IPv6 Security: Oxymoron or Oxycodone? NANOG 60 Atlanta Paul Ebersman IPv6

Similar documents
IPv6: Problems above Layer 3 Paul Ebersman, IPv6 PLNOG10, Warsaw, 28 Feb 2013

There are more layers than just layer 3 Paul Ebersman, IPv6 NANOG57, Orlando, FL (04-06 Feb 2013)

IPv6: Are we there yet? NANOG 58 New Orleans Paul Ebersman IPv6

IPv6 deployment for Enterprise/Sysadmins Paul NAv6 Summit 2013, Denver, Apr 2013

IPv6 and IPv4: Twins or Distant Relatives

Results of a Security Assessment of the Internet Protocol version 6 (IPv6)

SECURITY IN AN IPv6 WORLD MYTH & REALITY. RIPE 68 Warsaw May 2014 Chris Grundemann

Network Security. Thierry Sans

Don't have the plaid polyester leisure suit of IPv6 networks! Paul Ebersman, IPv6 Evangelist NANOG56, Dallas, TX (21-24 Oct 2012)

But we ve always done it this

Security in an IPv6 World Myth & Reality

IPv6 Security. David Kelsey (STFC-RAL) IPv6 workshop pre-gdb, CERN 7 June 2016

Recent advances in IPv6 insecurities reloaded Marc van Hauser Heuse GOVCERT NL Marc Heuse

IPv6 Security Fundamentals

Recent Advances in IPv6 Security. Fernando Gont

IPv6 Security Course Preview RIPE 76

IPv6 Security Safe, Secure, and Supported.

Adopting Innovative Detection Technique To Detect ICMPv6 Based Vulnerability Attacks

IPv6- IPv4 Threat Comparison v1.0. Darrin Miller Sean Convery

IPv6 Security (Theory vs Practice) APRICOT 14 Manila, Philippines. Merike Kaeo

AN INTRODUCTION TO ARP SPOOFING

IPv6 Traffic Hijack Test System and Defense Tools Using DNSSEC

Recent IPv6 Security Standardization Efforts. Fernando Gont

IPv6 Next generation IP

Insights on IPv6 Security

Recent Advances in IPv6 Security. Fernando Gont

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats

IPv6 Security Considerations: Future Challenges

IPv6 Implementation Best Practices For Service Providers

Insights on IPv6 Security

CSC 574 Computer and Network Security. TCP/IP Security

Recent Advances in IPv6 Security. Fernando Gont

ICS 451: Today's plan

DDoS Testing with XM-2G. Step by Step Guide

IPv6 Security Vendor Point of View. Eric Vyncke, Distinguished Engineer Cisco, CTO/Consulting Engineering

Recent Advances in IPv6 Security. Fernando Gont

IPv6 Associated Protocols. Athanassios Liakopoulos 6DEPLOY IPv6 Training, Skopje, June 2011

Security Considerations for IPv6 Networks. Yannis Nikolopoulos

Securing the Transition Mechanisms

Next Generation IPv6 Cyber Security Protection Through Assure6i TM Product Line

CS 457 Lecture 11 More IP Networking. Fall 2011

Control Plane Protection

IPv6 Security awareness

Chapter 8 roadmap. Network Security

20-CS Cyber Defense Overview Fall, Network Basics

Realities of IPv6 as the Future Network Layer TelecomNEXT March 21, 2006

Recent Advances in IPv6 Security. Fernando Gont

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

EE 122 Fall 2010 Discussion Section III 5 October 2010

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

ECE 435 Network Engineering Lecture 23

Security Concerns With Tunneling draft-ietf-v6ops-tunnel-security-concerns-00

Internetwork Expert s CCNA Security Bootcamp. Mitigating Layer 2 Attacks. Layer 2 Mitigation Overview

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Filtering Trends Sorting Through FUD to get Sanity

IPv6 Specifications to Internet Standard

M0n0wall and IPSEC March 20, 2004 Version 1.1 Francisco Artes

ARP Inspection and the MAC Address Table

IPv6 Neighbor Discovery (ND) Problems with Layer-2 Multicast State

When does it work? Packet Sniffers. INFO Lecture 8. Content 24/03/2009

ECE 435 Network Engineering Lecture 14

Chapter 5. Security Components and Considerations.

