SlideShare a Scribd company logo
C:>
State of the Art in IPv6 Security
Fernando Gont
Director of Information Security, EdgeUno
www.thehacksummit.com 5/11/2021 online ORGANIZERS:
Brief Introduction to IPv6
2
What is this IPv6 thing?
• Solves the problem of IPv4 address exhaustion
• Uses 128-bit addresses (vs. IPv4’s 32-bit addresses)
• Provides the same service as IPv4
• It is not “backwards compatible” with IPv4
3
Brief comparison of IPv4/IPv6
IPv4 IPv6
Addressing 32 bits 128 bits
Address resolution ARP ND (ICMPv6-based)
Configuration DHCP SLAAC & DHCPv6 (optional)
Fault isolation ICMPv4 ICMPv6
IPsec support Optional Optional
Fragmentation Hosts and routers Only hosts
4
IPv6 Security Tools
5
IPv6 security toolkits
• SI6 Networks' IPv6 Toolkit
• THC-IPv6
• Chiron
6
IPv6 Security Implications
7
IPv6 Addressing
8
Brief overview
• The increased address space is the “driver” for IPv6
• Address semantics similar to those of IPv4:
• Addresses are aggregated into “prefixes”
• Several address types
• Several address scopes
• Each interface employs multiple addresses of different types and scopes
• One link-local unicast address, one or more global unicast addresses, etc
9
IPv6 Global Unicast Addresses
• The interface ID can be set in a number of ways:
• Embed the underlying MAC address (traditional SLAAC)
• Embed the corresponding IPv4 address (e.g. 2001:db8::192.168.1.1)
• Low-byte (ej. 2001:db8::1, 2001:db8::2, etc.)
• Wordy (ej. 2001:db8::dead:beef)
• Stable and random addresses (RFC7217, current SLAAC)
Global Routing Prefix Subnet ID Interface ID
 |         n bits         |   m bits  |        128-n-m bits        |
10
IPv6 Addressing
Security and Privacy Implications
11
Security and privacy implications
• Implications dependent on IID-generation algorithm
• Stable IIDs Activity correlation over time
→
• Constant IIDs Activity correlation over space
→
• IIDs with patterns Network reconnaissance
→
• IIDs embedding MAC addresses Device-specific attacks
→
12
IPv6 Addressing
Mitigations
13
RFC 7217: Stable addresses
• Generate the Interface Identifier with:
F(Prefix, Net_Iface, Network_ID, Secret_Key)
• As the host moves:
• Prefix and Network_ID change from one network to another
• But they remain constant within each network
• F() varies across networks, but remains constant within each network
• Implementations: Mac OS, Linux, etc.
14
RFC 8981: Temporary addresses
• Randomized IIDs that change over time
• Generated in addition to to stable addresses
• Use:
• Temporary addresses: outgoing communications
• Stable addresses: incoming communications
• Implementations: All major OSes
15
IPv6 Addressing
Advice
16
Red-team advice
• You may need to change the way you do Network Reconnaissance!
• Check RFC 7707 (“Network Reconnaissance in IPv6 Networks”)
17
Red-team advice (II)
• Use pattern-based address-scanning attacks
18
Blue-team advice
• Use unpredictable IIDs where possible
• Consider the feasibility of using temporary addresses:
• Impact on network devices
• Impact on ACLs
• Impact on the ability to correlate network activity for legitimate purposes
• Implement IPv6 firewalling as necessary
19
IPv6 Extension Headers
20
IPv6 packet structure
• The IPv6 header only contains “mandatory” information
• Options are conveyed via “extension headers”
• They separate e.g. host vs. router options
• Only the MTU limits the number of extension headers and options
IPv6 HbH DO DO TCP
21
Implications
• Increase in the complexity of the resulting traffic
• Source of many vulnerabilities
• Increases the difficulty to obtain layer-4 information by intermediate systems
• They seldomly allows for circumvention of security controls
• Negative performance impact on network devices DoS
→
• Limited reliability on the public Internet
• F(not required, is problematic) drop!
→
22
Red-team advice
• IPv6 EHs can be useful for circumvention of security controls
• Possibly useful for DoS purposes
• But very unreliable across the Internet!
23
Blue-team advice
• At the edge of an organizational network use an “allow list”
→
• At transit networks use a “block list”
→
• Check vendor documentation regarding EH processing
• Use of EHs might require that packets be processed in the “slow path”
• It may be necessary to drop packets that employ EHs
• Check RFC 9098 (“Operational Implications of IPv6 Packets with
Extension Headers”)
24
Address Resolution
25
Brief overview
• Address resolution: IPv6 link-layer
→
• Performed with “Neighbor Discovery”:
• Based on ICMPv6 messages (Neighbor Solicitation and Neighbor Advertisement)
• Resulting traffic may be much more complex than that of IPv4’s ARP
• ARP-based attacks can be “ported” to the IPv6 world
• Man in The Middle
• Denial of Service
26
Blue-team advice
• Do you mitigate ARP attacks for the IPv4 case?
• If so, achieve policy-parity with:
• IPv6 Source Guard/SAVI
• Double-check if these mechanisms are actually effective!
27
Automatic Configuration
28
Brief overview
• Two mechanisms for IPv6 automatic configuration
• Stateless Address Auto-Configuration (SLAAC)
• Based on ICMPv6 messages
• DHCPv6
• Based on UDP datagrams
• SLAAC is mandatory, while DHCPv6 is optional
• But many networks use both, even with overlapping functionality
29
Security considerations
• Forged SLAAC and DHCPv6 packets can be leveraged for:
• Man In the Middle
• Denial of Service
• SLAAC may result in an increased attack window
• thanks to its push/pull model
30
Red-team advice
• SLAAC attacks are trivial to perform in local networks
• Use of IPv6 EHs can help circumvent SLAAC security controls
31
Blue-team advice
• Do you implement analogous mitigations in the IPv4 case? 

