Friday 13 th May :30-12:15

Size: px
Start display at page:

Download "Friday 13 th May :30-12:15"

Transcription

1 IPv6 Promised Role in Mitigating Cyber Attacks: Really it s Time! Friday 13 th May :30-12:15 Alaa AL-Din Al-Radhi IPv6 & Cyber Security: Consultant Engineer, Practitioner, Networker & Trainer IPv6 Forum Jordan Chapter President alradhi2000@yahoo.ca, alaalradhi@hotmail.com Friday, May 13, 2011 Alaa Al-Din Al-Radhi 1

2 IPv6 Security Road-Map & How-To Wrap-UP IPv6 Security Techies IPv6 Transition Threats Common IPv4 & IPv6 Security Concerns IPv6 Security Basic Issues Friday, May 13, 2011 Alaa Al-Din Al-Radhi 2

3 IPv4 Addresses Finished: Sorry, We are closed!! Friday, May 13, 2011 Alaa Al-Din Al-Radhi 3

4 NAT Layers for IP Shortages Too Many Security Attacks Current ISP (Internet Service Provider) Challanges Mobility Convergence Congestion & Delay

5 IPv6 Security Basic Issues Friday, May 13, 2011 Alaa Al-Din Al-Radhi 5

6 The ONLY real security A person can have in this world = A reserve of knowledge, Intent, experience, ability & action Friday, May 13, 2011 There is NO Fixed Answer; ONLY Possible Solutions! Alaa Al-Din Al-Radhi 6

7 Security Characteristics & Process IPv6 Will restore the CIA Model Friday, May 13, 2011 Alaa Al-Din Al-Radhi 7

8 Output Objective: Sieving Malicious Traffic Packet Filtering Anti Spoofing Learning & Stats. Analysis HTTP Analysis & Authen. Filters: IP's, ports, flags, etc. Friday, May 13, 2011 TCP Others Statistical Analysis, Layers 3-7 Alaa Al-Din Al-Radhi High-level Protocols: Anomaly Behavior, etc 8

9 Security incidence are a normal part of an ISP s operations Secure Resources: Firewall, Encryption, Authentication, Audit Manage & Improve: Post Mortem, Analyze the Incident, modify the plan / procedures Security Policy Monitor & Respond Intrusion Detection, work the incidence Friday, May 13, 2011 Test, Practice, Drill Vulnerability Scanning Alaa Al-Din Al-Radhi 9

10 Penetration Identify & Evaluate RISK Assessments: Security Breaches Likelihood AAA Remote Staff Friday, May 13, 2011 ISP s Backbone Alaa Al-Din Al-Radhi NOC Office Staff 10

11 Complete Security Life Cycle Friday, May 13, 2011 Alaa Al-Din Al-Radhi 11

12 What Goal How Access Control Authentication Non - Repudiation Data Confidentiality Communication Security Data Integrity Availability 8 Security Dimensions for Network Vulnerabilities: Ensures access by authorized personnel & devices only Protects against unauthorized use Confirms communications identity of (e.g., end-users, Net Elements, etc) Provide assurance of an entity Prevents Actions Denial of entity Ensures availability of an evidence that can be as has taken place Protects unauthorized data access Ensures data content can NOT be Manipulated by unauthenticated entity Ensures authorized information flow Ensures Info. NON-Interception Ensures Info. accuracy Provides event occurrence Network Availability Disaster recovery solutions Simple log-in / Password ACL IDS Digital certificates Digital Signatures SSL Logs Access control Digital signatures Encryption (3DES, AES) Access control lists File permissions VPNs (IPSec, L2TP) MPLS tunnels IPSec Anti-Virus Software FW, IDS / IPS Backup & Business continuity Privacy Information Protection Encryption of IP headers (IPSec) Friday, May 13, 2011 Alaa Al-Din Al-Radhi 12

13 ISP Security Breakdowns Checklists Endpoints Device integrity + Device and user AAA + Hosts: firewall (i.e. Black Ice) + OS patches + AV + hardening + File system encryption + Vulnerability scanning CPE Access / Perimeter Aggregation & Distribution Backbone / Core L3 filtering, L3 DDoS mitigation L2 security (Firewall, AAA, device integrity) + URL filtering + IDS (Host/Network based) Device integrity + Route authentication + Stateful / stateless firewall + Crypto + L3 filtering + L3 DDoS mitigation + L3 spoof mitigation Device integrity + Route Authentication

14 What is Needed: IPv6 End-to-End Secure Communications IPv4 Site-to-Site secure communications Private address segments Branch A IPsec Node NAT Low security in the LAN segments Global address segments Secure Transmission IPv4 Internet IPsec R R Node Private address segments NAT Low interoperability between deferent vendors Branch B Global address segments Secure Transmission IPv6 End-to-End secure communications Branch A End-to-End secure communications R IPv6 Internet Secure Transmission Easy to set up new connection R R Branch B Partner company Friday, May 13, 2011 Alaa Al-Din Al-Radhi 14

15 Motivations for IP Layer Security 1. The Internet community has developed some applicationspecific security mechanisms: Kerberos for Client / Server authentication PGP, PEM or S/MIME for security SSL for secure web access 2. So, we need to provide security at IP layer: IPSec, with the following benefits: Implemented at IP layer, all traffic can be secured, NO matter what application. IPSec in a firewall can NOT be bypassed if the firewall is the only connection between intranet & extranet. Transparent to applications: NO changes on upper-layer software. Provide routing security. Friday, May 13, 2011 Alaa Al-Din Al-Radhi 15

16 IPv6: Header Structure Simple header with fixed length of 40 bytes 6 Optional extension headers when needed : 1. Hop-by-hop Option Header, 2. Routing Header, 3. Fragment Header, 4. Destination Options Header, 5. Authentication Header (AH), 6. Encapsulating Security Payload (ESP) header. Each extension header is identified by the Next Header field in the preceding header. Friday, May 13, 2011 Alaa Al-Din Al-Radhi 16

17 IPv6: Header Structure = 40 Bytes Upper Layer PDU Bytes = Jumbo Payload Upper Layer PDU Bytes Friday, May 13, 2011 Alaa Al-Din Al-Radhi 17

18 IPv6: Header Structure Hop-by-Hop = 0; UDP = 17; Encapsulated Header = 41; RSVP = 46; IPSEC Encapsulating Security Payload = 50 + Authentication Header = 51; ICMPv6 = 58; No Next Header = 59; Destination Options = 60; OSPFv3 = 98 Friday, May 13, 2011 Alaa Al-Din Al-Radhi 18

19 IPv6: Header Structure Benefits The checksum has been removed, because error checking is usually performed in link layer and transport layer protocols. Fragmentation has been relegated to an extension header, the minimum MTU has been increased to 1280 bytes, and fragmentation and reassembly are only performed by endpoints. Routers have to examine more than the 40-byte header only when the Next Header (NH) field is zero. The design also pays careful attention to alignment for 64-bit processors; for e.g., the addresses are aligned on 64-bit boundaries. The constant size of IPv6 headers makes the header length field found in IPv4 unnecessary. Routers & intermediate nodes handling the packets are NOT required to accommodate variability in the length of headers, which expedites packet handling. Friday, May 13, 2011 Alaa Al-Din Al-Radhi 19

20 IPv6: Some Quick Security Facts Hop limit & GTSM: Still valid security mechanisms against DOS attacks on local links Amplification attack (congestion & DoS): can be caused by a packet with a Routing Header containing multiple instances of the same address. It is Crucial to perform ingress filtering that prohibits the forwarding of packets with a Type 0 Routing Header NH functionality in IPv6 provides the foundation for enhanced services such as IPv6 security & mobility. Packets containing hop-by-hop extension headers must be analyzed at every node along the forwarding path Extension headers bring additional complexity (and performance degradation) for the purpose of traffic filtering Block mobility headers if IPv6 mobility is NOT being used by an organization Extension headers can also be used as a covert channel to hide communications between two systems, e.g., in Destination Options Friday, May 13, 2011 Alaa Al-Din Al-Radhi 20

21 IPv6 Defenses: What s New? Authentication & Encryption IPSec CGA Crypto Graphic Generator RFC 2401 RFC 2402 RFC 2406 RFC 2408 Secure Neighbor Discovery SEND ULA Unique Local Addresses Firewall Model Change Friday, May 13, 2011 Alaa Al-Din Al-Radhi 21

22 What is Needed: Secure Site to Site IPv6 Traffic over IPv4 & IPv6 Networks with IPSec Friday, May 13, 2011 Alaa Al-Din Al-Radhi 22

23 IPSec RFC 2401, RFC 2402 Components RFC 2406, RFC 2408, RFC2409 IPSec = 3 Main Protocols into a Cohesive Security Framework: Provides Framework for the Authenticating and Securing Data IP protocol 51 AH: Authentication Header: Provides Framework for the Negotiation of Security Parameters & Establishment of Authenticated Keys IKE: Internet Key Exchange Negotiation of SA characteristics Automatic key generation Automatic key refresh Manageable manual configuration Provides Framework for the Encrypting, Authenticating and Securing Data IP protocol 50 ESP: Encapsulating Security Payload: Friday, May 13, 2011 Alaa Al-Din Al-Radhi 23

