Practical Security Assessment of IPv6 Networks and Devices. Fernando Gont



Similar documents
Recent Advances in IPv6 Security. Fernando Gont

Security Assessment of Neighbor Discovery for IPv6

Security Assessments of IPv6 Networks and Firewalls

IPv6 Network Reconnaissance:

Security of IPv6 and DNSSEC for penetration testers

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

IPv6 Network Reconnaissance:

Recent advances in IPv6 insecurities Marc van Hauser Heuse Deepsec 2010, Vienna Marc Heuse

IP(v6) security. Matěj Grégr. Brno University of Technology, Faculty of Information Technology. Slides adapted from Ing.

IPv6 Security Best Practices. Eric Vyncke Distinguished System Engineer

IPv6 Security Analysis

Security Implications of the Internet Protocol version 6 (IPv6)

IPv6 Associated Protocols

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc.

IPv6 Infrastructure Security

IPv6 Fundamentals: A Straightforward Approach

INLICHTINGEN DIENSTEN INLICHTINGEN DIENSTEN

CSCE 465 Computer & Network Security

IPV6 FRAGMENTATION. The Case For Deprecation. Ron Bonica NANOG58

IPv6 Intrusion Detection Research Project

Unix System Administration

IPv6 Hardening Guide for Windows Servers

IPv6 Infrastructure Security Jeffrey L Carrell Network Conversions Network Security Consultant, IPv6 SME/Trainer

IPv6 Security from point of view firewalls

Server Iron Hands-on Training

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

IPv6 Security Nalini Elkins, CEO Inside Products, Inc.

IPv6 First Hop Security Protecting Your IPv6 Access Network

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Testing IPv6 Firewalls with ft6

Internet Protocol Version 6 (IPv6)

IPv6 Security. Scott Hogg, CCIE No Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN USA

IPv6 Security Assessment and Benchmarking Abstract Test Suite

IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令

Moonv6 Test Suite. IPv6 Firewall Functionality and Interoperablility Test Suite. Technical Document. Revision 0.6

Internet Protocols Fall Lectures 7-8 Andreas Terzis

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

Chiron. An All-In-One IPv6 Pen-Testing Framework. secfu.net Antonios Atlasis

1. Firewall Configuration

Chapter 8 Security Pt 2

Brocade NetIron Denial of Service Prevention

ACHILLES CERTIFICATION. SIS Module SLS 1508

IPv6 Diagnostic and Troubleshooting

Introduction to IP v6

Network layer: Overview. Network layer functions IP Routing and forwarding

Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.

IP Address Classes (Some are Obsolete) Computer Networking. Important Concepts. Subnetting Lecture 8 IP Addressing & Packets

The Truth about IPv6 Security

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

Looking for Trouble: ICMP and IP Statistics to Watch

Carrier/WAN SDN Brocade Flow Optimizer Making SDN Consumable

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Firewall Firewall August, 2003

CloudEngine Series Switches. IPv6 Technical White Paper. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

Firewalls and Intrusion Detection

IPv6 Functionality. Jeff Doyle IPv6 Solutions Manager

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Vulnerabili3es and A7acks

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Firewalls und IPv6 worauf Sie achten müssen!

Announcements. No question session this week

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Firewall Implementation

Security Impacts of Abusing IPv6 Extension Headers

The ntop Project: Open Source Network Monitoring

Stateful Firewalls. Hank and Foo

IPv6 Security ::/0. Poland MUM Warsaw March, 2012 Eng. Wardner Maia Brazil

IPv6 associated protocols. Piers O Hanlon

Deploying IP Anycast. Core DNS Services for University of Minnesota Introduction and General discussion

Internet Control Protocols Reading: Chapter 3

6LoWPAN: An Open IoT Networking Protocol

8.2 The Internet Protocol

Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso

SEcure Neighbour Discovery: A Report

Frequent Denial of Service Attacks

Lecture Computer Networks

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Eric Vyncke, Distinguished Engineer, 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1

How do I get to

Firewalls. Ahmad Almulhem March 10, 2012

Personal Firewall Default Rules and Components

A Sampling of Internetwork Security Issues Involving IPv6

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Attack Lab: Attacks on TCP/IP Protocols

