Security of IPv6 and DNSSEC for penetration testers



Similar documents
The Myth of Twelve More Bytes. Security on the Post- Scarcity Internet

INLICHTINGEN DIENSTEN INLICHTINGEN DIENSTEN

IP(v6) security. Matěj Grégr. Brno University of Technology, Faculty of Information Technology. Slides adapted from Ing.

IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc.

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

IPv6 Fundamentals: A Straightforward Approach

Recent advances in IPv6 insecurities Marc van Hauser Heuse Deepsec 2010, Vienna Marc Heuse

CSCE 465 Computer & Network Security

SECURITY IN AN IPv6 WORLD MYTH & REALITY. SANOG XXIII Thimphu, Bhutan 14 January 2014 Chris Grundemann

IPv6 Security Analysis

IPv6 Security Best Practices. Eric Vyncke Distinguished System Engineer

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Securing IPv6. What Students Will Learn:

Security Assessment of Neighbor Discovery for IPv6

Firewalls and Intrusion Detection

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

Part 5 DNS Security. SAST01 An Introduction to Information Security Martin Hell Department of Electrical and Information Technology

IPv6 Intrusion Detection Research Project

Security vulnerabilities in the Internet and possible solutions

Vulnerabili3es and A7acks

DOMAIN NAME SECURITY EXTENSIONS

Learn Ethical Hacking, Become a Pentester

Practical Security Assessment of IPv6 Networks and Devices. Fernando Gont

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

IPv6 Security Nalini Elkins, CEO Inside Products, Inc.

A Sampling of Internetwork Security Issues Involving IPv6

Internet-Praktikum I Lab 3: DNS

A S B

1. LAB SNIFFING LAB ID: 10

Information Security. Training

Firewalls und IPv6 worauf Sie achten müssen!

IPv6 Infrastructure Security

CRYPTUS DIPLOMA IN IT SECURITY

Use Domain Name System and IP Version 6

LAN TCP/IP and DHCP Setup

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Linux Network Security

CIRA s experience in deploying IPv6

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

The Truth about IPv6 Security

co Characterizing and Tracing Packet Floods Using Cisco R

Content Distribution Networks (CDN)

IPv6 Associated Protocols

Penetration Testing with Kali Linux

DNS at NLnet Labs. Matthijs Mekking

C)PTC Certified Penetration Testing Consultant

The Domain Name System from a security point of view

This Lecture. The Internet and Sockets. The Start If everyone just sends a small packet of data, they can all use the line at the same.

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.

Vulnerability Assessment and Penetration Testing

IPv6 Hardening Guide for Windows Servers

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

ITL BULLETIN FOR JANUARY 2011

IPv6 First Hop Security Protecting Your IPv6 Access Network

DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008

Exploiting First Hop Protocols to Own the Network. Rocket City TakeDownCon Paul Coggin Senior Principal Cyber Security

Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.

A Very Incomplete Diagram of Network Attacks

IPV6 FRAGMENTATION. The Case For Deprecation. Ron Bonica NANOG58

On the Deficiencies of Active Network Discovery Systems

Chapter 8 Security Pt 2

IPv6 Security ::/0. Poland MUM Warsaw March, 2012 Eng. Wardner Maia Brazil

Network Security Fundamentals

Packet Sniffing on Layer 2 Switched Local Area Networks

IPv6 Diagnostic and Troubleshooting

CS 356 Lecture 16 Denial of Service. Spring 2013

CMPT 471 Networking II


Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

DNS Best Practices. Mike Jager Network Startup Resource Center

Brocade NetIron Denial of Service Prevention

IPv6 Security. Scott Hogg, CCIE No Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN USA

Attack and Defense Techniques

Denial of Service Attacks

IPv6 Security. Scott Hogg. Global Technology Resources, Inc. Director of Technology Solutions CCIE #5133, CISSP #4610

Keywords: IPv6, transition, security, network, IPv4 security of IPv6 still has a long way to go.

