Results of a Security Assessment of the Internet Protocol version 6 (IPv6)
Fernando Gont Fernando Gont
DEEPSEC 2011 Conference DEEPSEC 2011 Conference
Vienna, Austria, November Vienna, Austria, November 15-18, 2011 15-18, 2011
Results of a Security Assessment of the Internet Protocol version 6 - - PowerPoint PPT Presentation
Results of a Security Assessment of the Internet Protocol version 6 (IPv6) Fernando Gont Fernando Gont DEEPSEC 2011 Conference DEEPSEC 2011 Conference Vienna, Austria, November Vienna, Austria, November 15-18, 2011 15-18, 2011 About...
DEEPSEC 2011 Conference DEEPSEC 2011 Conference
Vienna, Austria, November Vienna, Austria, November 15-18, 2011 15-18, 2011
I have
UK NISCC (National
UK NISCC (National Infrastructur nfrastructure Security ecurity Co-or
dination Centr Centre)
UK CPNI (Centre for
UK CPNI (Centre for the he Protec Protection tion of
National Infrastructure) Infrastructure)
Currently
Membe
Invo
More information
Motivation
Brief
Discussion
Security
Security
Areas
Conclusions
Questions
IPv6
IPv6
Howeve
Additionaly, ISPs
Exhaus
Exhausti tion
the IAN ANA I IPv4 v4 fr free ee pool pool
Awareness
Awareness activities ctivities such uch as the s the “World IPv6 World IPv6 Day” Day”
Imminent
Imminent exhaustion exhaustion of the the free po ree pool o
IPv4 addresses addresses at the t the different ifferent RIRs RIRs
It
A lot
Security
Security as a as a key key component component of
the protocol rotocol
Change
Change from from networ network-centr k-centric to host-centri
aradigm igm
Increased
Increased use o se of IPsec IPsec
etc
etc.
They
This
Rather
There i
IPv6
Security
The
Two
Two internetw nternetworking
protocols (IPv4 v4 and and IPv6) Pv6)
Increased
Increased use o se of NATs NATs
Increased
Increased use o se of tunnels tunnels
Use
Use of
ransition/co-existance technologies echnologies
Lack
IPv6 and and IPv4 Pv4 are very re very similar in terms similar in terms of functionality unctionality (but (but not not in terms n terms of mecha mechanisms isms) ICMPv6 ICMPv6 ICMPv4 ICMPv4 Fault Fault Isolatio Isolation Mandatory Mandatory (to to "opt "optional ional") ") Optional Optional IPsec IPsec support support Only Only in hosts in hosts Both Both in hosts in hosts and nd ro routers uters Fragmentation Fragmentation ICMPv6 ICMPv6 RS/RA & DHCPv6 RS/RA & DHCPv6 (optional
) (+ MLD) DHCP & ICMP RS/RA DHCP & ICMP RS/RA Auto-configuration Auto-configuration ICMPv6 ICMPv6 NS/NA (+ MLD) NS/NA (+ MLD) ARP ARP Address Address resolutio resolution 128 bits 128 bits 32 32 b bits ts Addressing Addressing
The
IPv6
Simi
Addresses
Addresses are are aggregated aggregated into into “prefixes” “prefixes” (for (for routi routing pur urposes) poses)
There
There are different re different address address types ypes (u (unicast, anycast, and nicast, anycast, and multicast ulticast)
There
There are different re different address address scopes copes (link-local, global, etc.) (link-local, global, etc.)
It’s
One
One or more unicast
k-local address
One
One or more global unicast
ddress
One
One or more l
k-local address
Syntax
The
Global Unicast
Use
Use modified modified EUI-64 forma EUI-64 format identifiers identifiers (embed embed the he MAC address) MAC address)
“Privacy
“Privacy Addresses” Addresses” (or (or some
aria iant nt of
them)
Manual
Manually-configured ly-configured (e.g., 2001:db8::1) e.g., 2001:db8::1)
As specified
As specified by some y some specific specific transitio transition/co-existence /co-existence technology echnology Global Routing Prefix Subnet ID Interface ID
| n bits | m bits | 128-n-m bits |
This
However, Malone (*) measured
SLAAC (Interface-ID based
SLAAC (Interface-ID based on
AC address)
IPv4-ba
IPv4-based sed (e.g., 2001:db8::192.168.10.1) (e.g., 2001:db8::192.168.10.1)
“Low byte”
“Low byte” (e.g., 2001:d e.g., 2001:db8::1, 2001:db8::2, etc.) b8::1, 2001:db8::2, etc.)