24 IPSec Modes = Tunnel + Transport For Everything Else A new IP header is created in place of the original; this allows for encryption of entire original packet For End- To-End Session The ESP or AH header is inserted behind the IP header; The IP header can be authenticated but NOT encrypted Friday, May 13, 2011 Alaa Al-Din Al-Radhi 24

25 IPSec IPSec Services Service AH ESP (Encryption ONLY) ESP (Encryption + Authentication) Access Control Connectionless integrity Data origin authentication Reject replayed packets Payload confidentiality Traffic flow confidentiality Limited, due to limited amount of payload padding Friday, May 13, 2011 Alaa Al-Din Al-Radhi 25

26 SA (Security Association) Agreement between 2 entities on method to communicate securely IPSec SA is unidirectional 2-way communication consists of 2 SA s Destination Address Security Par. Index (SPI) IPSec Transform Key Additional SA Attributes (e.g., lifetime) Each SA is identified by: Security Parameters Index (SPI): 32-bit integer chosen by sender; enables receiving system to select the required SA. Destination Address: Only unicast IP addresses allowed! Security Protocol Identifier: AH or ESP. This information appears in the IP packet, so receiver knows how to behave A390BC1 AH, HMAC-MD5 7572CA49F Day or 100MB Friday, May 13, 2011 Alaa Al-Din Al-Radhi 26

27 IPSec IPSec Modes in SA AH ESP (Encryption ONLY) ESP ( Encryption + Authentication ) Transport Mode SA Authenticate IP payload & selected parts of IP header & IPv6 extension headers. Encrypt IP payload + any IPv6 extension headers after ESP header. Encrypt IP payload + any IPv6 extension headers after ESP header. Authenticate IP payload. Tunnel Mode SA Authenticate entire inner IP packet & selected parts of outer IP header & outer IPv6 extension headers. Encrypt inner IP packet. Encrypt & authenticate inner IP packet. Friday, May 13, 2011 Alaa Al-Din Al-Radhi 27

28 IPSec AH: Authentication & Integrity ESP: Encapsulating Security Payload Data confidentiality (encryption) Limited traffic flow confidentiality Data integrity Optional data origin authentication Anti-replay protection Does NOT protect IP header Friday, May 13, 2011 Alaa Al-Din Al-Radhi 28

29 IPSec AH: Authentication V4 vs. V6 V4 V6 Friday, May 13, 2011 Alaa Al-Din Al-Radhi 29

30 IPSec ESP: V4 vs. V6 V4 V6 Friday, May 13, 2011 Alaa Al-Din Al-Radhi 30

31 Phase1 Phase2 IPSec IKE (Internet Key Exchange) = Hybrid Protocol RFC 2409 IKE is a 2 Phase Protocol: Peers Negotiate a Secure, Authenticated Channel with Which to Communicate Main Mode or Aggressive Mode Accomplish a Phase I Exchange Security Associations Are Negotiated on Behalf of IPSec Services; Quick Mode Accomplishes a Phase 2 Exchange Friday, May 13, 2011 Alaa Al-Din Al-Radhi 31

32 How Does IKE Works? Phase1 Authentication Architecture Phase 2 Friday, May 13, 2011 Alaa Al-Din Al-Radhi 32

33 IPSec Components IKE 1 2 IKE Phase 1 IPSec Peer IPSec Peer Secure communication channel IKE Phase 2 3 IPSec Tunnel Terminology 4 Secured traffic exchange Data Integrity : Secure hashing (HMAC) is used to ensure NO data alteration in transit Data Confidentiality: Encr. is used to ensure data can NOT be intercepted by 3 rd party Data Origin Authentication: Authentication of the SA peer Anti-replay: Sequence numbers are used to detect & discard duplicate packets Hash Message Authentication Code (HMAC): A hash of the data & secret key used to provide message authenticity Diffie-Hellman Exchange: A shared secret key is established over an insecure path using public and private keys Friday, May 13, 2011 Alaa Al-Din Al-Radhi 33

34 IPSec Transforms An IPSec transform specifies either an AH or an ESP protocol and its corresponding algorithms and mode. IPSec Transforms Set A transform set is a combination of IPSec transforms that enact a security policy for traffic Up to 3 transforms can be in a set Sets are limited to up to 1 AH and up to 2 ESP transforms Friday, May 13, 2011 Alaa Al-Din Al-Radhi 34

35 5 Steps of IPSec Friday, May 13, 2011 Alaa Al-Din Al-Radhi 35

36 1 Inserting Traffic Access lists determine traffic to encrypt: Permit: traffic must be encrypted Deny: traffic sent unencrypted 2 5 Steps of IPSec: Authenticates IPSec peers Negotiates to protect IKE exchange Exchanges keys Establishes IKE SA IKE Phase One Friday, May 13, 2011 Alaa Al-Din Al-Radhi 36

37 3 IKE Phase Two Negotiates IPSec SA protected by an existing IKE SA Establishes IPSec SA Periodically renegotiates IPSec SAs to ensure security 5 Steps of IPSec: 4 IPSec Encrypted Tunnel Information is exchanged via IPSec tunnel. Packets are encrypted & decrypted. Uses encryption specified in IPSec SA. Friday, May 13, 2011 Alaa Al-Din Al-Radhi 37

38 5 Tunnel Termination Tunnel is terminated by: TCP session termination: SA lifetime timeout Packet counter exceeded Removes IPSec SA 5 Steps of IPSec: Friday, May 13, 2011 Alaa Al-Din Al-Radhi 38

39 CGA Cryptographically Generated Addresses (CGA) Each devices has a RSA key pair (NO need for certification) Ultra light check for validity Prevent spoofing a valid CGA address Friday, May 13, 2011 Alaa Al-Din Al-Radhi 39

40 SEND Secure Neighbor Discovery: Based on CGA A standard is to mitigate the ND attacks Certification paths: Anchored on trusted parties, expected to certify the authority of the routers on some prefixes Cryptographically Generated Addresses (CGA): IPv6 addresses whose interface identifiers are cryptographically generated RSA signature option: Protect all messages relating to neighbor & router discovery Timestamp and nonce options: Prevent replay attacks Friday, May 13, 2011 Alaa Al-Din Al-Radhi RFC

41 FW Model Change Distributed Firewalls A ONE point for routing & security policy Friday, May 13, 2011 Alaa Al-Din Al-Radhi 41

42 Common IPv4 & IPv6 Security Concerns Friday, May 13, 2011 Alaa Al-Din Al-Radhi 42

43 Friday, May 13, 2011 Alaa Al-Din Al-Radhi 43 DDoS Vulnerabilities, Threats and Targets

44 OSI Was Built to Allow Different Layers to Work Without the Knowledge of Each Other Unfortunately this means if one layer is hacked, communication are compromised without the other layers being aware of the problem Security is only as strong as the weakest link In networking: layer 2 can be a very weak link Lower Levels Affect Higher Levels Friday, May 13, 2011 Alaa Al-Din Al-Radhi 44

45 Attack Surfaces & layers Friday, May 13, 2011 Alaa Al-Din Al-Radhi 45

46 Common IPv4 & IPv6 Security Issues Denial of Service Attacks (DOS) Viruses & Worms Distribution Man-in-the-middle Attacks (MITM) Sniffing Fragmentation Attacks Application Layer Attacks An attempt to make a computer resource unavailable to its intended users. One common method involves flooding the target host with requests, thus preventing valid network traffic to reach the host Malicious code/programs can propagate themselves from one infected or compromised hosts to another. This distribution is aided by the small address space of IPv4 Without strong mutual authentication, any attacks utilizing MITM will have the same likelihood in IPv6 as in IPv4 IPv6 is NO less likely to fall victim to a sniffing attack than IPv4 This attack uses many small fragmented ICMP packets which when reassembled at the destination exceed the maximum allowable size for an IP datagram which can cause the victim host to crash, hang or even reboot The majority of vulnerabilities on the Internet today are at the application layer, something that IPSec will do NOTHING to prevent Friday, May 13, 2011 Alaa Al-Din Al-Radhi 46

47 On: Layer 1 Layer 2 Layer 3 Layers 4-7 Multiple Layers Misc. Threats Overview Briefing Wiretapping, console access, Rogue devices, VLAN hopping ; MAC, DHCP, ARP, Spoofing; IP Spoofing, DDoS, Routing, Smurf, Tunneling, Transition Viruses, Worms, Application, Rogue software, MITM Reconnaissance, Sniffing, unauthorized access Daily Probes & Attacks Top TCP & UDP Attacks Friday, May 13, 2011 Alaa Al-Din Al-Radhi 47

48 IPv6 Transition Threats Friday, May 13, 2011 Alaa Al-Din Al-Radhi 48

49 IPv4 to IPv6 Transition Landscape Challenges 16+ Transition Methods, possibly in combination Consider security for both protocols Resiliency (shared resources) Applications can be subject to attack on both IPv6 & IPv4 Host security controls should block & inspect traffic from both Bypass FW (protocol 41 or UDP) Can cause asymmetric traffic (hence breaking stateful firewalls) Dual Stack Tunnels Friday, May 13, 2011 Alaa Al-Din Al-Radhi 49

