SlideShare a Scribd company logo
1 of 36
IPv6 Security awareness
By
Musa Stephen HONLUE
Trainer@AFRINIC
Stephen.honlue@afrinic.net
04/12/2015
1
 Create awareness of IPv6 Security implications.
 Highlight technical concepts on IPv6
weaknesses
 Describe strengthening technics.
Presentation Objectives
2
Agenda
Intro. to IPv6 and Security.
Threatsandmitigation.
The 128 bits IP address
IPv6 Addresses
Global
Unicast
Unicast Multicast Anycast
Solicited NodeAssigned
Link-local Loopback Unspecified Unique Local
Embedded
IPv4
2000::/3 FE80::/64 ::1/128 ::/128 FEC0::/7 ::/80
FF00::/8 FF02::1:FF00:0000/104
4
Skills
The 128 bits IP address
|------------------------------128 bits-----------------------------|
Global Routing prefix Subnet ID Interface ID
N bits 64-N bits 64 bits
 2^128 ~ 304,282,366,920,938,463,463,374,607,431,768,211,456
trillion trillion trillion possible IP addresses.
 Simplified base header compared to IPv4
 Plug n play with SLAAC
 Most of IPv4 functions (DHCP, DNS, routing …)
5
Skills
Protocols Similarities
APPLICATION(DNS, HTTP, IMAP, SMTP, POP, NFS)
TRANSPORT(TCP, UDP)
NETWORK(IPv4/IPv6)
IPv4 (ICMP, IGMP, IPSec, NAT,
OSPF, IS-IS, mob. IP)
IPv6(ICMPv6, IPSec, ND, MLD,
OSPFv3, IS-IS, mob. IP)
DATA LINK(Ethernet & co., NBMA, ATM, PPP, WiMAX, 3GPP)
6
Skills
Any Similarity?
Version IHL Type of Service
Total length
Identification Flags Fragment Offset
Time to Live Protocol Header Checksum
Source Address
Destination Address
Options Padding
Fields Removed Fields removed from IPv6 base header
Fields renamed in IPv6 Fields kept
7
Skills
IPv6 is a network-layer
replacement for IPv4
8
Skills
Attacking tools sophistication
9
Skills
IPv6 attack tools?
Attacks Tools
Reconnaissance Alive6 and Nmap
Amplification Smurf6, Rsmurf6
Covert Channel, Tunnel Injection, RH0 Scapy
Router Alert Scapy, denial6
Tiny Fragments, Large Fragments Scapy, thcping6
RA Spoofing fake_router26, kill_router6, flood_router26
NA Spoofing parasite6, fake_advertise6,
flood_advertise6
NS Spoofing, NS Flooding Remote flood_solicitate6, ndpexhaust6
DAD Spoofing, Redirect Spoofing dos-new-ip6, redir6
DHCPv6 Spoofing flood_dhcpc6, fake_dhcps6
10
Skills
Myth or reality?
Is IPv6 is more secured than IPv4?
 IPSec is incorporated
 There is a large space not easy to scan
11
Skills
Myth or reality?
I don’t care IPv6 not on my network
Really?
All modern OS have IPv6 activated by default
# ./flood_router6 iface
12
Skills
Myth or reality?
IPv6 is just a successor of IPv4, so similar
Think twice!!!
IPv6 is new and most of the functionalities
13
Skills
Myth or reality?
IPv6 is not secured, NAT is missing
Who told you NAT is security?
NAT was meant to save address space
Any how check with your vendor:
CISCO – NPTv6
Juniper – basic-nat66
Iptables – t nat66
Use of proxy
14
Skills
Reconnaissance in IPv6
 Starting point for network attacks.
 /64 subnets, 1M tests/sec => 1400 Mbps =>
28 yrs to discover 1st active IPv6 address.
 With IPv6, new technics:
 Hints: DN, OIDs, logs, whois, flow, well
known addresses, transition mechs…
15
Skills
Reconnaissance in IPv6
 Site multicast: FF05::2, FF05::FB, FF05::1:3
 Link multicast : FF02::1, FF02::2, …
 Deprecated site local fec0:0:0:ffff::1
 Van Hauser found 2000 active IPv6
addresses in 20 secondes.
16
Skills
Use your border router
 Filter all site multicast at border router
Ipv6 access-list NO-SITE-MCAST
deny any FEC0::/10 (deprecated site local)
permit any FF02::/16 (link multicast)
permit any FF0E::/16 (global multicast)
deny any FF00::/16 (all other multicast)
17
Skills
A look at ICMPv6
NDP(RS, RA, NS, NA, Redirect)
Signalisation (Destination Unreachable, Time
Exceeded, Packet too big, Redirections)
Diagnostic (Ping, traceroute)
ICMPv6 is crucial to IPv6
18
Skills
Some LAN Attacks
 Neighbor cache spoofing (works like ARP spoof)
 DoS on DAD (Answer to all DAD requests)
 Neighbor cache overload (Fake NAs)
 Fake Router Advertisement
 Fake DHCPv6 server
19
Skills
Solutions against spoofing
 CISCO – SeND (RFC 3971), encrypts ND.
 RA-Guard (RFC 6101), drop RAs on access port.
 SAVI(draft), complex solution to solve fake RA,
