Security implications of the Internet transition to IPv6



Similar documents
OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

IPv6 Security Best Practices. Eric Vyncke Distinguished System Engineer

Securing the Transition Mechanisms

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date

IPv6 Security. Scott Hogg, CCIE No Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN USA

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

How to Make the Client IP Address Available to the Back-end Server

Strategies for Getting Started with IPv6

Getting started with IPv6 on Linux

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Internet Protocol: IP packet headers. vendredi 18 octobre 13

21.4 Network Address Translation (NAT) NAT concept

Chapter 8 Network Security

Datacenter Transformation

Chapter 8 Security Pt 2

Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6?

SIIT-DC: IPv4 Service Continuity for IPv6 Data Centres. Tore Anderson Redpill Linpro AS RIPE69, London, November 2014

ITL BULLETIN FOR JANUARY 2011

DirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Vulnerabili3es and A7acks

Firewall Firewall August, 2003

FortiDDos Size isn t everything

Security of IPv6 and DNSSEC for penetration testers

Proxies. Chapter 4. Network & Security Gildas Avoine

HughesNet Broadband VPN End-to-End Security Using the Cisco 87x

About Firewall Protection

A Sampling of Internetwork Security Issues Involving IPv6

Cisco QuickVPN Installation Tips for Windows Operating Systems

ISP Best Practices. Addressing a DDoS Attack on a Host. Hervey Allen Network Startup Resource Center

GregSowell.com. Mikrotik Security

Cisco IOS Flexible NetFlow Technology

Firewalls und IPv6 worauf Sie achten müssen!

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

Networking Security IP packet security

INTRODUCTION TO FIREWALL SECURITY

Evaluating IPv6 Firewalls & Verifying Firewall Security Performance

Eric Vyncke, Distinguished Engineer, 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Recent advances in IPv6 insecurities Marc van Hauser Heuse Deepsec 2010, Vienna Marc Heuse

OS/390 Firewall Technology Overview

Introduction to Computer Security Benoit Donnet Academic Year

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

A S B

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Application DDoS Mitigation

CS5008: Internet Computing

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Real World IPv6 Migration Solutions. Asoka De Saram Sr. Director of Systems Engineering, A10 Networks

Firewalls P+S Linux Router & Firewall 2013

How To Connect Ipv4 To Ipv6 On A Ipv2 (Ipv4) On A Network With A Pnet 2.5 (Ipvin4) Or Ipv3 (Ip V6) On An Ipv5

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.

Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

APNIC IPv6 Deployment

IPv6 Fundamentals: A Straightforward Approach

Examining Proxies to Mitigate Pervasive Surveillance

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

IPv6 Security from point of view firewalls

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

SIIT-DC: IPv4 Service Continuity for IPv6 Data Centres. Tore Anderson Redpill Linpro AS 8th Belgian IPv6 Council, Bruxelles, November 2015

Firewalls. Ahmad Almulhem March 10, 2012

SonicOS 5.9 One Touch Configuration Guide

Malicious Network Traffic Analysis

Network Security Fundamentals

Cyber Essentials. Test Specification

Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

SIIT-DC: Stateless IP/ICMP Translation for IPv6 Data Centre Environments & SIIT-DC: Dual Translation Mode

IPv6 Network Security.

NAT Tutorial. Dan Wing, IETF78, Maastricht July 25, 2010

IPv6 Fundamentals, Design, and Deployment

FortiOS Handbook - Load Balancing VERSION 5.2.2

464XLAT: Breaking Free of IPv4. T-Mobile.com NANOG 61 June 2014

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

How To Configure SSL VPN in Cyberoam

Internet Privacy Options

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

How To Protect Your Network From Attack

Table of Contents. Introduction

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Network Defense Tools

Basic IPv6 WAN and LAN Configuration

Implementing Cisco IOS Network Security

Skip the Transitions, Jump Straight into IPv6

Campus IPv6 connection Campus IPv6 deployment

Bit Chat: A Peer-to-Peer Instant Messenger

Internet infrastructure. Prof. dr. ir. André Mariën

Use Domain Name System and IP Version 6

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Broadband Network Architecture

Transcription:

Security implications of the Internet transition to IPv6 Eric VYNCKE Cisco Session ID: ASEC-209 Session Classification: Intermediate

Agenda There is no place for doubts: IPv6 is there Impact in the Data Center Impact on applications and their security What about logging? Call for action 2

There is no place for doubts: IPv6 is there 3

No Doubt Anymore: IPv4 is Out 4

IPv6 in One Slide IPv6 is IPv4 with larger addresses 128 bits vs. 32 bits NAT no more needed => easier for applications Simpler hence more security Data-link layer unchanged: Ethernet, xdsl, Transport layer unchanged: UDP, TCP, Applications unchanged : HTTP, SSL, SMTP, IPv6 is not really BETTER than IPv4 because it is new IPv6 has been specified in 1995 IPsec is identical in IPv4 & IPv6 Only benefit is a much larger address space

