SlideShare uma empresa Scribd logo
1 de 36
Baixar para ler offline
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1
Eric Vyncke, Distinguished Engineer, evyncke@cisco.com
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
Sometimes, newer means better and more secure
Sometimes, experience IS better and safer!
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
340,282,366,920,938,463,374,607,432,768,211,456
(IPv6 Address Space - 340 Trillion Trillion Trillion)
vs
4,294,967,296
(IPv4 Address Space - 4 Billion)
•  Let’s assume that an atom represents 4 Billion Addresses
•  You would need 80,000 Kgs of Atoms to represent IPv6!!!!
.
An Atom
An 80 Tonne Whale
(Lots of Atoms)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
•  Default subnets in IPv6 have 264 addresses
10 Mpps = more than 50 000 years
•  NMAP doesn’t even support ping sweeps on
IPv6 networks, it only works for port scans
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
•  Public servers will still need to be DNS reachable
⇒ More information collected by Google...
•  Increased deployment/reliance on dynamic DNS
⇒ More information will be in DNS
•  Using peer-to-peer clients gives IPv6 addresses of peers
•  Administrators may adopt easy-to-remember addresses (::
10,::20,::F00D, ::C5C0, :ABBA:BABE or simply IPv4 last octet for dual
stack)
•  By compromising hosts in a network, an attacker can learn new
addresses to scan
•  Transition techniques derive IPv6 address from IPv4 address
⇒ can scan again
IPv6 huge addressing space was never design to
prevent scanning, only to allow Internet growth ;-)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Remote
•  Remote router CPU/memory DoS attack if aggressive scanning
Router will do Neighbor Discovery... And waste CPU and memory
•  Local router DoS with NS/RS/…
2001:db8::/64
2001:db8::1
NS: 2001:db8::1
NS: 2001:db8::2
NS: 2001:db8::3
NS: 2001:db8::1
NS: 2001:db8::2
NS: 2001:db8::3
NS: 2001:db8::1
NS: 2001:db8::2
NS: 2001:db8::3
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
•  Built-in rate limiter with options to tune it
Since 15.1(3)T: ipv6 nd cache interface-limit
Or IOS-XE 2.6: ipv6 nd resolution data limit
Destination-guard is part of First Hop Security phase 3
Priority given to refresh existing entries vs. discovering new ones
•  Using a /64 on point-to-point links => a lot of addresses to scan!
Using /127 could help (RFC 6164)
•  Internet edge/presence: a target of choice
Ingress ACL permitting traffic to specific statically configured (virtual)
IPv6 addresses only
•  Using infrastructure ACL prevents this scanning
iACL: edge ACL denying packets addressed to your routers
Easy with IPv6 because new addressing scheme J
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
•  Viruses and email, IM worms: IPv6 brings no change
•  Other worms:
IPv4: reliance on network scanning
IPv6: not so easy (see reconnaissance) => will use
alternative techniques
§  Worm developers will adapt to IPv6
§  IPv4 best practices around worm detection and
mitigation remain valid
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
•  In 1997, IPv6 mandated the implementation of IPsec (but not its use)
•  Now, RFC 6434 “IPsec SHOULD be supported by all IPv6 nodes”
•  Some organizations believe that IPsec should be used to secure all
flows...
Interesting scalability issue
Need to trust endpoints and end-users because the network cannot secure
the traffic: no IPS, no ACL, no firewall
Network telemetry is blinded: IPfix, NetFlow of little use
Network services hindered: what about QoS?
Recommendation: do not use IPsec end to end within an
administrative domain.
Suggestion: Reserve IPsec for residential or hostile environment or
high profile targets EXACTLY as for IPv4
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
IPv6
Intranet	

•  Same as in IPv4
•  Bogon filtering (data plane & BGP route map):
http://www.cymru.com/Bogons/ipv6.txt
•  Anti-spoofing: uRPF
Inter-Networking Device
with uRPF Enabled
IPv6 Unallocated
Source Address
X IPv6 Intranet/
Internet	

