A Sampling of Internetwork Security Issues Involving IPv6



Similar documents
Vulnerabili3es and A7acks

Security of IPv6 and DNSSEC for penetration testers

Matt Ryanczak Network Operations Manager

CS5008: Internet Computing

IPv6 Fundamentals: A Straightforward Approach

IPv6 Security Best Practices. Eric Vyncke Distinguished System Engineer

Firewalls und IPv6 worauf Sie achten müssen!

IP(v6) security. Matěj Grégr. Brno University of Technology, Faculty of Information Technology. Slides adapted from Ing.

Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING

GregSowell.com. Mikrotik Security

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

Vicenza.linux.it\LinuxCafe 1

IPv6 Infrastructure Security

IPv6 Security from point of view firewalls

IPv6 Security. Scott Hogg, CCIE No Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN USA

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Firewalls and Intrusion Detection

Eric Vyncke, Distinguished Engineer, 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1

Security Assessment of Neighbor Discovery for IPv6

Examining Proxies to Mitigate Pervasive Surveillance

INLICHTINGEN DIENSTEN INLICHTINGEN DIENSTEN

Local Area Networks. LAN Security and local attacks. TDC 363 Winter 2008 John Kristoff - DePaul University 1

Charter Text Network Design and Configuration

Chapter 1 Personal Computer Hardware hours

DNS amplification attacks

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Proxy Server, Network Address Translator, Firewall. Proxy Server

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Security implications of the Internet transition to IPv6

How Cisco IT Protects Against Distributed Denial of Service Attacks

IPv6 Intrusion Detection Research Project

C)PTC Certified Penetration Testing Consultant

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

ICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

CS 356 Lecture 16 Denial of Service. Spring 2013

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

IPv6 Security Analysis

Security Technology White Paper

IPv6-only hosts in a dual stack environnment

Use Domain Name System and IP Version 6

Internet Security Firewalls

ITL BULLETIN FOR JANUARY 2011

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas

About the Technical Reviewers

CSCE 465 Computer & Network Security

Recent advances in IPv6 insecurities Marc van Hauser Heuse Deepsec 2010, Vienna Marc Heuse

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

IPv6 First Hop Security Protecting Your IPv6 Access Network

How To Compare Ipv6 And Ipv4 To Ipv5 (V1.2.0)

IPv6 Infrastructure Security Jeffrey L Carrell Network Conversions Network Security Consultant, IPv6 SME/Trainer

Personal Firewall Default Rules and Components

About Firewall Protection

IP address format: Dotted decimal notation:

Introduction to IPv6 and Benefits of IPv6

Malicious Network Traffic Analysis

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Internet Protocol: IP packet headers. vendredi 18 octobre 13

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas

Technical Support Information Belkin internal use only

IPv6 INFRASTRUCTURE SECURITY WORKSHOP SESSION 10 BUILDING IPv6 INFRASTRUCTURE NETWORK SECURITY

This Lecture. The Internet and Sockets. The Start If everyone just sends a small packet of data, they can all use the line at the same.

Denial of Service Attacks

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

DoS/DDoS Attacks and Protection on VoIP/UC

NAT and Firewall Traversal with STUN / TURN / ICE

IPV6 DEPLOYMENT GUIDELINES FOR. ARRIS Group, Inc.

The Truth about IPv6 Security

Southwest Arkansas Telephone Cooperative Network Management Practices

IPv6 Security ::/0. Poland MUM Warsaw March, 2012 Eng. Wardner Maia Brazil

Content Distribution Networks (CDN)

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Migrating to IPv6 Opportunity or threat for network security?