DHCPv4, and DHCPv6.
 RAGuards bypass with fragmentation.
20
Skills
VPN Exfiltration
Insertion of IPv6 fake router and DNS64 to Network.
IPv6 Internet
21
Some Protocol problems
 SLAAC doesn’t give DNS by default, DHCP
doesn’t give default router.
 Need to use both, so think security twice.
 TCP reassembly problem.
22
Skills
Extensions Headers
 New mechanism in IPv6, used to encrypt
optional inter-layer information.
 RH0 – deprecated by RFC 5095
 Fragmentation VFR
 EH manipulation (long chain, reorder)
 Block any unknown EH, and make sure to update
list.
23
Skills
Implementations problems
 Bugs have been found in nearly all
implementations, some examples follow:
 Windows vista Teredo filter bypass;
 CISCO IPv6 Source Routing Remote memory
corruption;
 Linux kernel multiple packet filtering bypass
24
Skills
Is IPv6 more secured?
25
Skills
Creating an IPv6 Security Policy
26
Skills
Network perimeter policy
Issues with ICMPv6 messages at perimeter.
Issues with Mobile IPv6 at the perimeter network.
IPv6 bogon addresses at network perimeters.
Only send packets sourced with your allocated IPv6
block or LLA in the case of NDP.
Only receive packets to your allocated IPv6 or for
NDP. 27
Skills
Network perimeter policy
Perform uRPF filtering at the network perimeter and
throughout the interior of the network.
Your firewalls should support IPv6 and ICMPv6
messages SPI and parsing the complete EHs.
Use IPv6-capable host-based firewalls.
Use IPS that can deeply inspect IPv6 packets.
Filter multicast packets at your perimeter based on
their scope.
28
Skills
Extensions Headers policy
 Only use operating systems with RH0 disabled.
 Drop RH0 packets and unknown EHs at perimeter
firewall and throughout interior of the network.
29
Skills
LAN policy
No unauthorized access is permitted. All Network guests
MUST follow a network access permission policy.
Explicitly prohibit the spoofing of any IPv6 packet on
LAN(RS, RA, NA, NS, redirect) and on the WAN (multicast,
spoofed Layer 3/4 info).
Use randomly determined node identifiers for all IPv6
nodes at the expense of increasing the OPEX.
Determine whether the use of privacy/temporary addresses
is strictly prohibited in your organization.
30
Skills
LAN Policy
DHCPv6 is preferred, and EUI-64, if DHCPv6 is not
available.
Keep track of IPv6 addresses all hosts are using.
Use IPv6-capable NAC solutions, and SEND when
available in the network equipment and host OS.
Disable node-information queries on all hosts.
31
Skills
Host & device hardening
Hosts and devices related policies:
 Harden all IPv6 Nodes (routers, servers, …).
 Strictly control the use of multicast.
 Only use OS that do not send ICMPv6 error messages in
response to a packet destined for a multicast address.
 Use OS that use integrated HIPS and IPv6-capable
firewalling.
32
Skills
Host & device hardening
Hosts and devices related policies:
 Keep OS/software patched for any IPv6 known
vulnerability or recommended by the vendor.
 Proactively monitor the security posture of hosts
and remediate them AQAP.
 Secure any routing adjacency or peer to the fullest
extent possible(packet/prefix filtering on interfaces,
passwords, MD5, or IPsec) .
33
Skills
Transition mechanisms policy
 Prefer DS, and secure each protocol equally.
 Use manual tunnels only (using Ipsec preferred) and
perform filtering on the tunnel endpoints.
 Avoid 6to4 if not required.
 Prevent Teredo on Windows unless a special
security policy waiver has been signed.
 No IPv6-in-IPv4 (IP protocol 41) tunnels through
the perimeter unless required.
34
Skills
Skills
IPSec Framework
Policies related to IPSec include the following:
 Use IPSec when ever possible for securing
communications between systems/network devices unless
the use of DPI, IP35S, traffic classification, and anomaly
systems is a requirement.
 Strive to use AH with ESP and IKEv2 for all IPSec
connections.
35
Thank you
for your
Attention
Questions?
afrinic
afrinic
afrinic
afrinic
afrinic
afrinic
media
.net
twitter.com/
flickr.com/
facebook.com/
linkedin.com/company/
youtube.com/
www.
36

