SlideShare a Scribd company logo
1 of 49
Download to read offline
Fernando Gont
IPv6 Security & Myth Busting
“Enterprise & IPv6” Workshop, UK IPv6 Council.
London, UK. April 24th
, 2023
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
About...
●
Security Researcher and Consultant
●
Published:
●
35+ IETF RFCs (15+ on IPv6)
●
Author of the SI6 Networks' IPv6 toolkit
●
https://www.si6networks.com/tools/ipv6toolkit
●
More at: https://www.gont.com.ar
3
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
Motivation for this presentation
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
Motivation for this presentation
●
Lots of myths around:
●
Security was considered during the design of the protocol
●
Network security paradigm will change from network-centric to host-centric
●
IPv6 will lead to increased IPsec usage
●
IPv6 will recover the “end-to-end” properties of the Internet
●
All them have a concrete negative effect:
●
They set incorrect expectations
●
They usually result in deployments that overlook security
5
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
General considerations about IPv6
security
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
Interesting aspects of IPv6 security
●
We have much less experience with IPv6 than with IPv4
●
IPv6 implementations are much less mature than their IPv4 counterparts
●
Security products (firewalls, NIDS, etc.) have less support for IPv6 than for IPv4
●
Increased complexity in the resulting Internet:
●
Two inter-networking protocols (IPv4 and IPv6)
●
Increased use of NATs
●
Increased use of tunnels
●
Lack of trained human resources
…but even then, IPv6 is the only option on the table to remain in this
business
8
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
IPv6 Extension Headers
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
Introduction
●
IPv6 options are included in “extension headers”
●
They sit between the IPv6 header and the upper-layer protocol
●
There may be multiple instances, of multiple extension headers, each with
multiple options
●
Hence, IPv6 follows a “header chain” type structure. e.g.,
IPv6 HbH DO DO TCP
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
Processing IPv6 Extension Headers
●
EH Processing limits
IPv6 HbH DO DO TCP
Limit on number of processed headers
#1 #2 #3 ...
N bytes
Limit on EH header chain length
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
Processing IPv6 Extension Headers (II)
●
Possible options in the presence of implementation limits:
●
Punt the packet to the general purpose CPU → DoS
●
Pass the packet → circumvention of security controls
●
Drop the packet → unreliability in packets with EHs
●
Many implementations do #1 or #2 :-(
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
Security Implications of Extension Headers
●
Evasion of security controls
●
DoS due to processing requirements
●
DoS due to implementation errors
●
Extension Header-specific issues
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
Advice on Extension Headers
●
Analyze your EH requirements
●
Block IPv6 packets with unexpected EHs
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
IPsec
●
Some had the expectation that IPv6 would foster IPsec usage
●
The “Node Requirements” RFC used to require IPsec implementation
●
Most implementations were non-compliant
●
The requirement was eventually removed
●
So… no changes to be expected with respect to IPv4
●
Or, actually…
Many networks filter packets that contain IPsec EHs, thus
making it rather unreliable
15
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
IPv6 Addressing
16
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
IPv6 Addressing
Introduction
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
Introduction
●
The main driver for IPv6 is its larger address space
●
IPv6 addresses are 128-bit long
●
IPv6 hosts simultaneously employ multiple addresses of:
●
Different scope (link-local, global, etc.)
●
Different type (unicast, multicast, etc.)
●
Different lifetime (stable, temporary)
●
IPv6 subnets are typically a /64
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
IPv6 Global Unicast Addresses
●
Where:
●
GRP: As delegated by the upstream provider or RIR (same as in IPv4)
●
Subnet ID: Same as in IPv4
●
Interface ID (IID): Analogous to IPv4’s Host-ID
Global Routing Prefix Subnet ID Interface ID
| n bits | m bits | 128-n-m bits |