No Route to SrcAddr => Drop
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
1.  RS:
Data = Query: please send RA
2.  RA:
Data= options, prefix, lifetime,
A+M+O flags
2. RA1. RS
RA w/o Any
Authentication
Gives Exactly Same
Level of Security as
DHCPv4 (None)
Router Advertisements contain:
- Prefix to be used by hosts
- Data-link layer address of the router
- Miscellaneous options: MTU, DHCPv6
use, …
Last come, first used
2. RA
DoSMITM
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
•  Devastating:
Denial of service: all traffic sent to a black hole
Man in the Middle attack: attacker can intercept, listen, modify unprotected
data
•  Also affects legacy IPv4-only network with IPv6-enabled hosts
•  Most of the time from non-malicious users
•  Requires layer-2 adjacency(some relief…)
•  It was the major blocking factor for enterprise IPv6 deployment
pretty much like IPv4 ARP spoofing/rogue DHCPv4
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
•  GOOD NEWS: dynamic ARP inspection for IPv6 is available
First phase (Port ACL & RA Guard) available in Cisco IOS since Summer 2010
Second phase (NDP & DHCP snooping) available in Cisco IOS since Summer
2011
http://www.cisco.com/en/US/docs/ios/ipv6/configuration/guide/ip6-
first_hop_security.html
•  (kind of) GOOD NEWS: Secure Neighbor Discovery
SeND = NDP + crypto
IOS 12.4(24)T
But not in Windows Vista, 2008 and 7, Mac OS/X, iOS, Android
Crypto means slower...
•  Other GOOD NEWS:
Private VLAN works with IPv6
Port security works with IPv6
IEEE 801.X works with IPv6 (except downloadable ACL)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Isolated Port
•  Prevent Node-Node Layer-2
communication by using:
Private VLANs (PVLAN) where nodes (isolated
port) can only contact the official router
(promiscuous port)
WLAN in ‘AP Isolation Mode’
1 VLAN per host (SP access network with
Broadband Network Gateway)
•  Link-local multicast (RA, DHCP request,
etc) sent only to the local official router:
no harm done by rogue RA
Side effect: it also disables DAD... If prefix
is advertised as on-link
RA
RA
RA
RA
RA
Promiscuous
Port
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
•  Port ACL blocks all ICMPv6 RA from hosts
interface FastEthernet0/2
ipv6 traffic-filter ACCESS_PORT in
access-group mode prefer port
•  RA-guard lite (12.2(33)SXI4 & 12.2(54)SG ): also
dropping all RA received on this port
interface FastEthernet0/2
ipv6 nd raguard
access-group mode prefer port
•  RA-guard (12.2(50)SY, 15.0(2)SE)
ipv6 nd raguard policy HOST device-role host
ipv6 nd raguard policy ROUTER device-role router
ipv6 nd raguard attach-policy HOST vlan 100
interface FastEthernet0/0
ipv6 nd raguard attach-policy ROUTER
!
RA
RA
RA
RA
RA
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
•  Significant changes
•  More relied upon
•  => ICMP policy on firewalls needs to change
ICMP Message Type ICMPv4 ICMPv6
Connectivity Checks X X
Informational/Error Messaging X X
Fragmentation Needed Notification X X
Address Assignment X
Address Resolution X
Router Discovery X
Multicast Group Management X
Mobile IPv6 Support X
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Internet
Internal Server A
Action Src Dst
ICMPv4
Type
ICMPv4
Code
Name
Permit Any A 0 0 Echo Reply
Permit Any A 8 0 Echo Request
Permit Any A 3 0
Dst. Unreachable—
Net Unreachable
Permit Any A 3 4
Dst. Unreachable—
Frag. Needed
Permit Any A 11 0
Time Exceeded—
TTL Exceeded
For Your
Reference
Border Firewall Policy
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
For Your
Reference
RFC 4890: Border Firewall Transit Policy
Internet
Internal Server A
Action Src Dst
ICMPv6
Type
ICMPv6
Code
Name
Permit Any A 128 0 Echo Reply
Permit Any A 129 0 Echo Request
Permit Any A 1 0 No Route to Dst.
Permit Any A 2 0 Packet Too Big
Permit Any A 3 0
Time Exceeded—
TTL Exceeded
Permit Any A 4 0 Parameter Problem
Needed for
Teredo traffic
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Internet
Internal Server A
Firewall B
Action Src Dst
ICMPv6
Type
ICMPv6
Code
Name
Permit Any B 2 0 Packet too Big
Permit Any B 4 0 Parameter Problem
Permit Any B 130–132 0 Multicast Listener
Permit Any B 135/136 0
Neighbor Solicitation
and Advertisement
Deny Any Any
For Your
Reference
RFC 4890: Border Firewall Receive Policy
For locally
generated
traffic
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
•  Application layer attacks
The majority of vulnerabilities on the Internet today are at the application
layer, something that IPSec will do nothing to prevent
•  Rogue devices
Rogue devices will be as easy to insert into an IPv6 network as in IPv4
•  Man-in-the-Middle Attacks (MITM)
Without strong mutual authentication, any attacks utilizing MITM will
have the same likelihood in IPv6 as in IPv4
•  Flooding
Flooding attacks are identical between IPv4 and IPv6
•  Sniffing
IPv6 is no more or less likely to fall victim to a sniffing attack than IPv4
Good news
IPv4 IPS signatures can be re-
used
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
•  Temporary addresses for IPv6 host client application,
e.g. web browser
Inhibit device/user tracking
Random 64 bit interface ID, then run Duplicate Address Detection
before using it
Rate of change based on local policy
•  Enabled by default in Windows, Android, iOS 4.3, Mac OS/X 10.7
2001
/32 /48 /64/23
Interface ID
Recommendation: Use Privacy Extensions for
External Communication but not for Internal
Networks (Troubleshooting and Attack Trace Back)
IETF Work in progress: unpredictable but stable addresses
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
•  Network Prefix Translation, RFC 6296,
1:1 stateless prefix translation allowing all inbound/outbound packets.
Main use case: multi-homing
•  Else, IETF has not specified any N:1 stateful translation (aka overload NAT
or NAPT) for IPv6
IETF has not specified N:1 or 1:1 NAT for IPv4 anyway, this is a vendor thing
•  Do not mix stateful firewall and NAPT even if they are often co-located
•  Nowadays, NAPT (for IPv4) does not help security
Host OS are way more resilient than in 2000
Hosts are mobile and cannot always be behind your ‘controlled NAPT’