CSE Computer Security

IPv6 Security Issues and Challenges

Tomáš Podermański, Matěj Grégr,

CSC 4900 Computer Networks: Network Layer

ARP, IP, TCP, UDP. CS 166: Introduction to Computer Systems Security 4/7/18 ARP, IP, TCP, UDP 1

IPv6 Security: Threats and Mitigation

ECE 435 Network Engineering Lecture 23

CYBER ATTACKS EXPLAINED: PACKET SPOOFING

The Layer-2 Insecurities of IPv6 and the Mitigation Techniques

Packet Header Formats

*Performance and capacities are measured under ideal testing conditions using PAN-OS.0. Additionally, for VM

It's the economy, stupid: the transition from IPv4 to IPv6

A Framework for Optimizing IP over Ethernet Naming System

Securing IPv6 Networks: ft6 & friends. Oliver Eggert, Simon Kiertscher

Homework 3 Discussion

STEVEN R. BAGLEY PACKETS

CSCI 680: Computer & Network Security

ELEC5616 COMPUTER & NETWORK SECURITY

The Layer-2 Security Issues and the Mitigation

TD#RNG#2# B.Stévant#

A Study of Two Different Attacks to IPv6 Network

A novel design for maximum use of public IP Space by ISPs one IP per customer

*Performance and capacities are measured under ideal testing conditions using PAN-OS 8.0. Additionally, for VM

Lab1. Definition of Sniffing: Passive Sniffing: Active Sniffing: How Does ARP Spoofing (Poisoning) Work?

Wireless Network Security

Max sessions (IPv4 or IPv6) 500, , ,000

OSI Data Link & Network Layer

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

ARP Inspection and the MAC Address Table for Transparent Firewall Mode

CSC 6575: Internet Security Fall Attacks on Different OSI Layer Protocols OSI Layer Basic Attacks at Lower Layers

A Review on ICMPv6 Vulnerabilities and its Mitigation Techniques: Classification and Art

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

Address Resolution Protocol (ARP), RFC 826

Welcome to PHOENIX CONTACT Routing

CSc 466/566. Computer Security. 18 : Network Security Introduction

Selected Network Security Technologies

Modular Policy Framework. Class Maps SECTION 4. Advanced Configuration

Rocky Mountain IPv6 Summit April 9, 2008

Transcription:

IPv6 Security: Oxymoron or Oxycodone? NANOG 60 Atlanta Paul Ebersman IPv6 Evangelist @Paul_IPv6, pebersman@infoblox.com 2013 Infoblox Inc. All Rights Reserved. 1

So many new security issues with IPv6! 2013 Infoblox Inc. All Rights Reserved. 2

Or are there 2013 Infoblox Inc. All Rights Reserved. 3

IPv6 Security issues Same problem, different name A few myths & misconceptions Actual new issues FUD (Fear Uncertainty & Doubt) 2013 Infoblox Inc. All Rights Reserved. 4

Round up the usual suspects! 2013 Infoblox Inc. All Rights Reserved. 5

Remember these? ARP cache poisoning P2p ping pong attacks Rogue DHCP 2013 Infoblox Inc. All Rights Reserved. 6

ARP cache poisoning Bad guy broadcasts fake ARP Hosts on subnet put bad entry in ARP Cache Result: MiM or DOS 2013 Infoblox Inc. All Rights Reserved. 7

Ping pong attack P2P link with subnet > /31 Bad buy sends packet for addr in subnet but not one of two routers Result: Link clogs with routers sending packet back and forth 2013 Infoblox Inc. All Rights Reserved. 8

Rogue DHCP Client broadcasts DHCP request Bad guy sends DHCP offer w/his bad router as default GW Client now sends all traffic to bad GW Result: MiM or DOS 2013 Infoblox Inc. All Rights Reserved. 9

Look similar? Neighbor cache corruption P2p ping pong attacks Rogue DHCP + rogue RA 2013 Infoblox Inc. All Rights Reserved. 10

Solutions? Lock down local wire /127s for p2p links (RFC 6164) RA Guard (RFC 6105) 2013 Infoblox Inc. All Rights Reserved. 11

And now for something completely different! 2013 Infoblox Inc. All Rights Reserved. 12

So what is new? Extension header chains Packet/Header fragmentation Predictable fragment headers Atomic fragments Tunnels 2013 Infoblox Inc. All Rights Reserved. 13

The IPv4 Packet 2013 Infoblox Inc. All Rights Reserved. 14

The IPv6 Packet 2013 Infoblox Inc. All Rights Reserved. 15

Fragmentation Minimum 1280 bytes Only source host can fragment Destination must get all fragments What happens if someone plays with fragments? 2013 Infoblox Inc. All Rights Reserved. 16

IPv6 Extension Header Chains No limit on length Deep packet inspection bogs down Confuses stateless firewalls Fragments a problem See RFC 7112 2013 Infoblox Inc. All Rights Reserved. 17

Predictable Fragments Fragment Header ID field No requirement other than unique Some implementations predictable draft-gont-6man-predictable-fragment-id 2013 Infoblox Inc. All Rights Reserved. 18

Results of predicting ID Determine the packet rate Perform stealth port scans Uncover the rules of a number of firewalls Count the # of systems behind a middle-box Perform a Denial of Service (DoS) attack 2013 Infoblox Inc. All Rights Reserved. 19

Atomic Fragments Packet w/fragment Header but not fragmented Usually forced by forged Packet too big msg Fragments can overlap Results: various fragmentation attacks possible See RFC 6946 2013 Infoblox Inc. All Rights Reserved. 20

Tunnels ACLs catch port/ip/protocol Some IPv6 tunnels don t use standard port/ip/protocol Signatures 2013 Infoblox Inc. All Rights Reserved. 21

Reality Most of these attacks are complicated Most attackers are lazy and will find easier vectors of attack But, there are toolsets out there: http://www.si6networks.com/tools/ipv6toolkit Beat on your vendors! 2013 Infoblox Inc. All Rights Reserved. 22

You re already running IPv6 2013 Infoblox Inc. All Rights Reserved. 23

I m not using IPv6 Are you running: Windows 8, Server 2012, Vista or newer Windows clustering Mac OSX Any modern LINUX or FreeBSD 2013 Infoblox Inc. All Rights Reserved. 24

Guess again Congratulations, you re running IPv6 2013 Infoblox Inc. All Rights Reserved. 25

Get used to it Test now Train your staff Beat on your vendors Monitor it, don t try to disable it 2013 Infoblox Inc. All Rights Reserved. 26

But everybody says 2013 Infoblox Inc. All Rights Reserved. 27

IPSEC: the myth IPSEC in IPv6 is better than IPv4 because it was designed in and mandated. 2013 Infoblox Inc. All Rights Reserved. 28

IPSEC: the reality RFCs said MUST support IPSEC (but softening to SHOULD ) Didn t define support, let vendors do it Vendors shipped, didn t enable No PKI 2013 Infoblox Inc. All Rights Reserved. 29

IPv6 is HUGE! So big you can t scan it Unless you don t really use it 2013 Infoblox Inc. All Rights Reserved. 30

Use the space we have Give the whole /64 to DHCP pools Randomize address assignments across the whole /64 Avoid EUI-64 (draft-gont-6man-deprecateeui64-based-addresses) 2013 Infoblox Inc. All Rights Reserved. 31

It s the end of the world as we know it! 2013 Infoblox Inc. All Rights Reserved. 32

IPv6 will destroy the Internet! Apps will break Firewalls won t work ICMP is scary We don t understand it so it must be insecure 2013 Infoblox Inc. All Rights Reserved. 33

Apps Yes, you will need to test and possibly rewrite all your code You need to reach everyone, including mobile devices Most bad ideas also in IPv4 code 2013 Infoblox Inc. All Rights Reserved. 34

If it was wrong in IPv4 Hard coding IP addresses Not checking inputs/sizes Using relative DNS labels No longer have source Not tested since Y2K 2013 Infoblox Inc. All Rights Reserved. 35

Where to read more RIPE presentation: https://ripe66.ripe.net/presentations/134- Making_an_application_fully_IPv6_compliant_(2).pdf 2013 Infoblox Inc. All Rights Reserved. 36

Firewalls won t work What do you do if your gear doesn t meet your needs? Beat on your vendors until it does But you need to know what to ask for 2013 Infoblox Inc. All Rights Reserved. 37

ICMP is scary, turn it off! ICMPv4 wasn t that scary ICMPv6 is much more tightly defined Read RFC 4890 2013 Infoblox Inc. All Rights Reserved. 38

We don t understand it, so If someone is telling you that IPv6 is evil incarnate, it s because: They are a vendor that doesn t support IPv6 but their competitors do They are trying to sell you a security product 2013 Infoblox Inc. All Rights Reserved. 39

Test!!! 2013 Infoblox Inc. All Rights Reserved. 40

Know what you need And ask for it! Hold vendors to IPv6 support Use the USGv6 standard: http://www-x.antd.nist.gov/usgv6 2013 Infoblox Inc. All Rights Reserved. 41

Q & A 2013 Infoblox Inc. All Rights Reserved. 42

Thank you! 2013 Infoblox Inc. All Rights Reserved. 43