IPv6 Security : ICMPv6 Vulnerabilities. Navaneethan C. Arjuman National Advanced IPv6 Centre December 2012

Similar documents
IPv6 Associated Protocols

Security of IPv6 and DNSSEC for penetration testers

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Network layer: Overview. Network layer functions IP Routing and forwarding

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

IPv6 Fundamentals: A Straightforward Approach

Security Assessment of Neighbor Discovery for IPv6

IPv6 Security. Scott Hogg, CCIE No Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN USA

IPv6 Hardening Guide for Windows Servers

Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.

Firewalls und IPv6 worauf Sie achten müssen!

Vulnerabili3es and A7acks

Security Implications of the Internet Protocol version 6 (IPv6)

IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc.

IPv6 Security Nalini Elkins, CEO Inside Products, Inc.

Implementing DHCPv6 on an IPv6 network

ProCurve Networking IPv6 The Next Generation of Networking

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

IPv6 Security Analysis

04 Internet Protocol (IP)

Personal Firewall Default Rules and Components

Tomás P. de Miguel DIT-UPM. dit UPM

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

Neighbour Discovery in IPv6

IPv6 First Hop Security Protecting Your IPv6 Access Network

Telematics. 9th Tutorial - IP Model, IPv6, Routing

About the Technical Reviewers

IPv6 Advantages. Yanick Pouffary.

IP - The Internet Protocol

Introduction to IP v6

IPv6 Diagnostic and Troubleshooting

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Recent advances in IPv6 insecurities Marc van Hauser Heuse Deepsec 2010, Vienna Marc Heuse

IPv6 Functionality. Jeff Doyle IPv6 Solutions Manager

Moonv6 Test Suite. IPv6 Firewall Functionality and Interoperablility Test Suite. Technical Document. Revision 0.6

IPv6 Infrastructure Security

8.2 The Internet Protocol

IP(v6) security. Matěj Grégr. Brno University of Technology, Faculty of Information Technology. Slides adapted from Ing.

Security Technology White Paper

INLICHTINGEN DIENSTEN INLICHTINGEN DIENSTEN

Introduction to IPv6 and Benefits of IPv6

IPv6 Security from point of view firewalls

Networks: IP and TCP. Internet Protocol

Network Layer: and Multicasting Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

IPv6 Infrastructure Security Jeffrey L Carrell Network Conversions Network Security Consultant, IPv6 SME/Trainer

Internet Control Protocols Reading: Chapter 3

Security with IPv6 Explored. U.S. IPv6 Summit Renée e Esposito Booz Allen Hamilton Richard Graveman RFG Security

Mobility on IPv6 Networks

Types of IPv4 addresses in Internet

SEcure Neighbour Discovery: A Report

ACHILLES CERTIFICATION. SIS Module SLS 1508

Securing IP Networks with Implementation of IPv6

DHCP, ICMP, IPv6. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley DHCP. DHCP UDP IP Eth Phy

IP addressing and forwarding Network layer

CSCE 465 Computer & Network Security

EVALUATING STANDARD AND CUSTOM APPLICATIONS IN IPV6 WITHIN A SIMULATION FRAMEWORK. Brittany Michelle Clore

CloudEngine Series Switches. IPv6 Technical White Paper. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

Network Security TCP/IP Refresher

A Sampling of Internetwork Security Issues Involving IPv6

CS5008: Internet Computing

Local Area Networks. LAN Security and local attacks. TDC 363 Winter 2008 John Kristoff - DePaul University 1

How To Compare Ipv6 And Ipv4 To Ipv5 (V1.2.0)

IPv6 for Cisco IOS Software, File 2 of 3: Configuring

IPv6 Security 111 Short Module on Security

Technology Brief IPv6 White Paper.

