Brief comparision between IPv6 and
Security Assessment of Neighbor Discovery for IPv6
Security Assessment of Neighbor Discovery for IPv6 Fernando Gont project carried out on behalf of UK Centre for the Protection of National Infrastructure LACNIC XV 15 al 20 de Mayo de 2011. Cancún, México
Recent Advances in IPv6 Security. Fernando Gont
Recent Advances in IPv6 Security Fernando Gont About... Security researcher and consultant at SI6 Networks Have worked on security assessment on communications protocols for: UK NISCC (National Infrastructure
Practical Security Assessment of IPv6 Networks and Devices. Fernando Gont
Practical Security Assessment of IPv6 Networks and Devices Fernando Gont About I have done a fair share of IPv6 standardization work I have published and maintain the SI6 Networks IPv6 Toolkit I run the
IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. [email protected]
1 IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. [email protected] Agenda What has not changed between IPv4 and IPv6 traces What has changed between IPv4 and
CloudEngine Series Switches. IPv6 Technical White Paper. Issue 01 Date 2014-02-19 HUAWEI TECHNOLOGIES CO., LTD.
Issue 01 Date 2014-02-19 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
IPv6 Fundamentals: A Straightforward Approach
IPv6 Fundamentals: A Straightforward Approach to Understanding IPv6 Rick Graziani Cisco Press 800 East 96th Street Indianapolis, IN 46240 IPv6 Fundamentals Contents Introduction xvi Part I: Background
IPv6 Associated Protocols
IPv6 Associated Protocols 1 New Protocols (1) New features are specified in IPv6 Protocol -RFC 2460 DS Neighbor Discovery (NDP) -RFC 4861 DS Auto-configuration : Stateless Address Auto-configuration -RFC
The Truth about IPv6 Security
The Truth about IPv6 Security Fernando Gont UTN/FRH FutureNet: MPLS, Ethernet and Beyond Boston, MA, USA, May 10-13, 2010 Agenda Brief comparision of IPv4 and IPv6 A few myths about IPv6 security Transition
IPv6 Network Reconnaissance:
IPv6 Network Reconnaissance: Theory & Practice Fernando Gont Overview IPv6 changes the Network Reconnaissance game Brute force address scanning attacks undesirable (if at all possible) Security guys will
IPv6 Functionality. Jeff Doyle IPv6 Solutions Manager [email protected]
IPv6 Functionality Jeff Doyle IPv6 Solutions Manager [email protected] Copyright 2003 Juniper Networks, Inc. Agenda ICMPv6 Neighbor discovery Autoconfiguration Agenda ICMPv6 Neighbor discovery Autoconfiguration
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
IPv6 Hardening Guide for Windows Servers
IPv6 Hardening Guide for Windows Servers How to Securely Configure Windows Servers to Prevent IPv6-related Attacks Version: 1.0 Date: 22/12/2014 Classification: Public Author(s): Antonios Atlasis TABLE
Vulnerabili3es and A7acks
IPv6 Security Vulnerabili3es and A7acks Inherent vulnerabili3es Less experience working with IPv6 New protocol stack implementa3ons Security devices such as Firewalls and IDSs have less support for IPv6
Types of IPv4 addresses in Internet
Types of IPv4 addresses in Internet PA (Provider Aggregatable): Blocks of addresses that may be sub-assigned to other ISPs or to other companies that also may leased the addresses to their customers May
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
19531 - Telematics. 9th Tutorial - IP Model, IPv6, Routing
19531 - Telematics 9th Tutorial - IP Model, IPv6, Routing Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 06. January, 2011 Institute of Computer Science Telematics
Chapter 3 Configuring Basic IPv6 Connectivity
Chapter 3 Configuring Basic IPv6 Connectivity This chapter explains how to get a ProCurve Routing Switch that supports IPv6 up and running. To configure basic IPv6 connectivity, you must do the following:
