Vulnerabili3es and A7acks



Similar documents
IPv6 Security 111 Short Module on Security

IPv6 Security:Threats and solutions

IPv6 Security from point of view firewalls

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

IPv6 Security. Scott Hogg, CCIE No Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN USA

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

IPv6 Security problems and mitigations János Mohácsi euronog meeting, Budapest September 2012

Eric Vyncke, Distinguished Engineer, 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1

IPv6 Security Best Practices. Eric Vyncke Distinguished System Engineer

IP(v6) security. Matěj Grégr. Brno University of Technology, Faculty of Information Technology. Slides adapted from Ing.

About the Technical Reviewers

IPv6 Fundamentals: A Straightforward Approach

Security of IPv6 and DNSSEC for penetration testers

ITL BULLETIN FOR JANUARY 2011

Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.

Security Assessment of Neighbor Discovery for IPv6

Recent advances in IPv6 insecurities Marc van Hauser Heuse Deepsec 2010, Vienna Marc Heuse

ProCurve Networking IPv6 The Next Generation of Networking

IPv6 Security. Scott Hogg. Global Technology Resources, Inc. Director of Technology Solutions CCIE #5133, CISSP #4610

How To Compare Ipv6 And Ipv4 To Ipv5 (V1.2.0)

IPv6 INFRASTRUCTURE SECURITY WORKSHOP SESSION 10 BUILDING IPv6 INFRASTRUCTURE NETWORK SECURITY

A Sampling of Internetwork Security Issues Involving IPv6

IPv6 Associated Protocols

IPv6 Hardening Guide for Windows Servers

IPv6 First Hop Security Protecting Your IPv6 Access Network

IPv6 Infrastructure Security

Security Technology White Paper

INLICHTINGEN DIENSTEN INLICHTINGEN DIENSTEN

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

A S B

Telematics. 9th Tutorial - IP Model, IPv6, Routing

Chapter 8 Security Pt 2

IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc.

CS5008: Internet Computing

DHCP, ICMP, IPv6. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley DHCP. DHCP UDP IP Eth Phy

IPv6 Fundamentals, Design, and Deployment

Migrating to IPv6 Opportunity or threat for network security?

Types of IPv4 addresses in Internet

Industry Automation White Paper Januar 2013 IPv6 in automation technology

Firewalls und IPv6 worauf Sie achten müssen!

Tomás P. de Miguel DIT-UPM. dit UPM

The Truth about IPv6 Security

Security with IPv6 Explored. U.S. IPv6 Summit Renée e Esposito Booz Allen Hamilton Richard Graveman RFG Security

Learn About Differences in Addressing Between IPv4 and IPv6

CloudEngine Series Switches. IPv6 Technical White Paper. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

IPv6 Security Analysis

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date

C)PTC Certified Penetration Testing Consultant

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Chapter 8 Network Security

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Frequent Denial of Service Attacks

Securing the Transition Mechanisms

Firewalls P+S Linux Router & Firewall 2013

IPv6 Infrastructure Security Jeffrey L Carrell Network Conversions Network Security Consultant, IPv6 SME/Trainer

IETF IPv6 Request for Comments (RFCs) Updated

Link Layer and Network Layer Security for Wireless Networks

VLAN und MPLS, Firewall und NAT,

Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.

GregSowell.com. Mikrotik Security

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

IPv6 Security ::/0. Poland MUM Warsaw March, 2012 Eng. Wardner Maia Brazil

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

CSCE 465 Computer & Network Security

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

IPV6 DEPLOYMENT GUIDELINES FOR. ARRIS Group, Inc.

Link Layer and Network Layer Security for Wireless Networks

Vicenza.linux.it\LinuxCafe 1

Router Security Configuration Guide Supplement - Security for IPv6 Routers

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Technology Brief IPv6 White Paper.

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Discovering IPv6 with Wireshark. presented by Rolf Leutert

CMPT 471 Networking II

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Recent Advances in IPv6 Security. Fernando Gont

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas

Security Implications of the Internet Protocol version 6 (IPv6)

Security vulnerabilities in the Internet and possible solutions

Chapter 9 Monitoring System Performance

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6?