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Layer 4-7 Server Load Balancing. Security, High-Availability and Scalability of Web and Application Servers

Host Configuration (Linux)

Innominate mguard Version 6

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Linux Network Security

IPv6 Security. Scott Hogg. Global Technology Resources, Inc. Director of Technology Solutions CCIE #5133, CISSP #4610

Transcription:

Practical Security Assessment of IPv6 Networks and Devices Fernando Gont

About I have done a fair share of IPv6 standardization work I have published and maintain the SI6 Networks IPv6 Toolkit I run the IPv6 Hackers mailing-list References at: http://www.gont.com.ar Everyday work: Security Assessment Producing fixes Tools & Testing

Agenda I ve never met anybody who really did spend blood on something who wasn t eager to describe what they ve done and how they did it and why -- Ken Thompson (in Coders at Work: Reflections on the Craft of Programming ) This talk is about SI6 Network's IPv6 Toolkit, and how to use it for fun & profit

Disclaimer Lots of stuff + 30' talk = Fasten your Seatbelts!

Introduction 5

IPv6 security tools It is hard to assess networks and devices without tools What would happen if I sent this or that packet to this device? For ages, THC-IPv6 was the only IPv6 security tools publicly available Mostly focused on specific vulnerabilities We felt the need for a general IPv6 toolkit

SI6 Networks' IPv6 Toolkit: Intro Brief history: Produced as part of a project funded by UK CPNI on IPv6 security Maintenance and extension taken over by SI6 Networks Goals: Security analysis and trouble-shooting of IPv6 networks and implementations Clean, portable, and secure code Good documentation

SI6 Networks' IPv6 Toolkit: Intro (II) Supported OSes: Linux, FreeBSD, NetBSD, OpenBSD, and Mac OS License: GPL (free software) Home: http://www.si6networks.com/tools/ipv6toolkit Collaborative development: https://www.github.com/fgont/ipv6toolkit.git

SI6 Networks' IPv6 Toolkit: Philosophy IDEAS TOOLS ipv6 NETWORK an interface between your brain and your IPv6 network Some find this is NOT a useful approach, though!

SI6 Networks' IPv6 toolkit: Tools addr6: An IPv6 address analysis tool scan6: An IPv6 address scanner path6: A versatile IPv6-based traceroute frag6: Play with IPv6 fragments tcp6: Play with IPv6-based TCP segments ns6: Play with Neighbor Solicitation messages na6: Play with Neighbor Advertisement messages

SI6 Networks' IPv6 toolkit: Tools (II) rs6: Play with Router Solicitation messages ra6: Play with Router Advertisement messages rd6: Play with Redirect messages icmp6: Play with ICMPv6 error messages ni6: Play with Node Information messages flow6: Play with the IPv6 Flow Label jumbo6: Play with IPv6 Jumbograms 5421-8764-2032-8011-7225

Some general notes on the tools 12

Modes of operation Active mode: Fire packets regardless of what is being received Listening mode: Listen to packets and respond with crafted packets If both modes are selected, Active mode goes first Then the tool enters listening mode

More about active mode --loop specifies that the active attack must be repeated indefinitely --sleep specifies the amount of time (in secs) to sleep between iterations Some tools support a --rate-limit option

More about listening mode Most tools support filters for the captured packets: Link-layer Address(es) IPv6 Address(es) Tool-specific filters (e.g., ND Target Address) Filters can be: accept filters : MUST match block filters : MUST NOT match Example: --accept-src fc00::1/64 --block-link-src 00:11:22:33.44:55

Support for Extension Headers All tools support use of: Destination Options Header Hop-by-Hop Options Header Fragment Header Extension headers can be combined (somewhat) arbitrarily e.g. to make the IPv6 header chain span multiple fragments

Neighbor Discovery tools 17

Overview Tools: ns6 na6 rs6 ra6 rd6 Can perform: Neighbor Cache poisoning attacks a plethora of DoS attacks

Example #1: DAD-based DoS attack Example (DAD-based DoS attack):: # na6 -i wlan0 -b ::/128 -c -o -L -vv interface accept filter flags listening mode be very verbose

Example #2: RA-Guard evasion Example (DAD-based DoS attack) interface PIO Dest Opt Hdr Dest Opt Hdr # ra6 -i wlan0 -P fc00:1::/64#la -u 1000 -u 100 -y 160 Frag Hdr