Priva
Privacy Addresses ddresses (Random (Random Interface-IDs) nterface-IDs)
“Wordy”
“Wordy” (e.g., 2001:db8::dead:beef) e.g., 2001:db8::dead:beef)
Related
Related to specific pecific transitio ransition-co-existence n-co-existence tec echnologies hnologies (e.g., Teredo (e.g., Teredo)
(*) Malone, D. 2008. Observations of IPv6 Addresses. Passive and Active Measurement Conference (PAM 2008, LNCS 4979), 29–30 April 2008.
The
20% 20% IPv4-ba IPv4-based ed Addr Address ess Type ype Percentage Percentage SLAAC SLAAC 50% 50% Teredo Teredo 10% 10% Low-byte Low-byte 8% Pri Privacy acy 6% Wordy Wordy <1% 1% Other Other <1% 1%
(*) Malone, D. 2008. Observations of IPv6 Addresses. Passive and Active Measurement Conference (PAM 2008, LNCS 4979), 29–30 April 2008.
<1% <1% Wordy Wordy Addr Address ess Type ype Percentage Percentage Low-byte Low-byte 70% 70% IPv4-ba IPv4-based ed 5% 5% SLAAC SLAAC 1% Pri Privacy acy <1% 1% Teredo Teredo <1% <1% Other Other <1% 1%
Hosts Hosts Routers Routers
IPv6
Host scanning
IPv6
They
They will will leverage leverage address address pattern atterns (i.e., predictable i.e., predictable addresses) ddresses)
They
They will will leverage leverage application-layer application-layer add ddress-leaks ress-leaks (e.g., e-mail, P2P, etc.) e.g., e-mail, P2P, etc.)
For
For local scans, multicast addresses, Neighbor
Discovery, and ery, and “Network “Network Neighborhood” Neighborhood” protocols rotocols (e.g., mDNS) w e.g., mDNS) will ill be leveraged be leveraged
Some
For
For servers, address servers, address predictability predictability is irrelevant rrelevant --
after all, yo ll, you want ant them hem to be easily be easily fo found. und.
For
For hosts, IPv6
“privacy addresses” addresses” are are probably probably desirable. –
co consider nsider the the use o se of firewalls! firewalls!
The
Dumb
Dumb networ network, sm k, smar art hosts
Any
Any node
an establis ish a communi communication cation instance stance wi with th any any other ther node node in the in the networ network
The
The network etwork do does es not not care are abo bout ut what what is is inside inside internet-layer internet-layer packets packets
It
Deployment
With
It
However,
Global-addressability
Global-addressability do does es not not necessarily ecessarily imply imply “end-to-end” end-to-end” connectivity. nnectivity.
Most
Most producti
networks don’t don’t really eally care re about
nnovation, but but rat ather her abo about getting etting work work do done. ne.
Users
Users expect xpect to use in IPv6 se in IPv6 the the same ame services ervices currently urrently available available for
IPv4 without without “end-to-end” end-to-end” connectivity
web, email, social
networks, etc.)
Thus,
End-to-end
End-to-end connectivity connectivity is not
necessarily a desir desired property roperty in a production n a production networ network (e.g., may increase e.g., may increase host host exposure exposure unnecessari unnecessarily) y)
A typical
A typical IPv6 Pv6 subnet ubnet will ill be protected e protected by a st y a stat ateful ul firewall t firewall that at only allo allows ws “return “return traffic” raffic”
IPv6
ICMPv6
Being
(ARP is
(ARP is implement implemented directly irectly over ver Ethernet thernet, with with no possibilities no possibilities for for Ext Extensio nsion Headers eaders or
fragmentation) n)
IPv4’s ARP spoofing
Possib
Deploy
Deploy SEND (SEcure SEND (SEcure Neighbor eighbor Discovery) iscovery)
Monitor Neighbor
Monitor Neighbor Discovery traffic Discovery traffic (e.g. with e.g. with NDPMon) NDPMon)
Add
Add static tatic entries ntries to to the the Neighbor eighbor Cache ache
Restri
Restrict ct access cess to to the the local
network
Unfortunately,
SEND is
SEND is very very difficult difficult to deploy eploy (it it requires requires a PKI) a PKI)
ND monitoring
ND monitoring tools tools can be trivially an be trivially evaded vaded
Use
Use of
static Neighbor Neighbor Cache entr Cache entries ies does
scale
Not
Not always lways is it possible ssible to restrict estrict access access to to the the local network
Conclusion: the
There
Stateless
Stateless: SLAAC (Stateless : SLAAC (Stateless Address Address Aut Auto-Co
figuration), based ), based on ICMPv6 ICMPv6 messages messages (Router Solicitation (Router Solicitation y Router Advertisement) Router Advertisement)
Stateful
Stateful: DHCPv6 : DHCPv6
SLAAC is
In SLAAC, “Router Advertiseme
IPv6
IPv6 prefixes prefixes to to use for use for autoconfiguration utoconfiguration
IPv6
IPv6 routes routes
Ot
Other her configuratio figuration parameters parameters (Hop Limit, MTU, etc.) (Hop Limit, MTU, etc.)
etc
etc.