 DHCP-snooping, etc.
• Achieve policy-parity with:
• RA-Guard
• DHCPv6-Shield
• IPv6 Source Guard/SAVI
• Double-check if your implementations are actually effective!
32
Security Considerations for
Dual-Stack Networks
33
Security considerations
• Most networks have at least partial deployment of IPv6
• If you expect that IPv6 is not used, enforce such policy!
• Lack of feature and/or policy parity with IPv4
• Implementation of packet filtering is inconsistent:
• Different rulesets for IPv4 and IPv6 policy mismatches
→
• Evidence exists about filtering policies mismatches
• Always audit all addresses of all protocol families
34
Some Conclusions
35
Some conclusions
• IPv6 provides similar functionality to that of IPv4

 Mechanisms are different

 It is such differences that may lead to “surprises”
• Most systems already ship with IPv6 support

 There is usually not such a thing as an “IPv4-only” network

 All networks should address IPv6 security challenges
• Your {blue, red, purple} teams should embrace IPv6!
36
Questions?
37
Thanks!
Fernando Gont
fernando.gont@edgeuno.com 
38
Thank you for watching!
Remember to leave your questions
and rate the presentation
in the section below.
www.thehacksummit.com 5/11/2021 online ORGANIZERS:

More Related Content

What's hot

Deploying IPv6 on OpenStack
Deploying IPv6 on OpenStackDeploying IPv6 on OpenStack
Deploying IPv6 on OpenStack
Vietnam Open Infrastructure User Group
 
ONOS intent introduction
ONOS intent introductionONOS intent introduction
ONOS intent introduction
Yi Tseng
 
Multicast in OpenStack Tips
Multicast in OpenStack TipsMulticast in OpenStack Tips
Multicast in OpenStack Tips
Vikram G Hosakote
 
2016 COSCUP ONOS
2016 COSCUP ONOS2016 COSCUP ONOS
2016 COSCUP ONOS
Yi Tseng
 
Securing Data in Transit -
Securing Data in Transit - Securing Data in Transit -
Securing Data in Transit -
wolfSSL
 
Open daylight and Openstack
Open daylight and OpenstackOpen daylight and Openstack
Open daylight and Openstack
Dave Neary
 