gianluca.verin verin@libero. @libero.itit Vicenza.linux.it\LinuxCafe 1
gianluca.verin verin@libero. @libero.itit Vicenza.linux.it\LinuxCafe 1 Agenda IPv6 Basics Connecting to 6Bone Why do we need IPv6? IPv6 Introduction-Transition IPv6 and open source community Future applications
OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS
OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS Eric Vyncke (@evyncke) Cisco Session ID: ARCH W01 Session Classification: Advanced Agenda Status of WorldWide IPv6 Deployment IPv6 refresher:
IPv6 Security Best Practices. Eric Vyncke [email protected] Distinguished System Engineer
IPv6 Best Practices Eric Vyncke [email protected] Distinguished System Engineer security 2007 Cisco Systems, Inc. All rights reserved. Cisco CPub 1 Agenda Shared Issues by IPv4 and IPv6 Specific Issues
About the Technical Reviewers
About the Author p. xiii About the Technical Reviewers p. xv Acknowledgments p. xvii Introduction p. xix IPv6 p. 1 IPv6-Why? p. 1 IPv6 Benefits p. 2 More Address Space p. 2 Innovation p. 3 Stateless Autoconfiguration
Recent advances in IPv6 insecurities Marc van Hauser Heuse Deepsec 2010, Vienna. 2010 Marc Heuse <[email protected]>
Recent advances in IPv6 insecurities Marc van Hauser Heuse Deepsec 2010, Vienna 2010 Marc Heuse Hello, my name is The future is here already Let s start with the basics IPv4 4 octets 4.294.967.296
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
IPv6 Network Reconnaissance:
IPv6 Network Reconnaissance: Theory & Practice Fernando Gont About... I have worked in security assessment of communication protocols for: UK NISCC (National Infrastructure Security Co-ordination Centre)
IPv6 Security from point of view firewalls
IPv6 Security from point of view firewalls János Mohácsi 09/June/2004 János Mohácsi, Research Associate, Network Engineer NIIF/HUNGARNET Contents Requirements IPv6 firewall architectures Firewalls and
Technology Brief IPv6 White Paper.
Technology Brief White Paper. Page 1 of 37 Table of Contents 1 Overview... 3 1.1 Background... 3 1.2 Advantages of... 5 2 Packet... 9 2.1 Basic Header... 9 2.1.1 Extension Headers... 11 2.1.2 ICMP Packet...
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
IPv6 First Hop Security Protecting Your IPv6 Access Network
IPv6 First Hop Security Protecting Your IPv6 Access Network What You Will Learn This paper provides a brief introduction to common security threats on IPv6 campus access networks and will explain the value
Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.
Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.2 COMPARISONS OF IP HEADER FORMATS 2.3 EXTENSION HEADERS 2.3.1 Options
Troubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
ITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
Getting started with IPv6 on Linux
Getting started with IPv6 on Linux Jake Edge LWN.net [email protected] LinuxCon North America 19 August 2011 History and Motivation IPng project July 1994 IPv6 - RFC 2460 December 1998 IPv5 - Internet Stream
IP Address Classes (Some are Obsolete) 15-441 Computer Networking. Important Concepts. Subnetting 15-441 15-641. Lecture 8 IP Addressing & Packets
Address Classes (Some are Obsolete) 15-441 15-441 Computer Networking 15-641 Class A 0 Network ID Network ID 8 16 Host ID Host ID 24 32 Lecture 8 Addressing & Packets Peter Steenkiste Fall 2013 www.cs.cmu.edu/~prs/15-441-f13
IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas
IPv6 Fundamentals Chapter 1: Introduction ti to IPv6 Copyright Cisco Academy Yannis Xydas The Network Today The Internet of today is much different that it was 30, 15 or 5 years ago. 2 Technology Tomorrow
Internet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
IP(v6) security. Matěj Grégr. Brno University of Technology, Faculty of Information Technology. Slides adapted from Ing.