Service Providers Dual-Stack (IPv6 + IPv4) with SP IPv4 NAT IPv6 host IPv4 Customer Router IPv6 Internet IPv6 IPv4+IPv6 host SP NAT Sharing IPv4 address(es) IPv4 Internet IPv4 host Subscriber Network More likely scenario: Dual-Stack SP Network using RFC1918 addresses Internet IPv6 being available all the way to the consumer SP core and customer has to use IPv4 NAT due to v4 depletion

Content Providers Dual-Stack Internet Edge in 2012-2013 IPv4 IPv6 IPv6 Internet Security Enforcement Load Balancer Legacy IPv4- only Servers IPv4 Internet IPv6 Network stops at load balancer 7

Users in Dual-Stack Selecting IPv4 or IPv6 2) IPv4 and IPv6 addresses of www.foo.com ISP DNS Server IPv4 IPv6 1) www.foo.com? IPv6 Internet Dual-Stack Server www.foo.com 3) Should I use IPv4 or IPv6??? IPv4 Internet Content provider has no influence Decision by the USER/INITIATOR: -RFC 6555: Happy Eyeball, try both and keep the fastest -RFC 6724: local policy, usually IPv6 is preferred 8

Impact in the Data Center 9

Innocent W2K3 -to- W2K8 Upgrade Windows 2003 C:\>ping svr-01 Pinging svr-01.example.com [10.121.12.25] with 32 bytes of data: Reply from 10.121.12.25: bytes=32 time<1ms TTL=128 Reply from 10.121.12.25: bytes=32 time<1ms TTL=128 Reply from 10.121.12.25: bytes=32 time<1ms TTL=128 Reply from 10.121.12.25: bytes=32 time<1ms TTL=128 Upgraded Host to Windows 2008 C:\>ping svr-01 Pinging svr-01 [fe80::c4e2:f21d:d2b3:8463%15] with 32 bytes of data: Reply from fe80::c4e2:f21d:d2b3:8463%15: time<1ms Reply from fe80::c4e2:f21d:d2b3:8463%15: time<1ms Reply from fe80::c4e2:f21d:d2b3:8463%15: time<1ms Reply from fe80::c4e2:f21d:d2b3:8463%15: time<1ms ALL recent OS have IPv6 enabled by default and prefer it... => Enable IPv6 host security and IPv6 IPS

Enabling IPv6 in the IPv4 Data Center The Fool s Way Internet 1) I want IPv6, send RA 2) Sending RA with prefix for autoconfiguration 3) Yahoo! IPv6 3) Yahoo! IPv6 3) Yahoo! IPv6 3) Yahoo! IPv6 IPv4 protection: iptables IPv4 protection: ipfw IPv4 Protection: Security center 4) Default protection IPv6 Protection: No ip6tables IPv6 Protection: No ip6fw IPv6 Protection: Security center

IPv6 in the IPv4 Data Center Don t be Blind IPv6 traffic by default, using link-local addresses IPv4-only Datacenter IPv4-only IDS, Monitoring,... MUST be upgraded to IPv6 NOW Operators must be trained

Impact on Application Security 13

Reputation of Shared IPv4 Address Every IPv4 address has a reputation Either blacklist or more sophisticated (senderbase.org) Used to detect spam, botnet members, It is fine as long as: One IPv4 == One legal entity (subscriber) What if One IPv4 == 10.000 entities/subscribers through SP NAT? 14

Shared IPv4 Address and DoS Mitigation Usual way to block a Denial of Service (DoS) against a server is to block the source IPv4 address(es) Before SP NAT: ok because it blocks only the attacker With SP NAT: will block the attacker but also 9.999 potential users/customers 15

Shared IPv4 Address and Rate Limiting Applications throttle use per IPv4 address When address is sharing by 1000 s of people the usage threshold is crossed And rate limiters are triggered even for legit traffic Example with AT&T using NAT for mobile phones

Content Providers IPv6 Security Controls IPv6 Internet IPv6-enabled Router security Security Enforcement IPv6-enabled SSL, logging, DoS protection Load Balancer IPv4 IPv6 Legacy IPv4- only Servers IPv4 Internet IPv6-enabled (web application) firewalls, IPS,... IPv6 Network stops at load balancer Penetration testing must be done over IPv6 PCI DSS Compliance is achievable with IPv6 (even w/o NAT) 17

Rate Limiting IPv6 IPv4 is easy: One subscriber is 32-bit IPv4 address Rate limit per 32-bit: scalable IPv6 could be more complex Rate limit per 128-bit: does not scale One subscriber is /48 to /64 You may want to rate limit per 48-bit entries or 64-bit entries The industry has yet to learn how to do it! 18

Adding Reputation to IPv6 Not a lot of data until now... Chicken and egg issue No reputation DB => nobody filters content over IPv6 Nobody filtering content over IPv6 => no data added to IPv6 Geolocation was an issue with IPv6 Compliance often restricts access based on country Getting better now (at least at country level) Use of tunnels (for transition) often hides the real country... 19

