IPv6 Secure Neighbor Discovery



Similar documents
IPv6 First Hop Security Protecting Your IPv6 Access Network

IP(v6) security. Matěj Grégr. Brno University of Technology, Faculty of Information Technology. Slides adapted from Ing.

Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security

IPv6 Associated Protocols

IPv6 Infrastructure Security

SEcure Neighbour Discovery: A Report

IPv6 Infrastructure Security

IPv6 Infrastructure Security Jeffrey L Carrell Network Conversions Network Security Consultant, IPv6 SME/Trainer

Security of IPv6 and DNSSEC for penetration testers

Security Assessment of Neighbor Discovery for IPv6

Eric Vyncke, Distinguished Engineer, 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1

IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc.

IPv6 End Station Addressing: Choosing SLAAC or DHCP Jeff Harrington - NYSERNet

Vulnerabili3es and A7acks

IPv6 INFRASTRUCTURE SECURITY WORKSHOP SESSION 10 BUILDING IPv6 INFRASTRUCTURE NETWORK SECURITY

IPv6 Functionality. Jeff Doyle IPv6 Solutions Manager

Securing IPv6. What Students Will Learn:

IPv6 Security. Scott Hogg. Global Technology Resources, Inc. Director of Technology Solutions CCIE #5133, CISSP #4610

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

IPv6 Security. Scott Hogg, CCIE No Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN USA

IPv6 Security Analysis

Recent advances in IPv6 insecurities Marc van Hauser Heuse Deepsec 2010, Vienna Marc Heuse

Eric Vyncke, Distinguished Engineer, 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1

How to securely operate an IPv6 network

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

SECURITY IN AN IPv6 WORLD MYTH & REALITY. SANOG XXIII Thimphu, Bhutan 14 January 2014 Chris Grundemann

IPv6 Security Best Practices. Eric Vyncke Distinguished System Engineer

IPv6 Security - Opportunities and Challenges

Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.

IPv6 Security. Eric Vyncke, Distinguished October 2014

Introduction to IPv6 and Benefits of IPv6

Personal Firewall Default Rules and Components

CloudEngine Series Switches. IPv6 Technical White Paper. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

Exploiting First Hop Protocols to Own the Network. Rocket City TakeDownCon Paul Coggin Senior Principal Cyber Security

Telematics. 9th Tutorial - IP Model, IPv6, Routing

IPv6 associated protocols. Piers O Hanlon

Joe Davies. Principal Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group June 1, 2011

Mobile Internet Protocol v6 MIPv6

3.5 IPv6 Forum Certified Security Course, Engineer, Trainer & Certification (GOLD)

Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.

IPv6 Diagnostic and Troubleshooting

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

About the Technical Reviewers

Securing IPv6 Neighbor and Router Discovery Jari Arkko Ericsson Research NomadicLab L M Ericsson FIN JORVAS, FINLAND

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

The Myth of Twelve More Bytes. Security on the Post- Scarcity Internet

Mobility on IPv6 Networks

Neighbour Discovery in IPv6

IPv6 Security from point of view firewalls

IPv6 Transition and Security Threat Report. Emin Çalışkan

IPv6 Intrusion Detection Research Project

IPv6 Autoconfiguration Best Practice Document

Network Security TCP/IP Refresher

IPv6 Security 111 Short Module on Security

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

ITL BULLETIN FOR JANUARY 2011

IPV6 DEPLOYMENT GUIDELINES FOR. ARRIS Group, Inc.

IPv6 Hardening Guide for Windows Servers

INLICHTINGEN DIENSTEN INLICHTINGEN DIENSTEN

Security Implications of the Internet Protocol version 6 (IPv6)

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Chapter 3 Configuring Basic IPv6 Connectivity

ProCurve Networking IPv6 The Next Generation of Networking

Firewalls und IPv6 worauf Sie achten müssen!