Malware are not injected from ‘outside’ but are fetched from the ‘inside’ by visiting
weird sites or installing any trojanized application
Nearly 80% of the Torpig-infected hosts were behind a NAPT...
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Stone-Gross et al., “Your Botnet is My Botnet: Analysis of a Botnet Takeover”, 2009
http://www.cs.ucsb.edu/~rgilbert/pubs/torpig_ccs09.pdf
“ 
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
•  Payment Card Industry Data Security Standard (latest revision October 2010):
Requirement 1.3.8 Do not disclose private IP addresses and routing information to
unauthorized parties.
Note: Methods to obscure IP addressing may include, but are not limited to: Network
Address Translation (NAT)
•  è how to comply with PCI DSS
Application proxies or SOCKS
Strict data plane filtering with ACL
Strict routing plane filtering with BGP route-maps
•  Cisco IPv6 design for PCI with IPv6
http://www.cisco.com/en/US/docs/solutions/Enterprise/Compliance/
Compliance_DG/PCI_20_DG.pdf
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
•  Unlimited size of header chain (spec-wise) can make
filtering difficult
•  Potential DoS with poor IPv6 stack implementations
More boundary conditions to exploit
Can I overrun buffers with a lot of extension headers?
•  Mitigation: use firewall or IPS to drop packets which violate extension header
specification
Perfectly Valid IPv6 Packet
According to the Sniffer
Destination Options Header Should
Be the Last
Header Should Only Appear Once
Destination Header Which Should
Occur at Most Twice
See also: http://www.cisco.com/en/US/technologies/tk648/tk872/technologies_white_paper0900aecd8054d37d.html
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
•  Finding the layer 4 information is not trivial in IPv6
Skip all known extension header
Until either known layer 4 header found => MATCH
Or unknown extension header/layer 4 header found... => NO MATCH
IPv6 hdr HopByHop Routing AH TCP data
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
•  RFC 3128 is not applicable to IPv6, extension header can be fragmented
•  ICMP header could be in 2nd fragment after a fragmented extension header
•  RA Guard works like a stateless ACL filtering ICMP type 134
•  THC fake_router6 –FD implements this attack which bypasses RA Guard
•  Partial work-around: block all fragments sent to ff02::1
•  If supported, deny undetermined-transport blocks this attack (work item at IETF)
IPv6 hdr HopByHop Routing Destination …Fragment1
ICMP header is in 2nd fragment,
RA Guard has no clue where to
find it!
IPv6 hdr HopByHop Fragment2 ICMP type=134Routing … Destination
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
•  16+ methods, possibly in combination
•  Dual stack
Consider security for both protocols
Cross v4/v6 abuse
Resiliency (shared resources)
•  Tunnels
Bypass firewalls (protocol 41 or UDP)
Can cause asymmetric traffic (hence breaking stateful firewalls)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
•  Host security on a dual-stack device
Applications can be subject to attack on both IPv6 and IPv4
Fate sharing: as secure as the least secure stack...
•  Host security controls should block and inspect traffic from both IP
versions
Host intrusion prevention, personal firewalls, VPN
clients, etc.
Dual Stack Client
With host firewall
Does the host firewall stop an
inbound IPv6 exploit?
IPv6 HDR Exploit
Host firewall is configured to
stop an inbound IPv4 exploit?
IPv4 HDR Exploit
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
•  Your host:
IPv4 is protected by your favorite personal firewall...
IPv6 is enabled by default (Vista, Linux, Mac OS/X, ...)
•  Your network:
Does not run IPv6
•  Your assumption:
I’m safe
•  Reality
You are not safe
Attacker sends Router Advertisements
Your host configures silently to IPv6
You are now under IPv6 attack
•  => Probably time to think about IPv6 in your network
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
•  Finding all hosts:
Address enumeration does not work for IPv6
Need to rely on DNS or NDP caches or NetFlow
•  Vulnerability scanning
IPv4 global address, IPv6 global address(es) (if any), IPv6 link-local address
Some services are single stack only (currently mostly IPv4 but who knows...)
Personal firewall rules could be different between IPv4/IPv6
•  IPv6 vulnerability scanning MUST be done for IPv4 & IPv6
even in an IPv4-only network
IPv6 link-local addresses are active by default
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
•  ASA Firewall
Since version 7.0 (released 2005)
Flexibility: Dual stack, IPv6 only, IPv4 only
SSL VPN for IPv6 over IPv4 (ASA 8.0) over IPv6 (ASA 9.0)
Stateful-Failover (ASA 8.2.2)
Extension header filtering and inspection (ASA 8.4.2)
Dual-stack ACL & object grouping (ASA 9.0)
•  ASA-SM
Leverage ASA code base, same features ;-) 16 Gbps of IPv6 throughput
•  IOS Firewall
IOS 12.3(7)T (released 2005)
Zone-based firewall on IOS-XE 3.6 (2012)
•  IPS
Since 6.2 (released 2008)
•  Email Security Appliance (ESA) under beta testing since 2010, IPv6 support since 7.6.1 (May 2012)
•  Web Security Appliance (WSA) with explicit proxy then transparent mode, work in progress (end of 2013 or
early 2014)
•  Cisco Cloud Web Security (ScanSafe) expected to be available in 2013 or early 2014
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 33
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
•  So, nothing really new in IPv6
Reconnaissance: address enumeration replaced by DNS enumeration
Spoofing & bogons: uRPF is our IP-agnostic friend
NDP spoofing: RA guard and more features coming
ICMPv6 firewalls need to change policy to allow NDP
Extension headers: firewall & ACL can process them
Fragmentation: undetermined-transport is your friend
•  Lack of operation experience may hinder security for a while: training is
required
•  Security enforcement is possible, IETF and the industry have done a
good job
Control your IPv6 traffic as you do for IPv4
•  Leverage IPsec to secure IPv6 when suitable
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 35
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Source: Cisco Press