Playing with IPv6 fragments 21

Overview (frag6 tool) Can assess IPv6 fragmentation-related issues: Support for IPv6 atomic fragments Assess the Fragment ID generation policy Assess the fragment reassembly policy Stress nodes with fragments

Example #1: Frag. Reassembly policy When fragments overlap, a node may: Use the first copy of the data, Use the second copy of the data, or, Discard duplicate fragments Example: # frag6 -i eth0 -v --frag-reass-policy -d fc00:1::1

Example #2: Frag ID generation policy Nodes typically generate the Frag ID as: a global counter initialized to 0, a per-destination counter initialized to 0, a per-destination counter initialized to a random value, or, a random value Predictable Frag IDs have well-known security implications Example: # frag6 --frag-id-policy -d fc00:1::1 -v 3044-7217-4032-5253-7397

Example #3: Flooding with fragments Some nodes may have poor management of the fragment reassembly queue Example: # frag6 -s ::/0 F 100 -l -z 5 -d fc00:1::1 -v Rand. Src Addr from 0::/64 100 Frags at a time loop Sleep 5 secs.

Playing with ICMPv6 errors 26

Overview (icmp6 tool) Can generate arbitrary ICMPv6 errors: Smart generation based on received packet, or, Generation based on specified parameters Example (generate ICMPv6 PTB): # icmp6 -i wlan0 -L -p TCP -E -v interface listening mode capture TCP packets ICMPv6 PTB be verbose

Playing with TCP segments 28

Overview For a long time there was not even a IPv6-based SYN flooder Even IPv4-based TCP tools were rather scarce and primitive tcp6 can: Perform SYN floods Flood with connections in virtually any state Perform TCP probing Perform some smart scans (buffer exhaustion, closed windows, etc.)

Example #1: Buffer/connection DoS The effect of this attack is two-fold: Lots of TCP connections with no controlling process Lots of queued data for such connections Example: Target Listen # tcp6 -d fc00:1::1 -a 80 -L -s fc00:1::/112 --flood-ports 10 -l -r 100pps --data "GET / HTTP/1.0\r\n\r\n" --close-mode last-ack Source Flood HTTP Req. Conn. state

Scanning IPv6 networks 31

Overview IPv6 host scanning deemed unfeasible for a long time -> But it is not! scan6 can leverage IPv6 address patterns: Traditional SLAAC address (embedded MAC address) Port-based addresses Virtual machines Low-byte-addresses etc. You should read draft-ietf-opsec-ipv6-host-scanning

Example Scan a network for port-based addresses # scan6 -d PREFIX/64 --tgt-port

Analyzing IPv6 addresses 34

Overview There are different address types and scopes There are different IID generation schemes At times they are not that easy to spot Our addr6 tool is your friend here

Example #1: Analyzing IPv6 Addresses The addr6 tool can analyze IPv6 addresses Example: $ addr6 -a ADDRESS Format: type=subtype=scope=iid_type=iid_subtype Example: $ addr6 -a fc00::1 unicast=unique-local=global=lowbyte=unspecified

Example #2: IPv6 address stats $ cat addresses.txt addr6 -i -s

(Rather uninteresting) tools 38

(Rather uninteresting) tools jumbo6 flow6 ni6 Checks for support of IPv6 jumbogams Assesses the Flow Label generation policy Same as ping6 -N in Linux, but with more options 8763-1387-8632-9842-4937

IPv6 Toolkit v1.6 in Troopers! 40

A versatile traceroute tool (new in SI6 ipv6 Toolkit v1.6!) 41

Overview (path6 tool) No existing traceroute tool supports IPv6 extension headers We needed to measure packet drops resulting from IPv6 EHs Hence we produced our path6 tool Supports IPv6 Extension Headers Can employ TCP, UDP, or ICMPv6 probes It's faster ;-) Example: # path6 -u 100 -d fc00:1::1 Dst Opt Hdr

Questions? 43

Thank you's Troopers 14 crew, for taking care of all details!

Thanks! Fernando Gont fgont@si6networks.com @FernandoGont SI6 Networks www.si6networks.com @SI6Networks