By forging
Denial
Denial of
Service (DoS) att DoS) attacks
“Man
“Man in the the Middle” iddle” (MIT (MITM) at M) atta tacks cks
Possib
Deploy
Deploy SEND (SEcure SEND (SEcure Neighbor eighbor Discovery) iscovery)
Monitor Neighbor
Monitor Neighbor Discovery Discovery traffic traffic (e.g., with e.g., with NDPMon) NDPMon)
Deploy
Deploy Ro Router Advertisement uter Advertisement Guard uard (RA-Guard) (RA-Guard)
Restri
Restrict ct access cess to to the the local
network
Unfortunately,
SEND is
SEND is very very difficult difficult to deploy eploy (it it requires requires a PKI) a PKI)
ND monitoring
ND monitoring tools tools can be trivially an be trivially evaded vaded
RA-Guard
RA-Guard can be trivially can be trivially evaded evaded
Not
Not always lways is it possible ssible to restrict estrict access access to to the the local network
Conclusion: the
This
In practice, this
What
What is is mandatory mandatory is IPsec Psec support support – not
IPsec usage usage
And
And nevertheless, many evertheless, many IPv4 IPv4 implem implementatio entations support upport IPsec, while IPsec, while there there exist exist IPv6 Pv6 implem mplementatio ntations ns th that at do n do not support upport IPsec IPsec
Virtually
Virtually all ll the the same ame IPsec Psec deployment deployment obstacles
resent in IPv4 in IPv4 are also are also present present in IPv6 in IPv6
The
Conclusion: there
The
Deploy
Deploy IPv6 v6 along
Pv4 before efore we really eally needed needed it
– Y
– Yes, it it failed failed. .
Current
Dual Stack
Dual Stack
“Configured”
“Configured” Tunnels nnels
Automatic
Automatic Tunnels unnels (ISATAP, 6to4, Teredo, etc.) (ISATAP, 6to4, Teredo, etc.)
Translatio
Translation (e.g., NAT6 e.g., NAT64)
Dual stack
Some
Transition
Many
Some
Which
Which networks/systems etworks/systems does
eredo or 6to 6to4 traffic traffic traverse? raverse?
This
This may (or may (or may not) be an ay not) be an important important issue ssue for for your organizatio rganization
Transition/co-e
This
Example: structure
IPv4 Header IPv4 Header UDP Header UDP Header IPv6 Header IPv6 Header IPv6 Extension Headers IPv6 Extension Headers TCP segment TCP segment
“Exercise”: write
Most
It
This
An
These
Transition
Thus,
Eve
Even if if you don’t ’t plan to plan to “use” IPv6 IPv6, yo , you shoul uld consi sider der its ts implic implicatio ations on your your network. network.
If
If a network a network is meant eant to to be IPv4-o be IPv4-only, make nly, make sure sure this this is is actually actually the the case. ase.
IPv6
Implementatio
Implementations hav ave not
really been been the the target arget of attackers, yet ttackers, yet
Only
Only a handful a handful of publicly ublicly available vailable attack ttack tools tools
Lots
Lots of vulnerabilities vulnerabilities and nd bugs bugs still still to be discovered. e discovered.
IPv6
IPv6
IPv6 transport transport is not
broadly supported upported in sec in security urity devices evices (firewalls, IDS/IPS, (firewalls, IDS/IPS, etc etc.)
This
This is is key key to be able e able enforce enforce security ecurity policies
comparable with the the IPv4 Pv4 counterpa counterparts ts
Education/Training
Pushing
Pushing peop eople to “Enable able IPv6” v6” point
style is simply imply insane nsane.
Training is
Training is needed needed for for engineers, techni ngineers, technicians, security cians, security perso ersonnel, etc., before nnel, etc., before the IPv6 Pv6 net etwo work rk is is ru running. g.
20 million engineers need IPv6 training, says IPv6 Forum
The IPv6 Forum - a global consortium of vendors, ISPs and national research & Education networks - has launched an IPv6 education certification programme in a bid to address what it says is an IPv6 training infrastructure that is "way too embryonic to have any critical impact.“ (http://www.itwire.com)
Beware
While
The
Most
Even if
It