Mais conteúdo relacionado

Mais procurados

Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8
Babaa Naya
 

Mais procurados (20)

Cisco Connect Montreal 2017 - Optimizing Your Client's Wi-Fi Experience
Cisco Connect Montreal 2017 - Optimizing Your Client's Wi-Fi ExperienceCisco Connect Montreal 2017 - Optimizing Your Client's Wi-Fi Experience
Cisco Connect Montreal 2017 - Optimizing Your Client's Wi-Fi Experience
 
02 - IDNOG04 - Sheryl Hermoso (APNIC) - IPv6 Deployment at APNIC
02 - IDNOG04 - Sheryl Hermoso (APNIC) - IPv6 Deployment at APNIC02 - IDNOG04 - Sheryl Hermoso (APNIC) - IPv6 Deployment at APNIC
02 - IDNOG04 - Sheryl Hermoso (APNIC) - IPv6 Deployment at APNIC
 
Network Function Virtualization (NFV) using IOS-XR
Network Function Virtualization (NFV) using IOS-XRNetwork Function Virtualization (NFV) using IOS-XR
Network Function Virtualization (NFV) using IOS-XR
 
Software Stacks to enable SDN and NFV
Software Stacks to enable SDN and NFVSoftware Stacks to enable SDN and NFV
Software Stacks to enable SDN and NFV
 
Phifer 3 30_04
Phifer 3 30_04Phifer 3 30_04
Phifer 3 30_04
 
pps Matters
pps Matterspps Matters
pps Matters
 
Henrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveHenrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspective
 
Application Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowApplication Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible Netflow
 
TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6
TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6
TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6
 
IPv6-strategic-planning-framework
IPv6-strategic-planning-frameworkIPv6-strategic-planning-framework
IPv6-strategic-planning-framework
 
Swisscom: Testing von IPv6 Security Devices
Swisscom: Testing von IPv6 Security DevicesSwisscom: Testing von IPv6 Security Devices
Swisscom: Testing von IPv6 Security Devices
 
IPv6 Security und Hacking
IPv6 Security und HackingIPv6 Security und Hacking
IPv6 Security und Hacking
 
Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...
Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...
Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...
 
Eric Vyncke - IPv6 Security Vendor Point of View
Eric Vyncke - IPv6 Security Vendor Point of ViewEric Vyncke - IPv6 Security Vendor Point of View
Eric Vyncke - IPv6 Security Vendor Point of View
 
Model driven telemetry
Model driven telemetryModel driven telemetry
Model driven telemetry
 
Secure collab on prem hikmat
Secure collab on prem   hikmatSecure collab on prem   hikmat
Secure collab on prem hikmat
 
Multicast in OpenStack
Multicast in OpenStackMulticast in OpenStack
Multicast in OpenStack
 
Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8
 
Route Origin Validation With Routinator - A MANRS Approach for Operators
Route Origin Validation With Routinator - A MANRS Approach for OperatorsRoute Origin Validation With Routinator - A MANRS Approach for Operators
Route Origin Validation With Routinator - A MANRS Approach for Operators
 
Meraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopMeraki Cloud Networking Workshop
Meraki Cloud Networking Workshop
 

Destaque

IPv6 and the IP Security Protocol
IPv6 and the IP Security ProtocolIPv6 and the IP Security Protocol
IPv6 and the IP Security Protocol
Miguel Luis
 

Destaque (9)

IPv6 and the IP Security Protocol
IPv6 and the IP Security ProtocolIPv6 and the IP Security Protocol
IPv6 and the IP Security Protocol
 
AF-23- IPv6 Security_Final
AF-23- IPv6 Security_FinalAF-23- IPv6 Security_Final
AF-23- IPv6 Security_Final
 
The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)
 
IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?
 
IPv6 Security
IPv6 SecurityIPv6 Security
IPv6 Security
 
Eric Vyncke - IPv6 security in general
Eric Vyncke - IPv6 security in generalEric Vyncke - IPv6 security in general
Eric Vyncke - IPv6 security in general
 
IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015
 
Survey on IPv6 security issues
Survey on IPv6 security issuesSurvey on IPv6 security issues
Survey on IPv6 security issues
 
IPV6 SIMPLE SECURITY CAPABILITIES
IPV6 SIMPLE SECURITY CAPABILITIESIPV6 SIMPLE SECURITY CAPABILITIES
IPV6 SIMPLE SECURITY CAPABILITIES
 

Semelhante a IPv6 Security - Myths and Reality

Semelhante a IPv6 Security - Myths and Reality (20)

Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?
 
Обеспечение безопасности сети оператора связи с помощью BGP FlowSpec
Обеспечение безопасности сети оператора связи с помощью BGP FlowSpecОбеспечение безопасности сети оператора связи с помощью BGP FlowSpec
Обеспечение безопасности сети оператора связи с помощью BGP FlowSpec
 
IPv6 and IP Multicast… better together?
IPv6 and IP Multicast… better together?IPv6 and IP Multicast… better together?
IPv6 and IP Multicast… better together?
 
Getting started with IPv6
Getting started with IPv6Getting started with IPv6
Getting started with IPv6
 
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
 
Cisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advanceCisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advance
 
2014/09/02 Cisco UCS HPC @ ANL
2014/09/02 Cisco UCS HPC @ ANL2014/09/02 Cisco UCS HPC @ ANL
2014/09/02 Cisco UCS HPC @ ANL
 
Deploying IPv6 in Cisco's Labs by Robert Beckett at gogoNET LIVE! 3 IPv6 Conf...
Deploying IPv6 in Cisco's Labs by Robert Beckett at gogoNET LIVE! 3 IPv6 Conf...Deploying IPv6 in Cisco's Labs by Robert Beckett at gogoNET LIVE! 3 IPv6 Conf...
Deploying IPv6 in Cisco's Labs by Robert Beckett at gogoNET LIVE! 3 IPv6 Conf...
 