More Related Content

What's hot

All about routers
All about routersAll about routers
All about routers
agwanna
 

What's hot (20)

Ipv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaIpv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
 
DPDK & Layer 4 Packet Processing
DPDK & Layer 4 Packet ProcessingDPDK & Layer 4 Packet Processing
DPDK & Layer 4 Packet Processing
 
100197
100197100197
100197
 
Swiss IPv6 Council: Konfusion um die Router Flags
Swiss IPv6 Council: Konfusion um die Router FlagsSwiss IPv6 Council: Konfusion um die Router Flags
Swiss IPv6 Council: Konfusion um die Router Flags
 
Introducing JPCERT/CC's activity for securing IPv6 gears [APRICOT 2015]
Introducing JPCERT/CC's activity for securing IPv6 gears [APRICOT 2015]Introducing JPCERT/CC's activity for securing IPv6 gears [APRICOT 2015]
Introducing JPCERT/CC's activity for securing IPv6 gears [APRICOT 2015]
 
Getting started with IPv6
Getting started with IPv6Getting started with IPv6
Getting started with IPv6
 
Let's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane ElectricLet's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane Electric
 
All about routers
All about routersAll about routers
All about routers
 
PVQA PCAP Analyzer
PVQA PCAP AnalyzerPVQA PCAP Analyzer
PVQA PCAP Analyzer
 
Fun with PRB, VRFs and NetNS on Linux - What is it, how does it work, what ca...
Fun with PRB, VRFs and NetNS on Linux - What is it, how does it work, what ca...Fun with PRB, VRFs and NetNS on Linux - What is it, how does it work, what ca...
Fun with PRB, VRFs and NetNS on Linux - What is it, how does it work, what ca...
 
IPv6 im Jahre 2018
IPv6 im Jahre 2018IPv6 im Jahre 2018
IPv6 im Jahre 2018
 
Defeating OSPF MD5 authentication
Defeating OSPF MD5 authenticationDefeating OSPF MD5 authentication
Defeating OSPF MD5 authentication
 
Using packet-tracer, capture and other Cisco ASA tools for network troublesho...
Using packet-tracer, capture and other Cisco ASA tools for network troublesho...Using packet-tracer, capture and other Cisco ASA tools for network troublesho...
Using packet-tracer, capture and other Cisco ASA tools for network troublesho...
 
DPDK Summit 2015 - Aspera - Charles Shiflett
DPDK Summit 2015 - Aspera - Charles ShiflettDPDK Summit 2015 - Aspera - Charles Shiflett
DPDK Summit 2015 - Aspera - Charles Shiflett
 
Cellular technology with Embedded Linux - COSCUP 2016
Cellular technology with Embedded Linux - COSCUP 2016Cellular technology with Embedded Linux - COSCUP 2016
Cellular technology with Embedded Linux - COSCUP 2016
 
Rafa Sánchez & Fran Gomez - IoCker - When IPv6 met malware [rooted2019]
Rafa Sánchez & Fran Gomez - IoCker - When IPv6 met malware [rooted2019]Rafa Sánchez & Fran Gomez - IoCker - When IPv6 met malware [rooted2019]
Rafa Sánchez & Fran Gomez - IoCker - When IPv6 met malware [rooted2019]
 