OpenStack and OpenDaylight: An Integrated IaaS for SDN/NFV
OpenStack and OpenDaylight: An Integrated IaaS for SDN/NFVOpenStack and OpenDaylight: An Integrated IaaS for SDN/NFV
OpenStack and OpenDaylight: An Integrated IaaS for SDN/NFV
Cloud Native Day Tel Aviv
 
MAGPI: Advanced Services: IPv6, Multicast, DNSSEC
MAGPI: Advanced Services: IPv6, Multicast, DNSSECMAGPI: Advanced Services: IPv6, Multicast, DNSSEC
MAGPI: Advanced Services: IPv6, Multicast, DNSSEC
Shumon Huque
 
PLNOG 3: Jens Link - IPv6 - Migration Planning
PLNOG 3: Jens Link -  IPv6 - Migration PlanningPLNOG 3: Jens Link -  IPv6 - Migration Planning
PLNOG 3: Jens Link - IPv6 - Migration Planning
PROIDEA
 
OSMC 2018 | Current State of Icinga by Bernd Erk
OSMC 2018 | Current State of Icinga by Bernd ErkOSMC 2018 | Current State of Icinga by Bernd Erk
OSMC 2018 | Current State of Icinga by Bernd Erk
NETWAYS
 
OpenStack in Action 4! Serge Frezefond - Database Clusters as a Service in O...
OpenStack in  Action 4! Serge Frezefond - Database Clusters as a Service in O...OpenStack in  Action 4! Serge Frezefond - Database Clusters as a Service in O...
OpenStack in Action 4! Serge Frezefond - Database Clusters as a Service in O...
eNovance
 
Openstack Neutron and SDN
Openstack Neutron and SDNOpenstack Neutron and SDN
Openstack Neutron and SDN
inakipascual
 
OpenNebulaConf2019 - Crytek: A Video gaming Edge Implementation "on the shoul...
OpenNebulaConf2019 - Crytek: A Video gaming Edge Implementation "on the shoul...OpenNebulaConf2019 - Crytek: A Video gaming Edge Implementation "on the shoul...
OpenNebulaConf2019 - Crytek: A Video gaming Edge Implementation "on the shoul...
OpenNebula Project
 
Der Einsatz von Lisp für die IPv6 Migration
Der Einsatz von Lisp für die IPv6 MigrationDer Einsatz von Lisp für die IPv6 Migration
Der Einsatz von Lisp für die IPv6 Migration
Swiss IPv6 Council
 
FreeSWITCH as a Microservice
FreeSWITCH as a MicroserviceFreeSWITCH as a Microservice
FreeSWITCH as a Microservice
Evan McGee
 
Bridges and Tunnels a Drive Through OpenStack Networking
Bridges and Tunnels a Drive Through OpenStack NetworkingBridges and Tunnels a Drive Through OpenStack Networking
Bridges and Tunnels a Drive Through OpenStack Networking
markmcclain
 
OpenStack Discovery and Networking Assurance - Koren Lev - Meetup
OpenStack Discovery and Networking Assurance - Koren Lev - MeetupOpenStack Discovery and Networking Assurance - Koren Lev - Meetup
OpenStack Discovery and Networking Assurance - Koren Lev - Meetup
Cloud Native Day Tel Aviv
 
Red Hat demo of OpenStack and ODL at ODL summit 2016
Red Hat demo of OpenStack and ODL at ODL summit 2016 Red Hat demo of OpenStack and ODL at ODL summit 2016
Red Hat demo of OpenStack and ODL at ODL summit 2016
RedHatTelco
 
The IPv6-Only Network
The IPv6-Only NetworkThe IPv6-Only Network
The IPv6-Only Network
APNIC
 
OpenStack Paris Summit: Bridges and Tunnels: A Drive Through OpenStack Networ...
OpenStack Paris Summit: Bridges and Tunnels: A Drive Through OpenStack Networ...OpenStack Paris Summit: Bridges and Tunnels: A Drive Through OpenStack Networ...
OpenStack Paris Summit: Bridges and Tunnels: A Drive Through OpenStack Networ...
markmcclain
 

What's hot (20)

Deploying IPv6 on OpenStack
Deploying IPv6 on OpenStackDeploying IPv6 on OpenStack
Deploying IPv6 on OpenStack
 
