SlideShare a Scribd company logo
1
Is IPv6 Security
Still An Afterthought ?
Merike Kaeo, CTO Farsight Security
merike@fsi.io
Goals For Today
• Fundamental IPv6 security considerations
• Knowing the right questions to ask
• Admitting that practical IPv6 malware detection
and mitigation needs work
• Learning how DNS can be utilized to help with
IPv6 malware detection
2
Does Operations Understand IPv6?
• It *is* similar to IPv4…..but NOT J [Training is Important!!]
• IPv4 and IPv6 interface addressing nuances
• Which IPv6 address used to source traffic?
• When is IPv4 address used vs IPv6 address for
a dual-stacked host?
• Where are special transition addresses used?
• More IPv6 nuances
• Every mobile device is a /64
• Extension headers
• Path MTU Discovery
• Fragmentation
3
Fundamental Security Principles
• Authentication
• Who (or What) are you?
• Authorization
• What are you allowed to access or do?
• Integrity
• Has data been altered?
• Confidentiality
• Can only authorized eyeballs see data?
• Availability
• Do I have access to data I need?
Fundamental Privacy Principles
• Concern for how data is:
• Collected
• Analyzed
• Used
• Protected
• Potential for increased surveillance and
tracking
How	is	privacy	changing	in	the	world	of	
social	media	and	information	gluttony?
Best Practices & Operational Realities
draft-ietf-opsec-v6-09
• Addressing	Recommendations
• Extension	Header	Issues
• Link	Layer	Security	(ND/RA)
• Control	Plane	Security
• Routing	Security
• Logging/Monitoring
• Legacy	vs New	Coexistence	Technologies
• Added	Considerations
6
Can You Listen to the Network using IPv4 / IPv6 ?
• Sources (data collection points)
• Protocols to use for data collection
• Tools used to collect data
Conference	
Net
NOC
Syslog, TFTP,
AAA, DNS,
SNMP
NetFlow,
SNMP
7
Growing Trends in DDoS (IPv4)
• DDoS attacks use spoofed IP addresses of legitimate users
• Combining spoofed addresses with legitimate protocol use
makes mitigation extremely difficult – what do you block
and where?
• Recent trends have been utilizing DNS as attack vector
since it is a fundamentally used Internet technology
• Utilize resources of large hosting providers for added attack
bandwidth
• Many other Internet protocols also susceptible
• Mobile networks and IoT – NEEDS ATTENTION
• Latest DDoS attack on Brian Krebs – 600+ Gbps!!!
• Mirai malware – exploits default weak credentials (Telnet!!)
8
My Television Uses IPv6 (Really!!)
Television Default Permissions
Attacker sends ICMP Echo request
packets to a remote network
directed broadcast address using
spoofed IP source addresses
All hosts that receive this ICMP
Echo request packet send a reply
to the spoofed IP source address
and overwhelm spoofed victim
Router that connects this remote network
sends packet onto the local network
1
1
2
2
Victim
3 3
Attacker
(SMURF)
Router Router
Type Description Justification
2 Packet too big For correct operation of PMTUD
4 Parameter problem Cannot process packet because cannot identify a
field in a header or the packet itself
130-
132
Multicast listener Routing device must accept these messages to
participate in multicast routing
133 Router solicitation Needed for IPv6 autoconfiguration
134 Router
advertisement
Needed for IPv6 autoconfiguration
135 Neighbor
solicitation
Duplicate address detection and Layer2 (MAC) -to-
IPv6 address resolution
136 Neighbor
advertisement
Duplicate address detection and Layer2 (MAC) -to-
IPv6 address resolution
IPv6 ICMP Considerations
Help Mitigate DDoS: Ingress/Egress Filters
ipv6 access-list extended DSL-ipv6-Outbound
permit ipv6 2001:DB8:AA65::/48 any
deny ipv6 any any log
interface atm 0/0
ipv6 traffic-filter DSL-ipv6_Outbound out
router bgp <AS#>
neighbor <IP> remote-as <AS#>
neighbor <IP> prefix-list customer in
ip prefix-list customer permit <netblock>
ip prefix-list customer deny <everything else>
Home
Customer
SMB Customer
ISP
EGRESS
INGRESS
Deploy anti-spoofing filters as close to potential source as possible
