IPv6 Security Best Practices. Eric Vyncke evyncke@cisco.com Distinguished System Engineer



Similar documents
Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.

Eric Vyncke, Distinguished Engineer, 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

IPv6 Security. Scott Hogg, CCIE No Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN USA

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Security of IPv6 and DNSSEC for penetration testers

Vulnerabili3es and A7acks

IPv6 Fundamentals: A Straightforward Approach

IP(v6) security. Matěj Grégr. Brno University of Technology, Faculty of Information Technology. Slides adapted from Ing.

Firewalls und IPv6 worauf Sie achten müssen!

IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc.

Security implications of the Internet transition to IPv6

IPv6 Security Nalini Elkins, CEO Inside Products, Inc.

Recent advances in IPv6 insecurities Marc van Hauser Heuse Deepsec 2010, Vienna Marc Heuse

Securing the Transition Mechanisms

About the Technical Reviewers

IPv6 Infrastructure Security

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Network Defense Tools

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

IPv6 Hardening Guide for Windows Servers

The Truth about IPv6 Security

Cisco Certified Security Professional (CCSP)

Securing Cisco Network Devices (SND)

Personal Firewall Default Rules and Components

INTRODUCTION TO FIREWALL SECURITY

IPv6 Security. Scott Hogg. Global Technology Resources, Inc. Director of Technology Solutions CCIE #5133, CISSP #4610

Implementing Cisco IOS Network Security

ITL BULLETIN FOR JANUARY 2011

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Firewalls. Pehr Söderman KTH-CSC

IINS Implementing Cisco Network Security 3.0 (IINS)

How To Compare Ipv6 And Ipv4 To Ipv5 (V1.2.0)

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date

IPv6 Infrastructure Security Jeffrey L Carrell Network Conversions Network Security Consultant, IPv6 SME/Trainer

Chapter 8 Network Security

IPv6 Fundamentals, Design, and Deployment

IPv6 Security from point of view firewalls

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

ICSA Labs Network Protection Devices Test Specification Version 1.3

Vicenza.linux.it\LinuxCafe 1

CCIE Security Written Exam ( ) version 4.0

"Charting the Course...

Security Technology: Firewalls and VPNs

ΕΠΛ 674: Εργαστήριο 5 Firewalls

IPv6 Associated Protocols

Network Security and Firewall 1

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 8 Security Pt 2

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.

(d-5273) CCIE Security v3.0 Written Exam Topics

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Network Security Fundamentals

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

CS5008: Internet Computing

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Firewalls. Chapter 3

Basic IPv6 WAN and LAN Configuration

Cisco Certified Network Expert (CCNE)

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Introduction to IP v6

Matt Ryanczak Network Operations Manager

Firewall Firewall August, 2003

Security with IPv6 Explored. U.S. IPv6 Summit Renée e Esposito Booz Allen Hamilton Richard Graveman RFG Security

Introduction of Intrusion Detection Systems

Security Assessment of Neighbor Discovery for IPv6

How To Learn Cisco Cisco Ios And Cisco Vlan

IPv6 Security:Threats and solutions

Cisco ASA, PIX, and FWSM Firewall Handbook

Getting started with IPv6 on Linux

Tomás P. de Miguel DIT-UPM. dit UPM

FIREWALLS & CBAC. philip.heimer@hh.se

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Practical Security Assessment of IPv6 Networks and Devices. Fernando Gont

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Firewalls P+S Linux Router & Firewall 2013

ProCurve Networking IPv6 The Next Generation of Networking

Cisco QuickVPN Installation Tips for Windows Operating Systems

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Interconnecting Cisco Network Devices 1 Course, Class Outline

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Securizarea Calculatoarelor și a Rețelelor 13. Implementarea tehnologiei firewall CBAC pentru protejarea rețelei

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Chapter 4 Firewall Protection and Content Filtering

Transcription:

IPv6 Best Practices Eric Vyncke evyncke@cisco.com Distinguished System Engineer security 2007 Cisco Systems, Inc. All rights reserved. Cisco CPub 1

Agenda Shared Issues by IPv4 and IPv6 Specific Issues for IPv6 IPsec everywhere, dual-stack, tunnels Cisco IPv6 Solutions ACL and Firewalls Secure IPv6 transport over public network 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2

Shared Issues Issues Shared by IPv4 and IPv6 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3

