IPv6 First Hop Security IPv6 Security im Access Layer. Stefan Portmann Netcloud AG

Similar documents
IPv6 First Hop Security Protecting Your IPv6 Access Network

IPv6 Secure Neighbor Discovery

IPv6 Associated Protocols

IPv6 Infrastructure Security

SEcure Neighbour Discovery: A Report

Security Assessment of Neighbor Discovery for IPv6

Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security

Vulnerabili3es and A7acks

IPv6 INFRASTRUCTURE SECURITY WORKSHOP SESSION 10 BUILDING IPv6 INFRASTRUCTURE NETWORK SECURITY

IP(v6) security. Matěj Grégr. Brno University of Technology, Faculty of Information Technology. Slides adapted from Ing.

Security of IPv6 and DNSSEC for penetration testers

IPv6 Infrastructure Security Jeffrey L Carrell Network Conversions Network Security Consultant, IPv6 SME/Trainer

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

IPv6 Diagnostic and Troubleshooting

Exploiting First Hop Protocols to Own the Network. Rocket City TakeDownCon Paul Coggin Senior Principal Cyber Security

Neighbour Discovery in IPv6

IPv6 Security Analysis

IPv6 Security. Scott Hogg, CCIE No Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN USA

IPv6 Security Best Practices. Eric Vyncke Distinguished System Engineer

Security Technology White Paper

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

Security Considerations in IP Telephony Network Configuration

Configuring DHCP Snooping

IPv6 Hardening Guide for Windows Servers

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

IPv6 Security. Scott Hogg. Global Technology Resources, Inc. Director of Technology Solutions CCIE #5133, CISSP #4610

How To Understand and Configure Your Network for IntraVUE

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Local Area Networks. LAN Security and local attacks. TDC 363 Winter 2008 John Kristoff - DePaul University 1

IP Routing Features. Contents

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

What is VLAN Routing?

IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc.

Mobility on IPv6 Networks

Tomás P. de Miguel DIT-UPM. dit UPM

Firewalls und IPv6 worauf Sie achten müssen!

Telematics. 9th Tutorial - IP Model, IPv6, Routing

Recent advances in IPv6 insecurities Marc van Hauser Heuse Deepsec 2010, Vienna Marc Heuse

CloudEngine Series Switches. IPv6 Technical White Paper. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

Cisco IOS Flexible NetFlow Technology

Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Eric Vyncke, Distinguished Engineer, 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1

Implementing DHCPv6 on an IPv6 network

IPv6 Functionality. Jeff Doyle IPv6 Solutions Manager

ProCurve Networking IPv6 The Next Generation of Networking

HP 5120 SI Switch Series

Interconnecting Cisco Network Devices 1 Course, Class Outline

Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.

Firewall Stateful Inspection of ICMP

INLICHTINGEN DIENSTEN INLICHTINGEN DIENSTEN

Packet Sniffing on Layer 2 Switched Local Area Networks

Securing end devices

IPv6 Security Assessment and Benchmarking Abstract Test Suite

Configuring the Transparent or Routed Firewall

IPv6 Security from point of view firewalls

Protecting and controlling Virtual LANs by Linux router-firewall

Configuring Flexible NetFlow

IPv6 Fundamentals: A Straightforward Approach

CCNA Exploration: Accessing the WAN Chapter 7 Case Study

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Strategies to Protect Against Distributed Denial of Service (DD

Moonv6 Test Suite. IPv6 Firewall Functionality and Interoperablility Test Suite. Technical Document. Revision 0.6

Internet Control Protocols Reading: Chapter 3

Mitigation of Breaking Connections. (a.k.a. OLSRd v1 Multi-Gateway & BRDP)

CCT vs. CCENT Skill Set Comparison

GB-OS Version 6.2. Configuring IPv6. Tel: Fax Web:

IPv6 End Station Addressing: Choosing SLAAC or DHCP Jeff Harrington - NYSERNet

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

- Basic Router Security -

ITL BULLETIN FOR JANUARY 2011

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0

BASIC ANALYSIS OF TCP/IP NETWORKS

Top-Down Network Design

ΕΠΛ 674: Εργαστήριο 5 Firewalls

IPv6 Security 111 Short Module on Security

Building Secure Network Infrastructure For LANs

Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example

Network Security. Ensuring Information Availability. Security

Attack Lab: Attacks on TCP/IP Protocols

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Frequent Denial of Service Attacks

CMPT 471 Networking II

IPV6 DEPLOYMENT GUIDELINES FOR. ARRIS Group, Inc.