Troubleshooting Tools

IPv6 Security ::/0. Poland MUM Warsaw March, 2012 Eng. Wardner Maia Brazil

IP Routing Features. Contents

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas

IPv6 associated protocols. Piers O Hanlon

Lecture Computer Networks

Joe Davies. Principal Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group June 1, 2011

Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security

IPv6 Security Best Practices. Eric Vyncke Distinguished System Engineer

BASIC ANALYSIS OF TCP/IP NETWORKS

IPv6 in Axis Video Products

Review: Lecture 1 - Internet History

IPv6 Security Assessment and Benchmarking Abstract Test Suite

Subnetting,Supernetting, VLSM & CIDR

ITL BULLETIN FOR JANUARY 2011

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Chapter 9. IP Secure

IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令

unisys ClearPath Enterprise Servers TCP/IP Implementation and Operations Guide ClearPath MCP 16.0 April

Content Distribution Networks (CDN)

Discovering IPv6 with Wireshark. presented by Rolf Leutert

Moonv6 Test Suite. IPv6 Firewall Base Functionality Test Suite. Technical Document. Revision 0.11

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

Windows 7 Resource Kit

C)PTC Certified Penetration Testing Consultant

Brocade NetIron Denial of Service Prevention

Transcription:

IPv6 Security : ICMPv6 Vulnerabilities Navaneethan C. Arjuman nava@nav6.usm.my National Advanced IPv6 Centre December 2012 1

Understanding ICMP What is ICMP? Internet Control Message Protocol (ICMP) ICMP integral part IP implementation Must be implemented in all IP module 2

ICMP Goal Goal of ICMP? Defined under RFC 792 Primary Goal Error messages for non-transient error conditions Provide a way to probe the network in order to determine general characteristics about the network 3

ICMP Categories Two (2) Categories ICMP Error Messages ICMP Query Messages 4

Understanding ICMP Currently there are two (2) types ICMPv4 ICMPv6 5

ICMPv4 Core Protocol of Internet Protocol Suite Defined under RFC 792 Mainly used to provide error message ICMP messages are typically generated in response to errors in IP datagrams (as specified in RFC 1122) or for diagnostic or routing purposes ICMP errors are always reported to the original source IP address of the originating datagram. 6

ICMPv4 IP Datagram Bits 0-7 8-15 16-23 24-31 0 TYPE CODE CHECKSUM 32 REST OF HEADER Type ICMP type as specified below. Code Subtype to the given type. Checksum Error checking data. Calculated from the ICMP header+data, with value 0 for this field. The checksum algorithm is specified in RFC 1071. Rest of Header Four byte field. Will vary based on the ICMP type and code. 7

ICMPv4 - Type Type Range There are 0-255 types 0 till 41 already defined 42 till 255 reserved Special attention focused on the following type Type 3 Type 9 and 10 Type 15 and 16 Type 17 and 18 Type 37 and 38 8

ICMPv4 - Type 3 Below are special codes that required main attention Code Range 0 - Destination network unreachable 1 - Destination host unreachable 2 - Destination protocol unreachable 3 - Destination port unreachable 6 - Destination network unknown 7 - Destination host unknown 9

ICMPv4 - Type 3 8 - Source host isolated 9 - Network administratively prohibited 10 - Host administratively prohibited 11 - Network unreachable for TOS 12 - Host unreachable for TOS 13 - Communication administratively prohibited 10

ICMPv4 - Others Type Type 9, Code 0 -Router Advertisement Type 10, Code 0 - Router discovery/selection/ solicitation Type 15, Code 0 - Information Request Type 16, Code 0 - Information Reply Type 17, Code 0 - Address Mask Request Type 18, Code 0 - Address Mask Reply Type 37, Code 0 - Domain Name Request Type 38, Code 0 - Domain Name Reply 11

ICMPv4 ICMP Fault Monitoring Features Sample Capture 12

ICMPv6 Internet Control Message Protocol (ICMP) for Internet Protocol version 6 (IPv6) Defined under RFC 4443 Mainly used for error message Several extensions have been published, defining new ICMPv6 message types as well as new options for existing ICMPv6 message types Neighbor Discovery Protocol (NDP) is a node discovery protocol in IPv6 which replaces and enhances functions of ARP 13

ICMPv6 Secure Neighbor Discovery Protocol(SEND) is an extension of NDP with extra security. Multicast Router Discovery (MRD) allows discovery of multicast routers. ICMPv6 messages may be classified into two categories: error messages and information messages ICMPv6 messages are transported by IPv6 packets in which the IPv6 Next Header value for ICMPv6 is set to 58. 14