50 Example: L3-L4 Spoofing in IPv6 When Using IPv6 over IPv4 Tunnels Most IPv4 / IPv6 transitions have NO authentication built in => an IPv4 attacker can inject traffic if spoofing on IPv4 & IPv6 addresses Friday, May 13, 2011 Alaa Al-Din Al-Radhi 50

51 Example: ISATAP / 6to4 Tunnels Bypass ACL Friday, May 13, 2011 Alaa Al-Din Al-Radhi 51

52 Example: Transition Threats: e.g. ISATAP Unauthorized tunnels firewall bypass (protocol 41) IPv4 infrastructure looks like a Layer 2 network to ALL ISATAP hosts in the enterprise. This has implications on network segmentation & network discovery NO authentication in ISATAP & rogue routers are possible IPv6 addresses can be guessed based on IPv4 prefix Friday, May 13, 2011 Alaa Al-Din Al-Radhi 52

53 Example: Teredo Tunnels 1 Without Teredo: Controls Are in Place Friday, May 13, 2011 Alaa Al-Din Al-Radhi 53

54 Example: Teredo Tunnels 2 No More Outbound Control Friday, May 13, 2011 Alaa Al-Din Al-Radhi 54

55 Example: Teredo Tunnels 3 No More Inbound Control Friday, May 13, 2011 Alaa Al-Din Al-Radhi 55

56 L3 Spoofing in IPv6 urpf (Unicast Reverse Path Forwarding ) Remains the Primary Tool for Protecting Against L3 Spoofing (e.g.. DoS) Friday, May 13, 2011 Alaa Al-Din Al-Radhi 56

57 Transition Mechanism Threats Summary Dual Stack : Preferred BUT: Running dual stack will give you at least twice the number of vulnerabilities Tunnels (6to4, etc) can bypass firewall / security Tunneling mechanisms are susceptible to packet forgery and DDoS attacks Manual Tunnels : Preferred: Filter tunnel source / destination and use IPSec If spoofing, return traffic is not sent to attacker Dynamic Tunnels 6 to 4 Relay routers are open relays ISATAP potential MITM attacks Attackers can spoof source / destination IPv4 / IPv6 addresses Deny packets for transition techniques NOT in use: Deny IPv4 protocol 41 forwarding unless that is exactly what is intended unless using 6to4 tunneling Deny UDP 3544 forwarding unless you are using Teredo tunneling Friday, May 13, 2011 Alaa Al-Din Al-Radhi 57

58 Dual Stack Transition Threats Comparasion Tunneling 1) Dual-stack = Vulnerabilities of V4 + V6. 2) If a FW is NOT configured to apply the same level of screening to IPv6 packets as for IPv4 packets, the FW may let IPv6 pass through to dual-stack hosts L3-L4 Spoofing in IPv6 with 6to4 Tunneling The 3 main potential problems are: 1. 6 to 4 routers not being able to identify whether relays are legitimate 2. Wrong or impartially implemented 6to4 router or relay security checks 3. 6 to 4 architecture used to participate in DoS or reflected DoS, making attacks harder to trace Friday, May 13, 2011 Alaa Al-Din Al-Radhi 58

59 IPv6 Security Techies Friday, May 13, 2011 Alaa Al-Din Al-Radhi 59

60 IPv6 Security Building Blocks Endpoint protection Admission control Infection containment Intelligent correlation & incident response IPS & anomaly detection Application security & defense Protection Techniques Perimeter protections from the Internet and external entities Secure remote-site connectivity with Virtual Private Network (VPN) technologies Infrastructure protection measures to ensure a secure network foundation Server security to protect the critical IT assets and data Client security measures to mitigate the insider threat Friday, May 13, 2011 Alaa Al-Din Al-Radhi 60

61 1 IPv6 Security Plan Equipment configuration Perimeter defense (FW, ACL, IDPS) Content filtering Mail filtering Patch Management Vulnerability Management (scanning) Certification & Accreditation of the new systems AAA (Authentication, Authorization, & Accounting) Rogue Detection Infrastructure Protocol Security IPSec Friday, May 13, 2011 Alaa Al-Din Al-Radhi 61

62 Old Model Firewall Security World 2 New Model Core routers individually secured Every router accessible from outside Friday, May 13, 2011 Alaa Al-Din Al-Radhi Core routers secured Individually Routers generally NOT accessible from outside 62

63 2 Enforcing a Security Policy Example: Cisco IOS IPv6 ACL Friday, May 13, 2011 Alaa Al-Din Al-Radhi 63

64 2 Example: Basic IPv6 Packet Filtering Friday, May 13, 2011 Alaa Al-Din Al-Radhi 64

65 2 Example: IPv6 Firewall Feature Set Friday, May 13, 2011 Alaa Al-Din Al-Radhi 65

66 Old Model Router Security World 3 New Model Policy enforced at process level (, SNMP ACL, etc.) Some early features such as ingress ACL used when possible Central policy enforcement, prior to process level Granular protection schemes On high-end platforms, hardware implementations

67 3 Preventing Routing Header Attacks Use IPSec to secure protocols such as OSPFv3 & RIPng Apply same policy for IPv6 as for Ipv4: Block Routing Header type 0 Prevent processing at the intermediate nodes: no ipv6 source-route At the edge: With an ACL blocking routing header RFC 5095 RH0 is deprecated: By default Cisco Routers changed in IOS code version 12.4(15)T to ignore and drop RH0 IPv6 Routing Header An extension header, Processed by the listed intermediate routers 2 Types: Type 0: similar to IPv4 routing (multiple intermediate routers) Type 2: used for mobile IPv6

68 4 ICMPv6 & other related security implications ICMPv6 Essential to IPv6 & dual stack network functioning: It reports errors if packets can NOT be processed properly & sends informational messages about the status of network ICMPv4 vs. ICMPv6 => ICMP policy on FW needs to change Friday, May 13, 2011 Alaa Al-Din Al-Radhi 68

69 Generic ICMPv4 Border FW Policy 4 Equivalent ICMPv6 Friday, May 13, 2011 Alaa Al-Din Al-Radhi 69

70 Potential Additional ICMPv6 4 Friday, May 13, 2011 Alaa Al-Din Al-Radhi 70

71 ICMPv6 Neighbor Discovery If A needs the MAC of B, it sends an ICMP6 Neighbor Solicitation NS to All-Nodes multicast address B sees the request and responds to A with an ICMP6 Neighbor Advertisement NA with its MAC address => Like ARP But everybody can respond to the request Friday, May 13, 2011 Alaa Al-Din Al-Radhi 71

72 ICMPv6 Duplicate Address Detection (DAD) If A sets a new IP address, it makes the Duplicate Address Detection DAD check, to check if anybody uses the address already. Anybody can respond to the DAD checks => dos-new-ipv6 prevents new systems on the LAN Friday, May 13, 2011 Alaa Al-Din Al-Radhi 72

73 ICMPv6 Stateless Auto-Configuration Routers send periodic (& soliticated) Router Advertisements (RA) to the All-Nodes multicast address Clients configure their routing tables and network prefix from advertisements => Like a DHCP-light in IPv4 Anyone can send Router Advertisements! Friday, May 13, 2011 Alaa Al-Din Al-Radhi 73

74 4 ICMPv6 & other related security implications ICMPv6 Threats Rogue devices on the network giving misleading information or consuming resources (DoS) Rogue DHCPv6client and servers on the linklocal multicast address (FF02::1:2): same threat as IPv4 Rogue DHCPv6servers on the site-local multicast address (FF05::1:3): new threat in IPv6 Scanning possible if leased addresses are consecutive ICMPv6 Threats Mitigation Rogue clients & servers can be mitigated by using the authentication option in DHCPv6 Port ACL can block DHCPv6traffic from client ports deny udp any eq 547 any eq 546 Cisco Network Registrar DHCPv6 Server Leased addresses are random => scanning difficult Can also lease temporary addresses (like privacy extension) Friday, May 13, 2011 Alaa Al-Din Al-Radhi 74

75 5 A MUST: Good IPSec Policy H2H Scenarios IKE Phase 1 (ISAKMP): 3DES Lifetime SHA-1 DH Group 2 (MODP) IKE Phase 2 (IPSec): 3DES Lifetime SHA-1 PFS DH Group 2 (MODP) Friday, May 13, 2011 Alaa Al-Din Al-Radhi Scenario A Scenario B 75

76 5 Good IPSec Policy A MUST: IKE Phase 1 (ISAKMP): 3DES Lifetime SHA-1 DH Group 2 (MODP) IKE Phase 2 (IPSec): 3DES Lifetime SHA-1 PFS DH Group 2 (MODP) G2G Scenarios Scenario C Scenario D Friday, May 13, 2011 Alaa Al-Din Al-Radhi 76