Rapid IPv6 Deployment for ISP Networks
Rapid IPv6 Deployment for ISP NetworksRapid IPv6 Deployment for ISP Networks
Rapid IPv6 Deployment for ISP Networks
 
IPV6 - Threats and Countermeasures / Crash Course
IPV6 - Threats and Countermeasures / Crash CourseIPV6 - Threats and Countermeasures / Crash Course
IPV6 - Threats and Countermeasures / Crash Course
 
Fb i pv6-sparchimanv1.0
Fb i pv6-sparchimanv1.0Fb i pv6-sparchimanv1.0
Fb i pv6-sparchimanv1.0
 
DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec
 
Fedv6tf-fhs
Fedv6tf-fhsFedv6tf-fhs
Fedv6tf-fhs
 
Introduction to Segment Routing
Introduction to Segment RoutingIntroduction to Segment Routing
Introduction to Segment Routing
 
OpenStack Havana over IPv6
OpenStack Havana over IPv6OpenStack Havana over IPv6
OpenStack Havana over IPv6
 
Design and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANsDesign and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANs
 
BGP evolution -from SDN perspective
BGP evolution -from SDN perspectiveBGP evolution -from SDN perspective
BGP evolution -from SDN perspective
 
IPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for MobilesIPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for Mobiles
 
ACI Hands-on Lab
ACI Hands-on LabACI Hands-on Lab
ACI Hands-on Lab
 
IPv6
IPv6IPv6
IPv6
 

Mais de Swiss IPv6 Council

Members geneva dos and donts of transition silvia hagen
Members geneva   dos and donts of transition silvia hagen Members geneva   dos and donts of transition silvia hagen
Members geneva dos and donts of transition silvia hagen
Swiss IPv6 Council
 

Mais de Swiss IPv6 Council (18)

IPv6 Adressvergabe und Adressierung
IPv6 Adressvergabe und AdressierungIPv6 Adressvergabe und Adressierung
IPv6 Adressvergabe und Adressierung
 
Intro Swiss IPv6 Council Event, 24. März 2014
Intro Swiss IPv6 Council Event, 24. März 2014Intro Swiss IPv6 Council Event, 24. März 2014
Intro Swiss IPv6 Council Event, 24. März 2014
 
IPv6 Integration im Datacenter - wie komplex ist es wirklich?
IPv6 Integration im Datacenter - wie komplex ist es wirklich?IPv6 Integration im Datacenter - wie komplex ist es wirklich?
IPv6 Integration im Datacenter - wie komplex ist es wirklich?
 
Dual-Stack IPv6 Monitoring bei AWK - Member Anlass Swiss IPv6 Council Nov 2013
Dual-Stack IPv6 Monitoring bei AWK - Member Anlass Swiss IPv6 Council Nov 2013Dual-Stack IPv6 Monitoring bei AWK - Member Anlass Swiss IPv6 Council Nov 2013
Dual-Stack IPv6 Monitoring bei AWK - Member Anlass Swiss IPv6 Council Nov 2013
 
IPv6 bei PostFinance AG - Erste Erkenntnisse aus der Vorstudie
IPv6 bei PostFinance AG - Erste Erkenntnisse aus der VorstudieIPv6 bei PostFinance AG - Erste Erkenntnisse aus der Vorstudie
IPv6 bei PostFinance AG - Erste Erkenntnisse aus der Vorstudie
 
IPv6 bei der Post - Step by Step zu IPv6
IPv6 bei der Post - Step by Step zu IPv6IPv6 bei der Post - Step by Step zu IPv6
IPv6 bei der Post - Step by Step zu IPv6
 
SIG IPv6 Provider "IPv6 Ready"
SIG IPv6 Provider "IPv6 Ready"SIG IPv6 Provider "IPv6 Ready"
SIG IPv6 Provider "IPv6 Ready"
 
Dos And Donts Of IPv6 Transition
Dos And Donts Of IPv6 TransitionDos And Donts Of IPv6 Transition
Dos And Donts Of IPv6 Transition
 
Members geneva dos and donts of transition silvia hagen
Members geneva   dos and donts of transition silvia hagen Members geneva   dos and donts of transition silvia hagen
Members geneva dos and donts of transition silvia hagen
 
IPv6 solutions for an easy implementation
IPv6 solutions for an easy implementationIPv6 solutions for an easy implementation
IPv6 solutions for an easy implementation
 
IPv6 Adoption --- Acceleration
IPv6 Adoption --- AccelerationIPv6 Adoption --- Acceleration
IPv6 Adoption --- Acceleration
 
IPv6 Transition
IPv6 TransitionIPv6 Transition
IPv6 Transition
 
Network Neutrality - What's At Stake
Network Neutrality - What's At StakeNetwork Neutrality - What's At Stake
Network Neutrality - What's At Stake
 
Der Einsatz von Lisp für die IPv6 Migration
Der Einsatz von Lisp für die IPv6 MigrationDer Einsatz von Lisp für die IPv6 Migration
Der Einsatz von Lisp für die IPv6 Migration
 