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Transcription:

IPv6 Security

Vulnerabili3es and A7acks

Inherent vulnerabili3es Less experience working with IPv6 New protocol stack implementa3ons Security devices such as Firewalls and IDSs have less support for IPv6 than IPv4 More complex networks Overlaid with tunnels Dual stack (two protocols on the same wire)

Neighbor Discovering Protocol Instead of ARP (IPv4), IPv6 uses Neighbor Discovering Protocol (NDS) NDP is based on ICMPv6 Instead of a broadcast (ARP), NDP uses Neighbor Solicita3on y Neighbor Adver3sement messages

NDP associated vulnerabili3es DoS a7acks to routers by filling Neighbor Cache with many entries Some mi7ga3ons are: Rate- limit processing the Neighbor Solicita3on (NS) Monitoring NDP traffic (i.e. NDPMon) Deploy SEND (SEcure Neighbor Discovery) RFC3791 Sta3c entries draw- gashinsky- v6nd- enhance- 00

Autoconfigura3on Two flavors: Stateless: SLAAC (Stateless Address Auto- Configura3on), based in ICMPv6 (Router Solicita3on and Router Adver3sement) Stateful: DHCPv6 SLAAC is mandatory and DHCPv6 is op3onal Routers send Router Adver3sement (RA) messages to communicate configura3on parameters: Prefixes Routes MTU, hop- limit Timers

Vulnerabili3es associated with autoconfigura3on Rogue RAs and Rogue DHCPv6 servers Inten3onally Man in the middle a7acks Accidentally Windows sharing!!! DoS a7acks Some considera3ons documented in RFC6104 and draw- gont- v6ops- ra- guard- evasion

Mi3ga3on of Rogue RAs RA- guard for switches (RFC6105) and RA- monitor But only for accidental RAs Cannot detect complex a7acks (next hop, fragmenta3on) Router Advert MONitoring Daemon (RAMOND) SEND Sta3c configura3on

Transi3on Mechanisms Protocol 41 and other tunnels Unauthorized traffic leaving your network as tunnels (6to4, Teredo, tunnels) Automa3c tunnels Where is your traffic going? Relays to IPv6 Who is using your relays?

End- to- End Model End- to- End connec3vity without NAT NAT and NAT- PT (Protocol Transla3on) for IPv4 used as security strategy (should it be?) RFC5902 Thoughts on IPv6 NAT IPv6- to- IPv6 address mapping (stateless NAT66 as discussed by IETF). Maps a private IPv6 address range (ULA)

In IPv4 Networks I do not have IPv6 in my network and I won t support it. I do not care then Well, you should Even though you do not run IPv6 in your network, you may be vulnerable: Rogue RA (Windows Network Sharing) 6to4, Teredo and other tunnel technologies All these may open holes in your network security

Recommenda3ons

Countering Threats in IPv6 Scanning Gateways and Hosts for weakness Scanning for Multicast Addresses Unauthorised Access Control Firewalls Protocol Weaknesses Distributed Denial of Service Transition Mechanisms 21

Scanning Gateways and Hosts Subnet Size is much larger About 500,000 years to scan a /64 subnet@1m addresses/sec But - IPv6 Scanning methods are changing - DNS based, parallelised scanning, common numbering - Compromising a router at key transit points - Can discover addresses in use Avoid: - Using easy to guess addresses 22

Scanning Multicast Addresses New Multicast Addresses - IPv6 supports new multicast addresses enabling attacker to identify key resources on a network and attack them E.g. Site-local all DHCP servers (FF05::5), and All Routers (FF05::2) Addresses must be filtered at the border in order to make them unreachable from the outside To prevent smurf type of attacks: IPv6 specs forbid the generation of ICMPv6 packets in response to messages to global multicast addresses that contain requests 23

Security of IPv6 addresses Cryptographically Generated Addresses (CGA) IPv6 addresses [RFC3972] Host-ID part of address is an encoded hash Binds IPv6 address to public key Used for securing Neighbor Discovery [RFC3971] Is being extended for other uses [RFC4581] Privacy addresses as defined [RFC 4941] prevents device/user tracking from makes accountability harder 24

Unauthorised Access Control Policy implementation in IPv6 with Layer 3 and Layer 4 is still done in firewalls Some design considerations Filter site-scoped multicast addresses at site boundaries Filter IPv4 mapped IPv6 addresses on the wire 25

Unauthorised Access control Non-routable + bogon (unallocated) address filtering slightly different in IPv4 easier deny non-routable + bogons in IPv6 simpler to permit legitimate (almost) Action deny permit permit permit Deny deny Src 2001:db8::/32 2001::/16 2002::/16 2003::/16 3ffe::/16 any Dst host/net host/net host/net host/net host/net any Src port any any any any Dst port service service service service Consult for non exisiting addresses at: http://www.space.net/~gert/ripe/ipv6-filters.html Doc prefix - NO 6to4 - YES 6bone - NO 26