The IPsec IPv6 Myth: IPsec End-to-End will Save the World and TLS is Dead RFC 6434 IPsec SHOULD be supported by all IPv6 nodes (no more a MUST) IPsec in IPv6 will be use in the same way as in IPv4 Need to trust endpoints and end-users because the network cannot secure the traffic: no IPS, no ACL, no firewall Network telemetry is blinded: NetFlow of little use SSL will still be used in IPv6 in the same way as in IPv4 for VPN and application security IPsec use case limited to VPN

IPv6 Attacks with Strong IPv4 Similarities Application layer attacks Good news IPv4 IPS signatures can be reused The majority of vulnerabilities on the Internet today are at the application layer, something that IPSec will do nothing to prevent Man-in-the-Middle Attacks (MITM) Without strong mutual authentication, any attacks utilizing MITM will have the same likelihood in IPv6 as in IPv4 Sniffing IPv6 is no more or less likely to fall victim to a sniffing attack than IPv4

SQLMAP Works over IPv6 $ python sqlmap.py -u http://6lab.cisco.com/stats/cible.php?country=fr... sqlmap/1.0-dev - automatic SQL injection and database takeover tool [20:29:05] [INFO] testing connection to the target url [20:29:06] [INFO] testing if the url is stable, wait a few seconds [20:29:08] [INFO] url is stable [20:29:08] [INFO] testing if GET parameter 'country' is dynamic [20:29:09] [WARNING] GET parameter 'country' appears to be not dynamic [20:29:09] [WARNING] reflective value(s) found and filtering out [20:29:09] [WARNING] heuristic test shows that GET parameter 'country' might not be injectable [2a02:578:X:Y:Z/-]:62754 - - [18/Sep/2012:13:27:40-0500] "GET /stats/cible.php?country=fr%29%20and%204025%3d5454%20and%20%285900%3d5900 HTTP/1.1" 200 2111 [2a02:578:X:Y:Z/-]:62755 - - [18/Sep/2012:13:27:41-0500] "GET /stats/cible.php?country=fr%29%20and%203881%3d3881%20and%20%284387%3d4387 HTTP/1.1" 200 2109

Dual-Stack IPS Engines Service HTTP

What about Logging 24

Shared IPv4 Address and Forensic SP will have to keep all the translation log (data retention) <time, subscriber internal IP, subscriber internal TCP/UDP port, subscriber external TCP/UDP port, Internet IP, Internet TCP/UDP port> <10:23:02 UTC, 10.1.2.3, 6543, 23944, 91.121.200.122, 80> AND, the server will have to extend the log to include the TCP/UDP port See also RFC 6302 Internet-Facing Server Logging At 10:23:02 who was using the shared port 23944? 25

Logging IPv6 Addresses IPv6 addresses stored as string = 39 chars If stored in a 15 chars field (for IPv4), then you Crash Loose important information If doing protocol translation at Server Load Balancers Configure SLB64 to insert X-Forwarded-For HTTP header 26

Augmented Logging in Apache 2.4 For Your Reference LogFormat "[%h/%{x-forwarded-for}i]:%{remote}p %l %u %t \"%r\" %>s %b" common [220.181.108.X/-]:53958 - - [09/Sep/2011:10:10:26 +0200] "GET /nav/ HTTP/1.1" 200 7112 [10.0.0.1/2001:700:700:20:221:X:Y:Z]:47191- - [09/Sep/2011:10:10:27 +0200] "GET /nav/nav.js HTTP/1.1" 200 33519 [2001:6f8:1468:X::Z/-]:3268 - - [09/Sep/2011:10:10:49 +0200] "GET /ping_ws.php HTTP/1.0" 200 53

On the Other Hand... NAT is obfuscating a lot... Some may believe it is useful to be hidden... Security by obscurity NAT also makes audit-trail more complex Keeping ACL up-to-date an daunting task! IPv6 does not have NAT, easier to audit-trail 28

Multiple Facets to IPv6 Addresses Every host can have multiple IPv6 addresses simultaneously Need to do correlation! Alas, no Security Information and Event Management (SIEM) supports IPv6 Usually, a customer is identified by its /48 Every IPv6 address can be written in multiple ways 2001:0DB8:0BAD::0DAD 2001:DB8:BAD:0:0:0:0:DAD 2001:db8:bad::dad (this is the canonical RFC 5952 format) => Grep cannot be used anymore to sieve log files

Perl Grep6 For Your Reference #!/usr/bin/perl w use strict ; use Socket ; use Socket6 ; my (@words, $word, $binary_address, $address) ; $address = inet_pton AF_INET6, $ARGV[0] ; if (! $address) { die "Wrong IPv6 address passed as argument" ; } ## go through the file one line at a time while (my $line = <STDIN>) { @words = split /[ \n\(\)\[\]]/, $line ; foreach $word (@words) { $binary_address = inet_pton AF_INET6, $word ; if ($binary_address and $binary_address eq $address) { print $line ; next ; } } }

Call for Action 31

Apply Slide Enable source port logging per RFC 6302 Learn more about IPv6 and its security In short: 99% as IPv4 ;-) Increase size of address logging fields to 39 chars Review/audit critical security pieces Audit-trail Rate-limiting Access control / reputation Penetration test 32