LISP Update
LISP UpdateLISP Update
LISP Update
 
IPv6 at CSCS
IPv6 at CSCSIPv6 at CSCS
IPv6 at CSCS
 
IPv6 strategy for deployment at ETH Switzerland
IPv6 strategy for deployment at ETH SwitzerlandIPv6 strategy for deployment at ETH Switzerland
IPv6 strategy for deployment at ETH Switzerland
 
IPv6 Enterprise Planning
IPv6 Enterprise PlanningIPv6 Enterprise Planning
IPv6 Enterprise Planning
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

IPv6 Security - Myths and Reality

  • 1. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 Eric Vyncke, Distinguished Engineer, evyncke@cisco.com
  • 2. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2 Sometimes, newer means better and more secure Sometimes, experience IS better and safer!
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 340,282,366,920,938,463,374,607,432,768,211,456 (IPv6 Address Space - 340 Trillion Trillion Trillion) vs 4,294,967,296 (IPv4 Address Space - 4 Billion) •  Let’s assume that an atom represents 4 Billion Addresses •  You would need 80,000 Kgs of Atoms to represent IPv6!!!! . An Atom An 80 Tonne Whale (Lots of Atoms)
  • 4. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 •  Default subnets in IPv6 have 264 addresses 10 Mpps = more than 50 000 years •  NMAP doesn’t even support ping sweeps on IPv6 networks, it only works for port scans
  • 5. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 •  Public servers will still need to be DNS reachable ⇒ More information collected by Google... •  Increased deployment/reliance on dynamic DNS ⇒ More information will be in DNS •  Using peer-to-peer clients gives IPv6 addresses of peers •  Administrators may adopt easy-to-remember addresses (:: 10,::20,::F00D, ::C5C0, :ABBA:BABE or simply IPv4 last octet for dual stack) •  By compromising hosts in a network, an attacker can learn new addresses to scan •  Transition techniques derive IPv6 address from IPv4 address ⇒ can scan again IPv6 huge addressing space was never design to prevent scanning, only to allow Internet growth ;-)
  • 6. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Remote •  Remote router CPU/memory DoS attack if aggressive scanning Router will do Neighbor Discovery... And waste CPU and memory •  Local router DoS with NS/RS/… 2001:db8::/64 2001:db8::1 NS: 2001:db8::1 NS: 2001:db8::2 NS: 2001:db8::3 NS: 2001:db8::1 NS: 2001:db8::2 NS: 2001:db8::3 NS: 2001:db8::1 NS: 2001:db8::2 NS: 2001:db8::3
  • 7. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 •  Built-in rate limiter with options to tune it Since 15.1(3)T: ipv6 nd cache interface-limit Or IOS-XE 2.6: ipv6 nd resolution data limit Destination-guard is part of First Hop Security phase 3 Priority given to refresh existing entries vs. discovering new ones •  Using a /64 on point-to-point links => a lot of addresses to scan! Using /127 could help (RFC 6164) •  Internet edge/presence: a target of choice Ingress ACL permitting traffic to specific statically configured (virtual) IPv6 addresses only •  Using infrastructure ACL prevents this scanning iACL: edge ACL denying packets addressed to your routers Easy with IPv6 because new addressing scheme J
  • 8. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8 •  Viruses and email, IM worms: IPv6 brings no change •  Other worms: IPv4: reliance on network scanning IPv6: not so easy (see reconnaissance) => will use alternative techniques §  Worm developers will adapt to IPv6 §  IPv4 best practices around worm detection and mitigation remain valid
  • 9. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9 •  In 1997, IPv6 mandated the implementation of IPsec (but not its use) •  Now, RFC 6434 “IPsec SHOULD be supported by all IPv6 nodes” •  Some organizations believe that IPsec should be used to secure all flows... Interesting scalability issue Need to trust endpoints and end-users because the network cannot secure the traffic: no IPS, no ACL, no firewall Network telemetry is blinded: IPfix, NetFlow of little use Network services hindered: what about QoS? Recommendation: do not use IPsec end to end within an administrative domain. Suggestion: Reserve IPsec for residential or hostile environment or high profile targets EXACTLY as for IPv4
  • 10. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10 IPv6 Intranet •  Same as in IPv4 •  Bogon filtering (data plane & BGP route map): http://www.cymru.com/Bogons/ipv6.txt •  Anti-spoofing: uRPF Inter-Networking Device with uRPF Enabled IPv6 Unallocated Source Address X IPv6 Intranet/ Internet No Route to SrcAddr => Drop
  • 11. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11 1.  RS: Data = Query: please send RA 2.  RA: Data= options, prefix, lifetime, A+M+O flags 2. RA1. RS RA w/o Any Authentication Gives Exactly Same Level of Security as DHCPv4 (None) Router Advertisements contain: - Prefix to be used by hosts - Data-link layer address of the router - Miscellaneous options: MTU, DHCPv6 use, … Last come, first used 2. RA DoSMITM
  • 12. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12 •  Devastating: Denial of service: all traffic sent to a black hole Man in the Middle attack: attacker can intercept, listen, modify unprotected data •  Also affects legacy IPv4-only network with IPv6-enabled hosts •  Most of the time from non-malicious users •  Requires layer-2 adjacency(some relief…) •  It was the major blocking factor for enterprise IPv6 deployment pretty much like IPv4 ARP spoofing/rogue DHCPv4