Spoofing IPv6 address are globally aggregated making spoof mitigation at aggregation points easy to deploy Simpler to protect due to IPv6 address hierarchy However host part of the address is not protected You need IPv6 < >MAC address (user) mapping for accountability! 27

Amplification (DDoS) Attacks There are no broadcast addresses in IPv6 This stops any type of amplification attacks that send ICMP packets to the broadcast address Global multicast addresses for special groups of devices, e.g. link-local addresses, etc. IPv6 specifications forbid the generation of ICMPv6 packets in response to messages to global multicast addresses Many popular operating systems follow the specification No packets with multicast sources should be allowed 28

Mitigation of IPv6 amplification Be sure that your host implementations follow the ICMPv6 spec [RFC 4443] Implement Ingress Filtering Defeats Denial of Service Attacks which employ IP Source Address Spoofing [RFC 2827] Implement ingress filtering of IPv6 packets with IPv6 multicast source address 29

Mixed IPv4/IPv6 environments Some security issues with transition mechanisms Tunnels often interconnect networks over areas supporting the wrong version of protocol Tunnel traffic often not anticipated by the security policies. It may pass through firewall systems due to their inability to check two protocols in the same time Do not operate completely automated tunnels Avoid translation mechanisms between IPv4 and IPv6, use dual stack instead Only authorised systems should be allowed as tunnel end-points 30

IPv6 transition mechanisms ~15 methods possible in combination Dual stack: enable the same security for both protocol Tunnels: ip tunnel punching the firewall (protocol 41) gre tunnel probably more acceptable since used several times before IPv6 l2tp tunnel udp therefore better handled by NATs 31

L3 L4 Spoofing in IPv4 with 6to4 For example, via 6to4 tunnelling spoofed traffic can be injected from IPv4 into IPv6. IPv4 Src: IPv4 Address IPv4 Dst: 6to4 Relay Anycast (192.88.99.1) IPv6 Src: 2002:: Spoofed Source IPv6 Dst: Valid Destination IPv6 net 6to4 gateway attacker public IPv4 net 6to4 relay IPv6 net 32

Firewalls IPv6 architecture and firewall - requirements No need to NAT same level of security with IPv6 possible as with IPv4 (security and privacy) Even better: e2e security with IPSec Weaknesses of the packet filtering cannot be hidden by NAT IPv6 does not require end-to-end connectivity, but provides end-to-end addressability Support for IPv4/IPv6 transition and coexistence Not breaking IPv4 security Most firewalls are now IPv6-capable Cisco ACL/PIX, Juniper NetScreen, CheckPoint Modern OSes now provide IPv6 capable firewalls 33

Firewall setup No blind ICMPv6 filtering possible: IPv6 specific Echo request/reply No route to destination TTL exceeded Parameter problem NS/NA RS/RA Packet too big MLD required Debug Debug better error indication Error report Error report (e.g. Extension header errors) Required for normal operation except static ND entry For Stateless Address Autoconfigration Path MTU discovery Requirements in for multicast 34

Firewalls L4 issues Problematic protocols for stateful filtering FTP Complex: PORT, LPRT, EPRT, PSV, EPSV, LPSV (RFC 1639, RFC 2428) Other non trivially proxy-able protocol: No support (e.g.: H.323) Skype Check with your firewall manufacturer for protocol support 35

Other threats IPv6 Routing Attack Use traditional authentication mechanisms for BGP and IS-IS. Use IPsec to secure protocols such as OSPFv3 and RIPng Viruses and Worms Sniffing Without IPsec, IPv6 is no more or less likely to fall victim to a sniffing attack than IPv4 ICMP attacks slight differences with ICMPv4 Recommendations for Filtering ICMPv6 Messages in Firewalls (RFC4890) TCP ICMP attacks slight differences with ICMPv6 http://tools.ietf.org/html/draft-ietf-tcpm-icmp-attacks-06 Application Layer Attacks Even with IPsec, the majority of vulnerabilities on the Internet today are at the application layer, something that IPsec will do nothing to prevent Man-in-the-Middle Attacks (MITM) Without IPsec, any attacks utilizing MITM will have the same likelihood in IPv6 as in IPv4 Flooding Flooding attacks are identical between IPv4 and IPv6 36