Security with IPv6 Explored. U.S. IPv6 Summit 20032. Renée e Esposito Booz Allen Hamilton Richard Graveman RFG Security



Similar documents
IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

ITL BULLETIN FOR JANUARY 2011

IPv6 Fundamentals: A Straightforward Approach

IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc.

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

IPv6 Security Best Practices. Eric Vyncke Distinguished System Engineer

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.

Tomás P. de Miguel DIT-UPM. dit UPM

CIRA s experience in deploying IPv6

Introduction to IP v6

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas

Vulnerabili3es and A7acks

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

IPv6 Security. Scott Hogg, CCIE No Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN USA

Security vulnerabilities in the Internet and possible solutions

Matt Ryanczak Network Operations Manager

CMPT 471 Networking II

Securing IP Networks with Implementation of IPv6

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

About the Technical Reviewers

IPv6 Fundamentals, Design, and Deployment

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Securing IPv6. What Students Will Learn:

Types of IPv4 addresses in Internet

Security of IPv6 and DNSSEC for penetration testers

Review: Lecture 1 - Internet History

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

ICSA Labs Network Protection Devices Test Specification Version 1.3

Firewalls and Intrusion Detection

Firewalls und IPv6 worauf Sie achten müssen!

ProCurve Networking IPv6 The Next Generation of Networking

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

8.2 The Internet Protocol

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Telematics. 9th Tutorial - IP Model, IPv6, Routing

IPv6 Advantages. Yanick Pouffary.

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Vicenza.linux.it\LinuxCafe 1

Internet Protocol Version 6 (IPv6)

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

Interconnecting Cisco Networking Devices Part 2

Компјутерски Мрежи NAT & ICMP

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.

Deploying IPv6, Now. Christian Huitema. Architect Windows Networking & Communications Microsoft Corporation

Mobility on IPv6 Networks

Updates to Understanding IPv6

IPv6 Hardening Guide for Windows Servers

Security Technology: Firewalls and VPNs

Network Working Group Request for Comments: Ericsson P. Savola CSC/Funet September IPv6 Transition/Coexistence Security Considerations

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

DirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team

IPv6 Security from point of view firewalls

: Interconnecting Cisco Networking Devices Part 2 v1.1

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

IPv6 Security Assessment and Benchmarking Abstract Test Suite

CloudEngine Series Switches. IPv6 Technical White Paper. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

Technology Brief IPv6 White Paper.

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Protocol Security Where?

Industry Automation White Paper Januar 2013 IPv6 in automation technology

Approaches to Multicast over Firewalls: an Analysis

Internet Peering, IPv6, and NATs. Mike Freedman V Networks

IP Security. Ola Flygt Växjö University, Sweden

Firewall Security. Presented by: Daminda Perera

Personal Firewall Default Rules and Components

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

Chapter 9. IP Secure

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Getting started with IPv6 on Linux

Proxy Server, Network Address Translator, Firewall. Proxy Server

Network Defense Tools

IPv6 First Hop Security Protecting Your IPv6 Access Network

DHCP, ICMP, IPv6. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley DHCP. DHCP UDP IP Eth Phy

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Migrating to IPv6 Opportunity or threat for network security?

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

The Myth of Twelve More Bytes. Security on the Post- Scarcity Internet

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Moonv6 Test Suite. IPv6 Firewall Functionality and Interoperablility Test Suite. Technical Document. Revision 0.6

Network Access Security. Lesson 10

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

IPv6 Security - Opportunities and Challenges

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Networking Security IP packet security

Security Technology White Paper

IPv6 Security: How is the Client Secured?

Network Security Part II: Standards

21.4 Network Address Translation (NAT) NAT concept

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Case Study for Layer 3 Authentication and Encryption

Transcription:

Security with IPv6 Explored U.S. IPv6 Summit 20032 December 8-11, 8 2003 Renée e Esposito Booz Allen Hamilton Richard Graveman RFG Security

IPv6 Security: Outline 1 Internet Security 2 IPv6: Core Protocols 3 Protocol Security: IPsec and IKE 4 Firewalls for IPv6 5 Security and IPv6 Transition 6 Summary Page 2

Security and the Internet When we first turned on extensive logging on our gateway host, it was much like moving into a new house with a tin roof in a hail-prone neighborhood under several large oak trees during acorn season. We diligently chased down evil-doers and helped secure numerous open systems. Some corporate machines were secured as well. Getting hacked is seldom a pleasant experience Bellovin and Cheswick, Firewalls and Internet Security Page 3