IPv6 Security. Scott Hogg. Global Technology Resources, Inc. Director of Technology Solutions CCIE #5133, CISSP #4610

IPv6 Security 111 Short Module on Security

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Networking Test 4 Study Guide

Transcription:

A Sampling of Internetwork Security Issues Involving IPv6 John Kristoff jtk@cymru.com FIRST 2013 John Kristoff Team Cymru 1

Agenda diff -u ipv4 ipv6 head What is the netsec community working on? How do the usual threats change, if they do? What new headaches arise with the transition glue? What are the miscreants doing? FIRST 2013 John Kristoff Team Cymru 2

IPv4 vs. IPv6 Header Formats FIRST 2013 John Kristoff Team Cymru 3

96 more bits, no magic? OS protocol stack software and APIs Address manipulation and storage Neighbor discovery Auto-configuration ICMPv6 Fragmentation on an end-to-end basis only Network and security tools Transition technologies Note: IPsec MUSTSHOULD be supported FIRST 2013 John Kristoff Team Cymru 4

Current IETF Work dhcpv6-shield (opsec) ipv6-host-scanning (opsec) lla-only (opsec) ipv6 (opsec) ipv6-implications-on-ipv4-nets (opsec) nd-security (opsec) nd-extension-headers (6man) predictable-fragment-id (6man) stable-privacy-addresses (6man) FIRST 2013 John Kristoff Team Cymru 5

Current IETF Work (continued) ipv6-smurf-amplifier (6man) mitigate-nd-cache-dos-slnd (6man) design-choices (v6ops) enterprise-incremental-ipv6 (v6ops) nat64-experience (v6ops) ra-guard-implementation (v6ops) ula-usage-recommendations (v6ops) fragdrop (v6ops) dc-ipv6 (v6ops) FIRST 2013 John Kristoff Team Cymru 6

Scanning Scans of the entire address space impractical intelligent address scanning imperfect, but practical DNS enumeration Non-random addresses SLAAC address space with known OUIs Multicast discovery Local neighbor discovery messages See IETF I-D draft-gont-opsec-ipv6-host-scanning FIRST 2013 John Kristoff Team Cymru 7

Spam Surprise, spam travels over IPv6 transport Many DNSBLs have used rbldnsd When it comes to IPv6, rbldnsd just doesn't scale Some software and usage changes required This is true for any IP address reputation system First SMTP over IPv6 email to comcast.net was spam FIRST 2013 John Kristoff Team Cymru 8

Routing Fair amount of focus on extension header issues Neighbor cache maintenance issues e.g. IETF RFC 6547 (using /127's for IRLs) Team Cymru IPv6 full bogons service IETF RFC 6666 A Discard Prefix for IPv6 Additional consideration likely needed here: Aggregation / disaggregation / hijack events Control plane protection for IPv6 transport FIRST 2013 John Kristoff Team Cymru 9

Packet Flooding / DoS Some evidence of IPv6-specific DoS Single D, not seeing evidence of IPv6-specific DDoS Some unintentional use of IPv6 transport for DDoS Mostly IRC-based miscreants experimenting with it Traffic levels are relatively modest thus far FIRST 2013 John Kristoff Team Cymru 10

Local Network Threats Router advertisements (RAs) presents a challenge As does much of the neighbor discovery mechanisms Who do you trust? How do you trust them? Similar to the known threats with ARP and DHCP SEcure Neighbor Discovery (SEND) IETF RFC 3971 Also see IETF RFC 3756 IPv6 Neighbor Discovery Trust Models and Threats 6Guard: a honeypot-based IPv6 attack detector FIRST 2013 John Kristoff Team Cymru 11

Transition Technologies 6in4/6to4/6rd/ISATAP/Teredo/tunnel brokers, OH MY! Are protections congruent? Can you monitor them? Mitigate problems over them? Whose relay? Do they monitor? Do you trust them? FIRST 2013 John Kristoff Team Cymru 12

%#@!#&$ NAT NAT just makes my life harder As pro-nat a statement I could make, IETF RFC 5902 IAB Thoughts on IPv6 Network Address Translation Next slide PLEASE! FIRST 2013 John Kristoff Team Cymru 13

