The Layer-2 Insecurities of IPv6 and the Mitigation Techniques

Similar documents
The Layer-2 Security Issues and the Mitigation

Advanced IPv6 Security: Securing Link- Operations at the First Hop

Eric Vyncke, Distinguished Engineer, 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1

IPv6 Security Vendor Point of View. Eric Vyncke, Distinguished Engineer Cisco, CTO/Consulting Engineering

IPv6 Security Threats and #CLEUR BRKSEC Eric Vyncke

Configuring IPv6 First-Hop Security

TD#RNG#2# B.Stévant#

IPv6 Snooping. Finding Feature Information. Restrictions for IPv6 Snooping

Eric Vyncke, Distinguished Engineer, 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1

IPv6 Security. David Kelsey (STFC-RAL) IPv6 workshop pre-gdb, CERN 7 June 2016

IPv6 Security: Threats and Mitigation

IPv6 Snooping. Finding Feature Information. Restrictions for IPv6 Snooping

Table of Contents 1 IPv6 Configuration IPv6 Application Configuration 2-1

Configuring Wireless Multicast

IPv6 Neighbor Discovery

Guide to TCP/IP Fourth Edition. Chapter 6: Neighbor Discovery in IPv6

IPv6 Associated Protocols. Athanassios Liakopoulos 6DEPLOY IPv6 Training, Skopje, June 2011

Recent advances in IPv6 insecurities reloaded Marc van Hauser Heuse GOVCERT NL Marc Heuse

IPv6 Client IP Address Learning

IPv6 Security Fundamentals

Remember Extension Headers?

Secure Neighbor Discovery. By- Pradeep Yalamanchili Parag Walimbe

IPv6 Protocol. Does it solve all the security problems of IPv4? Franjo Majstor EMEA Consulting Engineer Cisco Systems, Inc.

Introduction to IPv6 - II

Security Considerations for IPv6 Networks. Yannis Nikolopoulos

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery

Chapter 5. Security Components and Considerations.

Configuring IPv6 basics

IPv6 Security Course Preview RIPE 76

Network Security. Thierry Sans

IETF Update about IPv6

SECURE ROUTER DISCOVERY MECHANISM TO OVERCOME MAN-IN THE MIDDLE ATTACK IN IPV6 NETWORK

Operation Manual IPv6 H3C S3610&S5510 Series Ethernet Switches Table of Contents. Table of Contents

DELVING INTO SECURITY

The Netwok Layer IPv4 and IPv6 Part 2

Adopting Innovative Detection Technique To Detect ICMPv6 Based Vulnerability Attacks

IPv6 Security (Theory vs Practice) APRICOT 14 Manila, Philippines. Merike Kaeo

Basic L2 and L3 security in Campus networks. Matěj Grégr CNMS 2016

Table of Contents 1 IPv6 Configuration IPv6 Application Configuration 2-1

IPv6 Security Threats and Mitigations

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv6 Security. Rocky Mountain IPv6 Summit. Scott Hogg. GTRI - Director of Advanced Technology Services CCIE #5133, CISSP #4610

Table of Contents 1 IPv6 Configuration IPv6 Application Configuration 2-1

IPv6 Protocol Architecture

IPv6 ND Configuration Example

IPv6 Protocol & Structure. npnog Dec, 2017 Chitwan, NEPAL

IPv6 Security Safe, Secure, and Supported.

Configuring IPv6 for Gigabit Ethernet Interfaces

Table of Contents 1 IPv6 Basics Configuration 1-1

Insights on IPv6 Security

IPv6- IPv4 Threat Comparison v1.0. Darrin Miller Sean Convery

TCP/IP Protocol Suite

IPv6 Security. 15 August

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

IPv6 Bootcamp Course (5 Days)

IPv6 migration challenges and Security

Rocky Mountain IPv6 Summit April 9, 2008

Internet Protocol v6.

IPv6 Cyber Security Briefing May 27, Ron Hulen VP and CTO Cyber Security Solutions Command Information, Inc.

Juniper Netscreen Security Device. How to Enable IPv6 Page-51

Configuring IPv6. Information About IPv6. Send document comments to CHAPTER

Advances in Routing BRKRST Cisco Public BRKRST Cisco and/or its affiliates. All rights reserved.

