Une attaque par rejeu sur le protocole SEND
Tony Cheneau
mail: tony.cheneau@it-sudparis.eu
(Télécom SudParis) & Jean-Michel Combes
mail: jeanmichel.combes@orange-ftgroup.com
(FT R&D)
October 17, 2008 SAR-SSI'2008
Une attaque par rejeu sur le protocole SEND Tony Cheneau mail: - - PowerPoint PPT Presentation
Une attaque par rejeu sur le protocole SEND Tony Cheneau mail: tony.cheneau@it-sudparis.eu (Tlcom SudParis) & Jean-Michel Combes mail: jeanmichel.combes@orange-ftgroup.com (FT R&D) October 17, 2008 SAR-SSI'2008 Summary
mail: tony.cheneau@it-sudparis.eu
mail: jeanmichel.combes@orange-ftgroup.com
October 17, 2008 SAR-SSI'2008
October 19, 2008 Tony Cheneau & Jean-Michel Combes 2
October 19, 2008 Tony Cheneau & Jean-Michel Combes 3
October 19, 2008 Tony Cheneau & Jean-Michel Combes 4
How to compute a IPv6 address ?
October 19, 2008 Tony Cheneau & Jean-Michel Combes 5
October 19, 2008 Tony Cheneau & Jean-Michel Combes 6
– Router Discovery – Prefix Discovery – Parameter Discovery – Stateless Address Autoconfiguration – Address Resolution (similar to ARP in IPv4) – Next Hop Determination – Neighbor Unreachability Detection – Duplicate Address Detection (useful for Stateless
Autoconfiguration, also called DAD)
– Redirection (equivalent to ICMPv4 redirect)
October 19, 2008 Tony Cheneau & Jean-Michel Combes 7
– Neighbour Solicitation (NS) – Neighbour Advertisement (NA) – Router Solicitation – Router Advertisement – Redirect
October 19, 2008 Tony Cheneau & Jean-Michel Combes 8
Address Resolution
October 19, 2008 Tony Cheneau & Jean-Michel Combes 9
address
same address
address
Duplicate Address Detection
October 19, 2008 Tony Cheneau & Jean-Michel Combes 10
– Neighbor Solicitation/Advertisement Spoofing – Neighbor Unreachability Detection Failure – Duplicate Address Detection DoS Attack
October 19, 2008 Tony Cheneau & Jean-Michel Combes 11
– bind a public key to an IPv6 address with an hash
algorithm (but this everybody can do it)
– the public key can be generated on connection – and so does the CGA (it allows autoconfiguration)
– a whole set of parameters is bound to the address
October 19, 2008 Tony Cheneau & Jean-Michel Combes 12
October 19, 2008 Tony Cheneau & Jean-Michel Combes 13
October 19, 2008 Tony Cheneau & Jean-Michel Combes 14
– Timestamp (prevent replay attacks) – Nonce (supposedly prevent replay attacks) – CGA option – RSA signature option (actually proves the
October 19, 2008 Tony Cheneau & Jean-Michel Combes 15
October 19, 2008 Tony Cheneau & Jean-Michel Combes 16
October 19, 2008 Tony Cheneau & Jean-Michel Combes 17
– can listen to the DAD procedure of other nodes:
– packet is replayed within 1 second
October 19, 2008 Tony Cheneau & Jean-Michel Combes 18
October 19, 2008 Tony Cheneau & Jean-Michel Combes 19
# network interface on which we will listen packets conf.iface = 'eth0' # listen to an interface sniff (store=0, filter ="ip6" , # listen only to NS used for DAD lfilter = lambda x : x.haslayer(ICMPv6ND_NS) \ and x.getlayer(IPv6).src== " : : " , # replay the packet prn = lambda x : sendp ( x ) , count =0)
1: http://namabiiru.hongo.wide.ad.jp/scapy6/
October 19, 2008 Tony Cheneau & Jean-Michel Combes 20
– fairly easy – not backward compatible and not recommended
– three collision with the same node has low probability – backward compatible
– in received NS during a DAD process, Nonce value has to be
different.
– backward compatible – no (known) side effect
October 19, 2008 Tony Cheneau & Jean-Michel Combes 21
October 19, 2008 Tony Cheneau & Jean-Michel Combes 22
Details on NTT Docomo implementation:
October 19, 2008 Tony Cheneau & Jean-Michel Combes 23
October 19, 2008 Tony Cheneau & Jean-Michel Combes 24