ONOS intent introduction
ONOS intent introductionONOS intent introduction
ONOS intent introduction
 
Multicast in OpenStack Tips
Multicast in OpenStack TipsMulticast in OpenStack Tips
Multicast in OpenStack Tips
 
2016 COSCUP ONOS
2016 COSCUP ONOS2016 COSCUP ONOS
2016 COSCUP ONOS
 
Securing Data in Transit -
Securing Data in Transit - Securing Data in Transit -
Securing Data in Transit -
 
Open daylight and Openstack
Open daylight and OpenstackOpen daylight and Openstack
Open daylight and Openstack
 
OpenStack and OpenDaylight: An Integrated IaaS for SDN/NFV
OpenStack and OpenDaylight: An Integrated IaaS for SDN/NFVOpenStack and OpenDaylight: An Integrated IaaS for SDN/NFV
OpenStack and OpenDaylight: An Integrated IaaS for SDN/NFV
 
MAGPI: Advanced Services: IPv6, Multicast, DNSSEC
MAGPI: Advanced Services: IPv6, Multicast, DNSSECMAGPI: Advanced Services: IPv6, Multicast, DNSSEC
MAGPI: Advanced Services: IPv6, Multicast, DNSSEC
 
PLNOG 3: Jens Link - IPv6 - Migration Planning
PLNOG 3: Jens Link -  IPv6 - Migration PlanningPLNOG 3: Jens Link -  IPv6 - Migration Planning
PLNOG 3: Jens Link - IPv6 - Migration Planning
 
OSMC 2018 | Current State of Icinga by Bernd Erk
OSMC 2018 | Current State of Icinga by Bernd ErkOSMC 2018 | Current State of Icinga by Bernd Erk
OSMC 2018 | Current State of Icinga by Bernd Erk
 
OpenStack in Action 4! Serge Frezefond - Database Clusters as a Service in O...
OpenStack in  Action 4! Serge Frezefond - Database Clusters as a Service in O...OpenStack in  Action 4! Serge Frezefond - Database Clusters as a Service in O...
OpenStack in Action 4! Serge Frezefond - Database Clusters as a Service in O...
 
Openstack Neutron and SDN
Openstack Neutron and SDNOpenstack Neutron and SDN
Openstack Neutron and SDN
 
OpenNebulaConf2019 - Crytek: A Video gaming Edge Implementation "on the shoul...
OpenNebulaConf2019 - Crytek: A Video gaming Edge Implementation "on the shoul...OpenNebulaConf2019 - Crytek: A Video gaming Edge Implementation "on the shoul...
OpenNebulaConf2019 - Crytek: A Video gaming Edge Implementation "on the shoul...
 
Der Einsatz von Lisp für die IPv6 Migration
Der Einsatz von Lisp für die IPv6 MigrationDer Einsatz von Lisp für die IPv6 Migration
Der Einsatz von Lisp für die IPv6 Migration
 
FreeSWITCH as a Microservice
FreeSWITCH as a MicroserviceFreeSWITCH as a Microservice
FreeSWITCH as a Microservice
 
Bridges and Tunnels a Drive Through OpenStack Networking
Bridges and Tunnels a Drive Through OpenStack NetworkingBridges and Tunnels a Drive Through OpenStack Networking
Bridges and Tunnels a Drive Through OpenStack Networking
 
OpenStack Discovery and Networking Assurance - Koren Lev - Meetup
OpenStack Discovery and Networking Assurance - Koren Lev - MeetupOpenStack Discovery and Networking Assurance - Koren Lev - Meetup
OpenStack Discovery and Networking Assurance - Koren Lev - Meetup
 
Red Hat demo of OpenStack and ODL at ODL summit 2016
Red Hat demo of OpenStack and ODL at ODL summit 2016 Red Hat demo of OpenStack and ODL at ODL summit 2016
Red Hat demo of OpenStack and ODL at ODL summit 2016
 
The IPv6-Only Network
The IPv6-Only NetworkThe IPv6-Only Network
The IPv6-Only Network
 
OpenStack Paris Summit: Bridges and Tunnels: A Drive Through OpenStack Networ...
OpenStack Paris Summit: Bridges and Tunnels: A Drive Through OpenStack Networ...OpenStack Paris Summit: Bridges and Tunnels: A Drive Through OpenStack Networ...
OpenStack Paris Summit: Bridges and Tunnels: A Drive Through OpenStack Networ...
 