Reconnaissance in IPv6 Scanning Methods Are Likely to Change Default subnets in IPv6 have 2 64 addresses 10 Mpps = more than 50 000 years Public servers will still need to be DNS reachable Administrators may adopt easy-to-remember addresses (::10,::20,::F00D, ::C5C0 or simply IPv4 last octet for dual stack) See also draft-ietf-v6ops-scanning-implications-03.txt 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4

Viruses and Worms in IPv6 Viruses and email worms: IPv6 brings no change Other worms: IPv4: reliance on network scanning IPv6: not so easy (see reconnaissance) => will use alternative techniques Worm developers will adapt to to IPv6 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5

IPv6 Privacy Extensions (RFC 3041) /23 /32 /48 /64 2001 Interface ID Temporary addresses for IPv6 host client application Inhibit device/user tracking Random 64 bit interface ID Recommendation: Use Privacy Extensions for External Communication but not for Internal Networks (Troubleshooting and Attack Trace Back) 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6

L3 Spoofing in IPv6 urpf Remains the Primary Tool for Protecting Against L3 Spoofing urpf Loose Mode Spoofed IPv6 Source Address Access Layer Inter-Networking Device with urpf Enabled X IPv6 Intranet/Internet No Route to Src Addr prefix => Drop urpf Strict Mode Access Layer Inter-Networking Device with urpf Enabled X IPv6 Intranet/Internet Spoofed IPv6 Source Address No Route to Src Addr prefix out the packet inbound interface => Drop 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 7

ICMPv4 vs. ICMPv6 Significant changes More relied upon ICMP Message Type Connectivity Checks Informational/Error Messaging Fragmentation Needed Notification Address Assignment Address Resolution Multicast Group Management Mobile IPv6 Support ICMPv4 X X X ICMPv6 X X X X X X X => ICMP policy on firewalls needs to change See RFC 4890 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 8

Potential Additional ICMPv6 Border Firewall Policy For Your Reference Internet Firewall B Internal Server A Action Src Dst ICMPv6 Type ICMPv6 Code Name Permit Any A, B 4 1, 2 Parameter Problem Permit Any B 130 132 0 Multicast Listener Permit Any B 133/134 0 Neighbor Solicitation and Advertisement 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9

Routing Header Attacks CanSecWest Vancouver 2007: Fun with IPv6 routing headers P. Biondi & A. Ebalard Good old Ipv4 tricks (rebound to bypass firewall + amplification) Solution: Apply same policy for IPv6 as for Ipv4: Block Routing Header type 0 At the intermediate nodes no ipv6 source-route 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10

Neighbor Discovery Mechanisms Built into Discovery Protocol = None A B Src = A Dst = Solicited-node multicast of B ICMP type = 135 Data = link-layer address of A Query: what is your link address? Attack Tool: Parasite6 Src = B Dst = A ICMP type = 136 Data = link-layer address of B A and B Can Now Exchange Packets on This Link 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11

Secure Neighbor Discovery (SEND) RFC 3971 Use cryptography to secure the IPv6 <-> MAC Can also be used to secure stateless autoconfiguration IOS availability in 2008 Some impact on performance (RSA signatures) Still requires port security to secure MAC <-> port 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12

IPv6 Attacks with Strong IPv4 Similarities Sniffing Without IPSec, IPv6 is no more or less likely to fall victim to a sniffing attack than IPv4 Application layer attacks Even with IPSec, the majority of vulnerabilities on the Internet today are at the application layer, something that IPSec will do nothing to prevent Flooding Flooding attacks are identical between IPv4 and IPv6 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13

IPv6 Stacks Vulnerabilities IPv6 stack are new and could be buggy IPv6 enabled application can have bugs Some examples Python getaddreinfo() remote IPv6 buffer overflow Apache remote IPv6 buffer overflow Postfix IPv6 unauthorized mail relay vulnerability Linux kernel IPv6 DoS OpenBSD remote code execution in IPv6 stack (March 07) 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14

By the Way: It Is Real IPv6 Hacking Tools Let the Games Begin Sniffers/packet capture Snort TCPdump Sun Solaris snoop COLD Ethereal Analyzer Windump WinPcap NetPeek Sniffer Pro Scanners IPv6 security scanner Netcat DoS Tools 6tunneldos 4to6ddos Imps6-tools Packet forgers SendIP Packit Spak6 Complete tool http://www.thc.org/thc-ipv6/ 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15

