IPv6 Security Issues and Challenges Dr. Omar A. Abouabdalla - - PowerPoint PPT Presentation

ipv6 security issues and challenges
SMART_READER_LITE
LIVE PREVIEW

IPv6 Security Issues and Challenges Dr. Omar A. Abouabdalla - - PowerPoint PPT Presentation

Ministry of Science, People First, Performance Now Technology and Innovation IPv6 Security Issues and Challenges Dr. Omar A. Abouabdalla (omar@ipv6global.my) Head Technology Consultant Head Technology Consultant IPv6 Global Sdn Bhd 7


slide-1
SLIDE 1

People First, Performance Now Ministry of Science, Technology and Innovation

IPv6 Security Issues and Challenges

  • Dr. Omar A. Abouabdalla

(omar@ipv6global.my)

Head Technology Consultant Head Technology Consultant IPv6 Global Sdn Bhd

7 November 2012

slide-2
SLIDE 2

People First, Performance Now Ministry of Science, Technology and Innovation

IP 6

TO MIGRATE OR NOT TO MIGRATE?

IPv6

TO MIGRATE OR NOT TO MIGRATE?

  • It’s not an option.
  • Either we migrate or we will be left behind.
  • Malaysian government has mandated they will be IPv6

native by end of 2015 native by end of 2015.

  • Malaysian major trading partners including the U.S., China

and India has already started aggressively migrating to

  • IPv6. If we want to continue to be relevant, communicate

and do business with these countries, we will have to migrate. migrate.

slide-3
SLIDE 3

People First, Performance Now Ministry of Science, Technology and Innovation

Wh t' th bl ?

  • We have firewalls and Intrusion Detection Systems

What's the problem?

– so we’re safe from outside attack.

  • VPNs, SSH, etc. allow secure remote access.

SSL/TLS t t b hi hi tt k

  • SSL/TLS protects web access – so phishing attacks

don’t work.

  • Virus scanning is effective - so viruses are a thing of the

Virus scanning is effective so viruses are a thing of the past.

  • Security patches applied – The patches never break

thi anything.

  • IPv6 has complete built-in security.
  • And cows can fly!
  • And cows can fly!
slide-4
SLIDE 4

People First, Performance Now Ministry of Science, Technology and Innovation

The e ha stion of the finite pool of IP 4 addresses

IPv4 to IPv6 Challenging Move

  • The exhaustion of the finite pool of IPv4 addresses.
  • IPv6 deployment is critical to safeguarding the future

expansion of the internet. p

  • IPv6 deployment comes with its own set of challenges,

and security issues.

  • Networks need to be dual-stack during the transition

phase.

  • In most cases settings will not be automatically copied
  • In most cases, settings will not be automatically copied

between IPv4 and IPv6.

  • Whenever you make a change for one protocol you have

to do it for the other, which doubles the chances of making a mistake.

slide-5
SLIDE 5

People First, Performance Now Ministry of Science, Technology and Innovation

Some interesting aspects about IPv6 Some interesting aspects about IPv6 security

  • We have much less experience with IPv6 than

with IPv4 with IPv4.

  • IPv6 implementations are much less mature

than their IPv4 counterparts. p

  • Security products (firewalls, NIDS, etc.) have

less support for IPv6 than for IPv4. The complexity of the resulting network will

  • The complexity of the resulting network will

greatly increase during the transition/co- existence period:

Two internetworkin protocols (IPv4 and IPv6) Increased use of NATs Increased use of tunnels Increased use of tunnels

  • Lack of trained human resources.
slide-6
SLIDE 6

People First, Performance Now Ministry of Science, Technology and Innovation

B i f i b t IP 6 d IP 4 Brief comparison between IPv6 and IPv4

  • IPv6 and IPv4 are very similar in terms of functionality (but not in

terms of mechanisms) terms of mechanisms)

IPv4 IPv6

Addressing 32 bits 128 bits Addressing 32 bits 128 bits Address Resolution ARP ICMPv6 NS/NA A t DHCP & ICMP RS/RA ICMP 6 RS/RA & DHCP 6 Auto- configuration DHCP & ICMP RS/RA ICMPv6 RS/RA & DHCPv6 (recommended) F lt I l ti ICMP ICMP 6 Fault Isolation ICMP ICMPv6 IPsec support Optional Recommended (not mandatory) Fragmentation Both in hosts and routers Only in hosts

slide-7
SLIDE 7

People First, Performance Now Ministry of Science, Technology and Innovation

B i f i b t IP 6 d IP 4 Brief comparison between IPv6 and IPv4

  • Header formats:
slide-8
SLIDE 8

People First, Performance Now Ministry of Science, Technology and Innovation

Fl L b l Flow Label

  • The three tuple {Source Address Destination
  • The three-tuple {Source Address, Destination