Similar to Fernando Gont - The Hack Summit 2021 - State of the Art in IPv6 Security

fgont-h2hc-2020-ipv6-security.pdf
fgont-h2hc-2020-ipv6-security.pdffgont-h2hc-2020-ipv6-security.pdf
fgont-h2hc-2020-ipv6-security.pdf
FernandoGont
 
IPV6 - Threats and Countermeasures / Crash Course
IPV6 - Threats and Countermeasures / Crash CourseIPV6 - Threats and Countermeasures / Crash Course
IPV6 - Threats and Countermeasures / Crash Course
Thierry Zoller
 
Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?
APNIC
 
IPv6 Security - Workshop mit Live Demo
IPv6 Security - Workshop mit Live DemoIPv6 Security - Workshop mit Live Demo
IPv6 Security - Workshop mit Live Demo
Digicomp Academy AG
 
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
Digicomp Academy AG
 
IPv6 on the Interop Network
IPv6 on the Interop NetworkIPv6 on the Interop Network
IPv6 on the Interop Network
Network Utility Force
 
Henrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveHenrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspective
IKT-Norge
 
IPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCTIPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCT
Bangladesh Network Operators Group
 
IPv6 Threat Presentation
IPv6 Threat PresentationIPv6 Threat Presentation
IPv6 Threat Presentation
johnmcclure00
 
Ipv6
Ipv6Ipv6
Improved Applications with IPv6: an overview
Improved Applications with IPv6: an overviewImproved Applications with IPv6: an overview
Improved Applications with IPv6: an overview
Cisco DevNet
 
Rapid IPv6 Deployment for ISP Networks
Rapid IPv6 Deployment for ISP NetworksRapid IPv6 Deployment for ISP Networks
Rapid IPv6 Deployment for ISP Networks
Skeeve Stevens
 
PLNOG 5: Merike Kaeo - Something Old Is New Again
PLNOG 5: Merike Kaeo - Something Old Is New AgainPLNOG 5: Merike Kaeo - Something Old Is New Again
PLNOG 5: Merike Kaeo - Something Old Is New Again
PROIDEA
 
IPv6 Security - Myths and Reality
IPv6 Security - Myths and RealityIPv6 Security - Myths and Reality
IPv6 Security - Myths and Reality
Swiss IPv6 Council
 
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaIpv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
Wardner Maia
 
IPv4 adressing
IPv4 adressingIPv4 adressing
IPv4 adressing
AssemNazirova2
 
IPv6 Security und Hacking
IPv6 Security und HackingIPv6 Security und Hacking
IPv6 Security und Hacking
Swiss IPv6 Council
 
Addressing plans
Addressing plansAddressing plans
Addressing plans
enes373
 
IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?
RIPE NCC
 
Survey on IPv6 security issues
Survey on IPv6 security issuesSurvey on IPv6 security issues
Survey on IPv6 security issues
bathinin1
 

Similar to Fernando Gont - The Hack Summit 2021 - State of the Art in IPv6 Security (20)

fgont-h2hc-2020-ipv6-security.pdf
fgont-h2hc-2020-ipv6-security.pdffgont-h2hc-2020-ipv6-security.pdf
fgont-h2hc-2020-ipv6-security.pdf
 
IPV6 - Threats and Countermeasures / Crash Course
IPV6 - Threats and Countermeasures / Crash CourseIPV6 - Threats and Countermeasures / Crash Course
IPV6 - Threats and Countermeasures / Crash Course
 
Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?
 