Specific IPv6 Issues Issues Applicable only to IPv6 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16

The IPsec Myth: IPsec End-to-End will Save the World IPv6 mandates the implementation of IPsec IPv6 does not require the use of IPsec Some organizations believe that IPsec should be used to secure all flows... Interesting scalability issue (n 2 issue with IPsec) Need to trust endpoints and end-users because the network cannot secure the traffic: no IPS, no ACL, no firewall Network telemetry is blinded: NetFlow of little use Network services hindered: what about QoS? Recommendation: do not use IPsec end to end within an administrative domain. Residential use is probably recommended 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 17

Dual Stack Host Considerations Host security on a dual-stack device Applications can be subject to attack on both IPv6 and IPv4 Host security controls should block and inspect traffic from both IP versions Host intrusion prevention, personal firewalls, VPN clients, etc. IPv4 IPsecVPN with No Split Tunneling Dual Stack Client IPv6 HDR IPv6 Exploit Does the IPsec Client Stop an Inbound IPv6 Exploit? 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 18

Dual Stack with Enabled IPv6 by Default Your host: IPv4 is protected by your favorite personal firewall... IPv6 is enabled by default (Vista, Linux, MacOS,...) Your network: Does not run IPv6 Your assumption: I m safe Reality You are not safe Attacker sends Router Advertisements Your host configures silently to IPv6 You are now under IPv6 attack => Probably time to configure IPv6 on your network 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 19

IPv6 Tunneling Summary RFC 1933/2893 configured and automatic tunnels RFC 2401 IPSec tunnel RFC 2473 IPv6 generic packet tunnel RFC 2529 6over4 tunnel RFC 3056 6to4 tunnel ISATAP tunnel MobileIPv6 (uses RFC2473) Teredo tunnels Multiple solutions... No authentication but for IPsec 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 20

Issues with Tunnels Explicitly configured tunnels E.g. ISATAP protocol 41 Under network administrator control No authentication => threat limited to traffic injection Implicitly configured tunnels E.g. Teredo on Windows Vista UDP/3544 Preconfigured No control by network administrator Can bypass corporate firewall...... And drill a hole in the firewall... 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 21

Cisco IPv6 Solutions 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 22

Cisco IOS IPv6 ACL Cisco IOS Firewall IPv6 Support Standard/Extended IPv6 ACL IOS firewall since March 2004/12.3(7)T Stateful protocol inspection of IPv6: fragmented packets, TCP, UDP, ICMP and FTP traffic IPv4/v6 coexistence, no need for new hardware, just software Recognizes IPv6 extension header information such as routing header, hop-by-hop options header, fragment header, etc. IPv4 Site 3 Dual Stack Router IPv6 Internet Site 2 IPv6 IPv6 IPv6 Router with Cisco IOS Firewall IPv6 Router with Cisco IOS Firewall IPv6 Router with Cisco IOS Firewall (IPv4) IPv6 Router with Cisco IOS Firewall IPv6 Site 1 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 23

ASA and PIX Firewall IPv6 Support Since ASA 7.0 (April 05) IPv4/IPv6 coexistence Application awareness HTTP, FTP, telnet, SMTP, TCP, SSH, UDP urpf and v6 Frag guard Management access via IPv6 Telnet, SSH, HTTPS Caveat: no fail-over support 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 24

Secure IPv6 over IPv4/6 Public Internet No traffic sniffing No traffic injection Public Network Site 2 Site Remote Access IPv4 6in4/GRE tunnels protected by IPsec ISATAP protected by IPsec SSL VPN Client AnyConnect 2.0 IPv6 IPsec VTI 12.4(6)T N/A 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 25

Secure RA IPv6 Traffic over IPv4 Public Network: ISATAP in IPSec IPsec protects IPv4 unicast traffic... The encapsulated IPv6 packets IPsec ISATAP IPv6 Network IPv6 PC IPv4 Enterprise VPN head-end (ASA, IOS,...) ISATAP Tunnel server on dual stack router 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 26

Conclusion 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 27

Key Take Away So, nothing really new in IPv6 Lack of operation experience may hinder security for a while enforcement is possible Control your IPv6 traffic as you do for IPv4 Leverage IPsec and SSL to secure IPv6 when possible Beware of the IPv6 latent threat: your network may ALREADY be vulnerable to IPv6 attacks 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 28

2007 Cisco Systems, Inc. All rights reserved. Cisco Public 29