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
How are IPv6 IIDs generated
●
Manually
●
Embed the IPv4 address (e.g. 2001:db8::192.168.1.1)
●
Low-byte (e.g. 2001:db8::1, 2001:db8::2, etc.)
●
Wordy (e.g. 2001:db8::dead:beef)
●
Automatically
●
Embed the underlying MAC address ← original standard
●
F(Prefix, secret) ← current standard
●
Generated by a DHCPv6 server (implementation-specific algorithm)
21
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
IPv6 Addressing
Address Scanning
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
Introduction
●
Feasibility of successful address scans depends on IID type:
●
Randomized IIDs → Search space == 264
→ unfesible
●
Pattern-based IIDs → Search space << 264
→ feasible
●
Some considerations:
●
There’s different mechanisms/algorithms for IID generation
●
Different scenarios employ different mechanisms/algorithms
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
IPv6 address scanning in practice
●
Workstations & mobiles:
●
SLAAC → randomized addresses → unfeasible
●
DHCPv6 → pattern-based addresses → feasible
●
Servers (bare-metal, virtual):
●
Manual configuration → pattern-based addresses → feasible
●
DHCPv6 → pattern-based addresses → feasible
●
SLAAC → unfeasible
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
Advice on IPv6 address scanning
●
Network reconnaissance is a key phase of every attack
●
Making the attacker’s life more difficult is always useful
●
There may be limitations and/or trade-offs involved:
●
Enterprise may rely on a specific DHCPv6 vendor
●
Cloud provider may assign predictable addresses via DHCPv6
●
Organization may employ a specific pattern for server addresses
25
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
IPv6 Addressing
End-to-End Connectivity
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
IPv6 deployment model
●
IPv6 can provide public (global) IPv6 addresses to every device
●
This does not need to imply “End-to-End connectivity”
●
Suggested deployment model:
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
Suggested enterprise security policy
●
Only allow outgoing communications (and return traffic)
●
Where necessary & possible:
●
Use temporary addresses along with stable addresses
●
Allow incoming connections only to specific sable addresses
28
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
IPv6 Addressing
Unique Local Addresses (ULAs)
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
Address Scope Security Properties
●
A non-global scope may provide “prophylactic” security
●
Address “filtering” as a result of limited address scope
●
Orthogonal to other filtering mechanisms
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
Public Internet
Organizational Network
Address Scope Security Properties: Isolation
Unaddressable!
Scoped (e.g. ULA) addresses
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
Public Internet
Organizational Network
Address Scope Security Properties: Stability
Scoped (e.g. ULA) addresses
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
More controversial use cases
●
Some deployments mimic the IPv4 architecture
●
Motivation: well-understood model
34
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
IPv6 Addressing
Host-centric vs. Network-centric Security Paradigm
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
Changes in the security paradigm?
●
Some predict that IPv6 hosts will not rely on network-based controls
●
But IPv4 does not really rely on a network-centric paradigm!
●
IPv6 will implement both host-based and network-based controls:
●
They provide different layers of protection (defense in depth)
●
This is even more critical in the IoT-era
●
No changes with respect to the IPv4 world, actually!
36
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
IPv6 Addressing
Enforcing Access Control Lists (ACLs)
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
Introduction
●
Access Control Lists are a core component of security operations
●
Allow-lists:
– Meant to allow access to a resource from a prefix
●
Block-lists:
– Meant to block access to a resource
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
What is behind an IPv6 prefix?
●
Multiple addresses may map to a single host
●
Hosts typically configure multiple addresses
●
Addresses are typically selected from a /64
●
But a user might control a larger address block (e.g. a whole /48)
