A Sampling of Internetwork Security Issues Involving IPv6
|
|
- Dana Powell
- 6 years ago
- Views:
Transcription
1 A Sampling of Internetwork Security Issues Involving IPv6 John Kristoff DPU IPv6 Day John Kristoff Team Cymru 1
2 Agenda diff -u ipv4 ipv6 head What is the netsec community working on? What are the miscreants doing? DPU IPv6 Day John Kristoff Team Cymru 2
3 IPv4 vs. IPv6 Header Formats DPU IPv6 Day John Kristoff Team Cymru 3
4 96 more bits, no magic? OS protocol stack software and APIs Address manipulation and storage Neighbor discovery Auto-configuration ICMPv6 Fragmentation on an end-to-end basis only Network and security tools Transition technologies Note: IPsec MUSTSHOULD be supported DPU IPv6 Day John Kristoff Team Cymru 4
5 Scanning Scans of the entire address space impractical intelligent address scanning imperfect, but practical DNS enumeration Non-random addresses SLAAC address space with known OUIs Multicast discovery Local neighbor discovery messages See IETF I-D draft-gont-opsec-ipv6-host-scanning DPU IPv6 Day John Kristoff Team Cymru 5
6 Spam Surprise, spam travels over IPv6 transport Many DNSBLs have used rbldnsd When it comes to IPv6, rbldnsd just doesn't scale Some software and usage changes required This is true for any IP address reputation system First SMTP over IPv6 to comcast.net was spam DPU IPv6 Day John Kristoff Team Cymru 6
7 Routing Fair amount of focus on extension header issues Neighbor cache maintenance issues e.g. IETF RFC 6547 (using /127's for IRLs) Team Cymru IPv6 full bogons service IETF RFC 6666 A Discard Prefix for IPv6 Additional consideration likely needed here: Aggregation / disaggregation / hijack events Control plane protection for IPv6 transport DPU IPv6 Day John Kristoff Team Cymru 7
8 Packet Flooding / DoS Some evidence of IPv6-specific DoS Single D, not seeing evidence of IPv6-specific DDoS Some unintentional use of IPv6 transport for DDoS Mostly IRC-based miscreants experimenting with it Traffic levels are relatively modest thus far DPU IPv6 Day John Kristoff Team Cymru 8
9 Transition Technologies 6in4/6to4/6rd/ISATAP/Teredo/tunnel brokers, OH MY! Are protections congruent? Can you monitor them? Mitigate problems over them? Whose relay? Do they monitor? Do you trust them? DPU IPv6 Day John Kristoff Team Cymru 9
10 NAT NAT just makes my life harder As pro-nat a statement I could make, IETF RFC 5902 IAB Thoughts on IPv6 Network Address Translation Next slide PLEASE! DPU IPv6 Day John Kristoff Team Cymru 10
11 Local Network Threats Router advertisements (RAs) presents a challenge As does much of the neighbor discovery mechanisms Who do you trust? How do you trust them? Similar to the known threats with ARP and DHCP SEcure Neighbor Discovery (SEND) IETF RFC 3971 Also see IETF RFC 3756 IPv6 Neighbor Discovery Trust Models and Threats 6Guard: a honeypot-based IPv6 attack detector DPU IPv6 Day John Kristoff Team Cymru 11
12 An IPv6 Business Case is Born March 17, 2003 <A> get an ipv6 host./packetpeople wont know what to do <B> A we have ipv6 <C> most packet kiddies cant hit ipv6 yet <D> Im testing a ipv6 scanner i just made <E> i seen someone make a ddos for ipv6/ipv4 Later that same day, ipv6ddos.c released DPU IPv6 Day John Kristoff Team Cymru 12
13 IPv6 4SALE in the Underground November 11, 2003 <A> Got E-Gold Accounts, PayPaL Accounts, Vhosted Shells (ushells.net), Vhosts ( ipv4 - ipv6 ), Full Domin, Root, Root Scan, Root Nuke, Proxy Serv, Fresh CC's, Fresh Cvv2 I Verify 1st DPU IPv6 Day John Kristoff Team Cymru 13
14 Hiding behind the IPv6 More recently: <A>./gem -h T0 -t <B> that should do it <A> i got 5000mbit hitting <C> v6 is back up on X and Y just new ips <C> D got our vps working as a tunnel broker now <C> need a /64? <A> already has native IPv6 on ciscos DPU IPv6 Day John Kristoff Team Cymru 14