An IPv6 Business Case is Born March 17, 2003 <A> get an ipv6 host./packetpeople wont know what to do <B> A we have ipv6 <C> most packet kiddies cant hit ipv6 yet <D> Im testing a ipv6 scanner i just made <E> i seen someone make a ddos for ipv6/ipv4 Later that same day, ipv6ddos.c released FIRST 2013 John Kristoff Team Cymru 14

IPv6 4SALE in the Underground November 11, 2003 <A> Got E-Gold Accounts, PayPaL Accounts, Vhosted Shells (ushells.net), Vhosts ( ipv4 - ipv6 ), Full Domin, Root, Root Scan, Root Nuke, Proxy Serv, Fresh CC's, Fresh Cvv2 I Verify 1st FIRST 2013 John Kristoff Team Cymru 15

Hiding behind the IPv6 More recently: <A>./gem -h 192.0.2.1 -T0 -t 15000 <B> that should do it <A> i got 5000mbit hitting <C> v6 is back up on X and Y just new ips <C> D got our vps working as a tunnel broker now <C> need a /64? <A> already has native IPv6 on ciscos FIRST 2013 John Kristoff Team Cymru 16

udp6.pl, udp.pl w/ IPv6 transport http://example.com/udp6.pl <-- working ipv6ddos flood.pl --port=dst-port --size=pkt-size --time=secs --bandwidth=kbps --delay=msec ip-address [-6] Defaults: * random destination UDP ports are used unless --port is specified * random-sized packets are sent unless --size or --bandwidth is specified * flood is continuous unless --time is specified * flood is sent at line speed unless --bandwidth or --delay is specified * IPv4 flood unless -6 is specified FIRST 2013 John Kristoff Team Cymru 17

IRC bot with TCP over v6 DDoS elxbot bot ++ipv6_attacker addin wich actually worx! =~ /^ipv6flood\s+(.+)\s+(\d+)\s+(\d+)/ [ ] sub tcp6 { [ ] my @SOCKET6; while($_[3] > (time - $s_time)) { for(my $i=0;$i<200;$i++) { socket6($socket6[$i], PF_INET6, SOCK_STREAM, getprotobyname('tcp')); [ ] FIRST 2013 John Kristoff Team Cymru 18

Dissent on DDoS Resilience <A> no its nearly impossible to ddos an ipv6 connection <B> average bitch ddos kiddies couldn't ddos ipv6 <C> i only know 2 people that know how to ddos ipv6 <D> and its impossible to ddos ipv6 <E> i can ddos ipv6 tunnel down FIRST 2013 John Kristoff Team Cymru 19

Who Took Down Their Routers? Very large hosting provider site in Chicago goes dark Carefully aimed DDoS at infrastructure router Routing protocol packets being dropped Remedied with streamlined control plane filters Miscreant controlled via IRC from an IPv6 bounce FIRST 2013 John Kristoff Team Cymru 20

PING Flood 1 Gb/s ICMPv6 echo requests sent to IRC server Random source-address spoofed by a single source urpf briefly enabled, but that feature melted router Source ISP eventually fixed the host FIRST 2013 John Kristoff Team Cymru 21

What We (Don't) See Today IPv6 is widely used as a transport, but rarely a platform IPv6 dark nets are dark Very little IPv6-specific malware Anecdotal evidence of malware using IPv6 as transport Some evidence of miscreants using IPv6 to hide origin Some evidence of using IPv6 to hide from monitoring Some evidence of using IPv6 to mitigate retribution Useful and necessary IPv6 threat research ongoing Relatively little IPv6 opsec measurement occurring FIRST 2013 John Kristoff Team Cymru 22

Resources and References http://www.gont.com.ar/ https://www.ietf.org/mailman/listinfo/opsec https://www.ietf.org/mailman/listinfo/v6ops http://lists.si6networks.com/listinfo/ipv6hackers http://www.cymru.com/jtk/ FIRST 2013 John Kristoff Team Cymru 23