Scope This talk covers IPv6 protocol security And methods to hinder IPv6-based denial of service attacks Host and router system security only as related to IPv6 IPv6 firewalls Security of IPv6 transition strategies It does not cover Overall security architecture Physical, environmental, or personnel security General system security Network applications, buffer overflows, viruses, worms, spam, DHCPv6, IPv6 Routing, QoS, Flows, Timers, Multicast Keying, DNS Page 4

What Do We Want from Security? We assume an adversary may get complete access to our communications channels (i.e., we re on the Internet): Read, write, replay, modify, reorder, rearrange, truncate, reroute, spoof headers and addresses, etc. Try to take control of routers and hosts Launch additional attacks from compromised systems We want: To know who s sending what we get To know who s reading what we send To know that no one else has tampered with it To keep the network working reasonably well To control our own equipment Contents and operation; software and data Page 5

IPv6 and the Black Hat World IPv6 has been found running today without administrators knowledge Can be enabled on many platforms (XP, 2000, Linux, etc.) Intentionally or otherwise Can provide a stealth network for intruders Harder to scan Evades many intrusion detection systems Has been caught in honeypots Attacks on IPv6 can compromise co-existing IPv4 networks Precautions Block protocol 41 Handle Teredo as a dangerous UDP port at IPv4 firewalls Look for Router Advertisements and Neighbor Discovery packets Page 6

IPv6 Security: Outline 1 Internet Security 2 IPv6: Core Protocols 3 Protocol Security: IPsec and IKE 4 Firewalls for IPv6 5 Security and IPv6 Transition 6 Summary Page 7

IPv6 Core Protocols: Introduction IPv6 can offer end-to to-end connectivity to all hosts That, in itself, is scary to some who are used to NATs IPv6 header is simpler But IPv6 extensions are much more flexible IPv6 does much more than IPv4 at Layer 3 Some old favorites like ARP disappear Stateless Auto-Configuration is new IPv6 promotes Mobile IP Page 8

IPv6 Core Protocols: IPv6 Header Format Version (4 Bit) Traffic Class (8 Bit) Flow Label (20 Bit) Payload Length (16 Bit) Next Header (8 Bit) Hop Limit (8 Bit) Destination Address (128 Bit) Source Address (128 Bit) Page 9

IPv6 Core Protocols: IPv6 Extension Headers Order of Extension Headers when more than one is used in same packet: IPv6 Header Hop-by by-hop Options Header Destination Options Header ( (every Routing Header Fragment Header Authentication Header (AH) Encapsulation Security Payload (ESP) Header Destination Options Header ( (last Upper-Layer Header every Routing Header destination) last Routing Header destination) IPv6 Header Next Header = Routing Routing Header Next Header = Fragment Fragment Header Next Header = Security (ESP) Security Header (ESP) Next Header = TCP TCP Header + Data Payload Page 10

IPv6 Core Protocols: Addressing Unicast, Multicast, Anycast Broadcast dropped; Multicast essential Link local and site local scoping Link local makes a lot of sense Site local makes a lot less sense (today) Some good news Address and port scanning a subnet can be a lot harder Page 11

IPv6 Core Protocols: Address Generation and Renumbering Auto-Configuration Getting on a LAN may imply having insider privileges Need to look at different cases Enterprise, in the building Public WiFi Ad hoc networking Effects of self-generated addresses RFC 2462 addresses can be stolen by others RFC 3041 addresses cannot have pre-established established IPsec keys Subnet renumbering Need to track multiple prefixes simultaneously Need to map permissions from old to new addresses draft-bellovin bellovin-ipv6-accessprefix-01 proposes a way to retrieve a list of privileged prefixes with an ICMPv6 Router Advertisement Page 12

IPv6 Core Protocols: IPv6 Anycast Security Reserved anycast addresses may provide an attacker with a well-known target Globally reachable anycast only defined for routers No authorization mechanism exists for destination anycast addresses Spoofing and masquerade possible IPsec hard to set up in advance IPsec security associations need destination address Page 13

IPv6 Core Protocols: Site-Local Addresses IETF deprecated site-local addresses in March 2003 Intuitively, sites are hard to define Site boundaries may not match security, reachability, QoS, administrative, and funding boundaries The same addresses (e.g., FEC0::1) can exist in many sites A multi-homed host can belong to a site per interface Developers have to handle site identifiers along with addresses Multi-sited routers have to remember arrival interface Addresses can leak in application layer data Replacement architecture will have unambiguous addresses and more flexible scope rules Firewalls will need to implement the new design and block the old-style FEC0::/10 addresses Page 14