IPv6 Addressing and Subnetting

Beginner s Guide to Securing IPv6

IPv6 Security Nalini Elkins, CEO Inside Products, Inc.

Vicenza.linux.it\LinuxCafe 1

Introduction to Mobile IPv6

IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令

Recent Advances in IPv6 Security. Fernando Gont

Practical Security Assessment of IPv6 Networks and Devices. Fernando Gont

How To Protect Your Network From A Malicious Attack On A Vpn 6 Ipv6 Ipvv6 Router From A Rogue Router (Vpn) From A Pwn 6 Attack (Ipv6) From An Ipv 6 Attack From A

Practical IPv6 Monitoring on Campus

Mitigation of Breaking Connections. (a.k.a. OLSRd v1 Multi-Gateway & BRDP)

Moonv6 Test Suite. IPv6 Firewall Functionality and Interoperablility Test Suite. Technical Document. Revision 0.6

Domain Name Auto-Registration for Plugged-in IPv6 Nodes. <draft-kitamura-ipv6-name-auto-reg-00.txt>

IPv6 stateless address autoconfiguration 2 let IPv6 hosts configure

A Sampling of Internetwork Security Issues Involving IPv6

TESTING IPV6 ROUTERS WITH THE NEIGHBOR DISCOVERY PROTOCOL

MIP6 Route Optimization Enhancements

Junos OS. IPv6 Neighbor Discovery Feature Guide for Routing Devices. Release Modified: Copyright 2015, Juniper Networks, Inc.

Proactive DAD: An L2-assisted Fast Address Acquisition. Strategy for Mobile IPv6 Networks

Internet Control Protocols Reading: Chapter 3

OS IPv6 Behavior in Conflicting Environments

Topic 7 DHCP and NAT. Networking BAsics.

Moonv6 Test Suite DRAFT

Internet Engineering Task Force (IETF) France Telecom R&D S. Madanapalli iram Technologies November 2010

INFORMATION ASSURANCE AND THE TRANSITION TO IP VERSION 6 (IPV6)

How To Compare Ipv6 And Ipv4 To Ipv5 (V1.2.0)

6 Mobility Management

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Charter Text Network Design and Configuration

About Me. Work at Jumping Bean. Developer & Trainer Contact Info: mark@jumpingbean.co.za


A PKI For IDR Public Key Infrastructure and Number Resource Certification

IPv6 Fundamentals, Design, and Deployment

Deploying IPv6, Now. Christian Huitema. Architect Windows Networking & Communications Microsoft Corporation

Keywords: IPv6, transition, security, network, IPv4 security of IPv6 still has a long way to go.

Developing an IPv6 Addressing Plan Guidelines, Rules, Best Practice

Transcription:

IPv6 Secure Neighbor Discovery Andreas Hunkeler January 2015 Compass Security Schweiz AG Werkstrasse 20 Postfach 2038 CH-8645 Jona Tel +41 55 214 41 60 Fax +41 55 214 41 61 team@csnc.ch www.csnc.ch

IPv6 Adoption http://www.google.com/intl/en/ipv6/statistics.html Slide 2

IPv6 Adoption Switzerland http://www.google.com/intl/en/ipv6/statistics.html Slide 3

What the talk is about IPv6 will be used more widely in the future ARP spoofing is well-known Therefore, these slides cover: What is the IPv6 Neighbor Discovery (ND) protocol Intro to IPv6 Secure Neighbor Discovery (SeND) Problems and challenges with SeND Existing implementations Slide 4

Neighbor Discovery Protocol (NDP) Same as ARP in IPv4 but with extended functionality Neighbor Discovery messages Neighbor Solicitation (NS) NS resolves the neighbor node s IPv6 address to its MAC address and verifies that the node is still reachable Neighbor Advertisement (NA) The node that receives an NS message sends back an NA message with its own MAC address Router Solicitation (RS) IPv6 host sends RS to discover the default router and learn network information, such as prefixes and Domain Name Server (DNS) addresses Router Advertisement (RA) Router that receives an RS message sends back an RA message (solicited RA) and IPv6 routers send RA periodically (unsolicited multicast RA) with e.g. prefix Redirect Used by routers to inform hosts of a better first hop for a destination Slide 5