IP(v6) security Matěj Grégr Brno University of Technology, Faculty of Information Technology Slides adapted from Ing. Tomáš Podermański What is IP security? Encryption? Authentication? Authorization? Surveillance?
Firewalls und IPv6 worauf Sie achten müssen!
Firewalls und IPv6 worauf Sie achten müssen! Pascal Raemy CTO Asecus AG [email protected] Asecus AG Asecus AG Security (Firewall, Web-Gateway, Mail-Gateway) Application Delivery (F5 Neworks with BIGIP)
Security Assessments of IPv6 Networks and Firewalls
Security Assessments of IPv6 Networks and Firewalls Fernando Gont Marc Heuse IPv6 Kongress 2013 Frankfurt, Germany. June 6-7, 2013 About Fernando Gont Security researcher and consultant at SI6 Networks
IPv6 Security. Scott Hogg, CCIE No. 5133 Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA
IPv6 Security Scott Hogg, CCIE No. 5133 Eric Vyncke Cisco Press Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA Contents Introduction xix Chapter 1 Introduction to IPv6 Security 3 Reintroduction
Windows 7 Resource Kit
Windows 7 Resource Kit Mitch Tulloch, Tony Northrup, and Jerry Honeycutt To learn more about this book, visit Microsoft Learning at http://www.microsoft.com/mspress/books/ 9780735627000 2009 Microsoft
- IPv6 Addressing - (References: http://cc.uoregon.edu/cnews/spring2001/whatsipv6.html; http://en.wikipedia.org/wiki/ipv6)
1 IPv6 Basics - IPv6 Addressing - The most widespread implementation of IP currently is IPv4, which utilizes a 32-bit address. Mathematically, a 32-bit address can provide roughly 4 billion unique IP addresses
IPv6 Security Analysis
CENTER FOR CONVERGENCE AND EMERGING NETWORK TECHNOLOGIES CCENT School of Information Studies Syracuse University IPv6 Security Analysis TECHNICAL REPORT: T.R. 2014-002 Authored by: Jose Gonzalo Bejar (revised
IPv6 Infrastructure Security
IPv6 Infrastructure Security 2013 North American IPv6 Summit Jeffrey L Carrell Network Conversions Network Security Consultant IPv6 SME/Trainer 1 Agenda IPv6 address fundamentals Operating Systems support
IPv6 Security ::/0. Poland MUM Warsaw March, 2012 Eng. Wardner Maia Brazil
IPv6 Security ::/0 Poland MUM Warsaw March, 2012 Eng. Wardner Maia Brazil Introduction Name: Wardner Maia Country: Brazil Electronic/Telecommunications Engineer Internet Service Provider since 1995 Training
8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
Router Security Configuration Guide Supplement - Security for IPv6 Routers
Report Number: I33-002R-06 Router Security Configuration Guide Supplement - Security for IPv6 Routers A supplement to the NSA Router Security Configuration Guide offering security principles and guidance
IPv6 Protocols & Standards. ISP/IXP Workshops
IPv6 Protocols & Standards ISP/IXP Workshops 1 So what has really changed? Expanded address space Address length quadrupled to 16 bytes Header Format Simplification Fixed length, optional headers are daisy-chained
IP addressing and forwarding Network layer
The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP
Personal Firewall Default Rules and Components
Personal Firewall Default Rules and Components The Barracuda Personal Firewall comes with a default access ruleset. The following tables aim to give you a compact overview of the default rules and their
IPv6 Diagnostic and Troubleshooting
8 IPv6 Diagnostic and Troubleshooting Contents Introduction.................................................. 8-2 ICMP Rate-Limiting........................................... 8-2 Ping for IPv6 (Ping6)..........................................