IPv6 Core Protocols: ICMPv6 Capabilities implemented with ICMPv6 Address auto-configuration Router and prefix discovery Neighbor reachability and address resolution Duplicate address detection Router renumbering Redirect PMTU discovery Echo request and echo reply Error notifications Examples of security questions Are Router Advertisements coming from an authorized router? Are there security requirements for Neighbor Advertisements? Are redirects coming from the router to which the packet was actually sent? Page 15

IPv6 Core Protocols: Neighbor Discovery Neighbor Discovery lacks mechanism for determining authorized neighbors Attacks: Redirection, duplicate address detection, advertisement and parameter spoofing, denial of service Defenses: The hop count 255 trick has limited value IPsec Authentication Header (AH) or Encapsulating Security Payload (ESP) works with manual keying Page 16

IPv6 Core Protocols: Summary of ICMPv6 Security IPv6 RFCs say: Use IPsec AH for IPMCv6 Begs the question, how? Need addresses, which may not be determined Need a Security Association and keys Manual set up: how many? Automatically generated: need to run UDP Chicken and egg problem Page 17

IPv6 Core Protocols: Mobile IP Issues Goals: roaming, address anonymity, location privacy Authenticated, dynamic registration (binding) is needed Between the Mobile Node and the Home Agent Current draft specifies IPsec ESP and IKE (plus alternative) for: Binding updates and binding acknowledgemetns Return routability messages: Home Test Init and Home Test ICMPv6 between the Home Agent and Mobile Node (e.g., prefix discovery) User traffic (optional) Need to work around lack of global PKI, IKE-IPsec IPsec overhead,... See draft-ietf ietf-mobileip-mipv6-ha-ipsec-06, draft-ietf ietf-mobileip- ipv6-24, and draft-perkins perkins-mobileip-precfg-kbm-00 Firewalls need to control use of routing and home address headers Page 18

Summary: IPv6 Core Protocols Some things are brand new Subnet renumbering Site-local and link-local local addresses Address generation (auto-configuration) Anycast Duplicate address detection Some things are likely to become more common End-to to-end connectivity Multicast Use of clocks and timers (at Layer 3, not just TCP) Host multi-homing Some things are just different Flows (QoS) Fragmentation ICMPv6 Subnet scanning attacks Packet filtering methods For the most part, IPv6 is like IPv4, only more so Page 19

IPv6 Security: Outline 1 Internet Security 2 IPv6: Core Protocols 3 Protocol Security: IPsec and IKE 4 Firewalls for IPv6 5 Security and IPv6 Transition 6 Summary Page 20

Protocol Security: IPsec The big change in IPsec from IPv4 to IPv6 is that IPsec is mandatory in IPv6 implementations IPsec can provide authentication, integrity, confidentiality, and replay detection for any IP datagram Provided Page 21

Protocol Security: IPsec Provided we can trust identities and implement it correctly on a secure platform IPsec provides an extraordinarily sound protocol security infrastructure, but Details matter Implementing IPsec is somewhat difficult We have to figure out how to use it, case by case Changes in IPsec are still in the works If you think cryptography is the solution to your problem, you don t know what your problem is. Roger Needham Page 22

IPsec and IKE: Where Do they Live? IPsec: architecture and two extension headers RFC 2401: Security Architecture RFC 2402: Authentication Header Message origin authentication and connectionless integrity Replay detection RFC 2406: Encapsulating Security Payload Everything in AH plus confidentiality Key management for IPsec: IKE (Internet Key Exchange) RFCs 2407, 2408, 2409 Entity authentication Security Association (SA) negotiation Key exchange All of these RFCs will be revised in the next year (or so) Page 23

IPsec: Authentication Header (AH) Format MAC Next Header (8 Bit) Payload Length (8 Bit) Reserved (16 Bit) Security Parameters Index (SPI) (32 Bit) Sequence Number Field (32 Bit) Authentication Data (variable) Page 24

IPsec: Encapsulating Security Payload (ESP) Packet Format Security Parameters Index (SPI) (32 bits) Sequence Number (32 bits) MAC Initialization Vector (optional, variable) Payload Data (variable) Padding (0-255 bytes) Pad Length Authentication Data (variable) Next Header (8 Bits) Encrypt Page 25