ICMPv6 IP Datagram Bit Offset 0-7 8-15 16-31 0 Type Code Checksum 32 Message Body Type ICMP type as specified below. Code Subtype to the given type. Checksum Error checking data. Calculated from the ICMP header+data, with value 0 for this field. 15

ICMPv6 - Type Special attention focused on the following type Type 1 Type 128 and 137 Type 139 and 153 16

ICMPv6 - Type 1 Below is special codes that required attention when scanning take place Code Range 0 - no route to destination 1 - communication with destination administratively prohibited 2 - beyond scope of source address 3 - address unreachable 4 - port unreachable 17

ICMPv6 - Type 1 7 - source address failed ingress/egress policy 8 - reject route to destination 18

ICMPv6 - Others Type Type 128, Code 0 - Echo Request Type 129, Code 0 Echo Reply Type 130, Code 0 - Multicast Listener Query Type 133, Code 0 - Router Solicitation (NDP) Type 134, Code 0 - Router Advertisement (NDP) Type 135, Code 0 - Neighbor Solicitation (NDP) Type 136, Code 0 - Neighbor Advertisement (NDP) 19

ICMPv6 - Others Type Type 139, Code 0 till 2 - ICMP Node Information Query Type 140, Code 0 till 2 - ICMP Node Information Response Type 141, Code 0 - Inverse Neighbor Discovery Solicitation Message Type 142, Code 0 - Inverse Neighbor Discovery Advertisement Message Type 144, Code 0 - Home Agent Address Discovery Request Message 20

ICMPv6 - Others Type Type 145, Code 0 - Home Agent Address Discovery Reply Message Type 146, Code 0 till 2 - Mobile Prefix Solicitation Type 147, Code 0 - Mobile Prefix Advertisement Type 151- Multicast Router Advertisement (MRD) Type 152 - Multicast Router Solicitation (MRD) 21

ICMP Attacks Man in the Middle (MITM) Denial of Services 22

Man in the Middle Attacks Sniffing and session hijacking IPv4 ARP cache poisoning DHCP spoofing IPv6 ARP replaced by ICMPv6 neighbor discovery process DHCP may be replaced by the alternative process called stateless auto-configuration 23

Man in the Middle Attacks MITM some known techniques Man in the middle with spoofed ICMPv6 neighbor advertisement. Man in the middle with spoofed ICMPv6 router advertisement. Man in the middle using ICMPv6 redirect or ICMPv6 too big to implant route. Man in the middle to attack mobile IPv6 but requires ipsec to be disabled. Man in the middle with rogue DHCPv6 Server 24

Man in the Middle Attacks MITM some known techniques Man in the middle with spoofed ICMPv6 neighbor advertisement. Man in the middle with spoofed ICMPv6 router advertisement. Man in the middle using ICMPv6 redirect or ICMPv6 too big to implant route. Man in the middle to attack mobile IPv6 but requires ipsec to be disabled. Man in the middle with rogue DHCPv6 Server 25

MITM With Spoofed ICMPv6 Neighbor Advertisement ICMPv6 neighbor discovery requires two types of ICMPv6 ICMPv6 Neighbor solicitation (ICMPv6 Type 135) ICMPv6 neighbor advertisement (ICMPv6 type 136). 26

MITM With Spoofed ICMPv6 Neighbor Advertisement 27

MITM With Spoofed ICMPv6 Router Advertisement 28

MITM With Spoofed ICMPv6 Router Advertisement 29

Denial of Services Traffic flooding with ICMPv6 router advertisement, neighbor advertisement, neighbor solicitation, multicast listener discovery, or smurf attack. Denial of Service which prevents new IPv6 attack on the network. Denial of Service which is related to fragmentation. Traffic flooding with ICMPv6 neighbor solicitation and a lot of crypto stuff to make CPU target busy. 30

Smurf Attack 31

Duplicate Address Detection (DAD) 32

Duplicate Address Detection (DAD) 33

References http://www.sans.org/reading_room/whitepapers /detection/complete-guide-ipv6-attackdefense_33904 http://www.sans.org/securityresources/idfaq/icmp_misuse.php http://en.wikipedia.org/wiki/icmpv6 http://en.wikipedia.org/wiki/internet_control_message_ Protocol 34

References 35

Thank You 36