Neighbor Discovery Protocol (NDP) Part of the Internet Control Message Protocol for IPv6 (ICMPv6) Some of the key functionalities: discovering nodes on the same broadcast domain SLAAC (IPv6 stateless address auto-configuration) determining link-layer addresses detecting duplicate addresses (DAD) finding routers crucial role in mobile IPv6 (MIPv6) Slide 6

NDP Problems All hosts trust each other All hosts trust routers All routers trust hosts like ARP IPv6 neighbor discovery is vulnerable to Spoofing Denial-of-service (flood_advertise6, flood_router6, dos-new-ip6) Replay Redirect (parasite6) Rogue router attacks (fake_router6) Privacy issues with auto generated addresses Slide 7

Existing mitigations Router Advertisement Guard (RA Guard) RA guards monitors and detects RA Only protects an interface from a rogue RA, not traffic from NA and NS badness Privacy Extensions for Stateless Address Autoconfiguration in IPv6 described in RFC4941 Interface Identifier (IID) which changes over time Doesn t protect against spoofing Use monitoring tools like NDPMon or Ramond Passive detection tools Cisco First Hop Security (FHS) Cisco s solution for mitigating IPv6 attacks Slide 8

SeND (Secure Neighbor Discovery) SeND offers three additional features to NDP Address ownership proof Message protection Router authorization mechanism SeND uses cryptographically generated addresses (CGA,CGA++) to prevent address stealing. The node s IPv6 address is bound to its public key. Each node must generate or obtain a public/private RSA pair before it can claim an address. SeND includes a nonce in the solicitation message (request) and requires advertisements (response) to include this nonce. Slide 9

ICMPv6 Paket «IPv6 Secure Neighbor Discovery (SeND) and CGA, Jeremy Duncan Slide 10

Cryptographically Generated Addresses also called Hash Based Addresses or Key Based Addresses IPv6 Secure Neighbor Discovery, EPFL, C. Musso, S. Boujnah, K. Hajji, Dec 2013 Slide 11

SeND (Secure Neighbor Discovery) SeND uses authorization delegation discovery (ADD) to validate and authorize IPv6 routers to act as default gateways and specifies IPv6 prefixes that a router is authorized to announce on its link SeND offers two new ICMPv6 messages to identify the router authorization process: certificate path solicitation (CPS) request a certification path between a router and one of the host s trust anchors and certificate path advertisement (CPA) sent in reply to the CPS message and contains the router certificate Slide 12

SeND: Router authorization process IPv6 Secure Neighbor Discovery, EPFL, C. Musso, S. Boujnah, K. Hajji, Dec 2013 Slide 13

SeND RFCs RFC3971: Secure Neighbor Discovery (SeND) RFC3972: Cryptographically Generated Addresses (CGAs) RFC3779: X.509 Extensions for IP Address and AS Identifiers Slide 14

Security concerns with SeND CGA can t provide assurance about the real node s identity Because CGAs aren t certified, attackers can create new valid addresses from their own public keys and start the communication. For more security, a certificate authority is necessary to validate the keys. SHA-1 used for hashing and only 59 bits of cryptographic payload (64- bit minus 3-bit for the sec parameter and minus 1-bit for the u/g parameter see slide 7) Slide 15

Operational concerns with SeND Works as expected in IPv6-only networks DoS attacks are possible because of computational cost and because of the use of non-cgas to set DAD collision count to 2 (CGA algorithm might need to be extended to verify the DAD message responses before the increment of the collision count) every node must support CGA If the generation and verification values exceed 0.5 second, DAD would fail because it expects to send and receive two ND messages in less than 1 second, as RFC 4861 indicates. Any node trying to verify router authorization must be prepared beforehand with the anchor certificate Mobile IPv6 (MIPv6) needs to finish the address generation within hundreds of milliseconds Every devices must implement the protocol Slide 16