Address, Flow Label} was meant to identify a communication flow. C tl d b t k th it

  • Currently unused by many stacks – others use it

improperly

  • Speficication of this header field, together with

p , g possible uses, is “work in progress” at the IETF.

  • Potential vulnerabilities depend on the ongoing

work at the IETF: work at the IETF:

– Might be leveraged to perform “dumb” (stealth) address scans. Might be leveraged to perform Denial of Service – Might be leveraged to perform Denial of Service attacks.

slide-9
SLIDE 9

People First, Performance Now Ministry of Science, Technology and Innovation

H Li it Hop Limit

  • Analogous to IPv4’s “Time to Live” (TTL)
  • Analogous to IPv4 s Time to Live (TTL).
  • Identifies the number of network links the

packet may traverse packet may traverse.

  • Packets are discarded when the Hop Limit

is decremented to 0 is decremented to 0.

  • Could be leveraged for:

Detecting the Operating System of a remote – Detecting the Operating System of a remote node. – Fingerprinting a remote physical device. Fingerprinting a remote physical device. – Locating a node in the network topology.

slide-10
SLIDE 10

People First, Performance Now Ministry of Science, Technology and Innovation

H Li it Fi i ti D i OS Hop Limit: Fingerprinting Devices or OSes

  • Different Oses use different defaults for the “Hop Limit”

Different Oses use different defaults for the Hop Limit (typically a power of two: 64, 128, etc.)

  • If packets originating from the same IPv6 addresses contain

very different “Hop Limits”, they might be originated by different devices. E.g.:

– Packets from FTP server 2001:db8::1 arrive with a “Hop Limit” of 60 Packets from FTP server 2001:db8::1 arrive with a Hop Limit of 60 – Packets from web server 2001:db8::2 arrive with a “Hop Limit” of 124 – We infer:

  • FTP server sets the Hop Limit to 64 and is 4 “routers” away
  • FTP server sets the Hop Limit to 64, and is 4 routers away.
  • Web server sets the Hop Limit to 128, and is 4 “routers” away.
  • Detecting the Operating System of a remote node.
slide-11
SLIDE 11

People First, Performance Now Ministry of Science, Technology and Innovation

H Li it L ti N d Hop Limit: Locating a Node

  • Basic idea: if we are receiving packets from a node and

assume that it is using the default “Hop Limit” we can infer assume that it is using the default Hop Limit , we can infer the orginal “Hop Limit”

  • If we have multple “sensors”, we can “triangulate” the position
  • f the node

Source Hop Limit A 61 B 61 C 61 D 62 F is the only node that is:

  • 4 “routers” from A
  • 4 “routers” from B
  • 4 “routers” from C
  • 3 “routers” from D
slide-12
SLIDE 12

People First, Performance Now Ministry of Science, Technology and Innovation

Threats to be Countered in IPV6

Scanning Gateways and Hosts for weakness Scanning for Multicast Addresses Unauthorised Access Control Protocol Weaknesses Distributed Denial of Service (DDos) Transition Mechanisms Worms/Viruses

There are already worms that use IPv6 y e.g. Rbot.DUD

slide-13
SLIDE 13

People First, Performance Now Ministry of Science, Technology and Innovation

Scanning Gateways and Hosts

IPv6 Subnet Size is much larger

More than 500 000 years to scan a /64 subnet@1M addresses/sec.

Scanning for backdoors impractical Scanning for backdoors impractical.

Scanning for proxies impractical. Scan-based worms can not propagate Scan-based worms can not propagate.

slide-14
SLIDE 14

People First, Performance Now Ministry of Science, Technology and Innovation

Scanning Gateways and Hosts

IP 6 S i th d h i IPv6 Scanning methods are changing

Public servers will still need to be DNS reachable giving attacker some hosts to attack. attacker some hosts to attack. Administrators may adopt easy to remember addresses (::1,::2,::53, or simply IPv4 last octet). Use of trivial EUI-64 derived addresses.