Host Configuration (Linux)
: Location Date Host Configuration (Linux) Trainer Name Laboratory Exercise: Host Configuration (Linux) Objectives In this laboratory exercise you will complete the following tasks: Check for IPv6 support
Tomás P. de Miguel DIT-UPM. dit UPM
Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability
Learn About Differences in Addressing Between IPv4 and IPv6
> Learn About Differences in Addressing Between IPv4 and IPv6 IPv6 is the most recent generation of the Internet Protocol (IP) defined by the Internet Engineering Task Force (IETF). Initially defined in
Security with IPv6 Explored. U.S. IPv6 Summit 20032. Renée e Esposito Booz Allen Hamilton Richard Graveman RFG Security
Security with IPv6 Explored U.S. IPv6 Summit 20032 December 8-11, 8 2003 Renée e Esposito Booz Allen Hamilton Richard Graveman RFG Security IPv6 Security: Outline 1 Internet Security 2 IPv6: Core Protocols
ProCurve Networking IPv6 The Next Generation of Networking
ProCurve Networking The Next Generation of Networking Introduction... 2 Benefits from... 2 The Protocol... 3 Technology Features and Benefits... 4 Larger number of addresses... 4 End-to-end connectivity...
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
CS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
IPv6 Addressing. Awareness Objective. IPv6 Address Format & Basic Rules. Understanding the IPv6 Address Components
IPv6 Addressing Awareness Objective IPv6 Address Format & Basic Rules Understanding the IPv6 Address Components Understanding & Identifying Various Types of IPv6 Addresses 1 IPv4 Address SYNTAX W. X.
DHCP, ICMP, IPv6. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley DHCP. DHCP UDP IP Eth Phy
, ICMP, IPv6 UDP IP Eth Phy UDP IP Eth Phy Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights
Lecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
NETWORK LAYER/INTERNET PROTOCOLS
CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP
IPv6 Hardening Guide for OS-X
IPv6 Hardening Guide for OS-X How to Configure Mac OS-X to Prevent IPv6-related Attacks Version: 1.0 Date: 29/01/2015 Classification: Public Author(s): Antonios Atlasis TABLE OF CONTENT 1 HANDLING... 4
IPv6 Security Assessment and Benchmarking Abstract Test Suite
IPv6 Security Assessment and Benchmarking Abstract Test Suite Version 1.0 2013-01-22 EANTC AG Copyright (C) 2012, 2013 EANTC European Advanced Networking Test Center Aktiengesellschaft This document is
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
Overview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features
Overview Lecture 16: IP variations: IPv6, multicast, anycast Next generation IP: IPv6 6lowpan and the Internet of Things IP multicast IP anycast Practical considerations throughout I think we have a problem
IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date
IPv4 and IPv6 Integration Formation IPv6 Workshop Location, Date Agenda Introduction Approaches to deploying IPv6 Standalone (IPv6-only) or alongside IPv4 Phased deployment plans Considerations for IPv4
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
Internet Protocol Version 6 (IPv6)
Internet Protocol Version 6 (IPv6) Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 14-1 Overview
Joe Davies. Principal Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group June 1, 2011
Joe Davies Principal Writer Windows Server Information Experience Presented at: Seattle Windows Networking User Group June 1, 2011 2011 Microsoft Corporation IPv6 addressing and DNS review IPv6 subnetting
IPv6 INFRASTRUCTURE SECURITY WORKSHOP SESSION 10 BUILDING IPv6 INFRASTRUCTURE NETWORK SECURITY
IPv6 INFRASTRUCTURE SECURITY WORKSHOP SESSION 10 BUILDING IPv6 INFRASTRUCTURE NETWORK SECURITY Alastair JOHNSON July 2013 INTRODUCTION This module will cover network infrastructure security relating to:
About Me. Work at Jumping Bean. Developer & Trainer Contact Info: Twitter @mxc4 Twitter @jumpingbeansa [email protected]
IPv6 & Linux About Me Work at Jumping Bean Developer & Trainer Contact Info: Twitter @mxc4 Twitter @jumpingbeansa [email protected] Goals & Motivation Why? Why IPv6? Why this talk? Information on
Network layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
IPv6 Addressing and Subnetting
APNIC elearning: IPv6 Addressing and Subnetting Contact: [email protected] eip602_v1.0 Overview IPv6 Address Text Representation IPv6 Addressing Structure IPv6 Address Management Hierarchy Local Addresses
IPv6 Infrastructure Security Jeffrey L Carrell Network Conversions Network Security Consultant, IPv6 SME/Trainer
IPv6 Infrastructure Security Jeffrey L Carrell Network Conversions Network Security Consultant, IPv6 SME/Trainer 1 IPv6 Infrastructure Security v1.1 - Copyright 2013 Jeffrey L. Carrell Agenda IPv6 address
IP network tools & troubleshooting. AFCHIX 2010 Nairobi, Kenya October 2010
IP network tools & troubleshooting AFCHIX 2010 Nairobi, Kenya October 2010 Network configuration Reminder, configure your network in /etc/ rc.conf ( x = your IP, from.10 to...) ifconfig_bge0= 41.215.76.x/24
ICSA Labs Network Protection Devices Test Specification Version 1.3
Network Protection Devices Test Specification Version 1.3 August 19, 2011 www.icsalabs.com Change Log Version 1.3 August 19, 2011 added general configuration note to default configuration in Firewall section
Компјутерски Мрежи NAT & ICMP
Компјутерски Мрежи NAT & ICMP Riste Stojanov, M.Sc., Aleksandra Bogojeska, M.Sc., Vladimir Zdraveski, B.Sc Internet AS Hierarchy Inter-AS border (exterior gateway) routers Intra-AS interior (gateway) routers
How To Compare Ipv6 And Ipv4 To Ipv5 (V1.2.0)
IPv6 and IPv4 Threat Comparison and Best- Practice Evaluation (v1.0) Sean Convery ([email protected]) Darrin Miller ([email protected]) Table of Contents 1 Introduction...2 1.1 Caveats...3 2 Overview of IPv4
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
IPv6 Security. Scott Hogg. Global Technology Resources, Inc. Director of Technology Solutions CCIE #5133, CISSP #4610
IPv6 Security Scott Hogg Global Technology Resources, Inc. Director of Technology Solutions CCIE #5133, CISSP #4610 IPv6 Security Latent Threat Even if you haven t started using IPv6 yet, you probably
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令 1 内 容 流 量 分 析 简 介 IPv6 下 的 新 问 题 和 挑 战 协 议 格 式 变 更 用 户 行 为 特 征 变 更 安 全 问 题 演 化 流 量 导 出 手 段 变 化 设 备 参 考 配 置 流 量 工 具 总 结 2 流 量 分 析 简 介 流 量 分 析 目 标 who, what, where,
IPv6 associated protocols. Piers O Hanlon
IPv6 associated protocols Piers O Hanlon Contributions Main authors Jean-Marc Barozet, Cisco, France Faycal Hadj, Cisco, France Patrick Grossetete, Cisco, France Gunter Van de Velde, Cisco, Belgium Bernard
LAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik
Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and
Implementing DHCPv6 on an IPv6 network
Implementing DHCPv6 on an IPv6 network Benjamin Long [email protected] 8-11-2009 Implementing DHCPv6 on an IPv6 network 2 Table of Contents DHCPv6 Overview...3 Terms used by DHCPv6...3 DHCPv6 Message
IPv6 Security 111 Short Module on Security
IPv6 Security 111 Short Module on Security IPv6 Security 1 Copy Rights This slide set is the ownership of the 6DEPLOY project via its partners The Powerpoint version of this material may be reused and
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
IPv6 for Cisco IOS Software, File 2 of 3: Configuring
IPv6 for Cisco IOS Software, File 2 of 3: Configuring This document provides configuration tasks for the Cisco implementation of IP version 6 (IPv6) in the Cisco IOS software and includes the following