BPF & Cilium - Turning Linux into a Microservices-aware Operating System
BPF  & Cilium - Turning Linux into a Microservices-aware Operating SystemBPF  & Cilium - Turning Linux into a Microservices-aware Operating System
BPF & Cilium - Turning Linux into a Microservices-aware Operating System
 
Implementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud TenantImplementing an IPv6 Enabled Environment for a Public Cloud Tenant
Implementing an IPv6 Enabled Environment for a Public Cloud Tenant
 
6.Routing
6.Routing6.Routing
6.Routing
 
DPDK summit 2015: It's kind of fun to do the impossible with DPDK
DPDK summit 2015: It's kind of fun  to do the impossible with DPDKDPDK summit 2015: It's kind of fun  to do the impossible with DPDK
DPDK summit 2015: It's kind of fun to do the impossible with DPDK
 

Viewers also liked (7)

IPv6 Security - Myths and Reality
IPv6 Security - Myths and RealityIPv6 Security - Myths and Reality
IPv6 Security - Myths and Reality
 
IPv6 and the IP Security Protocol
IPv6 and the IP Security ProtocolIPv6 and the IP Security Protocol
IPv6 and the IP Security Protocol
 
IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?
 
IPv6 Security
IPv6 SecurityIPv6 Security
IPv6 Security
 
IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015
 
Survey on IPv6 security issues
Survey on IPv6 security issuesSurvey on IPv6 security issues
Survey on IPv6 security issues
 
IPV6 SIMPLE SECURITY CAPABILITIES
IPV6 SIMPLE SECURITY CAPABILITIESIPV6 SIMPLE SECURITY CAPABILITIES
IPV6 SIMPLE SECURITY CAPABILITIES
 

Similar to AF-23- IPv6 Security_Final

Introduction to IPv6-UoN
Introduction to IPv6-UoNIntroduction to IPv6-UoN
Introduction to IPv6-UoN
Mwendwa Kivuva
 
10 IP VERSION SIX (6) WEEK TEN notes.pptx
10 IP VERSION SIX (6)  WEEK TEN notes.pptx10 IP VERSION SIX (6)  WEEK TEN notes.pptx
10 IP VERSION SIX (6) WEEK TEN notes.pptx
JoshuaAnnan5
 
Cisco presentation2
Cisco presentation2Cisco presentation2
Cisco presentation2
ehsan nazer
 

Similar to AF-23- IPv6 Security_Final (20)

IDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsIDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerations
 
Introduction to IPv6-UoN
Introduction to IPv6-UoNIntroduction to IPv6-UoN
Introduction to IPv6-UoN
 
IPV6 - Threats and Countermeasures / Crash Course
IPV6 - Threats and Countermeasures / Crash CourseIPV6 - Threats and Countermeasures / Crash Course
IPV6 - Threats and Countermeasures / Crash Course
 
Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?
 
Rapid IPv6 Deployment for ISP Networks
Rapid IPv6 Deployment for ISP NetworksRapid IPv6 Deployment for ISP Networks
Rapid IPv6 Deployment for ISP Networks
 
10 IP VERSION SIX (6) WEEK TEN notes.pptx
10 IP VERSION SIX (6)  WEEK TEN notes.pptx10 IP VERSION SIX (6)  WEEK TEN notes.pptx
10 IP VERSION SIX (6) WEEK TEN notes.pptx
 
3hows
3hows3hows
3hows
 
Introduction to IPv6
Introduction to IPv6Introduction to IPv6
Introduction to IPv6
 
Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4
 
IPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCTIPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCT
 
MAGPI: Advanced Services: IPv6, Multicast, DNSSEC
MAGPI: Advanced Services: IPv6, Multicast, DNSSECMAGPI: Advanced Services: IPv6, Multicast, DNSSEC
MAGPI: Advanced Services: IPv6, Multicast, DNSSEC
 
[CB19] New threats are already around you, the IPV6 attack must be understood...
[CB19] New threats are already around you, the IPV6 attack must be understood...[CB19] New threats are already around you, the IPV6 attack must be understood...
[CB19] New threats are already around you, the IPV6 attack must be understood...
 
Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPN
 
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisonsAPNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
 
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisonsAPNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
 
IPv6 Security - Hacker Halted 2013
IPv6 Security - Hacker Halted 2013IPv6 Security - Hacker Halted 2013
IPv6 Security - Hacker Halted 2013
 
IPv6 transition and coexistance - Jordi Palet
IPv6 transition and coexistance - Jordi PaletIPv6 transition and coexistance - Jordi Palet
IPv6 transition and coexistance - Jordi Palet
 
IPv6 networking training sduffy v3
IPv6 networking training   sduffy v3IPv6 networking training   sduffy v3
IPv6 networking training sduffy v3
 
IPv6 Transition & Deployment, including IPv6-only in cellular and broadband
IPv6 Transition & Deployment, including IPv6-only in cellular and broadbandIPv6 Transition & Deployment, including IPv6-only in cellular and broadband
IPv6 Transition & Deployment, including IPv6-only in cellular and broadband
 
Cisco presentation2
Cisco presentation2Cisco presentation2
Cisco presentation2
 

AF-23- IPv6 Security_Final

  • 1. IPv6 Security awareness By Musa Stephen HONLUE Trainer@AFRINIC Stephen.honlue@afrinic.net 04/12/2015 1
  • 2.  Create awareness of IPv6 Security implications.  Highlight technical concepts on IPv6 weaknesses  Describe strengthening technics. Presentation Objectives 2
  • 3. Agenda Intro. to IPv6 and Security. Threatsandmitigation.
  • 4. The 128 bits IP address IPv6 Addresses Global Unicast Unicast Multicast Anycast Solicited NodeAssigned Link-local Loopback Unspecified Unique Local Embedded IPv4 2000::/3 FE80::/64 ::1/128 ::/128 FEC0::/7 ::/80 FF00::/8 FF02::1:FF00:0000/104 4 Skills
  • 5. The 128 bits IP address |------------------------------128 bits-----------------------------| Global Routing prefix Subnet ID Interface ID N bits 64-N bits 64 bits  2^128 ~ 304,282,366,920,938,463,463,374,607,431,768,211,456 trillion trillion trillion possible IP addresses.  Simplified base header compared to IPv4  Plug n play with SLAAC  Most of IPv4 functions (DHCP, DNS, routing …) 5 Skills
  • 6. Protocols Similarities APPLICATION(DNS, HTTP, IMAP, SMTP, POP, NFS) TRANSPORT(TCP, UDP) NETWORK(IPv4/IPv6) IPv4 (ICMP, IGMP, IPSec, NAT, OSPF, IS-IS, mob. IP) IPv6(ICMPv6, IPSec, ND, MLD, OSPFv3, IS-IS, mob. IP) DATA LINK(Ethernet & co., NBMA, ATM, PPP, WiMAX, 3GPP) 6 Skills
  • 7. Any Similarity? Version IHL Type of Service Total length Identification Flags Fragment Offset Time to Live Protocol Header Checksum Source Address Destination Address Options Padding Fields Removed Fields removed from IPv6 base header Fields renamed in IPv6 Fields kept 7 Skills
  • 8. IPv6 is a network-layer replacement for IPv4 8 Skills
  • 10. IPv6 attack tools? Attacks Tools Reconnaissance Alive6 and Nmap Amplification Smurf6, Rsmurf6 Covert Channel, Tunnel Injection, RH0 Scapy Router Alert Scapy, denial6 Tiny Fragments, Large Fragments Scapy, thcping6 RA Spoofing fake_router26, kill_router6, flood_router26 NA Spoofing parasite6, fake_advertise6, flood_advertise6 NS Spoofing, NS Flooding Remote flood_solicitate6, ndpexhaust6 DAD Spoofing, Redirect Spoofing dos-new-ip6, redir6 DHCPv6 Spoofing flood_dhcpc6, fake_dhcps6 10 Skills
  • 11. Myth or reality? Is IPv6 is more secured than IPv4?  IPSec is incorporated  There is a large space not easy to scan 11 Skills
  • 12. Myth or reality? I don’t care IPv6 not on my network Really? All modern OS have IPv6 activated by default # ./flood_router6 iface 12 Skills
  • 13. Myth or reality? IPv6 is just a successor of IPv4, so similar Think twice!!! IPv6 is new and most of the functionalities 13 Skills
  • 14. Myth or reality? IPv6 is not secured, NAT is missing Who told you NAT is security? NAT was meant to save address space Any how check with your vendor: CISCO – NPTv6 Juniper – basic-nat66 Iptables – t nat66 Use of proxy 14 Skills
  • 15. Reconnaissance in IPv6  Starting point for network attacks.  /64 subnets, 1M tests/sec => 1400 Mbps => 28 yrs to discover 1st active IPv6 address.  With IPv6, new technics:  Hints: DN, OIDs, logs, whois, flow, well known addresses, transition mechs… 15 Skills
  • 16. Reconnaissance in IPv6  Site multicast: FF05::2, FF05::FB, FF05::1:3  Link multicast : FF02::1, FF02::2, …  Deprecated site local fec0:0:0:ffff::1  Van Hauser found 2000 active IPv6 addresses in 20 secondes. 16 Skills
  • 17. Use your border router  Filter all site multicast at border router Ipv6 access-list NO-SITE-MCAST deny any FEC0::/10 (deprecated site local) permit any FF02::/16 (link multicast) permit any FF0E::/16 (global multicast) deny any FF00::/16 (all other multicast) 17 Skills