  • 13. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13 •  GOOD NEWS: dynamic ARP inspection for IPv6 is available First phase (Port ACL & RA Guard) available in Cisco IOS since Summer 2010 Second phase (NDP & DHCP snooping) available in Cisco IOS since Summer 2011 http://www.cisco.com/en/US/docs/ios/ipv6/configuration/guide/ip6- first_hop_security.html •  (kind of) GOOD NEWS: Secure Neighbor Discovery SeND = NDP + crypto IOS 12.4(24)T But not in Windows Vista, 2008 and 7, Mac OS/X, iOS, Android Crypto means slower... •  Other GOOD NEWS: Private VLAN works with IPv6 Port security works with IPv6 IEEE 801.X works with IPv6 (except downloadable ACL)
  • 14. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14 Isolated Port •  Prevent Node-Node Layer-2 communication by using: Private VLANs (PVLAN) where nodes (isolated port) can only contact the official router (promiscuous port) WLAN in ‘AP Isolation Mode’ 1 VLAN per host (SP access network with Broadband Network Gateway) •  Link-local multicast (RA, DHCP request, etc) sent only to the local official router: no harm done by rogue RA Side effect: it also disables DAD... If prefix is advertised as on-link RA RA RA RA RA Promiscuous Port
  • 15. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15 •  Port ACL blocks all ICMPv6 RA from hosts interface FastEthernet0/2 ipv6 traffic-filter ACCESS_PORT in access-group mode prefer port •  RA-guard lite (12.2(33)SXI4 & 12.2(54)SG ): also dropping all RA received on this port interface FastEthernet0/2 ipv6 nd raguard access-group mode prefer port •  RA-guard (12.2(50)SY, 15.0(2)SE) ipv6 nd raguard policy HOST device-role host ipv6 nd raguard policy ROUTER device-role router ipv6 nd raguard attach-policy HOST vlan 100 interface FastEthernet0/0 ipv6 nd raguard attach-policy ROUTER ! RA RA RA RA RA
  • 16. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16 •  Significant changes •  More relied upon •  => ICMP policy on firewalls needs to change ICMP Message Type ICMPv4 ICMPv6 Connectivity Checks X X Informational/Error Messaging X X Fragmentation Needed Notification X X Address Assignment X Address Resolution X Router Discovery X Multicast Group Management X Mobile IPv6 Support X
  • 17. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17 Internet Internal Server A Action Src Dst ICMPv4 Type ICMPv4 Code Name Permit Any A 0 0 Echo Reply Permit Any A 8 0 Echo Request Permit Any A 3 0 Dst. Unreachable— Net Unreachable Permit Any A 3 4 Dst. Unreachable— Frag. Needed Permit Any A 11 0 Time Exceeded— TTL Exceeded For Your Reference Border Firewall Policy
  • 18. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18 For Your Reference RFC 4890: Border Firewall Transit Policy Internet Internal Server A Action Src Dst ICMPv6 Type ICMPv6 Code Name Permit Any A 128 0 Echo Reply Permit Any A 129 0 Echo Request Permit Any A 1 0 No Route to Dst. Permit Any A 2 0 Packet Too Big Permit Any A 3 0 Time Exceeded— TTL Exceeded Permit Any A 4 0 Parameter Problem Needed for Teredo traffic
  • 19. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19 Internet Internal Server A Firewall B Action Src Dst ICMPv6 Type ICMPv6 Code Name Permit Any B 2 0 Packet too Big Permit Any B 4 0 Parameter Problem Permit Any B 130–132 0 Multicast Listener Permit Any B 135/136 0 Neighbor Solicitation and Advertisement Deny Any Any For Your Reference RFC 4890: Border Firewall Receive Policy For locally generated traffic
  • 20. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20 •  Application layer attacks The majority of vulnerabilities on the Internet today are at the application layer, something that IPSec will do nothing to prevent •  Rogue devices Rogue devices will be as easy to insert into an IPv6 network as in IPv4 •  Man-in-the-Middle Attacks (MITM) Without strong mutual authentication, any attacks utilizing MITM will have the same likelihood in IPv6 as in IPv4 •  Flooding Flooding attacks are identical between IPv4 and IPv6 •  Sniffing IPv6 is no more or less likely to fall victim to a sniffing attack than IPv4 Good news IPv4 IPS signatures can be re- used
  • 21. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21 •  Temporary addresses for IPv6 host client application, e.g. web browser Inhibit device/user tracking Random 64 bit interface ID, then run Duplicate Address Detection before using it Rate of change based on local policy •  Enabled by default in Windows, Android, iOS 4.3, Mac OS/X 10.7 2001 /32 /48 /64/23 Interface ID Recommendation: Use Privacy Extensions for External Communication but not for Internal Networks (Troubleshooting and Attack Trace Back) IETF Work in progress: unpredictable but stable addresses
  • 22. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22 •  Network Prefix Translation, RFC 6296, 1:1 stateless prefix translation allowing all inbound/outbound packets. Main use case: multi-homing •  Else, IETF has not specified any N:1 stateful translation (aka overload NAT or NAPT) for IPv6 IETF has not specified N:1 or 1:1 NAT for IPv4 anyway, this is a vendor thing •  Do not mix stateful firewall and NAPT even if they are often co-located •  Nowadays, NAPT (for IPv4) does not help security Host OS are way more resilient than in 2000 Hosts are mobile and cannot always be behind your ‘controlled NAPT’ Malware are not injected from ‘outside’ but are fetched from the ‘inside’ by visiting weird sites or installing any trojanized application Nearly 80% of the Torpig-infected hosts were behind a NAPT...
  • 23. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23 Stone-Gross et al., “Your Botnet is My Botnet: Analysis of a Botnet Takeover”, 2009 http://www.cs.ucsb.edu/~rgilbert/pubs/torpig_ccs09.pdf “ 