77 5 Good IPSec Policy A MUST: IKE Phase 1 (ISAKMP): 3DES Lifetime SHA-1 DH Group 2 (MODP) IKE Phase 2 (IPSec): 3DES Lifetime SHA-1 PFS DH Group 2 (MODP) Scenario E H2G + G2H Scenario Friday, May 13, 2011 Alaa Al-Din Al-Radhi 77

78 6 Some IPv6 Security Tools Sniffers / Packet Capture Scanners Packet Forgers DoS Tools Snort Sun Solaris snoop COLD Wireshark Analyzer Windump WinPcap TCPdump IPv6 security scanner Halfscan6 Nmap Strobe Netcat Scapy6 Packit Spak6 SendIP 6tunneldos 4to6ddos Imps6-tools Friday, May 13, 2011 Alaa Al-Din Al-Radhi 78

79 6 Some IPv6 Security Tools Tool Alive6 PARSITE6 REDIR6 FAKE_ROUTER6 DETECT-NEW - IPv6 DOS-NEW - IPv6 SMURF6 RSMURF6 TOOBIG6 FAKE_MLD6 FAKE_MIPv6 SENDPEES6 Protocol Tester TCPdump Friday, May 13, 2011 Usage Find all local IPv6 systems, checks aliveness of remote systems ICMP Neighbor Spoofer for Man-In-The-Middle attacks Redirect traffic to your system on a LAN Fake a router, implant routes, become the default router, Detect new IPv6 systems on the LAN, automatically launch a script Denial any new IPv6 system access on the LAN (DAD Spoofing) Local Smurf Tool (attack you own LAN) Remote Smurf Tool (attack a remote LAN) Reduce the MTU of a target Play around with Multicast Listener Discovery Reports Reroute mobile IPv6 nodes where you want them if no IPSEC is required Neighbor solicitations with lots of CGAs Various tests Dumps traffic on IPv6 Networks Alaa Al-Din Al-Radhi 79

80 6 Some IPv6 Security Tools Tool IPTrap AESOP Netstat SendIP COLD Friday, May 13, 2011 Usage Listens to several TCP ports to simulate fake services (X11, Netbios, DNS, etc). When a remote client connects to one of these ports, his IP gets immediately firewalled & an alert is logged. It runs with iptables and ipchains, but any external script can also be launched. IPv6 is supported A TCP-proxy that supports many advanced and powerful features. Aesop makes use of strong cryptography for all its data-transmission up to the end-link. Another powerful feature of Aesop is that Aesop proxies can be transparently stacked into a secure chain. Aesop supports IPv6 and can be used as secure IPv4-to-IPv6 tunnel for TCP connections. Aesop is implemented using multiplexing and is therefore fast and lightweight Displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IPv4 routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), the IPv6 routing table, & IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, & UDP over IPv6) For sending arbitrary IP packets Is a network monitoring & protocol analyzing tool which allows to study, maintain & troubleshoot networks by extracting flowing data & printing out the contents & structure. Alaa Al-Din Al-Radhi 80

81 Tool Nmap CH Scanner Hyenae 6 Some IPv6 Security Tools Usage The command syntax is the same for V4 except that you also add the -6 option. Also, in order to perform an IPv6 scan, both the source (your host) & the target of the scan must be configured for IPv6. It must have an IPv6 address & routing information. And, one must use IPv6 syntax if specifying an address rather than a hostname. An address might look like -> 3ffe:7501:4819:2000:210:f3ff:fe03:14d0, so hostnames are recommended. If your ISP (like most of them) does not allocate IPv6 addresses, free tunnel brokers are widely available and work fine with Nmap. For e.g., the free IPv6 tunnel broker service at 6to4 tunnels are another popular, free approach. The scan O/P looks the same as with IPv4, with IPv6 address on an interesting ports line being the only showed away. An ARP, IPv4 & IPv6 network scanner with 31 scan methods: it scans for open ports, protocols, NetBIOS information & Windows shares, SNMP information, & WMI (WBEM) information. It also has the ability to turn on (using Wake-On-LAN) & to shutdown or reboot a remote Windows host. Features an automatic (scriptable) working mode, a hunt mode, a passive mode &normal scanning mode. It allows you to reproduce low level Ethernet attack scenarios (such as MITM, & DDoS) to reveal the potential security vulnerabilities in a network. Friday, May 13, 2011 Alaa Al-Din Al-Radhi 81

82 6 Some IPv6 Security Tools Tool Alive6 Usage Find all local IPv6 systems & checks aliveness of remote systems For Local / Remote unicast targets, & local multicast addresses Sends three different type of packets: ICMP6 Echo Request IP6 packet with unknown header IP6 packet with unknown hop-by-hop option Routing header attack, (like IPv4 Source Routing): Use alive6 for checking if routing headers are allowed to target 1. Check if your ISP does ingress filtering: Send a packet from yourself to yourself via a remote system: alive6 eth0 YOUR-IP VICTIM-IP 2. Find all servers in the world for an anycast address: Send packets to an anycast address via several remote systems: - alive6 eth0 AnyCastAddr VICTIM-IP1; - alive6 eth0 AnyCastAddr VICTIM-IP2; etc. Friday, May 13, 2011 Alaa Al-Din Al-Radhi 82

83 Tool 6 Some IPv6 Security Tools Usage REDIR6 Redirect traffic to your system on a LAN Route Implanting with ICMP6 Redirects 1. (A)ttacker sends Echo Request: Source: (T)arget, Destination: (V)ictim 2. (V)ictim received Echo Request, and send a Reply to (T) 3. (A)ttacker crafts Redirect, Source: (R)outer, Destination: (V)ictim, redirects all traffic for (T) to (A) Friday, May 13, 2011 Alaa Al-Din Al-Radhi 83

84 6 Some IPv6 Security Tools Tool FAKE_ MIPv6 Usage Reroute mobile IPv6 nodes where you want them if no IPSEC is required Protocol specification is secure L because IPSEC is mandatory All implementations have the option to disable IPSEC requirement If this is the done, use fake_mipv6 to redirec traffic for any mobile IPv6 node to a destination of your choice Tool Usage SMURF6 Local Smurf Tool (attack you own LAN) Source is target, destination is local multicast Address Generates lots of local traffic that is sent to source Tool Usage RSMURF6 Remote Smurf Tool (attack a remote LAN) Source is local All-Nodes multicast address, destination is our target If target has mis-implemented IPv6, it responds with an Echo Reply to the All- Nodes multicast address Friday, May 13, 2011 Alaa Al-Din Al-Radhi 84

85 7 Some IPSec Tools Tool Usage Publisher IPSec Assists Network admin. with troubleshooting network Diagnostic related failures; Applicable on Windows XP, Windows Tool 1.0 Server 2003, Windows Vista & Windows Server IP A client for Mac OS X. It supports virtually every available Securitas IPSec compliant firewall, allowing you to Connect safely 3.3 IPSec Scan 1.1 IPSec VPN Client IPSec-Tools to your office or home network from any location Scans either a single IP address or a range of IP addresses looking for systems that are IPSec enabled Compliant with most of popular VPN gateways allowing fast integration in existing networks. Full IPSec standards, full IKE NAT Traversal, IP address emulation, strong encryption (X509, AES...), strong authentication mechanisms, high performances, no system overhead, DNS and WINS resolutions supported, operates as a Service, allowing the use on unattended Servers, accepts incoming IPSec Tunnels, optional 'IPSec only' traffic filtering. A port of KAME's IPSec utilities to the Linux-2.6 IPSec implementation. It supports NetBSD and FreeBSD as well Friday, May 13, 2011 Alaa Al-Din Al-Radhi 85

86 IPv6 Security Road-Map & How-To Wrap-up Friday, May 13, 2011 Alaa Al-Din Al-Radhi 86

87 IPv6 is NO more secure than IPv4 if we do NOT :: Gap the IPv6 Security-Perspectives knowledge: Training! Have an understood & enforced IPv6 Security Plan Configure Security Parameters (i.e. NOT implementing Security ONLY) Allow for full IPSec + Use IPSec to secure OSPFv3 & RIPng Ingress / Egress IPv6 the perimeter Use manual tunnels instead of dynamic tunnels Program Routers / Switches to Disable IPv6 Tunnels Filter internal-use IPv6 at the enterprise border routers Filter ICMP & Determine which ICMPv6 messages are required Use IPv6 Network Protection Tools & Enable IPv6 IDS / IPS Drop all fragments with less than 1280 octets Use cryptographic protections where critical Use static neighbor entries for critical systems Use IPv6 hop limits to protect network devices Separate Routing Registry for IPv4 and IPv6 Friday, May 13, 2011 Alaa Al-Din Al-Radhi 87

88 IPv6 Security Issues To Be Kept In Mind! OSI Layers & IPv6 Security Issues Friday, May 13, 2011 Alaa Al-Din Al-Radhi 88