How To Compare Ipv6 And Ipv4 To Ipv5 (V1.2.0)

What communication protocols are used to discover Tesira servers on a network?

Personal Firewall Default Rules and Components

How to securely operate an IPv6 network

Transcription:

IPv6 First Hop Security IPv6 Security im Access Layer Stefan Portmann Netcloud AG

Agenda Introduction The Layer 2 domain & IPv6 Neighbor Discovery (ND) / Secure Neighbor Discovery (SeND) IPv6 First-Hop Security (FHS) RA Guard IPv6 Snooping DHCP Guard Source/Prefix Guard Destination Guard FHS Config Example FHS Platform Support 30.05.2013 3

Introduction In many modern networks, the Layer 2 domain is playing an increasingly important role, with large campuses, very large data centers, server virtualization, Layer 2 mobility, etc., all resulting in larger Layer 2 domains. This change also brings with it an increasing number of challenges, such as security and scalability. In parallel with this change, IPv6 has been gaining momentum as the next generation IP, while the IPv4 address space continues to run out. Layer 2 (and to some extent Layer 2/3) switches constitute the core of this Layer 2 domain, and their strategic position in the network provides a number of opportunities to secure this domain, and to optimize link operations. These devices are referred to as "first hops". 30.05.2013 4

Introduction For many years, Cisco has been providing a suite of Catalyst Integrated Security Features (CISF) running on Catalyst switches, to secure and optimize Layer 2 (L2) operations for IPv4 networks. Catalyst Integrated Security Features IP Source Guard Dynamic ARP Inspection DHCP Snooping Port Security In order to provide the same level of end node protection on IPv6 or dual-stack networks, these L2 switches need to add a similar set of capabilities to address IPv6 link operations. Innocent User I m Your DHCP Server No Your Not! I m The User Email Server 30.05.2013 5

Agenda Introduction The Layer 2 domain & IPv6 Neighbor Discovery (ND) / Secure Neighbor Discovery (SeND) IPv6 First-Hop Security (FHS) RA Guard IPv6 Snooping DHCP Guard Source/Prefix Guard Destination Guard FHS Config Example FHS Platform Support 30.05.2013 6

Quick overview on the Layer 2 domain & IPv6 What is specific to IPv6 on a subnet? More addresses! More hosts allowed on the subnet (up to 2 64!). Results in much bigger subnets. More states (neighbor cache, etc) on hosts, routers and switches: creates new opportunities for DoS attacks And protocols - IPv6 link operations protocol is Neighbor Discovery More distributed and more autonomous operations Nodes discover their default router automatically Nodes auto-configure their addresses Nodes defend themselves (SeND) 30.05.2013 7

Fundamentals On Neighbor Discovery Defined in: RFC 4861 Neighbor Discovery for IP Version 6 (IPv6) RFC 4862 IPv6 Stateless Address Auto-configuration RFC 3971 Secure Neighbor Discovery etc. Used for: Router discovery IPv6 Stateless Address Auto Configuration (SLAAC) IPv6 address resolution (replaces ARP) Neighbor Unreachability Detection (NUD) / Duplicate Address Detection (DAD) Redirection Operates above ICMPv6 Relies heavily on (link-local scope) multicast, combined with Layer 2 Multicast Works with ICMP messages and message "options" 30.05.2013 8

Fundamentals On Neighbor Discovery 30.05.2013 9

Secure Neighbor Discovery (SeND) Enhances NDP with additional capabilities Cryptographically Generated Addresses (CGA) IPv6 addresses whose interface identifiers are cryptographically generated RSA signature option Protect all messages relating to neighbor and router discovery Timestamp and nonce options Prevent replay attacks Certification paths for authorized Routers Anchored on trusted parties, expected to certify the authority of the routers on some prefixes 30.05.2013 10

Secure Neighbor Discovery (SeND) To benefit fully from SeND, nodes must be provisioned with CA certificate(s) A chain of trust is "easy" to establish within the administrative boundaries, but very hard outside It is a 2 player game! And very few IPv6 stacks can play the game today: Cisco IOS, Linux and a few others 30.05.2013 11

Agenda Introduction The Layer 2 domain & IPv6 Neighbor Discovery (ND) / Secure Neighbor Discovery (SeND) IPv6 First-Hop Security (FHS) RA Guard IPv6 Snooping DHCP Guard Source/Prefix Guard Destination Guard FHS Config Example FHS Platform Support 30.05.2013 12

IPv6 RA Guard Router Theft Router Discovery Protocol Discover default/first hop routers Discover on-link prefixes 30.05.2013 13