●
A single IPv6 address may map to multiple hosts
●
NAT-PT for IPv6 is not uncommon
●
Kubernetes typically do IPv6 ULAs + NAT
●
All these aspects are key when implementing IPv6 ACLs
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
IPv6 Allow-lists: Challenges
●
Use of temporary addresses (RFC8981) means:
●
Addresses change on a regular basis
●
Addresses from multiple hosts may be intermingled in the same /64
●
So...What should we “allow”?
●
If specifying /128s, the ACLs might fail
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
IPv6 Block-lists: Challenges
●
Quite often, these are dynamically introduced as /128s, via e.g.:
●
SIEM/IPS
●
fail2ban
●
IP reputation services (e.g., abuseipdb.com)
●
But...what should we “block”?
●
If blocking /128s, a skilled attacker might:
●
Intentionally exhaust the number of entries in your block-list
●
Circumvent the block-list (i.e., use throw-away IPv6 addresses)
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
IPv6 Allow-lists: Guidance
●
Employ stable addresses (only):
●
Use:
– manual configuration, or,
– DHCPv6, or,
– SLAAC & disable temporary addresses (e.g. via group policies)
●
Specify allow-lists as /128s
●
Embrace temporary addresses usage:
●
Segregate systems into different subnets
●
Specify allow-lists as, e.g., /64s
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
IPv6 Block-lists: Guidance
●
If block-lists are dynamically-generated:
●
May need to dynamically aggregate ACLs
●
Possibly adjust the ACL lifetime based on the aggregation level
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
IPv6 Block-lists: Guidance (II)
LEVEL PREF_LEN AGGR_THRES ACL_LIFETIME
1 /128 10 1 hour
2 /64 10 1 hour
3 /56 10 30 min
4 /48 N/A 15 min
“Where possible, agregate at least AGGR_THRESN LEVELN ACLs into a
single LEVEL(N+1) ACL. Remove this new ACL after ACL_LIFETIME(N+1)”
●
One possible implementation for dynamic block-lists:
44
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
IPv6 Automatic Configuration
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
Overview
●
IPv6 supports to automatic configuration mechanisms:
●
SLAAC (mandatory)
●
DHCPv6 (optional)
●
IPv6 is a bit of “Configuration Anarchy”:
●
No IPv6 address lease database (no leases, actually!)
●
Hard to predict configuration outcome (except via ad-hoc domain policies)
●
DHCPv6 tends to be more Enterprise-friendly:
●
Matches DHCPv4 behavior
●
But… Android does not support DHCPv6
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
Automatic Configuration: Deployment alternatives
●
Provide different networks for mobiles vs. workstations
●
SLAAC for mobiles
●
DHCPv6 for everything else
●
MAC ↔ IPv6 address correlation:
●
DHCPv6: “Built in”
●
SLAAC: Use NDP monitoring to build IPv6 address lease database
– May also want to disable temporary addresses via domain policies.
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
Security implications of automatic configuration
●
IPv6 security controls should match their IPv4 counterparts
●
Do you implement ARP and DHCPv4 security controls?
●
No → No need to mitigate their IPv6 counterparts
●
Yes → Deploy RA-Guard, DHCPv6-{Snooping, Shield}, FHS, and the like
●
If you do deploy security controls:
●
Enforce controls for SLAAC, DHCPv6 and ND
●
Beware of evasion via IPv6 extension headers!
49
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
Security implications of IPv6 on IPv4
Networks
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
Can IPv6 security be ignored for IPv4-only networks?
●
IPv6 support is typically enabled by default for all general OSes
●
i.e., most networks have at least partial IPv6 deployment
●
IPv6 security cannot be ignored for such “IPv4-only” networks
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
VPN leakages
●
VPN leakages may occur when VPN software lacks IPv6 support
●
Typical scenario:
●
Your VPN software does not support IPv6
●
You attach to a network that supports IPv6
●
You establish a VPN tunnel with your home/office
●
All IPv6 traffic leaks from the VPN
●
Even in 2023, some vendors are still failing in this area
52
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
Questions?
“Enterprise & IPv6” Workshop
London, UK. April 24th
, 2023
Thanks!
Fernando Gont
fgont@si6networks.com
IPv6 Hackers mailing-list
http://www.si6networks.com/community/
www.si6networks.com