15 udp6.pl, udp.pl w/ IPv6 transport <-- working ipv6ddos flood.pl --port=dst-port --size=pkt-size --time=secs --bandwidth=kbps --delay=msec ip-address [-6] Defaults: * random destination UDP ports are used unless --port is specified * random-sized packets are sent unless --size or --bandwidth is specified * flood is continuous unless --time is specified * flood is sent at line speed unless --bandwidth or --delay is specified * IPv4 flood unless -6 is specified DPU IPv6 Day John Kristoff Team Cymru 15
16 Dissent on DDoS Resilience <A> no its nearly impossible to ddos an ipv6 connection <B> average bitch ddos kiddies couldn't ddos ipv6 <C> i only know 2 people that know how to ddos ipv6 <D> and its impossible to ddos ipv6 <E> i can ddos ipv6 tunnel down DPU IPv6 Day John Kristoff Team Cymru 16
17 Who Took Down Their Routers? Very large hosting provider site in Chicago goes dark Carefully aimed DDoS at infrastructure router Routing protocol packets being dropped Remedied with streamlined control plane filters Miscreant controlled via IRC from an IPv6 bounce DPU IPv6 Day John Kristoff Team Cymru 17
18 PING Flood 1 Gb/s ICMPv6 echo requests sent to IRC server Random source-address spoofed by a single source urpf briefly enabled, but that feature melted router Source ISP eventually fixed the host DPU IPv6 Day John Kristoff Team Cymru 18
19 What We (Don't) See Today IPv6 is widely used as a transport, but not a platform IPv6 dark nets are dark Lack of IPv6-specific malware Anecdotal evidence of malware using IPv6 as transport Some evidence of miscreants using IPv6 to hide origin Some evidence of using IPv6 to hide from monitoring Some evidence of using IPv6 to mitigate retribution Useful and necessary IPv6 threat research ongoing Relatively little IPv6 opsec measurement occurring DPU IPv6 Day John Kristoff Team Cymru 19
20 Resources and References DPU IPv6 Day John Kristoff Team Cymru 20
IPv6 Security (Theory vs Practice) APRICOT 14 Manila, Philippines. Merike Kaeo
IPv6 Security (Theory vs Practice) APRICOT 14 Manila, Philippines Merike Kaeo merike@doubleshotsecurity.com Current IPv6 Deployments Don t break existing IPv4 network Securing IPv6 Can t secure something
More informationIPv6- IPv4 Threat Comparison v1.0. Darrin Miller Sean Convery
IPv6- IPv4 Threat Comparison v1.0 Darrin Miller dmiller@cisco.com Sean Convery sean@cisco.com Motivations Discussions around IPv6 security have centered on IPsec Though IPsec is mandatory in IPv6, the
More informationResults of a Security Assessment of the Internet Protocol version 6 (IPv6)
Results of a Security Assessment of the Internet Protocol version 6 (IPv6) Fernando Gont DEEPSEC 2011 Conference Vienna, Austria, November 15-18, 2011 About... I have worked in security assessment of communication
More informationControl Plane Protection
Control Plane Protection Preventing accidentally on purpose We really talking about making sure routers do what we expect. Making sure the route decision stays under our control. Layer 2 Attacks ARP injections
More informationIPv6 Security. David Kelsey (STFC-RAL) IPv6 workshop pre-gdb, CERN 7 June 2016
IPv6 Security David Kelsey (STFC-RAL) IPv6 workshop pre-gdb, CERN 7 June 2016 Outline MORE MATERIAL HERE THAN TIME TO PRESENT & DISCUSS (BUT SLIDES AVAILABLE FOR LATER REFERENCE) IPv6 security & threats
More informationTDC 375 Network Protocols TDC 563 P&T for Data Networks
TDC 375 Network Protocols TDC 563 P&T for Data Networks Routing Threats TDC 375/563 Spring 2013/14 John Kristoff DePaul University 1 One of two critical systems Routing (BGP) and naming (DNS) are by far
More informationInsights on IPv6 Security
Insights on IPv6 Security Bilal Al Sabbagh, MSc, CISSP, CCSP Senior Information & Network Security Consultant - NXme Information Security Researcher Stockholm University 10/9/10 NXme FZ-LLC 1 NIXU Middle