IPv6 RA Guard Rogue or malicious routers - Vulnerability #1 Attacker tricks victim into accepting itself as default router Based on rogue Router Advertisements The most frequent threat by non-malicious user Many variants: preference, timing, final RA, etc. 30.05.2013 14

IPv6 RA Guard Rogue or malicious routers - Vulnerability #2 Attacker spoofs Router Advertisement with false on-link prefix Victim generates (topology-bogus) IP address with this prefix Access router drops outgoing packets from victim (ingress filtering) Or return path is broken 30.05.2013 15

IPv6 RA Guard RAs are used by routers to announce themselves on the link. The RA Guard blocks or rejects unwanted or rogue RA messages that arrive at the network switch platform. The RA Guard feature analyzes the RAs and filters out bogus RAs sent by unauthorized routers. 30.05.2013 16

IPv6 Snooping Address Theft - Address Resolution protocol Hosts reside on a shared "Layer 2 domain" (same link) When needed, it resolves the IP address into a MAC address Creates neighbor cache entry Maintains entry with NUD or upon receipt of any updated LLA Last Come, First Serve: good for mobility, bad for security! 30.05.2013 17

IPv6 Snooping Address Theft - Duplicate Address Resolution Verify address uniqueness before using it Required (MUST) by SLAAC, recommended (SHOULD) by DHCP Probe neighbors to verify nobody claims the address 30.05.2013 18

IPv6 Snooping Address Theft Vulnerability #1 Attacker can claim victim's IP address 30.05.2013 19

IPv6 Snooping Address Theft Vulnerability #2 Attacker hacks any victim's DAD attempts Victim can't configure IP address and can't communicate 30.05.2013 20

IPv6 Snooping A database table of IPv6 neighbors connected to the switch is created from multiple sources of information. For example, ND traffic, DHCP traffic and Data traffic. This binding table is used by ND Inspection (to validate the link-layer address (LLA)), perport address limit Device tracking (to prefix binding of the neighbors to prevent spoofing and redirect attacks). 30.05.2013 21

IPv6 DHCP Guard The DHCP Guard can be used to prevent forged messages from being entered in the binding table. The DHCP Guard blocks DHCP server messages when they are received on ports that are not explicitly configured as facing a DHCP server or DHCP relay. 30.05.2013 22

IPv6 Source/Prefix Guard The IPv6 Source Guard provides the ability to use the IPv6 binding table to install Port-ACLs to prevent a host from sending packets with an invalid IPv6 source address. Source addresses listed in the binding table are permitted on the switch port, other traffic will be blocked. 30.05.2013 23

IPv6 Destination Guard The Destination Guard helps in minimizing denial-of-service (DoS) attacks. It performs address resolutions, based on the binding table, only for those addresses that are active on the link. This feature enables the filtering of IPv6 traffic based on the destination address, and blocks the NDP resolution for destination addresses that are not found in the binding table. 30.05.2013 24

Agenda Introduction The Layer 2 domain & IPv6 Neighbor Discovery (ND) / Secure Neighbor Discovery (SeND) IPv6 First-Hop Security (FHS) RA Guard IPv6 Snooping DHCP Guard Source/Prefix Guard Destination Guard FHS Config Example FHS Platform Support 30.05.2013 25

FHS Config Example ipv6 snooping policy POLICY-SNOOPING ipv6 nd raguard policy POLICY-RAGUARD-HOST device-role host ipv6 nd raguard policy POLICY-RAGUARD-ROUTER device-role router ipv6 dhcp guard policy POLICY-DHCPGUARD-CLIENT device-role client ipv6 dhcp guard policy POLICY-DHCPGUARD-SERVER device-role server match reply prefix-list PREFIX-LIST-DHCP-SERVER-RANGE ipv6 prefix-list PREFIX-LIST-DHCP-SERVER-RANGE seq 5 permit 2001:DB8:1234::/48 30.05.2013 26

FHS Config Example vlan configuration 100 ipv6 nd raguard attach-policy POLICY-RAGUARD-HOST ipv6 dhcp guard attach-policy POLICY-DHCPGUARD-CLIENT ipv6 snooping attach-policy POLICY-SNOOPING interface GigabitEthernet0/1 description *** Uplink Port *** ipv6 nd raguard attach-policy POLICY-RAGUARD-ROUTER ipv6 dhcp guard attach-policy POLICY-DHCPGUARD-SERVER end interface GigabitEthernet0/2 description *** Access Port *** switchport access vlan 100 30.05.2013 27

IPv6 First Hop Security Platform Support 30.05.2013 28

Konnten wir Ihre Fragen beantworten?! Herzlichen Dank!