89 IPv6 Security Issues To Be Kept In Mind! IPv6 Defenses Defense SEND: Secure Neighbor Discovery CGA: Crypto- Generated Address ULAs: Unique Local Addresses IPSec Used For a security extension of the Neighbor Discovery Protocol (NDP) in IPv6. NDP replaces IPv4 ARP and is responsible for discovery of other nodes on the link, determining the link layer addresses of other nodes, finding available routers, and maintaining reachability information about the paths to other active neighbor nodes. A method for binding a public signature key to an IPv6 address in the Secure Neighbor Discovery Protocol (SEND). An IPv6 address in the block fc00::/7 defined in RFC They are supposed to be used for systems that are NOT connected to the Internet. IPSec with Authentication Header (AH) & Encrypted Security Payload (ESP) can protect IPv6 hosts from all kinds of DoS attacks & have the ability to recognize the spoofed source address (or original identity) of the malicious packets received. IPSec also able to protect the IPv6 hosts from DDoS attacks with the spoofed address. Friday, May 13, 2011 Alaa Al-Din Al-Radhi 89

90 A MUST: A MUST: IPv6 FW Policies Avoid IPv6 Tunneling 6 to 4 does NOT support source address filtering Teredo = holes into the NAT device Any Tunneling-Mechanism may be prone to spoofing With any Tunneling- Mechanism you trust the relay-servers. Do NOT just use your IPv4 FW for IPv6 rules Do NOT just allow IPSec or IPv4 Protocol 41 through FW On networks that are IPv4-only, block all IPv6 traffic Procure FW for IPv6 policy Look for vendor support of Extension Headers FW should have granular filtering of ICMPv6 & multicast Layer-2 FW are trickier with IPv6 because of ICMPv6 ND / NS / RA / RS messages Friday, May 13, 2011 Alaa Al-Din Al-Radhi 90

91 Some IPv6 Security Recommendations 1 If NOT deploying IPv6 Completely: 1. Block all IPv6 traffic, native & organization's FW. Both incoming & outgoing traffic should be blocked. 2. Disable all IPv6-compatible ports, protocols & services on all software and hardware. 3. Begin to acquire familiarity and expertise with IPv6, through laboratory experimentation &/or limited pilot deployments. 4. Make organization web servers, located outside of the organizational FW, accessible via IPv6 connections. This will enable IPv6-only users to access the servers & aid organization in acquiring familiarity with some aspects of IPv6 deployment. Friday, May 13, 2011 Alaa Al-Din Al-Radhi 91

92 Some IPv6 Security Recommendations 2 If deploying IPv6 : Apply an appropriate mix of different types of IPv6 addressing (privacy addressing, ULA, etc) to limit access & knowledge of IPv6-addressed environments. Leverage IPSec to secure IPv6 when suitable Use automated address management tools to avoid manual entry of IPv6 addresses, which is prone to error because of their length. Develop ICMPv6 filtering policy. Ensure that ICMPv6 messages that are essential to IPv6 operation are allowed, but others are blocked Use IPSec to authenticate & provide confidentiality to critical assets Enable controls that might not have been used in IPv4 due to a lower threat level during initial deployment (implementing default deny access control policies, implementing routing protocol security, etc). Pay close attention to the security aspects of transition (tunneling, etc) Ensure that IPv6routers, packet filters, firewalls, and tunnel endpoints enforce multicast scope boundaries and make sure that Multicast Listener Discovery (MLD) packets are not inappropriately routable Friday, May 13, 2011 Alaa Al-Din Al-Radhi 92

93 Some IPv6 Simple Best Security Practices Always null route unused address space within your network: If you have prefixes you know are unused, route them towards null0 on your routers. Enable port security & limit the number of MACs on customer ports Always filter ingress traffic from customers with urpf or ACLs Authenticate All of your network protocols ALWAYS ENCRYPT YOUR MANAGEMENT TRAFFIC! Filter BGP sessions ingress and egress Set maximum-prefix/prefix-limit on BGP sessions (including customers, transits, and peers) Give high priority to network control traffic Ideally, have an out-of-band management path to all POPs. Restrict DHCP & Router Advertisements on customer ports Separate customers into separate VLANs if you can Monitor critical network element resources, e.g. memory, bandwidth, etc Keep Patching up-to-date Have a security plan that includes incident management processes: Identify who, what, and how; Practice and test the plan; Make sure you know how to reach your peers and transit providers, and how their security plans work! Friday, May 13, 2011 Alaa Al-Din Al-Radhi 93

94 Check IPv6-Ready Compliance Requirements 1 IPv6 Compliance Network Security: Firewalls, IDS, IPS, etc Mandatory RFC Support Standard IPv6 Basic specification 2460 IPv6 Addressing Architecture 4291 Default Address Selection 3484 ICMPv SLAAC 4862 Router-Alert option 2711 Path MTU Discovery 1981 Neighbor Discovery 4861 BGP4 protocol 4760 OSPF-v RIPng 2080 IS-IS 5308 Support for QoS 3140 Basic Transition Mechanisms for IPv6 Hosts and 4213 Routers Using IPsec to Secure IPv6-in-IPv4 Tunnels 4891 Friday, May 13, 2011 Alaa Al-Din Al-Radhi 94

95 IPv6 Compliance Router / Layer 3 Switch Check IPv6-Ready Compliance Requirements 2 Mandatory Support RFC Standard IPv6 Basic specification 2460 IPv6 Addressing Architecture 4291 Default Address Selection 3484 ICMPv SLAAC 4862 MLDv2 snooping 4541 Router-Alert option 2711 Path MTU Discovery 1981 Neighbor Discovery 4861 Classless Inter-domain Routing 4632 Dynamic Internal Guidance Protocol (IGP) RIPng 2080 OSPF-v IS-IS 5308 BGP Support for QoS 3140 Basic Transition Mechanisms for IPv6 Hosts and Routers 4213 Using IPsec to Secure IPv6-in-IPv4 tunnels 4891 Generic Packet Tunneling and IPv Mobile IPv6 (MIPv6) 4877 MPLS functionality 4798 Layer-3 VPN functionality 4659 MPLS Traffic Engineering 5120 Friday, May 13, 2011 Alaa Al-Din Al-Radhi 95

96 Check IPv6-Ready Compliance Requirements 3 IPv6 Compliance Host: Client / Server Mandatory Support RFC Standard IPv6 Basic specification 2460 IPv6 Addressing Architecture 4291 Default Address Selection 3484 ICMPv DHCPv6 client 3315 SLAAC 4862 Path MTU Discovery 1981 Neighbor Discovery 4861 Basic Transition Mechanisms for IPv6 Hosts and Routers 4213 IPsec-v IKE version 2 (IKEv2) 4718 Mobile IPv6 (MIPv6) 4877 DNS protocol extensions for incorporating IPv6 DNS resource records 3596 DNS message extension mechanism 2671 DNS message size requirements 3226 Friday, May 13, 2011 Alaa Al-Din Al-Radhi 96

97 Check IPv6-Ready Compliance Requirements 4 IPv6 Compliance Mandatory Support RFC Standard MLDv2 snooping 4541 DHCPv6 snooping 3315 Layer 2 Switch Router Advertisement (RA) filtering 5006 Dynamic "IPv6 NA / NS inspection 4861 Neighbor Un-Reachability Detection NUD 4861 IPv6 support in software Duplicate Address Detection 4429 All software must support IPv4 and IPv6 and be able to communicate over both types of Networks. If software includes network parameters in its local or remote server settings, it should also support configuration of IPv6 parameters. Functional differences must not be significantly different between IPv4 and IPv6. The user should not experience any significant difference when software is communicating over IPv4 or IPv6. Friday, May 13, 2011 Alaa Al-Din Al-Radhi 97

98

99 So: Is IPv6 more secure? Yes & No! Yes: NO: IPSec (Authentication + Encryption) Secure Neighbor Discovery (SEND) Crypto-generated Address (CGA) Unique Local Addresses (ULAs) Privacy Addresses Automated Tunneling Neighbor Discovery & Auto-Configuration End-To-End-Model Newness & Complexity Lack of Guidance, Policy & Training Tools Using Friday, May 13, 2011 Alaa Al-Din Al-Radhi 99

100 Friday, May 13, 2011 Alaa Al-Din Al-Radhi 100

101 IPv6 Security Issues Are Evolving & In Continous Progress Stay Tuned! Friday, May 13, 2011 Alaa Al-Din Al-Radhi 101

IPv6 Security. Rocky Mountain IPv6 Summit. Scott Hogg. GTRI - Director of Advanced Technology Services CCIE #5133, CISSP #4610

IPv6 Security. Rocky Mountain IPv6 Summit. Scott Hogg. GTRI - Director of Advanced Technology Services CCIE #5133, CISSP #4610 Rocky Mountain IPv6 Summit IPv6 Security Scott Hogg GTRI - Director of Advanced Technology Services CCIE #5133, CISSP #4610 1 IPv6 Security We will all migrate to IPv6 eventually, but when and how remain

More information

IPv6 Security Considerations: Future Challenges

IPv6 Security Considerations: Future Challenges IPv6 Security Considerations: Future Challenges Prof. Sukumar Nandi Company LOGO Dept of Computer Sc. & Engg. Indian Institute of Technology Guwahati Agenda Outline Motivation for IPv6 Brief comparision

More information

IPv6- IPv4 Threat Comparison v1.0. Darrin Miller Sean Convery

IPv6- IPv4 Threat Comparison v1.0. Darrin Miller Sean Convery IPv6- IPv4 Threat Comparison v1.0 Darrin Miller dmiller@cisco.com Sean Convery sean@cisco.com Motivations Discussions around IPv6 security have centered on IPsec Though IPsec is mandatory in IPv6, the

More information

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

ETSF05/ETSF10 Internet Protocols Network Layer Protocols ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address

More information

Remember Extension Headers?

Remember Extension Headers? IPv6 Security 1 Remember Extension Headers? IPv6 allows an optional Extension Header in between the IPv6 header and upper layer header Allows adding new features to IPv6 protocol without major re-engineering

More information

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Int ernet w orking Internet Security Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Internet Security Internet security is difficult Internet protocols were not originally designed for security The

More information

IPv6 Security. IPv6 Training Day 18 th September 2012 Philip Smith APNIC

IPv6 Security. IPv6 Training Day 18 th September 2012 Philip Smith APNIC IPv6 Security IPv6 Training Day 18 th September 2012 Philip Smith APNIC 1 Before we begin p Enabling IPv6 on any device means that: The device is accessible by IPv6 Interface filters and firewall rules

More information

CSCE 715: Network Systems Security

CSCE 715: Network Systems Security CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina Security in Network Layer Implementing security in application layer provides flexibility in security

More information

Virtual Private Network

Virtual Private Network VPN and IPsec Virtual Private Network Creates a secure tunnel over a public network Client to firewall Router to router Firewall to firewall Uses the Internet as the public backbone to access a secure

More information

IPv6 Security Fundamentals

IPv6 Security Fundamentals IPv6 Security Fundamentals UK IPv6 Council January 2018 Dr David Holder CEng FIET MIEEE david.holder@erion.co.uk IPv6 Security Fundamentals Common Misconceptions about IPv6 Security IPv6 Threats and Vulnerabilities

More information

IPv6 Security. David Kelsey (STFC-RAL) IPv6 workshop pre-gdb, CERN 7 June 2016

IPv6 Security. David Kelsey (STFC-RAL) IPv6 workshop pre-gdb, CERN 7 June 2016 IPv6 Security David Kelsey (STFC-RAL) IPv6 workshop pre-gdb, CERN 7 June 2016 Outline MORE MATERIAL HERE THAN TIME TO PRESENT & DISCUSS (BUT SLIDES AVAILABLE FOR LATER REFERENCE) IPv6 security & threats

More information

Insights on IPv6 Security

Insights on IPv6 Security Insights on IPv6 Security Bilal Al Sabbagh, MSc, CISSP, CISA, CCSP Senior Information & Network Security Consultant NXme FZ-LLC Information Security Researcher, PhD Candidate Stockholm University bilal@nxme.net

More information

IPv6 Security János Mohácsi IPv6 workshop, Skopje June 2011

IPv6 Security János Mohácsi IPv6 workshop, Skopje June 2011 János Mohácsi IPv6 workshop, Skopje 29-30 June 2011 1 Copy Rights This slide set is the ownership of the 6DEPLOY project via its partners The Powerpoint version of this material may be reused and modified

More information

Security Considerations for IPv6 Networks. Yannis Nikolopoulos

Security Considerations for IPv6 Networks. Yannis Nikolopoulos Security Considerations for IPv6 Networks Yannis Nikolopoulos yanodd@otenet.gr Ημερίδα Ενημέρωσης Χρηστών για την Τεχνολογία IPv6 - Αθήνα, 25 Μαίου 2011 Agenda Introduction Major Features in IPv6 IPv6

More information

Sample excerpt. Virtual Private Networks. Contents

Sample excerpt. Virtual Private Networks. Contents Contents Overview...................................................... 7-3.................................................... 7-5 Overview of...................................... 7-5 IPsec Headers...........................................

More information

Recent advances in IPv6 insecurities reloaded Marc van Hauser Heuse GOVCERT NL Marc Heuse

Recent advances in IPv6 insecurities reloaded Marc van Hauser Heuse GOVCERT NL Marc Heuse Recent advances in IPv6 insecurities reloaded Marc van Hauser Heuse GOVCERT NL 2011 2011 Marc Heuse Hello, my name is Basics Philosophy Vulnerabilities Vendor Responses & Failures Recommendations

More information

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 27. Firewalls and Virtual Private Networks Paul Krzyzanowski Rutgers University Fall 2013 November 25, 2013 2013 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive

More information

CSC 4900 Computer Networks: Security Protocols (2)

CSC 4900 Computer Networks: Security Protocols (2) CSC 4900 Computer Networks: Security Protocols (2) Professor Henry Carter Fall 2017 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message Integrity 8.4 End point Authentication

More information

IP Security. Have a range of application specific security mechanisms

IP Security. Have a range of application specific security mechanisms IP Security IP Security Have a range of application specific security mechanisms eg. S/MIME, PGP, Kerberos, SSL/HTTPS However there are security concerns that cut across protocol layers Would like security

More information

IPv6 Security (Theory vs Practice) APRICOT 14 Manila, Philippines. Merike Kaeo

IPv6 Security (Theory vs Practice) APRICOT 14 Manila, Philippines. Merike Kaeo IPv6 Security (Theory vs Practice) APRICOT 14 Manila, Philippines Merike Kaeo merike@doubleshotsecurity.com Current IPv6 Deployments Don t break existing IPv4 network Securing IPv6 Can t secure something

More information

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005 Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks

More information

Certified Penetration Testing Consultant

Certified Penetration Testing Consultant Certified Penetration Testing Consultant Duration: 4 Days Language: English Course Delivery: Classroom COURSE BENEFITS The vendor neutral Certified Penetration Testing Consultant course is designed for

More information

Rocky Mountain ISSA Chapter April 5, IPv6 Security. Scott Hogg. Director of Advanced Technology Services - GTRI CCIE #5133, CISSP #4610

Rocky Mountain ISSA Chapter April 5, IPv6 Security. Scott Hogg. Director of Advanced Technology Services - GTRI CCIE #5133, CISSP #4610 Rocky Mountain ISSA Chapter April 5, 2007 IPv6 Security Scott Hogg Director of Advanced Technology Services - GTRI CCIE #5133, CISSP #4610 Agenda IPv6 Threats Reconnaissance LAN Threats ICMPv6 Threats

More information

Foreword xxiii Preface xxvii IPv6 Rationale and Features

Foreword xxiii Preface xxvii IPv6 Rationale and Features Contents Foreword Preface xxiii xxvii 1 IPv6 Rationale and Features 1 1.1 Internet Growth 1 1.1.1 IPv4 Addressing 1 1.1.2 IPv4 Address Space Utilization 3 1.1.3 Network Address Translation 5 1.1.4 HTTP

More information

Firepower Threat Defense Site-to-site VPNs

Firepower Threat Defense Site-to-site VPNs About, on page 1 Managing, on page 3 Configuring, on page 3 Monitoring Firepower Threat Defense VPNs, on page 11 About Firepower Threat Defense site-to-site VPN supports the following features: Both IPsec

More information

SECURE ROUTER DISCOVERY MECHANISM TO OVERCOME MAN-IN THE MIDDLE ATTACK IN IPV6 NETWORK

SECURE ROUTER DISCOVERY MECHANISM TO OVERCOME MAN-IN THE MIDDLE ATTACK IN IPV6 NETWORK 1 SECURE ROUTER DISCOVERY MECHANISM TO OVERCOME MAN-IN THE MIDDLE ATTACK IN IPV6 NETWORK Navaneethan C. Arjuman nava@nav6.usm.my National Advanced IPv6 Centre, Universiti Sains Malaysia March 2018 Copyright

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2.