  • 18. A look at ICMPv6 NDP(RS, RA, NS, NA, Redirect) Signalisation (Destination Unreachable, Time Exceeded, Packet too big, Redirections) Diagnostic (Ping, traceroute) ICMPv6 is crucial to IPv6 18 Skills
  • 19. Some LAN Attacks  Neighbor cache spoofing (works like ARP spoof)  DoS on DAD (Answer to all DAD requests)  Neighbor cache overload (Fake NAs)  Fake Router Advertisement  Fake DHCPv6 server 19 Skills
  • 20. Solutions against spoofing  CISCO – SeND (RFC 3971), encrypts ND.  RA-Guard (RFC 6101), drop RAs on access port.  SAVI(draft), complex solution to solve fake RA, DHCPv4, and DHCPv6.  RAGuards bypass with fragmentation. 20 Skills
  • 21. VPN Exfiltration Insertion of IPv6 fake router and DNS64 to Network. IPv6 Internet 21
  • 22. Some Protocol problems  SLAAC doesn’t give DNS by default, DHCP doesn’t give default router.  Need to use both, so think security twice.  TCP reassembly problem. 22 Skills
  • 23. Extensions Headers  New mechanism in IPv6, used to encrypt optional inter-layer information.  RH0 – deprecated by RFC 5095  Fragmentation VFR  EH manipulation (long chain, reorder)  Block any unknown EH, and make sure to update list. 23 Skills
  • 24. Implementations problems  Bugs have been found in nearly all implementations, some examples follow:  Windows vista Teredo filter bypass;  CISCO IPv6 Source Routing Remote memory corruption;  Linux kernel multiple packet filtering bypass 24 Skills
  • 25. Is IPv6 more secured? 25 Skills
  • 26. Creating an IPv6 Security Policy 26 Skills
  • 27. Network perimeter policy Issues with ICMPv6 messages at perimeter. Issues with Mobile IPv6 at the perimeter network. IPv6 bogon addresses at network perimeters. Only send packets sourced with your allocated IPv6 block or LLA in the case of NDP. Only receive packets to your allocated IPv6 or for NDP. 27 Skills
  • 28. Network perimeter policy Perform uRPF filtering at the network perimeter and throughout the interior of the network. Your firewalls should support IPv6 and ICMPv6 messages SPI and parsing the complete EHs. Use IPv6-capable host-based firewalls. Use IPS that can deeply inspect IPv6 packets. Filter multicast packets at your perimeter based on their scope. 28 Skills
  • 29. Extensions Headers policy  Only use operating systems with RH0 disabled.  Drop RH0 packets and unknown EHs at perimeter firewall and throughout interior of the network. 29 Skills
  • 30. LAN policy No unauthorized access is permitted. All Network guests MUST follow a network access permission policy. Explicitly prohibit the spoofing of any IPv6 packet on LAN(RS, RA, NA, NS, redirect) and on the WAN (multicast, spoofed Layer 3/4 info). Use randomly determined node identifiers for all IPv6 nodes at the expense of increasing the OPEX. Determine whether the use of privacy/temporary addresses is strictly prohibited in your organization. 30 Skills
  • 31. LAN Policy DHCPv6 is preferred, and EUI-64, if DHCPv6 is not available. Keep track of IPv6 addresses all hosts are using. Use IPv6-capable NAC solutions, and SEND when available in the network equipment and host OS. Disable node-information queries on all hosts. 31 Skills
  • 32. Host & device hardening Hosts and devices related policies:  Harden all IPv6 Nodes (routers, servers, …).  Strictly control the use of multicast.  Only use OS that do not send ICMPv6 error messages in response to a packet destined for a multicast address.  Use OS that use integrated HIPS and IPv6-capable firewalling. 32 Skills
  • 33. Host & device hardening Hosts and devices related policies:  Keep OS/software patched for any IPv6 known vulnerability or recommended by the vendor.  Proactively monitor the security posture of hosts and remediate them AQAP.  Secure any routing adjacency or peer to the fullest extent possible(packet/prefix filtering on interfaces, passwords, MD5, or IPsec) . 33 Skills
  • 34. Transition mechanisms policy  Prefer DS, and secure each protocol equally.  Use manual tunnels only (using Ipsec preferred) and perform filtering on the tunnel endpoints.  Avoid 6to4 if not required.  Prevent Teredo on Windows unless a special security policy waiver has been signed.  No IPv6-in-IPv4 (IP protocol 41) tunnels through the perimeter unless required. 34 Skills
  • 35. Skills IPSec Framework Policies related to IPSec include the following:  Use IPSec when ever possible for securing communications between systems/network devices unless the use of DPI, IP35S, traffic classification, and anomaly systems is a requirement.  Strive to use AH with ESP and IKEv2 for all IPSec connections. 35