IPsec: Security Associations Contain all the parameters needed to specify When and how the source applies security When and how the destination verifies security Named by a destination address, protocol, and Security Parameters Index Usually configured in pairs One in each direction Page 26

IPsec: IKEv2 Key Exchange Protocol IKEv2 adds nonces, directional protection, etc. A g x B g y { A, SIG A (g y, g x )MAC Km (A) } Ke { B, SIG B (g x, g y ) MAC Km (B) } Ke Page 27

IPsec: Current Revisions IKE v2 Problems fixed, simpler, fewer options Four-message sign-and and-mac protocol, formal security analysis New transforms One document for protocol, one for the transforms ESP, AH, and RFC2401bis 64-bit (implicit) sequence numbers Arbitrary padding Dummy packets: Protocol 59 New processing model and definition of security association Virtual IDs to support VPNs Thorny topics Legacy authentication PKI Page 28

IPsec: IKE and ICMPv6 ICMPv6 can be end-to to-end, any-to to-end, or link local ICMPv6 can be Unicast, Multicast, or Anycast; IKE is Unicast only IKE can only run if UDP is already enabled See draft-arkko arkko-icmpv6-ike-effects-02 for the following table: Dest. Unreachable Any-to to-end May use IKE Packet Too Big Any-to to-end May use IKE Time Exceeded Any-to to-end May use IKE Parameter Problem End-to to-end May use IKE Echo Request End-to to-end May use IKE Echo Reply End-to to-end May use IKE Redirect Link Local May use IKE Router Solicit Link Local Must Not use IKE Router Advert. Link Local Must Not use IKE Neighbor Solicit Link Local Must Not use IKE Neighbor Advert. Link Local Must Not use IKE Router Renumb. End-to to-end May use IKE Page 29

IPsec: Manual Keying and Neighbor Discovery Neighbor discovery uses many destination address types ICMPv6 message types overloaded Destination may be Multicast (M), Unicast (U), or Anycast (A) 1 Router and Prefix Discovery 133->M; 134->MU 2 Address Auto-Configuration 135->MUA; 136->MU 3 Duplicate Address Detection 135->MUA; 136->MU 4 Address Resolution 135->MUA; 136->MU 5 Neighbor Reachability Detection 135->MUA; 136->MU 6 Redirect 137->U Attacks and consequences vary case by case Need Security Associations for: Each node s Unicast and solicited node Multicast addresses Known ahead of time (not RFC 3041 addresses) The All Nodes and All Routers Multicast addresses See draft-arkko arkko-manual-icmpv6-sas-02 Page 30

IPv6 Security: Outline 1 Internet Security 2 IPv6: Core Protocols 3 Protocol Security: IPsec and IKE 4 Firewalls for IPv6 5 Security and IPv6 Transition 6 Summary Page 31

Firewalls for IPv6: Role of Firewalls Firewalls solve different problems from IPsec Enforce uniform policy at perimeter Stop outsiders from performing dangerous operations Provide a choke point and scalable, centralized control End-to to-end connectivity, tunneling, and encryption may conflict with this policy Traffic that cannot be checked at the firewall can bring unpleasant things to your desktop IPsec is like SSL, only more powerful in this respect The tunneling problem has no satisfactory solution We ll run it on Port 80, so it gets through the firewall Page 32

Firewalls for IPv6: Changing the Model The perimeter security model is changing Clear boundaries do not exist Users are being forced to run safe(r) computers Passwords on start up and wake up Virus protection Personal firewalls SSL, IPsec VPNs, PGP, encrypted hard drives, WiFi security Patches and updates Firewalls themselves are changing too Location Network or end system (personal firewall) Control Administrator or end user Page 33

IPv6 Firewalls: Packet Filtering Packet filtering uses rules based on: Source and destination addresses Protocol Source and destination ports Other fields like Traffic Class or Flow Label Source and destination addresses are the easiest part, but IPv6 hosts typically have many addresses IPv6 sub-networks can be renumbered Some IPv6 addresses have restricted scope IPv6 makes it harder to apply RFC 2827 consistently To prevent denial of service attacks with spoofed source addresses Especially with RFC 3041 addresses Page 34

IPv6 Firewalls: Extension Headers Processing IPv6 extension headers is more work Routing and fragmentation headers may trigger an access decision May get stuck on an unknown extension header Should a firewall send an unrecognized header ICMP? discard the packet? Note that the RFCs are unclear on firewall or middlebox actions Unknown destination options are a bit easier to handle TLV format Still need to define policy for unknown types Page 35