Internet Control Message Protocol

Recent advances in IPv6 insecurities Marc van Hauser Heuse CCC Congress 2010, Berlin Marc Heuse

Chapter 7: IP Addressing CCENT Routing and Switching Introduction to Networks v6.0

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

HP 6125 Blade Switch Series

DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide. Figure 9-1 Port Security Global Settings window

Introduction to IPv6

IPv6 Rogue Router Advertisement Attack Prepared By: Andrew Gray & Wil Hall Prepared For: Dr. Tom Calabrese

HPE FlexFabric 5940 Switch Series

Insights on IPv6 Security

Recent IPv6 Security Standardization Efforts. Fernando Gont

ODL Summit Bangalore - Nov 2016 IPv6 Design in OpenDaylight

The Netwok Layer IPv4 and IPv6 Part 2

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo

IPv6 associated protocols

HP A5830 Switch Series Layer 3 - IP Services. Configuration Guide. Abstract

SECURITY IN AN IPv6 WORLD MYTH & REALITY. RIPE 68 Warsaw May 2014 Chris Grundemann

IPv6 Next generation IP

IPv6 Neighbor Discovery

Workshop on Scientific Applications for the Internet of Things (IoT) March

ECE 435 Network Engineering Lecture 14

Certified Penetration Testing Consultant

IPv6 Neighbor Discovery

Introduction to IPv6. IPv6 addresses

IPv6 First-Hop Security Binding Table

HP 3600 v2 Switch Series

Security in an IPv6 World Myth & Reality

ERNW WHITEPAPER 62 RA GUARD EVASION REVISITED

IPv6 CGAs: Balancing between Security, Privacy and Usability

"Charting the Course... IPv6 Bootcamp Course. Course Summary

IPv6 It starts TODAY!

Networking Potpourri: Plug-n-Play, Next Gen

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August

Athanassios Liakopoulos

IPv6 address configuration and local operation

DHCPv6 OPERATIONAL ISSUES Tom Coffeen 4/7/2016

Transcription:

The Layer-2 Insecurities of IPv6 and the Mitigation Techniques Eric Vyncke Cisco, Consulting Engineering Distinguished Engineer evyncke@cisco.com Eric.Vyncke@ipv6council.be 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 1

2 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 2

Source: http://www.google.com/intl/en/ipv6/statistics/ http://www.vyncke.org/ipv6status 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 3

IPv6 is IPv4 with larger addresses 128 bits vs. 32 bits NAT no more needed => easier for applications Simpler hence more security Data-link layer unchanged: Ethernet, xdsl, Transport layer unchanged: UDP, TCP, Applications unchanged : HTTP, SSL, SMTP, IPv6 is not really BETTER than IPv4 because it is new IPv6 has been specified in 1995 IPsec is identical in IPv4 & IPv6 Only benefit is a much larger address space 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 4

Sometimes, newer means better and more secure Sometimes, experience IS better and safer! 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 5

For Your Reference Defined in: RFC 4861 Neighbor Discovery for IP Version 6 (IPv6) RFC 4862 IPv6 Stateless Address Auto-configuration RFC 3971 Secure Neighbor Discovery etc. Used for: Router discovery IPv6 Stateless Address Auto Configuration (SLAAC) IPv6 address resolution (replaces ARP) Neighbor Unreachability Detection (NUD) Duplicate Address Detection (DAD) Redirection Operates above ICMPv6 Relies heavily on (link-local scope) multicast, combined with Layer 2 Multicast Works with ICMP messages and messages options 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 6

Attacker Layer-7 Data and services Layer-2 Firewall Courtesy of Curt Smith 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 7

2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 8

Router Advertisements contains: - Prefix to be used by hosts - Data-link layer address of the router - Miscellaneous options: MTU, DHCPv6 use, RA w/o Any Authentication Gives Exactly Same Level of Security as DHCPv4 (None) MITM DoS 1. RS 2. RA 2. RA 1. RS: Data = Query: please send RA 2. RA: Data= options, prefix, lifetime, A+M+O flags 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 9

Devastating: Denial of service: all traffic sent to a black hole Man in the Middle attack: attacker can intercept, listen, modify unprotected data Also affects legacy IPv4-only network with IPv6-enabled hosts Most of the time from non-malicious users Requires layer-2 adjacency (some relief ) The major blocking factor for enterprise IPv6 deployment Special from THC: RA flood with different prefixes => crash Windows and a few other OS Still in 2012! 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 10

