Company
LOGO
IPv6 Security Considerations: Future Challenges
- Prof. Sukumar Nandi
Dept of Computer Sc. & Engg. Indian Institute of Technology Guwahati
IPv6 Security Considerations: Future Challenges Prof. Sukumar Nandi - - PowerPoint PPT Presentation
IPv6 Security Considerations: Future Challenges Prof. Sukumar Nandi Company Dept of Computer Sc. & Engg. LOGO Indian Institute of Technology Guwahati Agenda Outline Motivation for IPv6 Brief comparision between IPv6 and IPv4
Company
Dept of Computer Sc. & Engg. Indian Institute of Technology Guwahati
Version IHL Type of Service Total Length Identification
Flag s
Fragmen t Offset Time to Live Protocol Header Checksum Source Address Destination Address Options Padding
Version Traffic Class Flow Label Payload Length Next Heade r Hop Limit Source Address Destination Address
Dropped options need to go somewhere…
Payload
IPv6 Header Extension Header
Payload IPv6 Header Extension Header Extension Header Payload
impractical task considering the volume.
dynamically generated IP addresses.
requires a functional IP stack in order to function and this result in a bootstrapping problem.
So is this really a security benefit?
mandatory!
I also have 192.168.20.1
Who has 192.168.20.34? I Do. Here’s my MAC Hey Everyone. I have 192.168.20.34 And 192.168.20.2, And …..
I Do. Send traffic to me
Who has 2001::3/64? I Do. Here’s my Layer 2 address Who has 2001::3/64?
Neighbor Solicitation Neighbor Advertisement ND Spoofing
Solution: SEcure Neighbor Discovery (SEND) – RFC 3971
Other ND related attacks:
IPv6 multicast addresses: IPv6 multicast includes a ton of reserved addresses. Here’s a few:
Multicast Address Reservation FF02::1 All Host Address FF02::2 All Router Address (LL) FF02::9 RIP Routers FF02::A EIGRP Routers FF02::B Mobile-Agents FF02::1:2 All DHCP Agents FF05::2 All Router Address (SL) FF05::1:3 All DHCP Servers FF05::1:4 ALL DHCP Relays FF0X::101 NTP FF0X::106 Name Service Server
Attackers can use these multicast addresses to enumerate your network.
THC-IPv6 Attack Suite
Alive6 Parasite6 Redir6 Fake_Router6 Detect-New-IPv6 DoS-New-IPv6 Smurf6 rSmurf6 TooBig6 Fake_MIPv6 Fake_mld6 Fake_Advertiser6 SendPees6 DNSDict6 Trace6 Flood_Router6 Flood_Advertise6 Fuzz_IP6 etc…
Unfortunately, IPv6 security controls and products seems to be a bit behind.
THC-IPv6 Attack Suite Nmap Wireshark Multi-Generator (MGEN) IPv6 Security Scanner (vscan6) Halfscan6 Strobe Netcat6
Imps6-tools Relay6 6tunnel NT6tunnel VoodooNet Scapy6 Metasploit (etc.) Web Browsers (XSS & SQLi) TCPDump COLD Spak6 Isic6 Hyenae SendIP Packit 4to6ddos 6tunneldos
At least a Link-Local Address (FE80::/10) Likely a Unique Global Address (2000::/3) Possibly a Site-Local Address (FC00::/7)
You will probably need MULTIPLE Firewall or ACL policies for these extra networks within your
IPv6 and IPv4 Threat Comparison and Best-Practice Evaluation http://www.cisco.com/web/about/security/security_services/ciag/documents/ v6-v4-threats.pdf IPv6 Security Challenges https://www.cs.siue.edu/~wwhite/CS447/TopicalPaper/Originals/Bridges_IP v6SecurityChallenges.pdf IPv6 Security Challenges by Samuel Sotillo http://www.infosecwriters.com/text_resources/pdf/IPv6_SSotillo.pdf IPv6 Security Best Practices http://www.cisco.com/web/SG/learning/ipv6_seminar/files/02Eric_Vyncke_S ecurity_Best_Practices.pdf IPv6 Security Considerations and Recommendations http://technet.microsoft.com/en-us/library/bb726956.aspx NIST: Guidelines for the Secure Deployment of IPv6 http://csrc.nist.gov/publications/nistpubs/800-119/sp800-119.pdf IPv6 Transition/Coexistence Security Considerations (RFC 4942) http://www.ietf.org/rfc/rfc4942.txt And many more….