Resilience improving features of MPLS, IPv6 and DNSSEC

Matt Ryanczak Network Operations Manager

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security Sans Mentor: Daryl Fallin

Lesson 13: DNS Security. Javier Osuna GMV Head of Security and Process Consulting Division

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

Network Security. DNS (In)security. Radboud University, The Netherlands. Autumn 2015

Getting started with IPv6 on Linux

IPv6 Security from point of view firewalls

Internet infrastructure. Prof. dr. ir. André Mariën

1. Firewall Configuration

IPv6 Infrastructure Security Jeffrey L Carrell Network Conversions Network Security Consultant, IPv6 SME/Trainer

IPv6 Infrastructure Security

Security with IPv6 Explored. U.S. IPv6 Summit Renée e Esposito Booz Allen Hamilton Richard Graveman RFG Security

Introduction to IP v6

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Securing an Internet Name Server

Ethical Hacking as a Professional Penetration Testing Technique

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

IPv6 Security - Opportunities and Challenges

Attack Frameworks and Tools

Transcription:

Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011

Agenda Introduction DNSSEC security IPv6 security Conclusion Questions Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 2 of 33

Introduction DNSSEC was developed to fix security vulnerabilities of DNS. DNSSEC solves them by introducing signatures IPv4 address pool is exhausted. IPv6 has a much larger address space. Companies and ISP are switching to Ipv6. These protocols are still not fully researched. Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 3 of 33

Research questions What are the security issues of IPv6 and DNSSEC and how to perform penetration tests in order to identify them? Are the issues new or were present before? Are there issues during the IPv6 transition period? What tools can be used for performing penetration tests? How to perform tests on the large IPv6 scopes? Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 4 of 33

DNSSEC security Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 5 of 33

DNSSEC security issues DNSSEC zone walking DNSSEC implementation issues DNS DoS amplification attack DNSSEC has larger RRs Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 6 of 33

DNSSEC zone walking (1/2) NSEC RR are used to provide authenticated denial of existence for DNS data. NSEC RR of a domain contain the name of the next domain in the DNS zone. NSEC RR form a chain which can be used to enumerate domains by walking the chain. NSEC3 RR was developed to fix the problem. NSEC3 uses hashes of the domains in the zone. Hashes can be brute-forced. Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 7 of 33

DNSSEC zone walking (2/2) smtp.ipv6.os3.nl. 3600 IN NSEC sunni.ipv6.os3.nl. AAAA NSEC RRSIG sunni.ipv6.os3.nl. 3600 IN NSEC tummi.ipv6.os3.nl. AAAA NSEC RRSIG tummi.ipv6.os3.nl. 3600 IN NSEC vpnsmurf.ipv6.os3.nl. AAAA NSEC RRSIG Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 8 of 33

DNSSEC implementation issues Most of the vulnerabilities related to DNSSEC are bugs in the implementations. They can result in: cache poisoning DoS These vulnerabilities can also apply to DNS. Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 9 of 33

DNSSEC penetration testing tools Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 10 of 33

DNSSEC penetration testing tools Nmap offers zone walking feature Nessus detects implementation specific issues OpenVAS detects implementation specific issues using plugins Dig can query for DNSSEC RRs and validate DNSSEC Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 11 of 33

IPv6 security Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 12 of 33

IPv6 security issues Neighbor Discovery Protocol NS / NA spoofing comparable to ARP spoofing in IPv4 RS / RA spoofing comparable to rogue DHCP server on IPv4... Routing header type 0 Implementations Transition techniques IPv6 smurfing Low awareness of IPv6 autoconfiguration Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 13 of 33

Neighbor Discovery Protocol NDP uses ICMPv6 packets to performs functions similar to ARP in IPv4. No authentication mechanism built into ICMPv6, allowing packets to be spoofed. Spoofed packets can cause redirection of traffic and DoS. These vulnerabilities are limited to the local network. Most of the NDP attacks are implemented by Van Hauser in the IPv6 attack toolkit. Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 14 of 33

NDP host redirection spoofing (1/2) Redirection is used by a router to inform a host of a better route to a particular destination. The NDP redirect has a security mechanism: A copy of the packet causing the redirection must be included in the NDP redirect message. What if the attacker can cause the victim to send a predictable message? Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 15 of 33