ipv6 access-list extended DSL-ipv6-Inbound
permit ipv6 2001:DB8:AA65::/48 any
deny ipv6 any any log
interface atm 0/0
ipv6 traffic-filter DSL-ipv6_Inbound in
INGRESS
13
IPv6 Reserved Addresses (RFC 6890)
Description Network
unspecified ::	/128
loopback ::1	/128
IPv4-IPv6	Translation	address 64::ff9b::/96
IPv4-compatible	IPv6	address ::/96
IPv4-mapped	IPv6	address ::ffff:0:0/96
discard-only	prefix 100::/64
TEREDO 2001::/32
benchmarking 2001:2::/48
ORCHID 2001:10::/28
6to4 2002::/16
reserved ::/8
unique-local	address	 fc00::/7
multicast	address	 ff00::/8
documentation	addresses 2001:db8::/3214
Using DNS to detect IPv6 Malware
278
Million
10+
Billion
100+
Million
Current
Domain Names
ccTLD
Domains
Current
Hostnames
Questions That Can Be Answered
Using Passive DNS
- Where did this domain name point to
in the past?
- What domain names are hosted by a
given nameserver?
- What domain names point into a
given IP network?
- What subdomains exist below a
certain domain name?
- What new names are hosted in
ccTLDs?
Collector
Q1:	what	is	IP	address	of	www.nsrc.org	?
R2:	IP	address	of	authoritative	server	for	.org	
R1:	IP	address	of		www.nsrc.org
Q2:	what	is	IP	address	of	authoritative	server	for	.org?
Client	2
Client	1
R3:	IP	address	of	authoritative	server	for	nsrc.org
Q3:	what	is	IP	address	for	authoritative	server	for	.nsrc.org?
R4:		IP	address	of	authoritative	server	for	www.nsrc.org
Q4:	what	is	IP	address	for	authoritative	server	for	www.nsrc.org ?
R5:		IP	address	of	www.nsrc.org
Q5:	what	is	IP	address	of	www.nsrc.org	?
Passive	DNS	Sensor
DNS	
Resolver
Authoritative	
ROOT
Authoritative	
ORG
Authoritative	
NSRC
Q2,	R2,	Q3,	R3,	Q4,	R4
Passive DNS – What Is Collected
DNSDB Searches
Record	Types
ANY-DNSSEC
A
AAAA
NS
CNAME
DNAME
PTR
MX
SRV
TXT
DS
DLV
RRSIG
NSEC
DNSKEY
NSEC3
Find Associated Domains [IPv4]:
• Most all malicious
domains utilize A
records although
these could be
legitimate
• Many AAAA records
associated with
legitimate domains
TODAY’S TREND
18
Find Associated Domains [IPv6]:
19
Further Investigation…
• Correlate domains seen in IPv4 and in IPv6
• IPv4 and IPv4-mapped addresses both associated with > 10,000
domains
• Not all domains are same as seen in IPv4 and IPv6
• Investigate same domains seen in IPv4 and IPv6
• Investigate domains seen separately from IPv4 vs IPv6
address
• Might be legitimate hosting company
Passive DNS can be used to correlate
IPv4 and IPv6 related information
20
Operational Observations
• Some IPv6 attacks known but not discussed
• Ongoing SMTP over IPv6 discussions where lack of
reputation information blocks legitimate traffic that
would not be blocked on IPv4
• Many folks turn off SMTP use over IPv6 as response
• https://www.maawg.org/sites/maawg/files/news/M3AAWG_Inb
ound_IPv6_Policy_Issues-2014-09.pdf
• Many IPv6 invalid source addresses observed
• https://ripe67.ripe.net/presentations/288-Jen_RIPE67.pdf
• How would you tell configuration error from deliberate
spoofing?
21
• Secure end-host (a router or switch is an end-host)
• Turn off unused services
• Change all default credentials [use 2FA]
• Use cryptographically protected protocols for management
• Limit access to network
• Filter (packet filter vs uRPF vs route filter)
• Ingress AND Egress filtering necessary
• Authenticate
• Device vs User
• Credential management lifecycle
• Use multi-factor authentication
• Audit network traffic
• netflow-v9
• Wireshark (yes, periodically look what is ON THE WIRE)
How Mitigate Most Threats?
Trust But Verify….
• Understand what monitoring capability is for IPv4
and/or IPv6 traffic and know how the traffic patterns
can be correlated
• Test dual-stack and transition technology behavior to
know when DNS replies utilize A and/or AAAA records
• Tools for incident response improving for IPv6 but there
is still more improvement needed
• Not all management functionality can utilize IPv6 transport
• Some networks being built for IPv6 only and are motivating
vendors
• Correlation is important!!
23