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2. P2 Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE 802.11i, IEEE 802.1X P2.2 IP Security IPsec transport mode (host-to-host), ESP and

More information

Cryptography and Network Security. Sixth Edition by William Stallings

Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings Chapter 20 IP Security If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death, together with

More information

VPN Overview. VPN Types

VPN Overview. VPN Types VPN Types A virtual private network (VPN) connection establishes a secure tunnel between endpoints over a public network such as the Internet. This chapter applies to Site-to-site VPNs on Firepower Threat

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

IPv6 Security Vendor Point of View. Eric Vyncke, Distinguished Engineer Cisco, CTO/Consulting Engineering

IPv6 Security Vendor Point of View. Eric Vyncke, Distinguished Engineer Cisco, CTO/Consulting Engineering IPv6 Security Vendor Point of View Eric Vyncke, evyncke@cisco.com Distinguished Engineer Cisco, CTO/Consulting Engineering 1 ARP Spoofing is now NDP Spoofing: Threats ARP is replaced by Neighbor Discovery

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

A Border Gateway Protocol 3 (BGP-3) DNS Extensions to Support IP version 6. Path MTU Discovery for IP version 6

A Border Gateway Protocol 3 (BGP-3) DNS Extensions to Support IP version 6. Path MTU Discovery for IP version 6 IPv6 Standards and RFC 1195 Use of OSI IS-IS for Routing in TCP/IP and Dual Environments RFC 1267 A Border Gateway Protocol 3 (BGP-3) RFC 1305 Network Time Protocol (Version 3) Specification, Implementation

More information

IPSec. Overview. Overview. Levente Buttyán

IPSec. Overview. Overview. Levente Buttyán IPSec - brief overview - security associations (SAs) - Authentication Header (AH) protocol - Encapsulated Security Payload () protocol - combining SAs (examples) Overview Overview IPSec is an Internet

More information

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for

More information

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats Internetwork Expert s CCNA Security Bootcamp Common Security Threats http:// Today s s Network Security Challenge The goal of the network is to provide high availability and easy access to data to meet

More information

CSC 6575: Internet Security Fall 2017

CSC 6575: Internet Security Fall 2017 CSC 6575: Internet Security Fall 2017 Network Security Devices IP Security Mohammad Ashiqur Rahman Department of Computer Science College of Engineering Tennessee Tech University 2 IPSec Agenda Architecture

More information

Internet Protocol, Version 6

Internet Protocol, Version 6 Outline Protocol, Version 6 () Introduction to Header Format Addressing Model ICMPv6 Neighbor Discovery Transition from to vs. Taken from:chun-chuan Yang Basics: TCP/ Protocol Suite Protocol (IP) Features:

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

Chapter 5. Security Components and Considerations.

Chapter 5. Security Components and Considerations. Chapter 5. Security Components and Considerations. Technology Brief Virtualization and Cloud Security Virtualization concept is taking major portion in current Data Center environments in order to reduce

More information

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1 IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service

More information

Configuring IPv6 First-Hop Security

Configuring IPv6 First-Hop Security This chapter describes the IPv6 First-Hop Security features. This chapter includes the following sections: Finding Feature Information, on page 1 Introduction to First-Hop Security, on page 1 RA Guard,

More information

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Chapter 16 IP Security If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death,

More information

Cisco IOS IPv6. Cisco IOS IPv6 IPv6 IPv6 service provider IPv6. IPv6. data link IPv6 Cisco IOS IPv6. IPv6

Cisco IOS IPv6. Cisco IOS IPv6 IPv6 IPv6 service provider IPv6. IPv6. data link IPv6 Cisco IOS IPv6. IPv6 IP6FD v6 Fundamentals, Design, and Deployment v3.0 Cisco IOS IPv6 Cisco IOS IPv6 IPv6 IPv6 service provider IPv6 IP IPv6 IPv6 data link IPv6 Cisco IOS IPv6 IPv6 IPv6 DHCP DNS DHCP DNS IPv6 IPv4 IPv6 multicast

More information

Insights on IPv6 Security

Insights on IPv6 Security Insights on IPv6 Security Bilal Al Sabbagh, MSc, CISSP, CCSP Senior Information & Network Security Consultant - NXme Information Security Researcher Stockholm University 10/9/10 NXme FZ-LLC 1 NIXU Middle

More information

IKE and Load Balancing

IKE and Load Balancing Configure IKE, page 1 Configure IPsec, page 9 Load Balancing, page 22 Configure IKE IKE, also called ISAKMP, is the negotiation protocol that lets two hosts agree on how to build an IPsec security association.

More information

IPv6 Security Course Preview RIPE 76

IPv6 Security Course Preview RIPE 76 IPv6 Security Course Preview RIPE 76 Alvaro Vives - Marseille - 14 May 2018 Overview IPv6 Security Myths Basic IPv6 Protocol Security (Extension Headers, Addressing) IPv6 Associated Protocols Security

More information

Network Security. Thierry Sans

Network Security. Thierry Sans Network Security Thierry Sans HTTP SMTP DNS BGP The Protocol Stack Application TCP UDP Transport IPv4 IPv6 ICMP Network ARP Link Ethernet WiFi The attacker is capable of confidentiality integrity availability

More information

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved. Worldwide Education Services

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved.  Worldwide Education Services Junos Security Chapter 8: IPsec VPNs 2012 Juniper Networks, Inc. All rights reserved. www.juniper.net Worldwide Education Services Chapter Objectives After successfully completing this chapter, you will

More information

Configuring IPv6 basics

Configuring IPv6 basics Contents Configuring IPv6 basics 1 IPv6 overview 1 IPv6 features 1 IPv6 addresses 2 IPv6 neighbor discovery protocol 5 IPv6 PMTU discovery 8 IPv6 transition technologies 8 Protocols and standards 9 IPv6

More information

Network Encryption 3 4/20/17

Network Encryption 3 4/20/17 The Network Layer Network Encryption 3 CSC362, Information Security most of the security mechanisms we have surveyed were developed for application- specific needs electronic mail: PGP, S/MIME client/server

More information

Virtual Private Networks

Virtual Private Networks EN-2000 Reference Manual Document 8 Virtual Private Networks O ne of the principal features of routers is their support of virtual private networks (VPNs). This document discusses transmission security,

More information

IPv6 Bootcamp Course (5 Days)

IPv6 Bootcamp Course (5 Days) IPv6 Bootcamp Course (5 Days) Course Description: This intermediate - advanced, hands-on course covers pertinent topics needed for IPv6 migration and deployment strategies. IPv6 novices can expect to gain

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

More information

TCP/IP Protocol Suite

TCP/IP Protocol Suite TCP/IP Protocol Suite Computer Networks Lecture 5 http://goo.gl/pze5o8 TCP/IP Network protocols used in the Internet also used in today's intranets TCP layer 4 protocol Together with UDP IP - layer 3 protocol

More information

IPv Implementation - The Naked Truth. Dr. Omar Amer Abouabdalla IPv6 Global Sdn. Bhd.

IPv Implementation - The Naked Truth. Dr. Omar Amer Abouabdalla IPv6 Global Sdn. Bhd. IPv Implementation - The Naked Truth By Dr. Omar Amer Abouabdalla IPv6 Global Sdn. Bhd. omar@ipv6global.my Things to Connect to Internet Why IPv6??? No more room in IPv4 Quite empty in IPv6 IPv6 Implementation

More information

IPv6 Security. Pedro Lorga - WALC 2006 (Quito, Ecuador July 06)

IPv6 Security. Pedro Lorga - WALC 2006 (Quito, Ecuador July 06) IPv6 Security Pedro Lorga - lorga@fccn.pt 1 Copy Rights This slide set is the ownership of the 6DISS project via its partners The Powerpoint version of this material may be reused and modified only with

More information

Network Security CSN11111

Network Security CSN11111 Network Security CSN11111 VPN part 2 12/11/2010 r.ludwiniak@napier.ac.uk Five Steps of IPSec Step 1 - Interesting Traffic Host A Router A Router B Host B 10.0.1.3 10.0.2.3 Apply IPSec Discard Bypass IPSec

More information

IPV6 SIMPLE SECURITY CAPABILITIES.

IPV6 SIMPLE SECURITY CAPABILITIES. IPV6 SIMPLE SECURITY CAPABILITIES. 50 issues from RFC 6092 edited by J. Woodyatt, Apple Presentation by Olle E. Johansson, Edvina AB. ABSTRACT The RFC which this presentation is based upon is focused on

More information

IPv6 Transition Mechanisms

IPv6 Transition Mechanisms IPv6 Transition Mechanisms Petr Grygárek rek 1 IPv6 and IPv4 Coexistence Expected to co-exist together for many years Some IPv4 devices may exist forever Slow(?) transition of (part of?) networks to IPv6

More information

Network Security - ISA 656 IPsec IPsec Key Management (IKE)

Network Security - ISA 656 IPsec IPsec Key Management (IKE) Network Security - ISA 656 IPsec IPsec (IKE) Angelos Stavrou September 28, 2008 What is IPsec, and Why? What is IPsec, and Why? History IPsec Structure Packet Layout Header (AH) AH Layout Encapsulating

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

IPv6 Protocol. Does it solve all the security problems of IPv4? Franjo Majstor EMEA Consulting Engineer Cisco Systems, Inc.