Existing Implementations Conclusion: Lack of sophisticated implementations, most operating systems support NDP but lack support for SeND Kernel modifications vs. user-land applications Linux NDprotector. NDprotector (htt://amnesiak.org/ndprotector) Easy-SEND Native SeND kernel API for BSD (send-0.3) ipv6-send-cga, code.google.com/p/ipv6-send-cga) Windows / Mac WinSEND (only Windows, third-party implementation, won the German IPv6 Council Application Award for 2011) TrustRouter (only RA) Slide 17

Possible Deployment Approach Using CGA with RAGuard prevents address theft and detects fake RA CGA protects the local link from address theft and the RAGuard protects the local link from fake RA Slide 18

Windows IPv6 enabled by default Windows does not support SeND (Windows 7, 2008, 2012 and 8) Window Server 2012 now has NAT64/DNS64 (DirectAccess clients must use IPv6 to connect to the DA server) Microsoft no longer tests their software with IPv4 ONLY networks Disabling IPv6 could lead to operational problems Slide 19

Other platforms SeND not supported on Mac OS/X ios Android HP Networking Juniper JUNOS supports SeND with 9.3+ Slide 20

Cisco SeND: IOS 12.4-24(T) + Only T and M on ISR routers (not in new ASR) RA Guard in Cisco IOS Release Implemented RFC3971 (SeND) & RFC3972 (CGA) Leverage PKI tooling already available on routers First-Hop-Security for IPv6 is available First phase (Port ACL & RA Guard) available since Summer 2010 Second phase (NDP & DHCP snooping) available since Summer 2011 Third phase (Source Guard, Destination Guard) available since Summer 2013 Slide 21

Cisco First Hop Security Port ACL blocks all ICMPv6 RA from hosts RAguard lite also dropping all RA received on this port, 12.2(33)SXI4 & 12.2(54)SG RAguard (12.2(50)SY, 15.0(2)SE) attach-policy device-role host router Slide 22

Facts IPv4 still in use within enterprise networks A long way to go for IPv6-only IPv6 SeND only supported in experimental state Slide 23

Conclusion SeND would allow to prevent the IPv4 style «ARP spoofing» in the IPv6 world (impersonation / address stealing) SeND would allow to prevent rogue router advertisements (fake router, flooding) BUT we re currently not able to use it due to the lack of support and productive-ready implementations Slide 24

References Ed Horley IPv6 Bootcamp presentation, 2014 «IPv6 Secure ND implementation report on Cisco IOS» by Eric Levy-Abegnoli, IETF 70th, Vancouver «Secure Neighbor Discovery: Review, Challenges, Perspectives, and Recommendations, A. AlSa deh and C. Meinel, Hasso-Plattner- Institut, 2012 http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/enterpriseipv6-solution/whitepaper_c11-602135.html, «IPv6 First Hop Security», 2010 http://www.cisco.com/en/us/docs/ios-xml/ios/sec_data_acl/configuration/15-2mt/ip6-send.html, «IPv6 Secure Neighbor Discovery», 2012 «IPv6 Security», Eric Vyncke, Cisco, 2014 «GUIDELINES FOR THE SECURE DEPLOYMENT OF IPV6», NIST, 2010 «IPv6 Secure Neighbor Discovery», EPFL, Claire Hajji, Dec 2013 Musso, Syrine Boujnah, Khalil «Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SeND) of IPv6 NDP Security», Dec 2011, Yvette E. Gelogo, Ronnie D. Caytiles, Byungjoo Park «IPv6 Secure Neighbor Discovery (SeND) and CGA», Jeremy Duncan «Securing IPv6 Neighbor and Router Discovery», J. Arkko, T. Aura et al. Slide 25

Slide 26