More Related Content

What's hot

Let's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane ElectricLet's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane Electric
Bangladesh Network Operators Group
 
Secured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRRSecured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRR
Bangladesh Network Operators Group
 
Application Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowApplication Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible Netflow
Cisco DevNet
 
Cisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven TelemetryCisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Canada
 
HKNOG 1.0 - DDoS attacks in an IPv6 World
HKNOG 1.0 -  DDoS attacks in an IPv6 WorldHKNOG 1.0 -  DDoS attacks in an IPv6 World
HKNOG 1.0 - DDoS attacks in an IPv6 World
Tom Paseka
 
Actual Condition Survey of Malware Download Sites for A Long Period
Actual Condition Survey of Malware Download Sites for A Long PeriodActual Condition Survey of Malware Download Sites for A Long Period
Actual Condition Survey of Malware Download Sites for A Long Period
APNIC
 
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlowAuditor
 
Survey on IPv6 security issues
Survey on IPv6 security issuesSurvey on IPv6 security issues
Survey on IPv6 security issues
bathinin1
 
DDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL LeeDDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL Lee
MyNOG
 
Phifer 3 30_04
Phifer 3 30_04Phifer 3 30_04
Phifer 3 30_04
Ayano Midakso
 
NetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat DefenseNetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat Defense
Cisco Canada
 
DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec
APNIC
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Canada
 
Network Security and Visibility through NetFlow
Network Security and Visibility through NetFlowNetwork Security and Visibility through NetFlow
Network Security and Visibility through NetFlow
Lancope, Inc.
 
NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...
NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...
NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...
SolarWinds
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikPositive Hack Days
 
Automating Network Infrastructure : Ansible
Automating Network Infrastructure : AnsibleAutomating Network Infrastructure : Ansible
Automating Network Infrastructure : Ansible
Bangladesh Network Operators Group
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
Cisco Canada
 
Philippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTsPhilippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTs
APNIC
 

What's hot (20)

Let's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane ElectricLet's talk about routing security, Anurag Bhatia, Hurricane Electric
Let's talk about routing security, Anurag Bhatia, Hurricane Electric
 
Secured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRRSecured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRR
 
Application Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowApplication Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible Netflow
 
Cisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven TelemetryCisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven Telemetry
 
HKNOG 1.0 - DDoS attacks in an IPv6 World
HKNOG 1.0 -  DDoS attacks in an IPv6 WorldHKNOG 1.0 -  DDoS attacks in an IPv6 World
HKNOG 1.0 - DDoS attacks in an IPv6 World
 
Actual Condition Survey of Malware Download Sites for A Long Period
Actual Condition Survey of Malware Download Sites for A Long PeriodActual Condition Survey of Malware Download Sites for A Long Period
Actual Condition Survey of Malware Download Sites for A Long Period
 
Tech f42
Tech f42Tech f42
Tech f42
 
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
 
Survey on IPv6 security issues
Survey on IPv6 security issuesSurvey on IPv6 security issues
Survey on IPv6 security issues
 
DDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL LeeDDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL Lee
 
Phifer 3 30_04
Phifer 3 30_04Phifer 3 30_04
Phifer 3 30_04
 
NetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat DefenseNetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat Defense
 
DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
 
Network Security and Visibility through NetFlow
Network Security and Visibility through NetFlowNetwork Security and Visibility through NetFlow
Network Security and Visibility through NetFlow
 
NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...
NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...
NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey Gordeychik
 
Automating Network Infrastructure : Ansible
Automating Network Infrastructure : AnsibleAutomating Network Infrastructure : Ansible
Automating Network Infrastructure : Ansible
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
 
Philippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTsPhilippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTs
 

Viewers also liked

OTOÑO EMP
OTOÑO EMPOTOÑO EMP
OTOÑO EMP
10808
 
Behavior is the New Black
Behavior is the New Black Behavior is the New Black
Behavior is the New Black
Wax Marketing, Inc.
 