EUI-64 derived from interface MAC addresses.

By compromising routers at key transit points in a By compromising routers at key transit points in a network, an attacker can learn new addresses to scan.

Avoid using easy to guess addresses Avoid using easy to guess addresses.

slide-15
SLIDE 15

People First, Performance Now Ministry of Science, Technology and Innovation

S i M lti t Add Scanning Multicast Addresses

New Multicast Addresses - IPv6 supports new lti t dd bli tt k t id tif k multicast addresses enabling attacker to identify key resources on a network and attack them.

E g Site local all DHCP servers (FF05::1:3) mDNSv6 E.g. Site-local all DHCP servers (FF05::1:3), mDNSv6 (FF05::FB), and All Routers (FF05::2)

Addresses must be filtered at the border in order to Addresses must be filtered at the border in order to make them unreachable from the outside. To prevent smurf type of attacks: IPv6 specs forbids p yp p the generation of ICMPv6 packets in response to messages to global multicast addresses that contain requests.

slide-16
SLIDE 16

People First, Performance Now Ministry of Science, Technology and Innovation

Security of IPv6 Addresses

  • Cryptographically Generated Addresses (CGA) IPv6

addresses [RFC3972].

H t ID t f dd i d d h h Host ID - part of address is an encoded hash.

Binds IPv6 address to public key

Used for SEcuring Neighbor Discovery [RFC3971]. g g y [ ] Is being extended for other uses [RFC4581].

Privacy addresses as defined [RFC 4941]. y [ ]

Prevents device/user tracking Makes accountability harder

slide-17
SLIDE 17

People First, Performance Now Ministry of Science, Technology and Innovation

Unauthorised Access Control

Policy implementation in IPv6 with Layer 3 and Layer 4 is still done in firewalls. S d i id ti Some design considerations:

Filter site-scoped multicast addresses at site boundaries boundaries. Filter IPv4 mapped IPv6 addresses on the wire.

A ti S S t S t D t t Action Src Sst Src port Dst port permit a:b:c:d::e X:y:z:w::v any ssh deny any any deny any any

slide-18
SLIDE 18

People First, Performance Now Ministry of Science, Technology and Innovation

A lifi ti (DD S) Att k Amplification (DDoS) Attacks

There are no broadcast addresses in IPv6

This would stop any type of amplification attacks that send ICMP packets to the broadcast address Global multicast addresses for special groups of Global multicast addresses for special groups of devices, e.g. link-local addresses, etc.

IPv6 specifications forbid the generation of IPv6 specifications forbid the generation of ICMPv6 packets in response to messages to global multicast addresses

Many popular operating systems follow the specification. Still t i th d f ICMP k t ith Still uncertain on the danger of ICMP packets with global multicast source addresses.

slide-19
SLIDE 19

People First, Performance Now Ministry of Science, Technology and Innovation

Mitigation of IPv6 amplification

B th t h t i l t ti Be sure that your host implementations follow the ICMPv6 specification [RFC 4443] 4443]. Implement Ingress Filtering.

Defeating Denial of Service Attacks which

employ IP Source Address Spoofing [RFC 2827]. Implement ingress filtering of IPv6 packets p g g p with IPv6 multicast source address.

slide-20
SLIDE 20

People First, Performance Now Ministry of Science, Technology and Innovation

Mixed IPv4/IPv6 Environments

Some security issues with transition mechanisms

  • Some security issues with transition mechanisms.

Tunnels often interconnect networks over areas supporting the “wrong” version of protocol. supporting the wrong version of protocol. Tunnel traffic often not anticipated by the security

  • policies. It may pass through firewall systems due to

their inability to check two protocols in the same time.

Do not operate completely automated tunnels.

Avoid “translation” mechanisms between IPv4 and IPv6, use dual stack instead. Only authorised systems should be allowed as tunnel Only authorised systems should be allowed as tunnel end-points.

slide-21
SLIDE 21

People First, Performance Now Ministry of Science, Technology and Innovation

L3 – L4 Spoofing in IPv4 with 6to4

  • Via 6to4 tunneling spoofed traffic can be injected
  • Via 6to4 tunneling, spoofed traffic can be injected

from IPv4 into IPv6.