More Related Content

What's hot

Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)
Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)
Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)GLC Networks
 
SDN Fundamentals - short presentation
SDN Fundamentals -  short presentationSDN Fundamentals -  short presentation
SDN Fundamentals - short presentationAzhar Khuwaja
 
NSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
NSO: Network Service Orchestrator enabled by Tail-f Hands-on LabNSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
NSO: Network Service Orchestrator enabled by Tail-f Hands-on LabCisco Canada
 
IPv6 Fundamentals
IPv6 FundamentalsIPv6 Fundamentals
IPv6 FundamentalsMatt Bynum
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN DeploymentAPNIC
 
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Milan Jan/2014
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Milan Jan/2014Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Milan Jan/2014
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Milan Jan/2014Bruno Teixeira
 
MPLS on Router OS V7 - Part 2
MPLS on Router OS V7 - Part 2MPLS on Router OS V7 - Part 2
MPLS on Router OS V7 - Part 2GLC Networks
 
Network Monitoring with The Dude and Whatsapp
Network Monitoring with The Dude and WhatsappNetwork Monitoring with The Dude and Whatsapp
Network Monitoring with The Dude and WhatsappGLC Networks
 
Segment Routing Lab
Segment Routing Lab Segment Routing Lab
Segment Routing Lab Cisco Canada
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla nsCisco Canada
 
SRv6 Network Programming: deployment use-cases
SRv6 Network Programming: deployment use-cases SRv6 Network Programming: deployment use-cases
SRv6 Network Programming: deployment use-cases APNIC
 
大規模DCのネットワークデザイン
大規模DCのネットワークデザイン大規模DCのネットワークデザイン
大規模DCのネットワークデザインMasayuki Kobayashi
 
Using Mikrotik Switch Features to Improve Your Network
Using Mikrotik Switch Features to Improve Your Network Using Mikrotik Switch Features to Improve Your Network
Using Mikrotik Switch Features to Improve Your Network GLC Networks
 
Telecom Infra Projectの取り組み -光伝送におけるハードとソフトの分離-
Telecom Infra Projectの取り組み -光伝送におけるハードとソフトの分離-Telecom Infra Projectの取り組み -光伝送におけるハードとソフトの分離-
Telecom Infra Projectの取り組み -光伝送におけるハードとソフトの分離-HidekiNishizawa
 
MikroTik & RouterOS
MikroTik & RouterOSMikroTik & RouterOS
MikroTik & RouterOSFaelix Ltd
 
MPLS для чайников: основы технологии провайдеров и операторов связи
MPLS для чайников: основы технологии провайдеров и операторов связиMPLS для чайников: основы технологии провайдеров и операторов связи
MPLS для чайников: основы технологии провайдеров и операторов связиSkillFactory
 

What's hot (20)

FlexVPN
FlexVPNFlexVPN
FlexVPN
 
Mikrotik Hotspot
Mikrotik HotspotMikrotik Hotspot
Mikrotik Hotspot
 
Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)
Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)
Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)
 
SDN Fundamentals - short presentation
SDN Fundamentals -  short presentationSDN Fundamentals -  short presentation
SDN Fundamentals - short presentation
 
NSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
NSO: Network Service Orchestrator enabled by Tail-f Hands-on LabNSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
NSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
 
IPv6 Fundamentals
IPv6 FundamentalsIPv6 Fundamentals
IPv6 Fundamentals
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN Deployment
 
Ipv6
Ipv6Ipv6
Ipv6
 
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Milan Jan/2014
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Milan Jan/2014Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Milan Jan/2014
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Milan Jan/2014
 
MPLS on Router OS V7 - Part 2
MPLS on Router OS V7 - Part 2MPLS on Router OS V7 - Part 2
MPLS on Router OS V7 - Part 2
 
Network Monitoring with The Dude and Whatsapp
Network Monitoring with The Dude and WhatsappNetwork Monitoring with The Dude and Whatsapp
Network Monitoring with The Dude and Whatsapp
 
Segment Routing Lab
Segment Routing Lab Segment Routing Lab
Segment Routing Lab
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
 
How BGP Works
How BGP WorksHow BGP Works
How BGP Works
 
SRv6 Network Programming: deployment use-cases
SRv6 Network Programming: deployment use-cases SRv6 Network Programming: deployment use-cases
SRv6 Network Programming: deployment use-cases
 
大規模DCのネットワークデザイン
大規模DCのネットワークデザイン大規模DCのネットワークデザイン
大規模DCのネットワークデザイン
 
Using Mikrotik Switch Features to Improve Your Network
Using Mikrotik Switch Features to Improve Your Network Using Mikrotik Switch Features to Improve Your Network
Using Mikrotik Switch Features to Improve Your Network
 
Telecom Infra Projectの取り組み -光伝送におけるハードとソフトの分離-
Telecom Infra Projectの取り組み -光伝送におけるハードとソフトの分離-Telecom Infra Projectの取り組み -光伝送におけるハードとソフトの分離-
Telecom Infra Projectの取り組み -光伝送におけるハードとソフトの分離-
 
MikroTik & RouterOS
MikroTik & RouterOSMikroTik & RouterOS
MikroTik & RouterOS
 
MPLS для чайников: основы технологии провайдеров и операторов связи
MPLS для чайников: основы технологии провайдеров и операторов связиMPLS для чайников: основы технологии провайдеров и операторов связи
MPLS для чайников: основы технологии провайдеров и операторов связи
 

Similar to IPv6 Security and Myth Busting

Como definir un esquema de direcciones IPv6
Como definir un esquema de direcciones IPv6Como definir un esquema de direcciones IPv6
Como definir un esquema de direcciones IPv6Edgardo Scrimaglia
 
Conceptos ipv6, direccionamiento
Conceptos ipv6, direccionamientoConceptos ipv6, direccionamiento
Conceptos ipv6, direccionamientoEdgardo Scrimaglia
 
Roadmap to Next Generation IP Networks: A Review of the Fundamentals
Roadmap to Next Generation IP Networks: A Review of the FundamentalsRoadmap to Next Generation IP Networks: A Review of the Fundamentals
Roadmap to Next Generation IP Networks: A Review of the FundamentalsNetwork Utility Force
 
ITN_Module_12.pptx
ITN_Module_12.pptxITN_Module_12.pptx
ITN_Module_12.pptxseare1
 
Implementation of isp mpls backbone network on i pv6 using 6 pe routers MAIN PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers MAIN PPTImplementation of isp mpls backbone network on i pv6 using 6 pe routers MAIN PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers MAIN PPTSatish Kumar
 
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPTImplementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPTSatish Kumar
 
RFC8273: Unique Prefix per Host
RFC8273: Unique Prefix per HostRFC8273: Unique Prefix per Host
RFC8273: Unique Prefix per HostAPNIC
 
Moushumi Maria (071464056)
Moushumi Maria (071464056)Moushumi Maria (071464056)
Moushumi Maria (071464056)mashiur
 
Rapid IPv6 Deployment for ISP Networks
Rapid IPv6 Deployment for ISP NetworksRapid IPv6 Deployment for ISP Networks
Rapid IPv6 Deployment for ISP NetworksSkeeve Stevens
 
Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4newbie2019
 
IPv6 with Mikrotik
IPv6 with MikrotikIPv6 with Mikrotik
IPv6 with MikrotikGLC Networks
 
DCN 5th ed. slides ch22 Next Generation IP.pdf
DCN 5th ed. slides ch22 Next Generation IP.pdfDCN 5th ed. slides ch22 Next Generation IP.pdf
DCN 5th ed. slides ch22 Next Generation IP.pdfBilal Munir Mughal
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8Irsandi Hasan
 
Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Hamza Malik
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002suvobgd
 

Similar to IPv6 Security and Myth Busting (20)

Kinber ipv6-education-healthcare
Kinber ipv6-education-healthcareKinber ipv6-education-healthcare
Kinber ipv6-education-healthcare
 
Como definir un esquema de direcciones IPv6
Como definir un esquema de direcciones IPv6Como definir un esquema de direcciones IPv6
Como definir un esquema de direcciones IPv6
 
Conceptos ipv6, direccionamiento
Conceptos ipv6, direccionamientoConceptos ipv6, direccionamiento
Conceptos ipv6, direccionamiento
 
Roadmap to Next Generation IP Networks: A Review of the Fundamentals
Roadmap to Next Generation IP Networks: A Review of the FundamentalsRoadmap to Next Generation IP Networks: A Review of the Fundamentals
Roadmap to Next Generation IP Networks: A Review of the Fundamentals
 
ITN_Module_12.pptx
ITN_Module_12.pptxITN_Module_12.pptx
ITN_Module_12.pptx
 
Implementation of isp mpls backbone network on i pv6 using 6 pe routers MAIN PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers MAIN PPTImplementation of isp mpls backbone network on i pv6 using 6 pe routers MAIN PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers MAIN PPT
 
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPTImplementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
 
RFC8273: Unique Prefix per Host
RFC8273: Unique Prefix per HostRFC8273: Unique Prefix per Host
RFC8273: Unique Prefix per Host
 
Moushumi Maria (071464056)
Moushumi Maria (071464056)Moushumi Maria (071464056)
Moushumi Maria (071464056)
 
Rapid IPv6 Deployment for ISP Networks
Rapid IPv6 Deployment for ISP NetworksRapid IPv6 Deployment for ISP Networks
Rapid IPv6 Deployment for ISP Networks
 
Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4
 
IPv6 on Mikrotik
IPv6 on MikrotikIPv6 on Mikrotik
IPv6 on Mikrotik
 
IPV6
IPV6 IPV6
IPV6
 
IPv6 with Mikrotik
IPv6 with MikrotikIPv6 with Mikrotik
IPv6 with Mikrotik
 
DCN 5th ed. slides ch22 Next Generation IP.pdf
DCN 5th ed. slides ch22 Next Generation IP.pdfDCN 5th ed. slides ch22 Next Generation IP.pdf
DCN 5th ed. slides ch22 Next Generation IP.pdf
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
 
Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8
 
BGP on mikrotik
BGP on mikrotikBGP on mikrotik
BGP on mikrotik
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002
 
IPv4 adressing
IPv4 adressingIPv4 adressing
IPv4 adressing
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

IPv6 Security and Myth Busting

  • 1. Fernando Gont IPv6 Security & Myth Busting “Enterprise & IPv6” Workshop, UK IPv6 Council. London, UK. April 24th , 2023
  • 2. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 About... ● Security Researcher and Consultant ● Published: ● 35+ IETF RFCs (15+ on IPv6) ● Author of the SI6 Networks' IPv6 toolkit ● https://www.si6networks.com/tools/ipv6toolkit ● More at: https://www.gont.com.ar
  • 3. 3 “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 Motivation for this presentation
  • 4. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 Motivation for this presentation ● Lots of myths around: ● Security was considered during the design of the protocol ● Network security paradigm will change from network-centric to host-centric ● IPv6 will lead to increased IPsec usage ● IPv6 will recover the “end-to-end” properties of the Internet ● All them have a concrete negative effect: ● They set incorrect expectations ● They usually result in deployments that overlook security
  • 5. 5 “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 General considerations about IPv6 security
  • 6. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 Interesting aspects of IPv6 security ● We have much less experience with IPv6 than with IPv4 ● IPv6 implementations are much less mature than their IPv4 counterparts ● Security products (firewalls, NIDS, etc.) have less support for IPv6 than for IPv4 ● Increased complexity in the resulting Internet: ● Two inter-networking protocols (IPv4 and IPv6) ● Increased use of NATs ● Increased use of tunnels ● Lack of trained human resources …but even then, IPv6 is the only option on the table to remain in this business
  • 7. 8 “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 IPv6 Extension Headers
  • 8. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 Introduction ● IPv6 options are included in “extension headers” ● They sit between the IPv6 header and the upper-layer protocol ● There may be multiple instances, of multiple extension headers, each with multiple options ● Hence, IPv6 follows a “header chain” type structure. e.g., IPv6 HbH DO DO TCP
  • 9. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 Processing IPv6 Extension Headers ● EH Processing limits IPv6 HbH DO DO TCP Limit on number of processed headers #1 #2 #3 ... N bytes Limit on EH header chain length
  • 10. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 Processing IPv6 Extension Headers (II) ● Possible options in the presence of implementation limits: ● Punt the packet to the general purpose CPU → DoS ● Pass the packet → circumvention of security controls ● Drop the packet → unreliability in packets with EHs ● Many implementations do #1 or #2 :-(
  • 11. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 Security Implications of Extension Headers ● Evasion of security controls ● DoS due to processing requirements ● DoS due to implementation errors ● Extension Header-specific issues
  • 12. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 Advice on Extension Headers ● Analyze your EH requirements ● Block IPv6 packets with unexpected EHs
  • 13. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 IPsec ● Some had the expectation that IPv6 would foster IPsec usage ● The “Node Requirements” RFC used to require IPsec implementation ● Most implementations were non-compliant ● The requirement was eventually removed ● So… no changes to be expected with respect to IPv4 ● Or, actually… Many networks filter packets that contain IPsec EHs, thus making it rather unreliable
  • 14. 15 “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 IPv6 Addressing
  • 15. 16 “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 IPv6 Addressing Introduction
  • 16. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 Introduction ● The main driver for IPv6 is its larger address space ● IPv6 addresses are 128-bit long ● IPv6 hosts simultaneously employ multiple addresses of: ● Different scope (link-local, global, etc.) ● Different type (unicast, multicast, etc.) ● Different lifetime (stable, temporary) ● IPv6 subnets are typically a /64
  • 17. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 IPv6 Global Unicast Addresses ● Where: ● GRP: As delegated by the upstream provider or RIR (same as in IPv4) ● Subnet ID: Same as in IPv4 ● Interface ID (IID): Analogous to IPv4’s Host-ID Global Routing Prefix Subnet ID Interface ID | n bits | m bits | 128-n-m bits |
  • 18. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 How are IPv6 IIDs generated ● Manually ● Embed the IPv4 address (e.g. 2001:db8::192.168.1.1) ● Low-byte (e.g. 2001:db8::1, 2001:db8::2, etc.) ● Wordy (e.g. 2001:db8::dead:beef) ● Automatically ● Embed the underlying MAC address ← original standard ● F(Prefix, secret) ← current standard ● Generated by a DHCPv6 server (implementation-specific algorithm)
  • 19. 21 “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 IPv6 Addressing Address Scanning
  • 20. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 Introduction ● Feasibility of successful address scans depends on IID type: ● Randomized IIDs → Search space == 264 → unfesible ● Pattern-based IIDs → Search space << 264 → feasible ● Some considerations: ● There’s different mechanisms/algorithms for IID generation ● Different scenarios employ different mechanisms/algorithms
  • 21. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 IPv6 address scanning in practice ● Workstations & mobiles: ● SLAAC → randomized addresses → unfeasible ● DHCPv6 → pattern-based addresses → feasible ● Servers (bare-metal, virtual): ● Manual configuration → pattern-based addresses → feasible ● DHCPv6 → pattern-based addresses → feasible ● SLAAC → unfeasible
  • 22. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 Advice on IPv6 address scanning ● Network reconnaissance is a key phase of every attack ● Making the attacker’s life more difficult is always useful ● There may be limitations and/or trade-offs involved: ● Enterprise may rely on a specific DHCPv6 vendor ● Cloud provider may assign predictable addresses via DHCPv6 ● Organization may employ a specific pattern for server addresses
  • 23. 25 “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 IPv6 Addressing End-to-End Connectivity
  • 24. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 IPv6 deployment model ● IPv6 can provide public (global) IPv6 addresses to every device ● This does not need to imply “End-to-End connectivity” ● Suggested deployment model:
  • 25. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 Suggested enterprise security policy ● Only allow outgoing communications (and return traffic) ● Where necessary & possible: ● Use temporary addresses along with stable addresses ● Allow incoming connections only to specific sable addresses
  • 26. 28 “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 IPv6 Addressing Unique Local Addresses (ULAs)
  • 27. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 Address Scope Security Properties ● A non-global scope may provide “prophylactic” security ● Address “filtering” as a result of limited address scope ● Orthogonal to other filtering mechanisms
  • 28. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 Public Internet Organizational Network Address Scope Security Properties: Isolation Unaddressable! Scoped (e.g. ULA) addresses
  • 29. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 Public Internet Organizational Network Address Scope Security Properties: Stability Scoped (e.g. ULA) addresses
  • 30. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 More controversial use cases ● Some deployments mimic the IPv4 architecture ● Motivation: well-understood model
  • 31. 34 “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 IPv6 Addressing Host-centric vs. Network-centric Security Paradigm
  • 32. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 Changes in the security paradigm? ● Some predict that IPv6 hosts will not rely on network-based controls ● But IPv4 does not really rely on a network-centric paradigm! ● IPv6 will implement both host-based and network-based controls: ● They provide different layers of protection (defense in depth) ● This is even more critical in the IoT-era ● No changes with respect to the IPv4 world, actually!
  • 33. 36 “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 IPv6 Addressing Enforcing Access Control Lists (ACLs)
  • 34. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 Introduction ● Access Control Lists are a core component of security operations ● Allow-lists: – Meant to allow access to a resource from a prefix ● Block-lists: – Meant to block access to a resource
  • 35. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 What is behind an IPv6 prefix? ● Multiple addresses may map to a single host ● Hosts typically configure multiple addresses ● Addresses are typically selected from a /64 ● But a user might control a larger address block (e.g. a whole /48) ● A single IPv6 address may map to multiple hosts ● NAT-PT for IPv6 is not uncommon ● Kubernetes typically do IPv6 ULAs + NAT ● All these aspects are key when implementing IPv6 ACLs
  • 36. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 IPv6 Allow-lists: Challenges ● Use of temporary addresses (RFC8981) means: ● Addresses change on a regular basis ● Addresses from multiple hosts may be intermingled in the same /64 ● So...What should we “allow”? ● If specifying /128s, the ACLs might fail
  • 37. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 IPv6 Block-lists: Challenges ● Quite often, these are dynamically introduced as /128s, via e.g.: ● SIEM/IPS ● fail2ban ● IP reputation services (e.g., abuseipdb.com) ● But...what should we “block”? ● If blocking /128s, a skilled attacker might: ● Intentionally exhaust the number of entries in your block-list ● Circumvent the block-list (i.e., use throw-away IPv6 addresses)
  • 38. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 IPv6 Allow-lists: Guidance ● Employ stable addresses (only): ● Use: – manual configuration, or, – DHCPv6, or, – SLAAC & disable temporary addresses (e.g. via group policies) ● Specify allow-lists as /128s ● Embrace temporary addresses usage: ● Segregate systems into different subnets ● Specify allow-lists as, e.g., /64s
  • 39. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 IPv6 Block-lists: Guidance ● If block-lists are dynamically-generated: ● May need to dynamically aggregate ACLs ● Possibly adjust the ACL lifetime based on the aggregation level
  • 40. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 IPv6 Block-lists: Guidance (II) LEVEL PREF_LEN AGGR_THRES ACL_LIFETIME 1 /128 10 1 hour 2 /64 10 1 hour 3 /56 10 30 min 4 /48 N/A 15 min “Where possible, agregate at least AGGR_THRESN LEVELN ACLs into a single LEVEL(N+1) ACL. Remove this new ACL after ACL_LIFETIME(N+1)” ● One possible implementation for dynamic block-lists:
  • 41. 44 “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 IPv6 Automatic Configuration
  • 42. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 Overview ● IPv6 supports to automatic configuration mechanisms: ● SLAAC (mandatory) ● DHCPv6 (optional) ● IPv6 is a bit of “Configuration Anarchy”: ● No IPv6 address lease database (no leases, actually!) ● Hard to predict configuration outcome (except via ad-hoc domain policies) ● DHCPv6 tends to be more Enterprise-friendly: ● Matches DHCPv4 behavior ● But… Android does not support DHCPv6
  • 43. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 Automatic Configuration: Deployment alternatives ● Provide different networks for mobiles vs. workstations ● SLAAC for mobiles ● DHCPv6 for everything else ● MAC ↔ IPv6 address correlation: ● DHCPv6: “Built in” ● SLAAC: Use NDP monitoring to build IPv6 address lease database – May also want to disable temporary addresses via domain policies.
  • 44. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 Security implications of automatic configuration ● IPv6 security controls should match their IPv4 counterparts ● Do you implement ARP and DHCPv4 security controls? ● No → No need to mitigate their IPv6 counterparts ● Yes → Deploy RA-Guard, DHCPv6-{Snooping, Shield}, FHS, and the like ● If you do deploy security controls: ● Enforce controls for SLAAC, DHCPv6 and ND ● Beware of evasion via IPv6 extension headers!
  • 45. 49 “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 Security implications of IPv6 on IPv4 Networks
  • 46. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 Can IPv6 security be ignored for IPv4-only networks? ● IPv6 support is typically enabled by default for all general OSes ● i.e., most networks have at least partial IPv6 deployment ● IPv6 security cannot be ignored for such “IPv4-only” networks
  • 47. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 VPN leakages ● VPN leakages may occur when VPN software lacks IPv6 support ● Typical scenario: ● Your VPN software does not support IPv6 ● You attach to a network that supports IPv6 ● You establish a VPN tunnel with your home/office ● All IPv6 traffic leaks from the VPN ● Even in 2023, some vendors are still failing in this area
  • 48. 52 “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 Questions?
  • 49. “Enterprise & IPv6” Workshop London, UK. April 24th , 2023 Thanks! Fernando Gont fgont@si6networks.com IPv6 Hackers mailing-list http://www.si6networks.com/community/ www.si6networks.com