Charity Bowl Newsletter 2016
Charity Bowl Newsletter 2016Charity Bowl Newsletter 2016
Charity Bowl Newsletter 2016Blake Coco
 
Vocabulario navidad
Vocabulario navidadVocabulario navidad
Vocabulario navidadchonihmd
 
Vocabulario otoño
Vocabulario otoñoVocabulario otoño
Vocabulario otoñochonihmd
 
A gestão de projetos atps 1
A gestão de projetos atps 1A gestão de projetos atps 1
A gestão de projetos atps 1
Ana Genesy
 
La newsletter sur la Roumanie de Septembre 2016 préparée par eastrategies
La newsletter sur la Roumanie de Septembre 2016 préparée par  eastrategiesLa newsletter sur la Roumanie de Septembre 2016 préparée par  eastrategies
La newsletter sur la Roumanie de Septembre 2016 préparée par eastrategies
Eastrategies - Bucarest, Roumanie
 
Terremotos y tsunamis en chile
Terremotos y tsunamis en chileTerremotos y tsunamis en chile
Terremotos y tsunamis en chileSalvador Contreras
 
SECTOR CERVECERO EN ESPAÑA
SECTOR CERVECERO EN ESPAÑASECTOR CERVECERO EN ESPAÑA
SECTOR CERVECERO EN ESPAÑA
Natalia Gomez Ortego
 
Clean 9 İle Sağlıklı Bir Şekilde Kilo Verin
Clean 9 İle Sağlıklı Bir Şekilde Kilo VerinClean 9 İle Sağlıklı Bir Şekilde Kilo Verin
Clean 9 İle Sağlıklı Bir Şekilde Kilo Verin
Kürşad Kalay
 
Management de la distribution
Management  de la distributionManagement  de la distribution
Management de la distribution
Youssef LAMGHARI
 
Acuerdos de Paz en Colombia
Acuerdos de Paz en ColombiaAcuerdos de Paz en Colombia
Acuerdos de Paz en Colombia
Andrés Felipe Bohórquez López
 

Viewers also liked (16)

OTOÑO EMP
OTOÑO EMPOTOÑO EMP
OTOÑO EMP
 
Horario 3º
Horario  3ºHorario  3º
Horario 3º
 
VERBAL JUDO
VERBAL JUDOVERBAL JUDO
VERBAL JUDO
 
Behavior is the New Black
Behavior is the New Black Behavior is the New Black
Behavior is the New Black
 
Charity Bowl Newsletter 2016
Charity Bowl Newsletter 2016Charity Bowl Newsletter 2016
Charity Bowl Newsletter 2016
 
TRAFFIC COLLISION
TRAFFIC COLLISIONTRAFFIC COLLISION
TRAFFIC COLLISION
 
LaPaz_report_esp
LaPaz_report_espLaPaz_report_esp
LaPaz_report_esp
 
Vocabulario navidad
Vocabulario navidadVocabulario navidad
Vocabulario navidad
 
Vocabulario otoño
Vocabulario otoñoVocabulario otoño
Vocabulario otoño
 
A gestão de projetos atps 1
A gestão de projetos atps 1A gestão de projetos atps 1
A gestão de projetos atps 1
 
La newsletter sur la Roumanie de Septembre 2016 préparée par eastrategies
La newsletter sur la Roumanie de Septembre 2016 préparée par  eastrategiesLa newsletter sur la Roumanie de Septembre 2016 préparée par  eastrategies
La newsletter sur la Roumanie de Septembre 2016 préparée par eastrategies
 
Terremotos y tsunamis en chile
Terremotos y tsunamis en chileTerremotos y tsunamis en chile
Terremotos y tsunamis en chile
 
SECTOR CERVECERO EN ESPAÑA
SECTOR CERVECERO EN ESPAÑASECTOR CERVECERO EN ESPAÑA
SECTOR CERVECERO EN ESPAÑA
 
Clean 9 İle Sağlıklı Bir Şekilde Kilo Verin
Clean 9 İle Sağlıklı Bir Şekilde Kilo VerinClean 9 İle Sağlıklı Bir Şekilde Kilo Verin
Clean 9 İle Sağlıklı Bir Şekilde Kilo Verin
 
Management de la distribution
Management  de la distributionManagement  de la distribution
Management de la distribution
 
Acuerdos de Paz en Colombia
Acuerdos de Paz en ColombiaAcuerdos de Paz en Colombia
Acuerdos de Paz en Colombia
 

Similar to Is IPv6 Security Still an Afterthought?