IPv4 Src: IPv4 Address. IPv4 Dst: 6to4 Relay IPv6 Src: 2002:: Spoofed Source IPv6 Dst: Valid Destination

Attacker 6to4 GW 6to4 relay IPv6 network IPv6 network Public IPv4 network

slide-22
SLIDE 22

People First, Performance Now Ministry of Science, Technology and Innovation

IPv6 and IPsec

  • General IP Security mechanisms that provides:

– Authentication – Confidentiality – key management -requires a PKI infrastructure (IKEv2)

  • Applicable to use over LANs, across public & private WANs, &

for the Internet for the Internet

  • IPSec is not a single protocol. Instead, IPSec provides a set
  • f security algorithms plus a general framework that allows a

pair of communicating entities to use whichever algorithms provide security appropriate for the communication. IPS i d t d i IP 6 l f d t d

  • IPSec is mandated in IPv6 – you can rely on for end-to-end

security.

slide-23
SLIDE 23

People First, Performance Now Ministry of Science, Technology and Innovation

What is IPsec?

  • Work done by the IETF IPsec Working Group
  • Applies to both IPv4 and IPv6 and its implementation is:

– Mandatory for IPv6 y – Optional for IPv4

  • IPsec Architecture: RFC 2401
  • IPsec services
  • IPsec services

– Authentication – Integrity – Confidentiality – Confidentiality

  • IPsec modes: Transport Mode & Tunnel Mode
  • IPsec protocols: AH (RFC 2402) & ESP (RFC 2406)
slide-24
SLIDE 24

People First, Performance Now Ministry of Science, Technology and Innovation

IPsec Protocols modes and IPsec Protocols, modes and combinations

Transport Mode Tunnel Mode

AH

Authenticates IP payload and selected portions of IP header Authenticates entire inner IP datagram (header & payload) and selected portions of the

  • uter IP header

ES P

Encrypts IP payload Encrypts inner IP datagram

ES P with A th ti ti

Encrypts IP payload and authenticates IP payload but Encrypts and authenticates inner IP datagram

Authentication

p y not IP header g

slide-25
SLIDE 25

People First, Performance Now Ministry of Science, Technology and Innovation

Some thoughts...

While IPv6 provides similar features as IPv4, it uses

different mechanisms. – and the evil lies in the small details.

The security implications of IPv6 should be considered

before it is deployed (not after!) before it is deployed (not after!).

Most systems have IPv6 support enabled by default, and

this has implications on “IPv4-only” networks!

Even if you are not planning to deploy IPv6 in the short

term, most likely you will eventually do it.

It is time to learn about and experiment with IPv6! It is time to learn about and experiment with IPv6!

slide-26
SLIDE 26

People First, Performance Now Ministry of Science, Technology and Innovation

Summary

IP 6 i b f d

  • IPv6 carries a number of advantages

– Improved addressing – Improved security p y – Improved routing

  • IPv6 advantages can be used against networks

B kd hidd – Backdoors hidden – Communications channels hidden – Security mechanisms bypassed

  • IPv6 is easier and cheaper to provide than prevent
  • Time for ignoring IPv6 is past
  • Time for understanding and using IPv6 is now
slide-27
SLIDE 27

People First, Performance Now Ministry of Science, Technology and Innovation

slide-28
SLIDE 28

People First, Performance Now Ministry of Science, Technology and Innovation

Acknowledgements

This presentation includes some material from these

  • ther sources:

National Advanced IPv6 Centre (NAv6) 6Deploy 6Deploy

slide-29
SLIDE 29

People First, Performance Now Ministry of Science, Technology and Innovation

slide-30
SLIDE 30

People First, Performance Now Ministry of Science, Technology and Innovation

IPv6 Global Sdn Bhd is an affiliate to Universiti Sains Malaysia’s National Who is IPv6 Global Sdn Bhd IPv6 Global Sdn Bhd is an affiliate to Universiti Sains Malaysia s National Advanced IPv6 Center (NAV6). NAV6 is a world leader in IPv6 R&D and sit in IPv6 Council of several countries including China, India and Singapore. In 2005, the Ministry of Information, Culture and Communication appointed NAV6 to spearhead the country's transition to be IPv6. We aim to provide a complete

  • ne-stop centre for all IPv6 requirements and needs.

Contact information Contact information Zulkifli Shahari zul.shahari@ipv6global.my

info@ipv6global.my or go to our website, www.ipv6global.my

zul.shahari@ipv6global.my 0133305588