More informationAdopting Innovative Detection Technique To Detect ICMPv6 Based Vulnerability Attacks
Adopting Innovative Detection Technique To Detect ICMPv6 Based Vulnerability Attacks Navaneethan C. Arjuman nava@nav6.usm.my National Advanced IPv6 Centre January 2014 1 Introduction IPv6 was introduced
More informationInsights on IPv6 Security
Insights on IPv6 Security Bilal Al Sabbagh, MSc, CISSP, CISA, CCSP Senior Information & Network Security Consultant NXme FZ-LLC Information Security Researcher, PhD Candidate Stockholm University bilal@nxme.net
More informationRecent Advances in IPv6 Security. Fernando Gont
Recent Advances in IPv6 Security Fernando Gont About... Security researcher and consultant for SI6 Networks Have worked on security assessment on communications protocols for: UK NISCC (National Infrastructure
More informationSecurity Considerations for IPv6 Networks. Yannis Nikolopoulos
Security Considerations for IPv6 Networks Yannis Nikolopoulos yanodd@otenet.gr Ημερίδα Ενημέρωσης Χρηστών για την Τεχνολογία IPv6 - Αθήνα, 25 Μαίου 2011 Agenda Introduction Major Features in IPv6 IPv6
More informationNetwork Security. Thierry Sans
Network Security Thierry Sans HTTP SMTP DNS BGP The Protocol Stack Application TCP UDP Transport IPv4 IPv6 ICMP Network ARP Link Ethernet WiFi The attacker is capable of confidentiality integrity availability
More informationA Review on ICMPv6 Vulnerabilities and its Mitigation Techniques: Classification and Art
2015 IEEE 2015 International Conference on Computer, Communication, and Control Technology (I4CT 2015), April 21-23 in Imperial Kuching Hotel, Kuching, Sarawak, Malaysia A Review on ICMPv6 Vulnerabilities
More informationIPv6 Security Issues and Challenges
IPv6 Security Issues and Challenges Dr. Omar A. Abouabdalla (omar@ipv6global.my) Head Technology Consultant IPv6 Global Sdn Bhd 7 November 2012 IPv6 TO MIGRATE OR NOT TO MIGRATE? It s not an option. Either
More informationIPv6 Security Fundamentals
IPv6 Security Fundamentals UK IPv6 Council January 2018 Dr David Holder CEng FIET MIEEE david.holder@erion.co.uk IPv6 Security Fundamentals Common Misconceptions about IPv6 Security IPv6 Threats and Vulnerabilities
More informationInternetwork Expert s CCNA Security Bootcamp. Common Security Threats
Internetwork Expert s CCNA Security Bootcamp Common Security Threats http:// Today s s Network Security Challenge The goal of the network is to provide high availability and easy access to data to meet
More informationIPv6 Security Vendor Point of View. Eric Vyncke, Distinguished Engineer Cisco, CTO/Consulting Engineering
IPv6 Security Vendor Point of View Eric Vyncke, evyncke@cisco.com Distinguished Engineer Cisco, CTO/Consulting Engineering 1 ARP Spoofing is now NDP Spoofing: Threats ARP is replaced by Neighbor Discovery
More informationIPv6 Security: Threats and Mitigation
IPv6 Security: Threats and Mitigation Eric Vyncke, Distinguished Engineer @evyncke Agenda Debunking IPv6 Myths Shared Issues by IPv4 and IPv6 Specific Issues for IPv6 Extension headers, IPsec everywhere,
More informationIPv6 Security Safe, Secure, and Supported.
IPv6 Security Safe, Secure, and Supported. Andy Davidson Hurricane Electric and LONAP adavidson@he.net Twitter: @andyd MENOG 9 Muscat, Oman, Tuesday 4 th October 2011 Don t Panic! IPv6 is not inherently
More informationRecent IPv6 Security Standardization Efforts. Fernando Gont
Recent IPv6 Security Standardization Efforts Fernando Gont Part I: Protocol Issues 2 IPv6 Addressing 3 Security & Privacy Analysis RFC 7721: Security and Privacy Considerations for IPv6 Address Generation
More informationIPv6 Cyber Security Briefing May 27, Ron Hulen VP and CTO Cyber Security Solutions Command Information, Inc.