NDP host redirection spoofing (2/2) 1. The Attacker sends to the Victim an ICMPv6 echo request, with spoofed source address claiming to be originating from the router. 2. The Victim replies to the router with ICMPv6 echo reply. 3. The Attacker knows that the Victim is going to reply and can use the reply message to craft the NDP redirect packet, which advertises the Attacker as a better route to the Router. 4. Now all the traffic which is going from the Victim to the Router goes to the Attacker. The Attacker can sniff the packets and redirect them to the Router in order to stay unnoticed. Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 16 of 33

Duplicate Address Detection attack In IPv6 network it is not allowed the same IP address to be shared by several host. A host must verify if an IP is free before using it. The host sends NS and waits for NA message An attacker can pretend to use every IP in the network. This will create DoS since the host won't be able to obtain an IP address. Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 17 of 33

Neighbor Solicitation flooding Routers can store limited number of ND cache entries (similar to CAM tables in switches). A flood with NS messages can result in: the router might stop learning new entries the router might delete legitimate old entries router crash Some hosts might use a new IPv6 address for each TCP connection as a security mechanism, resulting in a NS flooding. Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 18 of 33

Routing header type 0 (RH0) RH0 is used to force a packet to follow strictly predefined path between network nodes. The same IP address may be included more than once. RH0 can be exploited to cause: amplification attack (via packet bouncing) bypassing of firewalls RH0 is deprecated since December 2007. Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 19 of 33

Implementation issues Large number of the vulnerabilities in IPv6 are caused by bad implementations. They can result in: DoS security policies bypassing buffer overflow It is likely that implementations will go better when IPv6 is adopted widely. Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 20 of 33

Transition techniques issues Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 21 of 33

Dual-stack networks Systems can be subject to attack on both IPv4 and IPv6. A firewall may not be enforcing the same policy for IPv4 as for IPv6 traffic due to: Misconfiguration Usage of firewall with limited IPv6 functionality This can result in exposing internal services to the Internet. Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 22 of 33

Tunneled IPv6 over IPv4 IPv6 address are globally routable, thus allowing hosts behind NAT to be addressed If the hosts were not protected, they will requite installing a firewall before using tunneled IPv6. Encapsulated IPv6 traffic could pass unnoticed by the firewall. The tunneling programs require opening a port in the firewall that could be used for attacks. Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 23 of 33

IPv6 penetration testing tools Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 24 of 33

IPv6 penetration testing tools Nmap partial support of IPv6, still in development Nessus requires the scanning engine to be run under Linux or Mac OS X Netcat6 full support of IPv6 Metasploit 19 of 224 payloads are using IPv6 THC IPv6 attack toolkit designed for testing IPv6 netwroks Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 25 of 33

Enumeration of IPv6 hosts Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 26 of 33

Enumeration of IPv6 hosts IPv6 subnets are /64 This is 4 294 967 296 times the size of IPv4. New approaches have to be used in order to enumerate hosts in IPv6 networks. Reducing the address space DNS Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 27 of 33

Enumeration of IPv6 host by reducing the address space Reducing the address space can be done by analyzing patterns in the address. In most cases IPv6 address are not random, but are generated using a system: Consecutive ordered Autoconfiguration hosts with embedded MAC address hosts with embedded IPv4 address Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 28 of 33

Enumeration of IPv6 host using DNS IPv6 address are harder to remember and type. DNS could be more widely used with IPv6 IPv6 host can be enumerated by: Brute-force Reverse DNS of IPv4 Searching the Web for subdomains DNSSEC zone walking Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 29 of 33

Conclusion Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 30 of 33

DNSSEC Conclusion Are the DNSSEC issues new or were present before? DNS amplification attack was present before. Implementation vulnerabilities were present also in DNS. DNS zone walking applies only to DNSSEC. What tools can be used for performing penetration tests? DNS querying tools can be used to fetch DNSEC RR. Vulnerability scanners can detect implementation specific issues. Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 31 of 33

IPv6 Conclusion Are the IPv6 issues new or were present before? Some issues are new and some were present before. Are there issues during the IPv6 transition period? There are issues caused by low awareness and bad implementations of IPv6. What tools can be used for performing penetration tests? Most of the well known penetration testing tools are partially or fully compatible with the IPv6. How to perform tests on the large IPv6 scopes? The IPv6 scopes can be enumerated by analyzing the numbering scheme or by various uses of DNS. Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 32 of 33

Questions Security of IPv6 and DNSSEC for penetration testers - Vesselin Hadjitodorov 33 of 33