IPv6 Firewalls: RH and HA Processing Many IPv4 firewalls prohibit source routing IPv6 Routing Header (RH) and Home Address (HA) rewrite addresses Needed for mobile IPv6, TE, and multi-homing Want to recognize legitimate MobileIP addresses and route optimizations RH and HA can turn any host behind a firewall into a router May enable an unauthorized Web server May break denial of service protections What does this mean? Want to characterize what RH and HA are doing Mobile IP: allow only one RH segment left, only if policy and use correspond Demand secure Binding Updates or an authenticated packet before accepting HA TE: decide which routers are configured to handle TE Internet defined in the RFCs Internet accessed by enterprises Page 36

IPv6 Firewalls: Fragmentation Some IPv4 firewalls prohibit fragmentation Extension headers make it harder to determine whether the upper layer protocol number is in a fragment Cisco FRAGMENT keyword matches all non- initial segments and initial segments if the upper layer cannot be determined Page 37

IPv6 Firewalls: ICMPv6 issues ICMPv6 needs additional attention CISCO ACLs by default allow Neighbor Discovery, Neighbor Advertisement, and Neighbor Solicitation but deny others Hop count 255 may be defeated by tunneling Is a reasonable policy-based approach to Redirects possible? Note the increased use of host multi-homing Page 38

IPv6 Firewalls: IPsec ESP No reasonable solution to accessing encrypted content at the border exists The ipsec WG rejected an ESP-like transform that left the upper layer header in the clear Another attempt is in the works A proposal to use the Flow Label bits has other drawbacks Consider using host-based, administratively controlled firewalls Page 39

IPv6 Firewalls: Peer-to to-peer Services IPv6 without NAT makes peer to peer potentially more usable Firewalls usually take an outbound only stance, except for well-known servers Possible approaches: Reserved range of high-numbered ports End-system firewalling IETF midcom WG s pinholing Page 40

IPv6 Security: Outline 1 Internet Security 2 IPv6: Core Protocols 3 Protocol Security: IPsec and IKE 4 Firewalls for IPv6 5 Security and IPv6 Transition 6 Summary Page 41

Security and IPv6 Transition Two original IPv6 goals were Security Transition Secure transition only recently received attention Main transition components Dual stack Tunneling Translation Many variations Security issues similar Some differences in the details Page 42

Transition Strategies Various encapsulation (tunneling) proposals SIT 6over4 (RFC 2529) 6to4 (RFC 3056) ISATAP Teredo (UDP port 3544) Main security issues: Do not mistakenly configure a back door around firewall Do not let the IPv6 network open attacks on the IPv4 network After decapsulating, enforce address-interface consistency (anti-spoofing) and firewall rules Requires careful configuration Do not provide a hiding place for DoS attacks Page 43

IPv6 Transition Strategy Edge of Network v6 Encapsulated in v4 IPv4 If v6 encapsulated in v4 encapsulated in v4 Dual Stack Bypasses v6 Firewall v6 encapsulated in v4 v4 Firewall Resolves Tunneling v6 v6 Firewall IPv6 Page 44

General Tunneling Security Issues Typically, a loose approach is taken to IPv6 service piloting Tunneling can break the perimeter defense Automatic tunneling accepts packets from everywhere Consider some access control or firewall functionality For example, treat addresses the way stateful UDP filtering works Tunnel exit should decrement hop count Ambiguities exist with IPv4-mapped IPv6 addresses Applies to RFC 2373 ::ffff:a.b.c.d addresses in general Some IPv6 pieces are only partially deployed or immature DNS, routing, applications Enabling IPv6 may open routers to bugs, inefficiencies, or instabilities IPsec can be deployed between routers and relay routers With manual keying or with IKE Page 45

IPv6 Security: Outline 1 Internet Security 2 IPv6: Core Protocols 3 Protocol Security: IPsec and IKE 4 Firewalls for IPv6 5 Security and IPv6 Transition 6 Summary Page 46

IPv6 Security: Summary The IETF is still working on IPv6 security for ICMPv6, IPv6 firewalls, mobility, transition, etc. Hackers, today, are turning on stealth IPv6 networks after intrusions Increased use of IPsec depends in part on PKI and user authentication The standard bag of tricks for IPv6 firewalls has not been invented yet Security analysis must be a part of any service provider s or enterprise s IPv6 transition plan The Internet defined by the IETF does not always match the Internet deployed and used by today s enterprises Page 47