$ ifconfig en1 en1: flags=8863<up,broadcast,smart,running,simplex,multicast> Humm mtu 1500 ether 00:26:bb:xx:xx:xx Is there an IPv6 inet6 fe80::226:bbff:fexx:xxxx%en1 prefixlen 64 scopeid 0x6 inet 10.19.19.118 netmask 0xfffffe00 Network? broadcast 10.19.19.255 media: autoselect status: active $ ping6 -I en1 ff02::1%en1 PING6(56=40+8+8 bytes) fe80::226:bbff:fexx:xxxx%en1 --> ff02::1 16 bytes from fe80::226:bbff:fexx:xxxx%en1, Humm icmp_seq=0 hlim=64 time=0.140 ms... Are there any IPv6 16 bytes from fe80::cabc:c8ff:fec3:fdef%en1, icmp_seq=3 hlim=64 time=402.112 ms ^C peers? --- ff02::1%en1 ping6 statistics --- 4 packets transmitted, 4 packets received, +142 duplicates, 0.0% packet loss round-trip min/avg/max/std-dev = 0.140/316.721/2791.178/412.276 ms $ ndp -an Neighbor Let s have some Linklayer fun here Address Configure Netif a tunnel, Expire St Flgs Prbs 2001:xxxx:xxxx:1:3830:abff:9557:e33c 0:24:d7:5:6b:f0 en1 23h59m30s S enable forwarding and transmit RA... $ ndp -an wc -l 64 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 11

Where Routers Hosts Routers & Hosts Switch (First Hop) Switch (First Hop) Switch (First Hop) What Increase legal router preference Disabling Stateless Address Autoconfiguration SeND Router Authorization Host isolation Port Access List (PACL) RA Guard 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 12

RFC 3972 Cryptographically Generated Addresses (CGA) IPv6 addresses whose interface identifiers are cryptographically generated from node public key SeND adds a signature option to Neighbor Discovery Protocol Using node private key Node public key is sent in the clear (and linked to CGA) Very powerful If MAC spoofing is prevented But, not a lot of implementations: Cisco IOS, Linux, some H3C, third party for Windows (from Hasso-Plattner-Institut in Germany!) 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 13

Each devices has a RSA key pair (no need for cert) Ultra light check for validity Prevent spoofing a valid CGA address Signature RSA Keys Priv Pub Modifier Public Key Subnet Prefix CGA Params SHA-1 SeND Messages Subnet Prefix Interface Identifier Crypto. Generated Address 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 14

Adding a X.509 certificate to RA Subject Name contains the list of authorized IPv6 prefixes Trust Anchor X.509 cert X.509 Router Advertisement cert Source Addr = CGA CGA param block (incl pub key) Signed 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 15

Prevent Node-Node Layer-2 communication by using: Private VLANs (PVLAN) where nodes (isolated port) can only contact the official router (promiscuous port) Promiscuous Port WLAN in AP Isolation Mode 1 VLAN per host (SP access network with Broadband Network Gateway) RA RA Isolated Port Link-local multicast (RA, DHCP request, etc) sent only to the local official router: no harm RA RA RA 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 16

Port ACL blocks all ICMPv6 RA from hosts interface FastEthernet0/2 ipv6 traffic-filter ACCESS_PORT in access-group mode prefer port RA RA-guard lite (12.2(33)SXI4 & 12.2(54)SG ): also dropping all RA received on this port interface FastEthernet0/2 ipv6 nd raguard access-group mode prefer port RA-guard (12.2(50)SY) ipv6 nd raguard policy HOST device-role host ipv6 nd raguard policy ROUTER device-role router ipv6 nd raguard attach-policy HOST vlan 100 interface FastEthernet0/0 ipv6 nd raguard attach-policy ROUTER RA RA RA RA 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 17

host? Configuration- based Learning-based Challenge-based Verification succeeded? I am the default gateway Router Advertisement Option: prefix(s) Bridge RA Switch selectively accepts or rejects RAs based on various criteria s Can be ACL based, learning based or challenge (SeND) based. Hosts see only allowed RAs, and RAs with allowed content 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 18

IPv6 hdr HopByHop Routing Fragment1 Destination IPv6 hdr HopByHop Routing Fragment2 TCP Data Layer 4 header is in 2 nd fragment 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 19

IPv6 hdr HopByHop Routing Fragment1 Destination IPv6 hdr HopByHop Routing Fragment2 Destination ICMP type=134 ICMP header is in 2 nd fragment, RA Guard has no clue where to find it! 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 20

Internet 1) I want IPv6, send RA 2) Sending RA with prefix for autoconfiguration 3) Yahoo! IPv6 3) Yahoo! IPv6 3) Yahoo! IPv6 3) Yahoo! IPv6 IPv4 protection: iptables IPv4 protection: ipfw IPv4 Protection: Security center 4) Default protection IPv6 Protection: No ip6tables IPv6 Protection: No ip6fw IPv6 Protection: Security center 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 21