IPv6 Protocol. Does it solve all the security problems of IPv4? Franjo Majstor EMEA Consulting Engineer Cisco Systems, Inc. IPv6 Protocol Does it solve all the security problems of IPv4? Franjo Majstor EMEA Consulting Engineer fmajstor@cisco.com Cisco Systems, Inc. 1 Agenda IPv6 Primer IPv6 Protocol Security Dual stack approach

More information

Introduction to IPv6 - II

Introduction to IPv6 - II Introduction to IPv6 - II Building your IPv6 network Alvaro Vives 27 June 2017 Workshop on Open Source Solutions for the IoT Contents IPv6 Protocols and Autoconfiguration - ICMPv6 - Path MTU Discovery

More information

SEN366 (SEN374) (Introduction to) Computer Networks

SEN366 (SEN374) (Introduction to) Computer Networks SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol

More information

IPv6 Security awareness

IPv6 Security awareness IPv6 Security awareness By Musa Stephen HONLUE Trainer@AFRINIC Stephen.honlue@afrinic.net 04/12/2015' 1 Presentation Objectives! Create awareness of IPv6 Security implications.! Highlight technical concepts

More information

Implementing Firewall Technologies

Implementing Firewall Technologies Implementing Firewall Technologies Network firewalls separate protected from non-protected areas preventing unauthorized users from accessing protected network resources. Technologies used: ACLs Standard,

More information

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link. Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:

More information

IPv6 migration challenges and Security

IPv6 migration challenges and Security IPv6 migration challenges and Security ITU Regional Workshop for the CIS countries Recommendations on transition from IPv4 to IPv6 in the CIS region, 16-18 April 2014 Tashkent, Republic of Uzbekistan Desire.karyabwite@itu.int

More information

IPv6 Transition Mechanisms

IPv6 Transition Mechanisms IPv6 Transition Mechanisms Petr Grygárek rek 1 IPv6 and IPv4 Coexistence Expected to co-exist together for many years Some IPv4 devices may exist forever Slow(?) transition of (part of?) networks to IPv6

More information

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing.

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. R (2) N (5) Oral (3) Total (10) Dated Sign Experiment No: 1 Problem Definition: Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. 1.1 Prerequisite:

More information

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0 DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any

More information

IPv6 Security Safe, Secure, and Supported.

IPv6 Security Safe, Secure, and Supported. IPv6 Security Safe, Secure, and Supported. Andy Davidson Hurricane Electric and LONAP adavidson@he.net Twitter: @andyd MENOG 9 Muscat, Oman, Tuesday 4 th October 2011 Don t Panic! IPv6 is not inherently

More information

Virtual Private Network. Network User Guide. Issue 05 Date

Virtual Private Network. Network User Guide. Issue 05 Date Issue 05 Date 2018-03-30 Contents Contents 1 Overview... 1 1.1 Concepts... 1 1.1.1 VPN... 1 1.1.2 IPsec VPN...1 1.2 Application Scenarios...2 1.3 Billing Standards... 3 1.4 VPN Reference Standards and

More information

KENIC-AFRINIC IPv6 Workshop 17th 20th June 2008

KENIC-AFRINIC IPv6 Workshop 17th 20th June 2008 IPv6 Training KENIC-AFRINIC IPv6 Workshop 17th 20th June 2008 César Olvera (cesar.olvera@consulintel.es) Jordi Palet (jordi.palet@consulintel.es) es) Alvaro Vives (alvaro.vives@consulintel.es) -1 Agenda

More information

IPv6 Security Issues and Challenges

IPv6 Security Issues and Challenges IPv6 Security Issues and Challenges Dr. Omar A. Abouabdalla (omar@ipv6global.my) Head Technology Consultant IPv6 Global Sdn Bhd 7 November 2012 IPv6 TO MIGRATE OR NOT TO MIGRATE? It s not an option. Either

More information

Table of Contents 1 IKE 1-1

Table of Contents 1 IKE 1-1 Table of Contents 1 IKE 1-1 IKE Overview 1-1 Security Mechanism of IKE 1-1 Operation of IKE 1-1 Functions of IKE in IPsec 1-2 Relationship Between IKE and IPsec 1-3 Protocols 1-3 Configuring IKE 1-3 Configuration

More information

Cisco 5921 Embedded Services Router

Cisco 5921 Embedded Services Router Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms

More information

Unit 5: Internet Protocols skong@itt-tech.edutech.edu Internet Protocols She occupied herself with studying a map on the opposite wall because she knew she would have to change trains at some point. Tottenham

More information

IPv6 Client IP Address Learning

IPv6 Client IP Address Learning Prerequisites for IPv6 Client Address Learning, on page 1 Information About IPv6 Client Address Learning, on page 1 Configuring IPv6 Unicast, on page 6 Configuring RA Guard Policy, on page 7 Applying RA

More information

Securing Networks with Cisco Routers and Switches

Securing Networks with Cisco Routers and Switches SNRS Securing Networks with Cisco Routers and Switches Volume 2 Version 2.0 Student Guide Editorial, Production, and Web Services: 02.06.07 DISCLAIMER WARRANTY: THIS CONTENT IS BEING PROVIDED AS IS. CISCO

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

IP Security IK2218/EP2120

IP Security IK2218/EP2120 IP Security IK2218/EP2120 Markus Hidell, mahidell@kth.se KTH School of ICT Based partly on material by Vitaly Shmatikov, Univ. of Texas Acknowledgements The presentation builds upon material from - Previous

More information

The IPsec protocols. Overview

The IPsec protocols. Overview The IPsec protocols -- components and services -- modes of operation -- Security Associations -- Authenticated Header (AH) -- Encapsulated Security Payload () (c) Levente Buttyán (buttyan@crysys.hu) Overview

More information

Internet Control Message Protocol

Internet Control Message Protocol Internet Control Message Protocol The Internet Control Message Protocol is used by routers and hosts to exchange control information, and to inquire about the state and configuration of routers and hosts.

More information

Computer Security 3e. Dieter Gollmann. Security.di.unimi.it/sicurezza1415/ Chapter 16: 1

Computer Security 3e. Dieter Gollmann. Security.di.unimi.it/sicurezza1415/ Chapter 16: 1 Computer Security 3e Dieter Gollmann Security.di.unimi.it/sicurezza1415/ Chapter 16: 1 Chapter 16: Communications Security Chapter 16: 2 Agenda Threat model Secure tunnels Protocol design principles IPsec

More information

Service Managed Gateway TM. Configuring IPSec VPN

Service Managed Gateway TM. Configuring IPSec VPN Service Managed Gateway TM Configuring IPSec VPN Issue 1.2 Date 12 November 2010 1: Introduction 1 Introduction... 3 1.1 What is a VPN?... 3 1.2 The benefits of an Internet-based VPN... 3 1.3 Tunnelling

More information

Next Generation IPv6 Cyber Security Protection Through Assure6i TM Product Line

Next Generation IPv6 Cyber Security Protection Through Assure6i TM Product Line Next Generation IPv6 Cyber Security Protection Through Assure6i TM Product Line Designed to Prevent, Detect, and Block Malicious Attacks on Both IPv4 and IPv6 Networks TM Introduction With the exponential

More information

The Internet community has developed application-specific security mechanisms in a number of application areas, including electronic mail (S/MIME,

The Internet community has developed application-specific security mechanisms in a number of application areas, including electronic mail (S/MIME, 1 The Internet community has developed application-specific security mechanisms in a number of application areas, including electronic mail (S/MIME, PGP), client/server (Kerberos), Web access (Secure Sockets

More information

NIST SP : Guidelines for the Secure Deployment of IPv6

NIST SP : Guidelines for the Secure Deployment of IPv6 NIST SP 800-119: Guidelines for the Secure Deployment of IPv6 Sheila Frankel Computer Security Division NIST sheila.frankel@nist.gov US Government IPv6 Directives: Office of Management and Budget (OMB)

More information

IPv6 Security: Threats and Mitigation

IPv6 Security: Threats and Mitigation IPv6 Security: Threats and Mitigation Eric Vyncke, Distinguished Engineer @evyncke Agenda Debunking IPv6 Myths Shared Issues by IPv4 and IPv6 Specific Issues for IPv6 Extension headers, IPsec everywhere,

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.   Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : GCFW Title : GIAC Certified Firewall Analyst Vendors : GIAC Version : DEMO Get Latest & Valid GCFW Exam's

More information

8. Network Layer Contents

8. Network Layer Contents Contents 1 / 43 * Earlier Work * IETF IP sec Working Group * IP Security Protocol * Security Associations * Authentication Header * Encapsulation Security Payload * Internet Key Management Protocol * Modular

More information

Lecture 13 Page 1. Lecture 13 Page 3

Lecture 13 Page 1. Lecture 13 Page 3 IPsec Network Security: IPsec CS 239 Computer Software March 2, 2005 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided

More information

BCRAN. Section 9. Cable and DSL Technologies

BCRAN. Section 9. Cable and DSL Technologies BCRAN Section 9 Cable and DSL Technologies Cable and DSL technologies have changed the remote access world dramatically. Without them, remote and Internet access would be limited to the 56 kbps typical

More information

Configuring IPsec and ISAKMP

Configuring IPsec and ISAKMP CHAPTER 61 This chapter describes how to configure the IPsec and ISAKMP standards to build Virtual Private Networks. It includes the following sections: Tunneling Overview, page 61-1 IPsec Overview, page

More information

PROTECTING INFORMATION ASSETS NETWORK SECURITY

PROTECTING INFORMATION ASSETS NETWORK SECURITY PROTECTING INFORMATION ASSETS NETWORK SECURITY PAUL SMITH 20 years of IT experience (desktop, servers, networks, firewalls.) 17 years of engineering in enterprise scaled networks 10+ years in Network Security

More information

The EN-4000 in Virtual Private Networks

The EN-4000 in Virtual Private Networks EN-4000 Reference Manual Document 8 The EN-4000 in Virtual Private Networks O ne of the principal features of routers is their support of virtual private networks (VPNs). This document discusses transmission

More information