IPv6 Cyber Security Briefing May 27, 2010 Ron Hulen VP and CTO Cyber Security Solutions Command Information, Inc. 2610:f8:ffff:2010:05:27:85:1 Attack Surfaces Protocol Translator IPv4 Native Dual-Stack
More informationTCP/IP Protocol Suite
TCP/IP Protocol Suite Computer Networks Lecture 5 http://goo.gl/pze5o8 TCP/IP Network protocols used in the Internet also used in today's intranets TCP layer 4 protocol Together with UDP IP - layer 3 protocol
More informationPlanning for Information Network
Planning for Information Network Lecture 7: Introduction to IPv6 Assistant Teacher Samraa Adnan Al-Asadi 1 IPv6 Features The ability to scale networks for future demands requires a limitless supply of
More informationIPv6 Transition Technologies (TechRef)
Tomado de: http://technet.microsoft.com/en-us/library/dd379548.aspx IPv6 Transition Technologies (TechRef) Updated: January 7, 2009 IPv6 Transition Technologies Protocol transitions are not easy, and the
More informationTransitioning to IPv6
Transitioning to IPv6 麟瑞科技區域銷售事業處副處長張晃崚 CCIE #13673 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0 7-1 IPv4 and IPv6 Currently, there are approximately 1.3 billion usable IPv4 addresses available.
More informationETSF05/ETSF10 Internet Protocols Network Layer Protocols
ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address
More informationIPv6: An Introduction
Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with
More informationChapter 15 IPv6 Transition Technologies
Chapter 15 IPv6 Transition Technologies Published: April 18, 2006 Updated: November 06, 2006 Writer: Joe Davies 1 Abstract This chapter describes the mechanisms that aid in the transition of Internet Protocol
More informationIntroduction to IPv6 - II
Introduction to IPv6 - II Building your IPv6 network Alvaro Vives 27 June 2017 Workshop on Open Source Solutions for the IoT Contents IPv6 Protocols and Autoconfiguration - ICMPv6 - Path MTU Discovery
More informationCS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis
CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture #4 preview ICMP ARP DHCP NAT
More informationDHCPv6 OPERATIONAL ISSUES Tom Coffeen 4/7/2016
1 2016 2013 Infoblox Inc. All Inc. Rights All Reserved. Rights Reserved. DHCPv6 OPERATIONAL ISSUES Tom Coffeen 4/7/2016 ABOUT THE PRESENTER Tom Coffeen IPv6 Evangelist Infoblox @ipv6tom tom@ipv6.works
More informationIPv6 Implementation Best Practices For Service Providers
IPv6 Implementation Best Practices For Service Providers Brandon Ross Chief Network Architect and CEO 2013 Utilities Telecom Council Network Utility Force www.netuf.net @NetUF RFC 6540 - IPv6 Support Required
More informationIPv6 in Campus Networks
IPv6 in Campus Networks Dave Twinam Manager, Technical Marketing Engineering Internet Systems Business Unit dtwinam@cisco.com Cisco Twinam IPv6 Summit 2003 Cisco Systems, Inc. All rights reserved. 1 IPv6
More informationOSI Data Link & Network Layer
OSI Data Link & Network Layer Erkki Kukk 1 Layers with TCP/IP and OSI Model Compare OSI and TCP/IP model 2 Layers with TCP/IP and OSI Model Explain protocol data units (PDU) and encapsulation 3 Addressing
More informationIPv6 Rapid Deployment (6rd) in broadband networks. Allen Huotari Technical Leader June 14, 2010 NANOG49 San Francisco, CA
Rapid Deployment () in broadband networks Allen Huotari Technical Leader ahuotari@cisco.com June 14, 2010 NANOG49 San Francisco, CA 1 Why IP Tunneling? IPv4 Tunnel Tunnel IPv4 IPv4 Retains end-end IP semantics
More informationInitial results from an IPv6 Darknet
Initial results from an IPv6 Darknet Matthew Ford, Jonathan Stevens 2 and John Ronan 3 British Telecommunications plc, Networks Research Centre, pp HWP276, PO Box 234, Edinburgh, EH2 9UR, UK 2 British
More informationRecent Advances in IPv6 Security. Fernando Gont
Recent Advances in IPv6 Security Fernando Gont About... Security researcher and consultant for SI6 Networks Have worked on security assessment on communications protocols for: UK NISCC (National Infrastructure
More informationIPv6 Security. Pedro Lorga - WALC 2006 (Quito, Ecuador July 06)
IPv6 Security Pedro Lorga - lorga@fccn.pt 1 Copy Rights This slide set is the ownership of the 6DISS project via its partners The Powerpoint version of this material may be reused and modified only with
More informationFireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.
Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which
More informationIPv6 Deployment at the University of Pennsylvania
IPv6 Deployment at the University of Pennsylvania Jorj Bauer and Shumon Huque University of Pennsylvania Educause Mid-Atlantic Regional Conference, Philadelphia, PA January 8 th, 2009 Outline Why you should
More informationRadware ADC. IPV6 RFCs and Compliance
Radware ADC IPV6 s and Compliance Knowledgebase Team February 2016 Scope: This document lists most of the s that relevant to IPv6. Legend: Yes supported N/A not applicable No Currently not supported Relevance:
More informationUsing IPv6. Daniel Hagerty
Using IPv6 Daniel Hagerty hag@linnaean.org 6to4 connectivity on this laptop Included since OS-X 10.3 or so. Works anywhere you have a public IP that can send/receive IP protocol 41. Could give v6 transit
More informationOSI Data Link & Network Layer
OSI Data Link & Network Layer Erkki Kukk 1 Layers with TCP/IP and OSI Model Compare OSI and TCP/IP model 2 Layers with TCP/IP and OSI Model Explain protocol data units (PDU) and encapsulation 3 Addressing
More informationRecent Advances in IPv6 Security. Fernando Gont
Recent Advances in IPv6 Security Fernando Gont About... Security researcher and consultant at SI6 Networks Have worked on security assessment on communications protocols for: UK NISCC (National Infrastructure
More informationUnit 5 - IPv4/ IPv6 Transition Mechanism(8hr) BCT IV/ II Elective - Networking with IPv6
5.1 Tunneling 5.1.1 Automatic Tunneling 5.1.2 Configured Tunneling 5.2 Dual Stack 5.3 Translation 5.4 Migration Strategies for Telcos and ISPs Introduction - Transition - the process or a period of changing
More informationIPv6. Copyright 2017 NTT corp. All Rights Reserved. 1
IPv6 IPv6 NTT IPv6 Copyright 2017 NTT corp. All Rights Reserved. 1 IPv6 IPv4 IPv6 Copyright 2017 NTT corp. All Rights Reserved. 2 IPv4 http://www.potaroo.net/tools/ipv4/ 2018.3.5 Copyright 2017 NTT corp.
More informationOperational Security Capabilities for IP Network Infrastructure
Operational Security Capabilities F. Gont for IP Network Infrastructure G. Gont (opsec) UTN/FRH Internet-Draft September 1, 2008 Intended status: Informational Expires: March 5, 2009 Status of this Memo
More informationOSI Data Link & Network Layer
OSI Data Link & Network Layer Erkki Kukk 1 Layers with TCP/IP and OSI Model Compare OSI and TCP/IP model 2 Layers with TCP/IP and OSI Model Explain protocol data units (PDU) and encapsulation 3 Addressing
More informationRecent advances in IPv6 insecurities reloaded Marc van Hauser Heuse GOVCERT NL Marc Heuse
Recent advances in IPv6 insecurities reloaded Marc van Hauser Heuse GOVCERT NL 2011 2011 Marc Heuse Hello, my name is Basics Philosophy Vulnerabilities Vendor Responses & Failures Recommendations
More informationRemember Extension Headers?