Editor's Notes

  1. Network-layer successor to IPv4 128 bits long (296 times the total IPv4 address space) Runs on the same physical infrastructure The same applications can also run on IPv6 Incompatible with IPv4! The only sustainable answer to IPv4 exhaustion Enables continued growth of the Internet Restores end-to-end model & related applications
  2. Hop to hop checksum is left to link layer & transport layer does end-to-end checksum verification
  3. Application layer attacks Unauthorized access Man-in-the-middle attacks Sniffing/eavesdropping Denial of service (DoS) attacks Spoofed packets: forged addresses and other fields Attacks against routers and other networking devices. Attacks against the physical or data link layers Following is a list of threats that are unique to IPv6 networks: Reconnaissance and scanning worms: Brute-force discovery is more difficult. Attacks against ICMPv6: ICMPv6 is a required component of IPv6. Extension Header (EH) attacks: EHs need to be accurately parsed. Autoconfiguration: NDP attacks are simple to perform. Attacks on transition mechanisms: Migration techniques are required by IPv6. Mobile IPv6 attacks: Devices that roam are susceptible to many vulnerabilities. IPv6 protocol stack attacks: Because of the code freshness of IPv6, bugs in the protocol stack exist.
  4. IPv6 communications are preferred over IPv4’s
  5. IPv6 communications are preferred over IPv4’s
  6. You can terminate all your connections on a proxy server, so the outside will only see the add of the proxy. This was possible with IPv4 but people overloved NAT
  7. Hints can provide information about active IPv6 addresses in the network, 2002(6to4) .1.3.6.1.2.4.31.1.1 = aggregate information on IPv6
  8. Hints can provide information about active IPv6 addresses in the network, 2002(6to4)
  9. Most of functionalities are on ICMPv6(NDP, ping, MLD, …)
  10. SeND requires PKI infrastructure can’t work with manually configured , EUI-64 and Privacy Extension addresses RA-Guard is similar to DHCP snooping DHCP snooping is a means with which you tell the switch a DHCP server is connected on this port, if there is a different DHCP server don’t accept addresses from this
  11. Isic6 –s 2001:db8::1 –d 2001:db8::2 Even if your firewall is properly configured, if there is a new EH, you need to work on that. If
  12. Network practitioners have to stay awoken
  13. Network practitioners have to stay awoken
  14. Without clear security policy, all security activities are pointless. Aspects to take in account when writing an IPv6 security policy: Must be written down. Must be approved by management. Must be agreed upon by everyone and have universal participation. Must be well publicized. Must be monitored and enforced. Must be regularly reviewed and updated.
  15. Filter multicast at the perimeter if inter-domain multicast is not required.
  16. Secure any routing adjacency or peer to the fullest extent possible(packet filtering on interfaces, prefix filtering, passwords, MD5, or IPsec) .
  17. Deep Packet Inspection (DPI) Internet Key Exchange version 2 (IKEv2)