2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 22

Security Mechanisms Built into Discovery Protocol = None A! B! => Very similar to ARP Src = A Dst = Solicited-node multicast of B ICMP type = 135 Data = link-layer address of A Query: what is your link address? Attack Tool: Parasite6 Answer to all NS, Claiming to Be All Systems in the LAN... A and B Can Now Exchange Packets on This Link Src = B Dst = A ICMP type = 136 Data = link-layer address of B 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 23

Duplicate Address Detection (DAD) Uses Neighbor Solicitation to Verify the Existence of an Address to Be Configured A! B! Src = :: Dst = Solicited-node multicast of A ICMP type = 135 Data = link-layer address of A Query = what is your link address? From RFC 4862 5.4: «If a duplicate @ is discovered the address cannot be assigned to the interface» What If: Use MAC@ of the Node You Want to DoS and Claim Its IPv6 @ Attack Tool: Dos-new-IPv6 Mitigation in IOS: Configuring the IPv6 address as anycast disables DAD on the interface 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 24

Pretty much like RA: no authentication Any node can steal the IP address of any other node Impersonation leading to denial of service or MITM Requires layer-2 adjacency IETF SAVI Source Address Validation Improvements (work in progress) 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 25

Where Routers & Hosts Routers & Hosts Switch (First Hop) Switch (First Hop) What configure static neighbor cache entries Use CryptoGraphic Addresses (SeND CGA) Host isolation Address watch Glean addresses in NDP and DHCP Establish and enforce rules for address ownership 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 26

Neighbor Advertisement Source Addr = CGA CGA param block (incl pub key) Signed 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 27

If a switch wants to enforce the mappings < IP address, MAC address> how to learn them? Multiple source of information SeND: verify signature in NDP messages, then add the mapping DHCP: snoop all messages from DHCP server to learn mapping (same as in IPv4) NDP: more challenging, but first come, first served The first node claiming to have an address will have it 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 28

H1 H2 H3 NS [IP source=a 1, LLA=MAC H1 ] Binding table ADR MAC VLAN IF A 1 MAC H1 100 P1 A 21 MAC H2 100 P2 A 22 MAC H2 100 P2 A 3 MAC H3 100 P3 DHCPserver REQUEST [XID, SMAC = MAC H2 ] REPLY[XID, IP=A 21, IP=A 22 ] data [IP source=a 3, SMAC=MAC H3 ] DAD NS [IP source=unspec, target = A 3 ] DHCP LEASEQUERY NA [IP source=a 3, LLA=MAC H3 ] DHCP LEASEQUERY_REPLY Then, drop all Neighbor Discovery packets not matching the binding... 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 29

2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 30

Remote Remote router CPU/memory DoS attack if aggressive scanning Router will do Neighbor Discovery... And waste CPU and memory Local router DoS with NS/RS/ NS: 2001:db8::3 NS: 2001:db8::2 NS: 2001:db8::1 NS: 2001:db8::3 NS: 2001:db8::2 NS: 2001:db8::1 2001:db8::1 NS: 2001:db8::3 NS: 2001:db8::2 NS: 2001:db8::1 2001:db8::/64 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 31

Mainly an implementation issue Rate limiter on a global and per interface Prioritize renewal (PROBE) rather than new resolution Maximum Neighbor cache entries per interface and per MAC address Internet edge/presence: a target of choice Ingress ACL permitting traffic to specific statically configured (virtual) IPv6 addresses only Allocate and configure a /64 but uses addresses fitting in a /120 in order to have a simple ingress ACL 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 32

Ingress ACL allowing only valid destination and dropping the rest NDP cache & process are safe Requires DHCP or static configuration of hosts 2001:db8::1 NS: 2001:db8::1 NA: 2001:db8::1 2001:db8::/64 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 33

2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 34

Without a secure layer-2, there is no upper layer security Rogue Router Advertisement is the most common threat Mitigation techniques Host isolation Secure Neighbor Discovery: but not a lot of implementations SAVI-based techniques: discovery the right information and dropping RA/NA with wrong information Last remaining issue: (overlapped) fragments => drop all fragments Neighbor cache exhaustion Use good implementation Expose only a small part of the addresses and block the rest via ACL Products are now available implementing the techniques ;-) 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 35

And a shameless plug 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 36

Thank you.