IPv6 Security 1 Remember Extension Headers? IPv6 allows an optional Extension Header in between the IPv6 header and upper layer header Allows adding new features to IPv6 protocol without major re-engineering
More informationIPv6 IMPLEMENTATION IN VNPT
IPv6 IMPLEMENTATION IN VNPT VŨ XUÂN NHÀN 11/2016 NOC VNPT Net 1 Contents 6PE/6VPE model IPv6 implementation in VNPT Service models IPv6 allocation IPv6 CPE IPv6 security threats Problems 11/29/2016 VNNIC
More informationCustomer IPv6 Delivery
Customer IPv6 Delivery The Nextgen Experience Chris Chaundy, Nextgen Networks October 2011 Agenda Nextgen Network s strategy Just get a prefix and turn it on!?!? Scope of the project Hardware considerations
More informationCisco IOS IPv6. Cisco IOS IPv6 IPv6 IPv6 service provider IPv6. IPv6. data link IPv6 Cisco IOS IPv6. IPv6
IP6FD v6 Fundamentals, Design, and Deployment v3.0 Cisco IOS IPv6 Cisco IOS IPv6 IPv6 IPv6 service provider IPv6 IP IPv6 IPv6 data link IPv6 Cisco IOS IPv6 IPv6 IPv6 DHCP DNS DHCP DNS IPv6 IPv4 IPv6 multicast
More informationAdvisory Guidelines for 6to4 Deployment
Advisory Guidelines for 6to4 Deployment draft-carpenter-v6ops-6to4[-teredo]-advisory-03 Brian Carpenter March 2011 1 Acknowledgements Very useful and practical input from at least 20 people: Emile Aben,
More informationIPv6 Deployment - Security Issues Thinking outside the NAT box
IPv6 Deployment - Security Issues Thinking outside the NAT box Tony Hain IPv6 Forum Fellow Cisco Systems Technical Leader ahain@cisco.com Session Number 1 Agenda: Introduction IPv4 lifetime Conflicting
More informationTransition to IPv6. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806
Transition to IPv6 Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 10/12/2015 CSCI 445 Fall 2015 1 Acknowledgements Some pictures used in this presentation
More informationOn Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August
The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format
More informationETSF10 Internet Protocols Network Layer Protocols
ETSF10 Internet Protocols Network Layer Protocols 2012, Part 2, Lecture 3.1 Kaan Bür, Jens Andersson Network Layer Protocols IPv4, IPv6 [ed.4 ch.20.3+19.2] [ed.5 ch.22.1.1-2+22.2] Transition from IPv4
More informationSECURE ROUTER DISCOVERY MECHANISM TO OVERCOME MAN-IN THE MIDDLE ATTACK IN IPV6 NETWORK
1 SECURE ROUTER DISCOVERY MECHANISM TO OVERCOME MAN-IN THE MIDDLE ATTACK IN IPV6 NETWORK Navaneethan C. Arjuman nava@nav6.usm.my National Advanced IPv6 Centre, Universiti Sains Malaysia March 2018 Copyright
More informationIllegitimate Source IP Addresses At Internet Exchange Points
Illegitimate Source IP Addresses At Internet Exchange Points @ DENOG8, Darmstadt Franziska Lichtblau, Florian Streibelt, Philipp Richter, Anja Feldmann 23.11.2016 Internet Network Architectures, TU Berlin
More informationIPv6 Security awareness
IPv6 Security awareness By Musa Stephen HONLUE Trainer@AFRINIC Stephen.honlue@afrinic.net 04/12/2015' 1 Presentation Objectives! Create awareness of IPv6 Security implications.! Highlight technical concepts
More informationPersonal Firewall Default Rules and Components
The Barracuda Personal Firewall comes with a default access ruleset. The following tables aim to give you a compact overview of the default rules and their functions. Rule Categories The default rules
More informationCertified Penetration Testing Consultant
Certified Penetration Testing Consultant Duration: 4 Days Language: English Course Delivery: Classroom COURSE BENEFITS The vendor neutral Certified Penetration Testing Consultant course is designed for
More informationComputer Networks and Data Systems
Computer Networks and Data Systems Routing TDC463 Winter 2011/12 John Kristoff - DePaul University 1 One of two critical systems BGP and DNS are, by far, the two most fundamentally critical components
More informationMulticast operational concerns
Multicast operational concerns John Kristoff jtk@northwestern.edu http://aharp.ittns.northwestern.edu +1 847 467 5878 Northwestern University Evanston, IL 60208 DPU CTI Seminar John Kristoff Northwestern
More informationForeword xxiii Preface xxvii IPv6 Rationale and Features
Contents Foreword Preface xxiii xxvii 1 IPv6 Rationale and Features 1 1.1 Internet Growth 1 1.1.1 IPv4 Addressing 1 1.1.2 IPv4 Address Space Utilization 3 1.1.3 Network Address Translation 5 1.1.4 HTTP
More informationIPv6 Addressing. There are three types of IPV6 Addresses. Unicast:Multicast:Anycast
IPv6 Addressing There are three types of IPV6 Addresses. Unicast:Multicast:Anycast Unicast IPv6 addresses A unicast address identifies a single interface within the scope of the type of unicast address.
More informationDistributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013
Distributed Systems 27. Firewalls and Virtual Private Networks Paul Krzyzanowski Rutgers University Fall 2013 November 25, 2013 2013 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive
More informationNetwork Security: Network Flooding. Seungwon Shin GSIS, KAIST
Network Security: Network Flooding Seungwon Shin GSIS, KAIST Detecting Network Flooding Attacks SYN-cookies Proxy based CAPCHA Ingress/Egress filtering Some examples SYN-cookies Background In a TCP 3-way
More informationIETF Activities Update
IETF Activities Update Marla Azinger marla.azinger@frontiercorp.com ARIN XXIV OCT 22, 2009 Note This presentation is not an official IETF report There is no official IETF Liaison to ARIN or any RIR It
More informationIPv6 migration challenges and Security
IPv6 migration challenges and Security ITU Regional Workshop for the CIS countries Recommendations on transition from IPv4 to IPv6 in the CIS region, 16-18 April 2014 Tashkent, Republic of Uzbekistan Desire.karyabwite@itu.int
More informationCCNA 1 Chapter 5 v5.0 Exam Answers 2013
CCNA 1 Chapter 5 v5.0 Exam Answers 2013 1 2 A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in its ARP cache. How will the device obtain a destination
More informationEverything you need to know about IPv6 security I can manage in 30min. IPv6 Day Copenhagen November 2017
Welcome to Everything you need to know about IPv6 security I can manage in 30min IPv6 Day Copenhagen November 2017 Henrik Lund Kramshøj hlk@zencurity.dk Slides are available as PDF, kramshoej@github c
More informationTable of Contents Chapter 1 Tunneling Configuration
Table of Contents Table of Contents... 1-1 1.1 Introduction to Tunneling... 1-1 1.1.1 IPv6 over IPv4 Tunnel... 1-2 1.1.2 IPv4 over IPv4 Tunnel... 1-7 1.2 Tunneling Configuration Task List... 1-8 1.3 Configuring
More informationWhy IPv6? Roque Gagliano LACNIC
Why IPv6? Roque Gagliano LACNIC Agenda Initial Concepts. IPv6 History. What is IPv6? Planning IPv6. Agenda Initial Concepts. IPv6 History. What is IPv6? Planning IPv6. Some initial concepts. IPv6 is the
More informationThe Spoofer Project Inferring the Extent of Source Address Filtering on the Internet
The Spoofer Project Inferring the Extent of Source Address Filtering on the Internet Rob Beverly and Steve Bauer {rbeverly,bauer}@mit.edu The Spoofer Project Goal: Quantify the extent and nature of source
More informationLISP Locator/ID Separation Protocol
LISP Locator/ID Separation Protocol Hernán Contreras G. Consulting Systems Engineer hcontrer@cisco.com LISP Next Gen Routing Architecture Locator-ID Separation Protocol (LISP) Elevator Pitch LISP is a
More informationCOE IPv6 Roadmap Planning. ZyXEL
COE IPv6 Roadmap Planning ZyXEL COE Product Offering with IPv6 Dual Stack Lite / Translation & Dual Stack, IPv6 Core Phase I Chassis MSAN FW Rel. 3.96.1 MSC1000G, MSC1024G, MSC1224G, ALC12xxG- 5x, VLC13xxG-5x
More informationHost Identity Indirection Infrastructure Hi 3. Jari Arkko, Pekka Nikander and Börje Ohlman Ericsson Research
Host Identity Indirection Infrastructure Hi 3 Jari Arkko, Pekka Nikander and Börje Ohlman Ericsson Research Presentation outline Motivation Background Secure i 3 Hi 3 Summary 2 Hi 3 motivation Question:
More informationTEXTBOOK MAPPING CISCO COMPANION GUIDES
TestOut Routing and Switching Pro - English 6.0.x TEXTBOOK MAPPING CISCO COMPANION GUIDES Modified 2018-08-20 Objective Mapping: Cisco 100-105 ICND1 Objective to LabSim Section # Exam Objective TestOut
More informationRecent IPv6 Security Standardization Efforts. Fernando Gont
Recent IPv6 Security Standardization Efforts Fernando Gont Agenda Motivation for this presentation Part I: Protocol Issues IPv6 Addressing IPv6 Fragmentation & Reassembly IPv6 Neighbor Discovery IPv6 Extension
More informationIPv6 Security. Rocky Mountain IPv6 Summit. Scott Hogg. GTRI - Director of Advanced Technology Services CCIE #5133, CISSP #4610
Rocky Mountain IPv6 Summit IPv6 Security Scott Hogg GTRI - Director of Advanced Technology Services CCIE #5133, CISSP #4610 1 IPv6 Security We will all migrate to IPv6 eventually, but when and how remain
More informationHost Scanning in IPv6 Networks
Host Scanning in IPv6 Networks (draft-gont-opsec-ipv6-host-scanning) Fernando Gont IETF 84 Overview IPv6 address-scanning attacks have long been considered unfeasible This myth has been based on the assumption
More informationThe STRIDE towards IPv6: A Threat Model for IPv6 Transition Technologies
iplab The STRIDE towards IPv6: A Threat Model for IPv6 Transition Technologies draft-georgescu-opsec-ipv6-trans-tech-threat-model-01 Marius Georgescu Nara Institute of Science and Technology Internet Engineering
More informationIPv6 Bootcamp Course (5 Days)
IPv6 Bootcamp Course (5 Days) Course Description: This intermediate - advanced, hands-on course covers pertinent topics needed for IPv6 migration and deployment strategies. IPv6 novices can expect to gain
More informationIPv6 Security 111 Short Module on Security
IPv6 Security 111 Short Module on Security IPv6 Security 1 Copy Rights This slide set is the ownership of the 6DEPLOY project via its partners The Powerpoint version of this material may be reused and
More informationIPv6 implementation in a multi-vendor network.
IPv6 implementation in a multi-vendor network. Roque Gagliano www.antel.com.uy Agenda motivation. first experience. backbone deployment. addressing. routing. multi-vendor environment. conclusion / next
More informationECE 435 Network Engineering Lecture 14
ECE 435 Network Engineering Lecture 14 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 25 October 2018 Announcements HW#6 was due HW#7 will be posted 1 IPv4 Catastrophe 2 Out of
More informationCSE 123A Computer Netwrking
CSE 123A Computer Netwrking Winter 2005 Mobile Networking Alex Snoeren presenting in lieu of Stefan Savage Today s s issues What are implications of hosts that move? Remember routing? It doesn t work anymore
More informationConfiguring IPv6 First-Hop Security
This chapter describes the IPv6 First-Hop Security features. This chapter includes the following sections: Finding Feature Information, on page 1 Introduction to First-Hop Security, on page 1 RA Guard,
More informationCisco Certified Network Associate ( )
Cisco Certified Network Associate (200-125) Exam Description: The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50 60 question assessment that
More informationA Practical (and Personal) Perspective on IPv6 for Servers. Geoff Huston June 2011
A Practical (and Personal) Perspective on IPv6 for Servers Geoff Huston June 2011 Lets look at... Why we need IPv6 The differences between IPv4 and IPv6 Some practical hints for Dual Stack Services Why?
More informationIPv6 address configuration and local operation
IPv6 address configuration and local operation Amsterdam, 16 february 2012 Iljitsch van Beijnum Today's topics IPv6 address configuration stateless autoconfig DHCPv6 DAD, NUD, timers Router solicitations/advertisements
More informationIntroduction to IPv6. Stig Venaas, UNINETT /18/2001
Introduction to IPv6 Stig Venaas, UNINETT 2001-09-12 9/18/2001 Overview What is wrong with IP? IPv6 basics More IPv6 Implementations Getting started IPv6 connectivity and transition techniques UNINETT
More informationProtecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper
Protecting DNS Critical Infrastructure Solution Overview Radware Attack Mitigation System (AMS) - Whitepaper Table of Contents Introduction...3 DNS DDoS Attacks are Growing and Evolving...3 Challenges
More informationNetwork Address Translation
Network Address Translation All you want to know about (C) Herbert Haas 2005/03/11 Reasons for NAT Mitigate Internet address depletion Save global addresses (and money) Conserve internal address plan TCP
More informationRecent Advances in IPv6 Security. Fernando Gont
Recent Advances in IPv6 Security Fernando Gont About... Security Researcher and Consultant at SI6 Networks Published: 20 IETF RFCs (9 on IPv6) 10+ active IETF Internet-Drafts Author of the SI6 Networks'
More informationSJTU 2018 Fall Computer Networking. Wireless Communication
SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP
More informationIPv6 Protocol. Does it solve all the security problems of IPv4? Franjo Majstor EMEA Consulting Engineer Cisco Systems, Inc.
IPv6 Protocol Does it solve all the security problems of IPv4? Franjo Majstor EMEA Consulting Engineer fmajstor@cisco.com Cisco Systems, Inc. 1 Agenda IPv6 Primer IPv6 Protocol Security Dual stack approach
More informationLast time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing
Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol
More information