IPv6 Security - Workshop mit Live Demo
IPv6 Security - Workshop mit Live DemoIPv6 Security - Workshop mit Live Demo
IPv6 Security - Workshop mit Live Demo
 
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
 
IPv6 on the Interop Network
IPv6 on the Interop NetworkIPv6 on the Interop Network
IPv6 on the Interop Network
 
Henrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveHenrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspective
 
IPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCTIPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCT
 
IPv6 Threat Presentation
IPv6 Threat PresentationIPv6 Threat Presentation
IPv6 Threat Presentation
 
Ipv6
Ipv6Ipv6
Ipv6
 
Improved Applications with IPv6: an overview
Improved Applications with IPv6: an overviewImproved Applications with IPv6: an overview
Improved Applications with IPv6: an overview
 
Rapid IPv6 Deployment for ISP Networks
Rapid IPv6 Deployment for ISP NetworksRapid IPv6 Deployment for ISP Networks
Rapid IPv6 Deployment for ISP Networks
 
PLNOG 5: Merike Kaeo - Something Old Is New Again
PLNOG 5: Merike Kaeo - Something Old Is New AgainPLNOG 5: Merike Kaeo - Something Old Is New Again
PLNOG 5: Merike Kaeo - Something Old Is New Again
 
IPv6 Security - Myths and Reality
IPv6 Security - Myths and RealityIPv6 Security - Myths and Reality
IPv6 Security - Myths and Reality
 
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaIpv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
 
IPv4 adressing
IPv4 adressingIPv4 adressing
IPv4 adressing
 
IPv6 Security und Hacking
IPv6 Security und HackingIPv6 Security und Hacking
IPv6 Security und Hacking
 
Addressing plans
Addressing plansAddressing plans
Addressing plans
 
IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?
 
Survey on IPv6 security issues
Survey on IPv6 security issuesSurvey on IPv6 security issues
Survey on IPv6 security issues
 

Recently uploaded

“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 

Recently uploaded (20)