  • 24. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24 •  Payment Card Industry Data Security Standard (latest revision October 2010): Requirement 1.3.8 Do not disclose private IP addresses and routing information to unauthorized parties. Note: Methods to obscure IP addressing may include, but are not limited to: Network Address Translation (NAT) •  è how to comply with PCI DSS Application proxies or SOCKS Strict data plane filtering with ACL Strict routing plane filtering with BGP route-maps •  Cisco IPv6 design for PCI with IPv6 http://www.cisco.com/en/US/docs/solutions/Enterprise/Compliance/ Compliance_DG/PCI_20_DG.pdf
  • 25. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25 •  Unlimited size of header chain (spec-wise) can make filtering difficult •  Potential DoS with poor IPv6 stack implementations More boundary conditions to exploit Can I overrun buffers with a lot of extension headers? •  Mitigation: use firewall or IPS to drop packets which violate extension header specification Perfectly Valid IPv6 Packet According to the Sniffer Destination Options Header Should Be the Last Header Should Only Appear Once Destination Header Which Should Occur at Most Twice See also: http://www.cisco.com/en/US/technologies/tk648/tk872/technologies_white_paper0900aecd8054d37d.html
  • 26. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26 •  Finding the layer 4 information is not trivial in IPv6 Skip all known extension header Until either known layer 4 header found => MATCH Or unknown extension header/layer 4 header found... => NO MATCH IPv6 hdr HopByHop Routing AH TCP data
  • 27. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27 •  RFC 3128 is not applicable to IPv6, extension header can be fragmented •  ICMP header could be in 2nd fragment after a fragmented extension header •  RA Guard works like a stateless ACL filtering ICMP type 134 •  THC fake_router6 –FD implements this attack which bypasses RA Guard •  Partial work-around: block all fragments sent to ff02::1 •  If supported, deny undetermined-transport blocks this attack (work item at IETF) IPv6 hdr HopByHop Routing Destination …Fragment1 ICMP header is in 2nd fragment, RA Guard has no clue where to find it! IPv6 hdr HopByHop Fragment2 ICMP type=134Routing … Destination
  • 28. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28 •  16+ methods, possibly in combination •  Dual stack Consider security for both protocols Cross v4/v6 abuse Resiliency (shared resources) •  Tunnels Bypass firewalls (protocol 41 or UDP) Can cause asymmetric traffic (hence breaking stateful firewalls)
  • 29. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29 •  Host security on a dual-stack device Applications can be subject to attack on both IPv6 and IPv4 Fate sharing: as secure as the least secure stack... •  Host security controls should block and inspect traffic from both IP versions Host intrusion prevention, personal firewalls, VPN clients, etc. Dual Stack Client With host firewall Does the host firewall stop an inbound IPv6 exploit? IPv6 HDR Exploit Host firewall is configured to stop an inbound IPv4 exploit? IPv4 HDR Exploit
  • 30. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30 •  Your host: IPv4 is protected by your favorite personal firewall... IPv6 is enabled by default (Vista, Linux, Mac OS/X, ...) •  Your network: Does not run IPv6 •  Your assumption: I’m safe •  Reality You are not safe Attacker sends Router Advertisements Your host configures silently to IPv6 You are now under IPv6 attack •  => Probably time to think about IPv6 in your network
  • 31. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31 •  Finding all hosts: Address enumeration does not work for IPv6 Need to rely on DNS or NDP caches or NetFlow •  Vulnerability scanning IPv4 global address, IPv6 global address(es) (if any), IPv6 link-local address Some services are single stack only (currently mostly IPv4 but who knows...) Personal firewall rules could be different between IPv4/IPv6 •  IPv6 vulnerability scanning MUST be done for IPv4 & IPv6 even in an IPv4-only network IPv6 link-local addresses are active by default
  • 32. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32 •  ASA Firewall Since version 7.0 (released 2005) Flexibility: Dual stack, IPv6 only, IPv4 only SSL VPN for IPv6 over IPv4 (ASA 8.0) over IPv6 (ASA 9.0) Stateful-Failover (ASA 8.2.2) Extension header filtering and inspection (ASA 8.4.2) Dual-stack ACL & object grouping (ASA 9.0) •  ASA-SM Leverage ASA code base, same features ;-) 16 Gbps of IPv6 throughput •  IOS Firewall IOS 12.3(7)T (released 2005) Zone-based firewall on IOS-XE 3.6 (2012) •  IPS Since 6.2 (released 2008) •  Email Security Appliance (ESA) under beta testing since 2010, IPv6 support since 7.6.1 (May 2012) •  Web Security Appliance (WSA) with explicit proxy then transparent mode, work in progress (end of 2013 or early 2014) •  Cisco Cloud Web Security (ScanSafe) expected to be available in 2013 or early 2014
  • 33. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 33
  • 34. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34 •  So, nothing really new in IPv6 Reconnaissance: address enumeration replaced by DNS enumeration Spoofing & bogons: uRPF is our IP-agnostic friend NDP spoofing: RA guard and more features coming ICMPv6 firewalls need to change policy to allow NDP Extension headers: firewall & ACL can process them Fragmentation: undetermined-transport is your friend •  Lack of operation experience may hinder security for a while: training is required •  Security enforcement is possible, IETF and the industry have done a good job Control your IPv6 traffic as you do for IPv4 •  Leverage IPsec to secure IPv6 when suitable
  • 35. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 35
  • 36. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36 Source: Cisco Press