Fedv6tf-fhs
Fedv6tf-fhsFedv6tf-fhs
Fedv6tf-fhs
Tim Martin
 
Fernando Gont - The Hack Summit 2021 - State of the Art in IPv6 Security
Fernando Gont - The Hack Summit 2021 - State of the Art in IPv6 SecurityFernando Gont - The Hack Summit 2021 - State of the Art in IPv6 Security
Fernando Gont - The Hack Summit 2021 - State of the Art in IPv6 Security
EdgeUno
 
IPV6 - Threats and Countermeasures / Crash Course
IPV6 - Threats and Countermeasures / Crash CourseIPV6 - Threats and Countermeasures / Crash Course
IPV6 - Threats and Countermeasures / Crash Course
Thierry Zoller
 
gkk20211e4djwew4dSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials   domain 2gkk20211e4djwew4dSecurity essentials   domain 2
gkk20211e4djwew4dSecurity essentials domain 2
Anne Starr
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2
Anne Starr
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2
Anne Starr
 
fgont-h2hc-2020-ipv6-security.pdf
fgont-h2hc-2020-ipv6-security.pdffgont-h2hc-2020-ipv6-security.pdf
fgont-h2hc-2020-ipv6-security.pdf
FernandoGont
 
Understanding i pv6 2
Understanding i pv6 2Understanding i pv6 2
Understanding i pv6 2srmanjuskp
 
IPv6 Security und Hacking
IPv6 Security und HackingIPv6 Security und Hacking
IPv6 Security und Hacking
Swiss IPv6 Council
 
Da for dummies techdays 2012
Da for dummies techdays 2012Da for dummies techdays 2012
Da for dummies techdays 2012
Alex de Jong
 
The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)
Martin Schütte
 
IPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCTIPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCT
Bangladesh Network Operators Group
 
IPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be IgnoredIPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be Ignored
Rochester Security Summit
 
IPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for MobilesIPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for Mobiles
APNIC
 
Ipv6
Ipv6Ipv6
Rapid IPv6 Deployment for ISP Networks
Rapid IPv6 Deployment for ISP NetworksRapid IPv6 Deployment for ISP Networks
Rapid IPv6 Deployment for ISP Networks
Skeeve Stevens
 
IPv6 Security - Workshop mit Live Demo
IPv6 Security - Workshop mit Live DemoIPv6 Security - Workshop mit Live Demo
IPv6 Security - Workshop mit Live Demo
Digicomp Academy AG
 
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
Digicomp Academy AG
 
Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4
newbie2019
 

Similar to Is IPv6 Security Still an Afterthought? (20)

Fedv6tf-fhs
Fedv6tf-fhsFedv6tf-fhs
Fedv6tf-fhs
 
Fernando Gont - The Hack Summit 2021 - State of the Art in IPv6 Security
Fernando Gont - The Hack Summit 2021 - State of the Art in IPv6 SecurityFernando Gont - The Hack Summit 2021 - State of the Art in IPv6 Security
Fernando Gont - The Hack Summit 2021 - State of the Art in IPv6 Security
 
IPv6 on the Interop Network
IPv6 on the Interop NetworkIPv6 on the Interop Network
IPv6 on the Interop Network
 
IPV6 - Threats and Countermeasures / Crash Course
IPV6 - Threats and Countermeasures / Crash CourseIPV6 - Threats and Countermeasures / Crash Course
IPV6 - Threats and Countermeasures / Crash Course
 
gkk20211e4djwew4dSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials   domain 2gkk20211e4djwew4dSecurity essentials   domain 2
gkk20211e4djwew4dSecurity essentials domain 2
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2
 
fgont-h2hc-2020-ipv6-security.pdf
fgont-h2hc-2020-ipv6-security.pdffgont-h2hc-2020-ipv6-security.pdf
fgont-h2hc-2020-ipv6-security.pdf
 
Understanding i pv6 2
Understanding i pv6 2Understanding i pv6 2
Understanding i pv6 2
 
IPv6 Security und Hacking
IPv6 Security und HackingIPv6 Security und Hacking
IPv6 Security und Hacking
 
Da for dummies techdays 2012
Da for dummies techdays 2012Da for dummies techdays 2012
Da for dummies techdays 2012
 
The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)
 
IPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCTIPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCT
 
IPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be IgnoredIPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be Ignored
 
IPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for MobilesIPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for Mobiles
 
Ipv6
Ipv6Ipv6
Ipv6
 
Rapid IPv6 Deployment for ISP Networks
Rapid IPv6 Deployment for ISP NetworksRapid IPv6 Deployment for ISP Networks
Rapid IPv6 Deployment for ISP Networks
 
IPv6 Security - Workshop mit Live Demo
IPv6 Security - Workshop mit Live DemoIPv6 Security - Workshop mit Live Demo
IPv6 Security - Workshop mit Live Demo
 
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
 
Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4Ccna rse chp9 nat fo i_pv4
Ccna rse chp9 nat fo i_pv4
 

More from APNIC

APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
APNIC
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
APNIC
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
APNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
APNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APNIC
 

More from APNIC (20)

APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 

Recently uploaded

guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 

Recently uploaded (20)

guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 

Is IPv6 Security Still an Afterthought?

  • 1. 1 Is IPv6 Security Still An Afterthought ? Merike Kaeo, CTO Farsight Security merike@fsi.io
  • 2. Goals For Today • Fundamental IPv6 security considerations • Knowing the right questions to ask • Admitting that practical IPv6 malware detection and mitigation needs work • Learning how DNS can be utilized to help with IPv6 malware detection 2
  • 3. Does Operations Understand IPv6? • It *is* similar to IPv4…..but NOT J [Training is Important!!] • IPv4 and IPv6 interface addressing nuances • Which IPv6 address used to source traffic? • When is IPv4 address used vs IPv6 address for a dual-stacked host? • Where are special transition addresses used? • More IPv6 nuances • Every mobile device is a /64 • Extension headers • Path MTU Discovery • Fragmentation 3
  • 4. Fundamental Security Principles • Authentication • Who (or What) are you? • Authorization • What are you allowed to access or do? • Integrity • Has data been altered? • Confidentiality • Can only authorized eyeballs see data? • Availability • Do I have access to data I need?
  • 5. Fundamental Privacy Principles • Concern for how data is: • Collected • Analyzed • Used • Protected • Potential for increased surveillance and tracking How is privacy changing in the world of social media and information gluttony?
  • 6. Best Practices & Operational Realities draft-ietf-opsec-v6-09 • Addressing Recommendations • Extension Header Issues • Link Layer Security (ND/RA) • Control Plane Security • Routing Security • Logging/Monitoring • Legacy vs New Coexistence Technologies • Added Considerations 6
  • 7. Can You Listen to the Network using IPv4 / IPv6 ? • Sources (data collection points) • Protocols to use for data collection • Tools used to collect data Conference Net NOC Syslog, TFTP, AAA, DNS, SNMP NetFlow, SNMP 7
  • 8. Growing Trends in DDoS (IPv4) • DDoS attacks use spoofed IP addresses of legitimate users • Combining spoofed addresses with legitimate protocol use makes mitigation extremely difficult – what do you block and where? • Recent trends have been utilizing DNS as attack vector since it is a fundamentally used Internet technology • Utilize resources of large hosting providers for added attack bandwidth • Many other Internet protocols also susceptible • Mobile networks and IoT – NEEDS ATTENTION • Latest DDoS attack on Brian Krebs – 600+ Gbps!!! • Mirai malware – exploits default weak credentials (Telnet!!) 8
  • 9. My Television Uses IPv6 (Really!!)
  • 11. Attacker sends ICMP Echo request packets to a remote network directed broadcast address using spoofed IP source addresses All hosts that receive this ICMP Echo request packet send a reply to the spoofed IP source address and overwhelm spoofed victim Router that connects this remote network sends packet onto the local network 1 1 2 2 Victim 3 3 Attacker (SMURF) Router Router
  • 12. Type Description Justification 2 Packet too big For correct operation of PMTUD 4 Parameter problem Cannot process packet because cannot identify a field in a header or the packet itself 130- 132 Multicast listener Routing device must accept these messages to participate in multicast routing 133 Router solicitation Needed for IPv6 autoconfiguration 134 Router advertisement Needed for IPv6 autoconfiguration 135 Neighbor solicitation Duplicate address detection and Layer2 (MAC) -to- IPv6 address resolution 136 Neighbor advertisement Duplicate address detection and Layer2 (MAC) -to- IPv6 address resolution IPv6 ICMP Considerations
  • 13. Help Mitigate DDoS: Ingress/Egress Filters ipv6 access-list extended DSL-ipv6-Outbound permit ipv6 2001:DB8:AA65::/48 any deny ipv6 any any log interface atm 0/0 ipv6 traffic-filter DSL-ipv6_Outbound out router bgp <AS#> neighbor <IP> remote-as <AS#> neighbor <IP> prefix-list customer in ip prefix-list customer permit <netblock> ip prefix-list customer deny <everything else> Home Customer SMB Customer ISP EGRESS INGRESS Deploy anti-spoofing filters as close to potential source as possible ipv6 access-list extended DSL-ipv6-Inbound permit ipv6 2001:DB8:AA65::/48 any deny ipv6 any any log interface atm 0/0 ipv6 traffic-filter DSL-ipv6_Inbound in INGRESS 13
  • 14. IPv6 Reserved Addresses (RFC 6890) Description Network unspecified :: /128 loopback ::1 /128 IPv4-IPv6 Translation address 64::ff9b::/96 IPv4-compatible IPv6 address ::/96 IPv4-mapped IPv6 address ::ffff:0:0/96 discard-only prefix 100::/64 TEREDO 2001::/32 benchmarking 2001:2::/48 ORCHID 2001:10::/28 6to4 2002::/16 reserved ::/8 unique-local address fc00::/7 multicast address ff00::/8 documentation addresses 2001:db8::/3214
  • 15. Using DNS to detect IPv6 Malware 278 Million 10+ Billion 100+ Million Current Domain Names ccTLD Domains Current Hostnames Questions That Can Be Answered Using Passive DNS - Where did this domain name point to in the past? - What domain names are hosted by a given nameserver? - What domain names point into a given IP network? - What subdomains exist below a certain domain name? - What new names are hosted in ccTLDs?
  • 18. Find Associated Domains [IPv4]: • Most all malicious domains utilize A records although these could be legitimate • Many AAAA records associated with legitimate domains TODAY’S TREND 18
  • 20. Further Investigation… • Correlate domains seen in IPv4 and in IPv6 • IPv4 and IPv4-mapped addresses both associated with > 10,000 domains • Not all domains are same as seen in IPv4 and IPv6 • Investigate same domains seen in IPv4 and IPv6 • Investigate domains seen separately from IPv4 vs IPv6 address • Might be legitimate hosting company Passive DNS can be used to correlate IPv4 and IPv6 related information 20
  • 21. Operational Observations • Some IPv6 attacks known but not discussed • Ongoing SMTP over IPv6 discussions where lack of reputation information blocks legitimate traffic that would not be blocked on IPv4 • Many folks turn off SMTP use over IPv6 as response • https://www.maawg.org/sites/maawg/files/news/M3AAWG_Inb ound_IPv6_Policy_Issues-2014-09.pdf • Many IPv6 invalid source addresses observed • https://ripe67.ripe.net/presentations/288-Jen_RIPE67.pdf • How would you tell configuration error from deliberate spoofing? 21
  • 22. • Secure end-host (a router or switch is an end-host) • Turn off unused services • Change all default credentials [use 2FA] • Use cryptographically protected protocols for management • Limit access to network • Filter (packet filter vs uRPF vs route filter) • Ingress AND Egress filtering necessary • Authenticate • Device vs User • Credential management lifecycle • Use multi-factor authentication • Audit network traffic • netflow-v9 • Wireshark (yes, periodically look what is ON THE WIRE) How Mitigate Most Threats?
  • 23. Trust But Verify…. • Understand what monitoring capability is for IPv4 and/or IPv6 traffic and know how the traffic patterns can be correlated • Test dual-stack and transition technology behavior to know when DNS replies utilize A and/or AAAA records • Tools for incident response improving for IPv6 but there is still more improvement needed • Not all management functionality can utilize IPv6 transport • Some networks being built for IPv6 only and are motivating vendors • Correlation is important!! 23