“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 

Fernando Gont - The Hack Summit 2021 - State of the Art in IPv6 Security

  • 1. C:> State of the Art in IPv6 Security Fernando Gont Director of Information Security, EdgeUno www.thehacksummit.com 5/11/2021 online ORGANIZERS:
  • 3. What is this IPv6 thing? • Solves the problem of IPv4 address exhaustion • Uses 128-bit addresses (vs. IPv4’s 32-bit addresses) • Provides the same service as IPv4 • It is not “backwards compatible” with IPv4 3
  • 4. Brief comparison of IPv4/IPv6 IPv4 IPv6 Addressing 32 bits 128 bits Address resolution ARP ND (ICMPv6-based) Configuration DHCP SLAAC & DHCPv6 (optional) Fault isolation ICMPv4 ICMPv6 IPsec support Optional Optional Fragmentation Hosts and routers Only hosts 4
  • 6. IPv6 security toolkits • SI6 Networks' IPv6 Toolkit • THC-IPv6 • Chiron 6
  • 9. Brief overview • The increased address space is the “driver” for IPv6 • Address semantics similar to those of IPv4: • Addresses are aggregated into “prefixes” • Several address types • Several address scopes • Each interface employs multiple addresses of different types and scopes • One link-local unicast address, one or more global unicast addresses, etc 9
  • 10. IPv6 Global Unicast Addresses • The interface ID can be set in a number of ways: • Embed the underlying MAC address (traditional SLAAC) • Embed the corresponding IPv4 address (e.g. 2001:db8::192.168.1.1) • Low-byte (ej. 2001:db8::1, 2001:db8::2, etc.) • Wordy (ej. 2001:db8::dead:beef) • Stable and random addresses (RFC7217, current SLAAC) Global Routing Prefix Subnet ID Interface ID  |         n bits         |   m bits  |        128-n-m bits        | 10
  • 11. IPv6 Addressing Security and Privacy Implications 11
  • 12. Security and privacy implications • Implications dependent on IID-generation algorithm • Stable IIDs Activity correlation over time → • Constant IIDs Activity correlation over space → • IIDs with patterns Network reconnaissance → • IIDs embedding MAC addresses Device-specific attacks → 12
  • 14. RFC 7217: Stable addresses • Generate the Interface Identifier with: F(Prefix, Net_Iface, Network_ID, Secret_Key) • As the host moves: • Prefix and Network_ID change from one network to another • But they remain constant within each network • F() varies across networks, but remains constant within each network • Implementations: Mac OS, Linux, etc. 14
  • 15. RFC 8981: Temporary addresses • Randomized IIDs that change over time • Generated in addition to to stable addresses • Use: • Temporary addresses: outgoing communications • Stable addresses: incoming communications • Implementations: All major OSes 15
  • 17. Red-team advice • You may need to change the way you do Network Reconnaissance! • Check RFC 7707 (“Network Reconnaissance in IPv6 Networks”) 17
  • 18. Red-team advice (II) • Use pattern-based address-scanning attacks 18
  • 19. Blue-team advice • Use unpredictable IIDs where possible • Consider the feasibility of using temporary addresses: • Impact on network devices • Impact on ACLs • Impact on the ability to correlate network activity for legitimate purposes • Implement IPv6 firewalling as necessary 19
  • 21. IPv6 packet structure • The IPv6 header only contains “mandatory” information • Options are conveyed via “extension headers” • They separate e.g. host vs. router options • Only the MTU limits the number of extension headers and options IPv6 HbH DO DO TCP 21
  • 22. Implications • Increase in the complexity of the resulting traffic • Source of many vulnerabilities • Increases the difficulty to obtain layer-4 information by intermediate systems • They seldomly allows for circumvention of security controls • Negative performance impact on network devices DoS → • Limited reliability on the public Internet • F(not required, is problematic) drop! → 22
  • 23. Red-team advice • IPv6 EHs can be useful for circumvention of security controls • Possibly useful for DoS purposes • But very unreliable across the Internet! 23
  • 24. Blue-team advice • At the edge of an organizational network use an “allow list” → • At transit networks use a “block list” → • Check vendor documentation regarding EH processing • Use of EHs might require that packets be processed in the “slow path” • It may be necessary to drop packets that employ EHs • Check RFC 9098 (“Operational Implications of IPv6 Packets with Extension Headers”) 24
  • 26. Brief overview • Address resolution: IPv6 link-layer → • Performed with “Neighbor Discovery”: • Based on ICMPv6 messages (Neighbor Solicitation and Neighbor Advertisement) • Resulting traffic may be much more complex than that of IPv4’s ARP • ARP-based attacks can be “ported” to the IPv6 world • Man in The Middle • Denial of Service 26
  • 27. Blue-team advice • Do you mitigate ARP attacks for the IPv4 case? • If so, achieve policy-parity with: • IPv6 Source Guard/SAVI • Double-check if these mechanisms are actually effective! 27
  • 29. Brief overview • Two mechanisms for IPv6 automatic configuration • Stateless Address Auto-Configuration (SLAAC) • Based on ICMPv6 messages • DHCPv6 • Based on UDP datagrams • SLAAC is mandatory, while DHCPv6 is optional • But many networks use both, even with overlapping functionality 29
  • 30. Security considerations • Forged SLAAC and DHCPv6 packets can be leveraged for: • Man In the Middle • Denial of Service • SLAAC may result in an increased attack window • thanks to its push/pull model 30
  • 31. Red-team advice • SLAAC attacks are trivial to perform in local networks • Use of IPv6 EHs can help circumvent SLAAC security controls 31
  • 32. Blue-team advice • Do you implement analogous mitigations in the IPv4 case?    DHCP-snooping, etc. • Achieve policy-parity with: • RA-Guard • DHCPv6-Shield • IPv6 Source Guard/SAVI • Double-check if your implementations are actually effective! 32
  • 34. Security considerations • Most networks have at least partial deployment of IPv6 • If you expect that IPv6 is not used, enforce such policy! • Lack of feature and/or policy parity with IPv4 • Implementation of packet filtering is inconsistent: • Different rulesets for IPv4 and IPv6 policy mismatches → • Evidence exists about filtering policies mismatches • Always audit all addresses of all protocol families 34
  • 36. Some conclusions • IPv6 provides similar functionality to that of IPv4   Mechanisms are different   It is such differences that may lead to “surprises” • Most systems already ship with IPv6 support   There is usually not such a thing as an “IPv4-only” network   All networks should address IPv6 security challenges • Your {blue, red, purple} teams should embrace IPv6! 36
  • 39. Thank you for watching! Remember to leave your questions and rate the presentation in the section below. www.thehacksummit.com 5/11/2021 online ORGANIZERS: