SlideShare uma empresa Scribd logo
1 de 73
IPv6 Security Implications
Eric Oosting
VP, Core Routing Practice
eoosting@netuf.net +1-404-941-6678
1Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
IPv4 and IPv6: Brief History
• Internet Protocol version 4
– 1978: Developed for ARPANET
– 4 billion addresses
– Allocation based on documented need
– Deployed globally and well entrenched
• Internet Protocol version 6
– IETF forecasts IPv4 depletion between 2010 and 2017
– 1996: IPv6 design begins
– 340 undecillion addresses
– 1999: Completed, tested, and available
⎻ Management and use similar to IPv4
⎻ Today: IPv4 address pool is already depleted for
many RIRs as of 2014.
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
The Case for IPv6
Limitations of IPv4
• IPv4 address space
exhaustion
• Exponential Internet
growth
• Requirement for
security at the IP level
• Need for simpler
configuration
• Support for real-time
delivery of data
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
Exponential Internet Growth
• Internet Users or PC
• Emerging
population/geopolitical
and Address space
• PDA, Tablet, Notepad,…
• Mobile phones
• Transportation
• Planes, cars
• Consumer devices
• Billions of Home and
Industrial Appliances
Interim Solutions...
• Drop address classes A, B,
and C
• Assign addresses in power-
of-two chunks
• Assign several Class C
addresses instead of one
Class B address
• Assign providers large
contiguous address block to
be used for customers
• Advertise chunks instead of
individual address
assignments
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
Conservation Efforts
• PPP / DHCP address
sharing
• CIDR (classless inter-
domain routing)
• NAT (network address
translation)
• Address reclamation
Deployment Benefits
• Chance to eliminate some complexity in IP header
• Improve per-hop processing
• Chance to upgrade functionality
– Multicast, QoS, mobility
• Chance to include new features
• Binding updates
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
IPv6 Features
• Larger address space
• Simplified header format
• Stateless and stateful address configuration
• QoS:
– Hierarchical architecture for prioritized delivery
– Integrated services (int-serv), Differentiated
Services (DiffServ)
• Required IPSec header support
• Multicast interaction
• Support for mobility
• Extensibility
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
IPv4 vs IPv6
Length in Bits 32 128
Amount of Addresses 232
4,294,967,296
2128
340,282,366,920,939,463,374,607,43
1,768,211,456
Address Format Dotted Decimal
192.168.100.1
Hexadecimal
Dynamic Addressing DHCP SLAAC/DHCPv6
IPSec Optional Mandatory
Header Length Variable Fixed
Minimal Packet Size 576 bytes
(fragmented)
1280 bytes
Header Checksum Yes No
Header Options Yes No (extensions)
Flow No Packet Flow Label
Packet Structure
IPv6 Format and Header
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
IPv6
Header
Upper layer
Protocol Data Unit
Payload
IPv6 Packet
Extension
Headers
Chain of Pointers from Next Header
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
IPv6 Header
Next Header = 6
(TCP)
TCP Segment
IPv6 Header
Next Header = 43
(Routing)
TCP SegmentRouting Header
Next Header = 6
(TCP)
Authentication Header
Next Header = 6 (TCP)
IPv6 Header
Next Header = 43
(Routing)
Routing Header
Next Header = 51
(AH)
TCP Segment
IPv6 Fragmentation
Broken into two pieces:
• Unfragmentable Part
– Includes main header of original datagram + any
extension headers that need to be present in each
fragment. Must be present in each fragment
• Hop-By-Hop Options, Destination Options (for options
processed by devices along route) and Routing
• Fragmentable Part
– Data portion of the datagram + other extension headers
if present
• Authentication Header, Encapsulating Security Payload
and/or Destination Options (for options processed
only by final destination)
– Split up among fragments
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
IPv6 Fragmentation
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
Unfragmentable
part
Fragmentable part
First fragment
Fragment
Hdr
Unfragmentable
part
Second fragment
Fragment
Hdr
Unfragmentable
part
Third
fragment
Fragment
Hdr
Original IPv6 Packet
Interface ID
• Two Parts:
– 64-bit network prefix
used for routing
– 64-bit interface identifier
used to identify a host’s
network interface
• 64 bits long
– Derived from EUI-64
addresses
• Combined with a network
prefix, (routing prefix and
subnet ID), to determine a
corresponding IPv6 address
for the device
• Unique within subnet prefix
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
• Lowest-order 64-bit field of
unicast address
– Assignment:
• Auto-configured from a 64-
bit EUI-64
• Expanded from a 48-bit
MAC address (e.g.,Ethernet
address)
• Auto-generated pseudo-
random number (privacy
concerns)
• Assigned via DHCP
• Manually configured
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
00 22 b0 75 b5 99
00 22 b0 75 b5 99
FF FE
00 22 b0 75 b5 99FF FE
0000 00X0 X=1, X is universal bit
02 22 b0 75 b5 99FF FE
IEEE 802 48-
bit MAC
IEEE 802 64-
bit MAC
IEEE EUI-64
Converting MAC to EUI-64
• Split MAC address
– First three octets of MAC: Company-ID
– Last three octets of MAC: Node-ID
• 0xfffe inserted between Company-ID and Node-ID
• Universal/Local-Bit (U/L-bit) is set to 1 for
global scope
ICMPv6
• Updated version of the Internet Control Message
Protocol (ICMP) for IPv6
• Reports delivery or forwarding errors and a simple
echo service for troubleshooting
• Provides a framework for:
– Multicast Listener Discovery (MLD)
– Neighbor Discovery (ND)
– Mobile IPv6
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
Functions
• Router discovery
• Prefix discovery
• Autoconfiguration of address & other parameters
• Duplicate address detection (DAD)
• Neighbor unreachability detection (NUD)
• Link-layer address resolution
• First-hop redirect
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
Neighbor Discovery (NDP)
• Messages and processes that determine relationships between
neighboring nodes
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
ND for Routers:
• Advertise their presence, host
config parameters, routes and
on-link preferences
• Inform hosts of best next-hop
address for destination
ND for Hosts:
• Address autoconfig of nodes
• Find routers and DNS server
ND for Nodes:
• Discover other nodes on link
and determine their link-layer
addresses
• Determine if neighboring
node’s link-layer address
changes and if still reachable
16
Router Solicitation (RS)
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
• RS Message sent by hosts at system startup and in
response to router solicitation messages
– Immediately autoconfigure without needing to wait for
next scheduled RA message
– Host does not have a configured unicast address
– Source address in router solicitation messages is usually
unspecified IPv6 address (0:0:0:0:0:0:0:0)
Router Advertisement (RA)
• Periodically sent out each configured interface of an
IPv6 router
• Used to announce network configuration information to
local hosts
• Advertised prefix length in RA messages must always
be 64 bits for autoconfiguration
• The RA messages are sent to the all-nodes multicast
address
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
Router Discovery: Process
1. IPv6 routers periodically send a Router Advertisement
message on the local link advertising their existence as
routers.
● Also provide configuration parameters such as default hop limit,
MTU, and prefixes
2. Active IPv6 hosts on local link receive the RA messages
● Use contents to maintain the default router list, the prefix list,
and other configuration parameters
3. Starting up Host sends a Router Solicitation message
4. Receipt of RA message, all routers on the local link send
unicast RA message to node that sent the Router Solicitation
5. Node receives RA messages
● Use contents to build default router and prefix lists, set other
configuration parameters
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
Autoconfiguration Overview
• IPv6 interfaces can configure
themselves
– Even without a stateful
configuration protocol
(DHCPv6)
– Link-local address for
each interface by default
• Host uses router discovery to
determine:
– Additional addresses
– Router addresses
– Other configuration
parameters
• DHCP is available
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
• Hosts use RA to construct
address
– Subnet prefix(es): learned
from periodic multicast
advertisement from
neighboring router(s)
– Interface IDs: generated
locally
– MAC addresses: pseudo-
random temporary
• Other IP-layer parameters also
learned from router adverts
(router addresses,
recommended hop limit,
etc…)
• Higher-layer info discovered
by multicast/ anycast-based
service-location protocol
Types of Autoconfiguration
1. Stateless (SLAAC)
– Receipt of Router Advertisement messages with one or more
Prefix Information options
2. Stateful
– Use of a stateful address configuration protocol such as DHCPv6
3. Both
– Receipt of Router Advertisement messages and stateful
configuration protocol
For all types, a link-local address is always configured
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
Neighbor Solicitation (NS) Message
• Determine link-layer address of another node
– Source address in an NS message is the IPv6 address of the
node sending the neighbor solicitation message
• Destination (Target) address in NS message
– Solicited-node multicast address corresponding to the IPv6
address of the destination node
• Includes the link-layer address of the source node
• Used to verify reachability of a neighbor after the
link-layer address of a neighbor is identified
• To verify the reachability of a neighbor, destination
address in an NS message is the neighbor’s unicast
address.
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
Neighbor Advertisement (NA) Message
• Informs mapping of an IPv6 address to a link-layer address
• Destination node replies to neighbor solicitation message
on the local link
• Source and destination addresses are in the NA message
– Source: IPv6 address of the node interface sending the
neighbor advertisement message
– Destination (Target): IPv6 address of the node that sent the
neighbor solicitation message.
• Data portion of NA message includes link-layer address of
the node sending the neighbor advertisement message
• NA messages are also sent in response to change
in the link-layer address of node on local link
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
Address Resolution
• An exchange of Neighbor Solicitation and Neighbor
Advertisement messages to resolve the link-layer
address of the next-hop address
– Multicast Neighbor Solicitation message
– Unicast Neighbor Advertisement message
• Both hosts update their neighbor caches
• Unicast traffic can now be sent
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
Redirect Message
• Router informs Inform hosts of better first hop for a
destination
• Router must be able to determine link-local address for
each neighboring router
– Ensure the target address in a redirect message identifies
the neighbor router by its link-local address
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
Neighbor Function Equivalents
IPv4 Neighbor Function IPv6 Neighbor Function
ARP Request message Neighbor Solicitation message
ARP Reply message Neighbor Advertisement
message
ARP cache Neighbor cache
Gratuitous ARP Duplicate Address Detection
(DAD)
Router Solicitation message
(optional)
Router Solicitation (required)
Router Advertisement message
(optional)
Router Advertisement
(required)
Redirect message Redirect message
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
Neighbor Reachabilty
• Host A acquires the link-layer address of neighbor
Host B
• Host A can use NS and NA messages to check
whether Host B is reachable
1. Host A sends an NS message whose destination address
is the IPv6 address of Host B
2. If Host A receives an NA message from Host B, Host A
decides that Host B is reachable Otherwise, Host B is
unreachable
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
DHCPv6
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
• DHCPv6 infrastructure
– Clients, servers, relay agents
• Key Differences from IPv4
– On-Link flag in the Prefix Information option
• Directly attached subnet route for a DHCPv6-assigned IPv6
address not configured by IPv6 hosts automatically
– Default route configured from RA
• No default route assignment in DHCPv6
Provides stateful or stateless address configuration
settings for IPv6 hosts
DHCPv6 Communication
• User Datagram Protocol (UDP) messages
– DHCPv6 clients listen on UDP port 546
– DHCPv6 servers and relay agents listen on UDP port 547
• Multicast addresses
– DHCPv6 servers and relay agents listen on ff02::1:2
– DHCPv6 client sends messages to ff02::1:2
• Relay agent forwards multicasts as unicasts to configured
DHCPv6 servers
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
DUID
• Clients use the DHCP Unique Identifier (DUID) to
get an IP address from a DHCPv6 server
• 2 byte type field + type specific variable length data
– Minimum length of 12 bytes (96 bits) and a maximum
length of 20 bytes (160 bits).
– Server compares DUID with its database and delivers
configuration data (address, lease times, DNS servers,
etc…) to the client
• Must be globally unique but easy to generate
• Three types:
– LL: Link-layer address
– LLT:Link-layer address + time
– EN: Vendor-assigned unique ID based on
Enterprise number
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only 30
DUID Types
0 32 bits 31
15 16
Hardware Type
Link Layer Address
DUID Type: 1
Time
DUID LLT
Identifier
Enterprise Number
0
32 bits
DUID Type: 2
31
15 16
Enterprise Number (cont’d)
DUID EN
0
32 bits
31
15 16
Link Layer Address
Hardware TypeDUID Type: 3
0
0
DUID LL
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only 31
Attribution
32
The following slides are courtesy of Chris
Grundemann - Internet Society
CO ISOC Founder
NANOG-BCOP Chair
IPv6 Author (Juniper Day One Books)
IETF Contributor
More: http://chrisgrundemann.com
9/3/2015 Chris Grundemann
This section…
33
• Aims to debunk the most common IPv6 security myths
• Is NOT a comprehensive look at IPv6 security practices
• Should scare you a little
• Should NOT discourage IPv6 Deployment
– The more you know…
9/3/2015 Chris Grundemann
SOME MYTHS…
Let’s get to busting
349/3/2015 Chris Grundemann
MYTH:
I’M NOT RUNNING IPV6, I DON’T
HAVE TO WORRY
359/3/2015 Chris Grundemann
Reality:
Your Applications are Using IPv6
Already
36
MYTH:
I’M NOT RUNNING IPV6, I DON’T
HAVE TO WORRY
• Linux, Mac OS X, BSD, and Microsoft Vista/Windows 7
systems all come with IPv6 capability, some even have
IPv6 enabled by default (IPv6 preferred)
• They may try to use IPv6 first and then fall-back to IPv4
• If you are not protecting your IPv6 nodes then you have just
allowed a huge back-door to exist!
9/3/2015 Chris Grundemann
Reality:
Your Users are Using IPv6 Already
37
MYTH:
I’M NOT RUNNING IPV6, I DON’T
HAVE TO WORRY
9/3/2015 Chris Grundemann
IPv4
IPv4 Firewall
Reality:
Your Users are Using IPv6 Already
6to4 / Toredo
38
MYTH:
I’M NOT RUNNING IPV6, I DON’T
HAVE TO WORRY
9/3/2015 Chris Grundemann
IPv4 Firewall
IPv6 IPv6
MYTH:
IPv6 Has Security Designed In
399/3/2015 Chris Grundemann
MYTH:
IPv6 Has Security Designed In
40
• IPsec exists for IPv4
• IPsec mandates in IPv6 are no guarantee of security
– Also are no longer in place
REALITY:
IPSEC IS NOT NEW
9/3/2015 Chris Grundemann
MYTH:
IPv6 Has Security Designed In
41
REALITY:
IPV6 WAS DESIGNED 15-20 YEARS AGO
9/3/2015 Chris Grundemann
Reality:
Extension Headers
42http://www.cisco.com/en/US/technologies/tk648/tk872/technologies_white_paper0900aecd
8054d37d.html
9/3/2015 Chris Grundemann
MYTH:
IPv6 Has Security Designed In
43
• Routing Header Type 0 (RH0) – Source Routing
– Deprecated in RFC 5095:
The functionality provided by IPv6's Type 0 Routing Header can be
exploited in order to achieve traffic amplification over a remote path
for the purposes of generating denial-of-service traffic.
REALITY:
9/3/2015 Chris Grundemann
MYTH:
IPv6 Has Security Designed In
44
• Hop-by-Hop Options Header
– Vulnerable to low bandwidth DOS attacks
– Threat detailed in draft-krishnan-ipv6-hopbyhop
REALITY:
9/3/2015 Chris Grundemann
MYTH:
IPv6 Has Security Designed In
45
• Extension Headers are vulnerable in general
– Large extension headers
– Lots of extension headers
– Invalid extension headers
REALITY:
9/3/2015 Chris Grundemann
MYTH:
IPv6 Has Security Designed In
46
• Rogue Router Advertisements (RAs)
– Can renumber hosts
– Can launch a Man In The Middle attack
– Problem documented in RFC 6104
In this document, we summarise the scenarios in which rogue RAs may
be observed and present a list of possible solutions to the problem.
REALITY:
9/3/2015 Chris Grundemann
MYTH:
IPv6 Has Security Designed In
47
• Forged Neighbor Discovery messages
• ICMP Redirects – just like IPv4 redirects
• See RFC 6583 - Operational Neighbor Discovery Problems
REALITY:
9/3/2015 Chris Grundemann
MYTH:
IPv6 Has Security Designed In
48
• Buffer overflows
• SQL Injection
• Cross-site scripting
• E-mail/SPAM (open relays)
REALITY:
MANY ATTACKS ARE ABOVE OR BELOW IP
9/3/2015 Chris Grundemann
Myth:
NO IPv6 NAT Means Less Security
499/3/2015 Chris Grundemann
Myth:
NO IPv6 NAT Means Less Security
50
REALITY:
STATEFUL FIREWALLS PROVIDE SECURITY
• NAT can actually reduce security
9/3/2015 Chris Grundemann
Myth:
IPv6 Networks are too Big to Scan
519/3/2015 Chris Grundemann
Myth:
IPv6 Networks are too Big to Scan
52
• SLAAC - EUI-64 addresses (well known OUIs)
– Tracking!
• DHCPv6 sequential addressing (scan low numbers)
• 6to4, ISATAP, Teredo (well known addresses)
• Manual configured addresses (scan low numbers, vanity
addresses)
• Exploiting a local node
– ff02::1 - all nodes on the local network segment
– IPv6 Node Information Queries (RFC 4620)
– Neighbor discovery
• Leveraging IPv4 (Metasploit Framework “ipv6_neighbor”)
• IPv6 addresses leaked out by application-layer protocols (email)
REALITY:
9/3/2015 Chris Grundemann
Myth:
IPv6 Networks are too Big to Scan
53
• Privacy addresses use MD5 hash on EUI-64 and random number
• Often temporary – rotate addresses
– Frequency varies
– Often paired with dynamic DNS (firewall state updates?)
• Makes filtering, troubleshooting, and forensics difficult
• Alternative: Randomized DHCPv6
– Host: Randomized IIDs
– Server: Short leases, randomized assignments
REALITY:
PRIVACY ADDRESSES (RFC 4941)
9/3/2015 Chris Grundemann
Myth:
IPv6 is too New to be Attacked
549/3/2015 Chris Grundemann
Myth:
IPv6 is too New to be Attacked
55
• THC IPv6 Attack Toolkit
• SI6 IPv6 Toolkit
• IPv6 port scan tools
• IPv6 packet forgery tools
• IPv6 DoS tools
REALITY:
TOOLS ARE ALREADY AVAILABLE
9/3/2015 Chris Grundemann
Myth:
IPv6 is too New to be Attacked
56
• Vendors
• Open source software
REALITY:
BUGS AND VULNERABILITIES PUBLISHED
9/3/2015 Chris Grundemann
Myth:
IPv6 is too New to be Attacked
57
REALITY:
SEARCH FOR “SECURITYFOCUS.COM INURL:BID IPV6”
9/3/2015 Chris Grundemann
Myth:
96 more bits, no magic (It’s just like
IPv4)
589/3/2015 Chris Grundemann
Myth:
96 more bits, no magic (It’s just like
IPv4)
59
REALITY:
IPV6 ADDRESS FORMAT IS DRASTICALLY NEW
• 128 bits vs. 32 bits
• Hex vs. Decimal
• Colon vs. Period
• Multiple possible formats (zero suppression, zero
compression)
• Logging, grep, filters, etc.
9/3/2015 Chris Grundemann
Myth:
96 more bits, no magic (It’s just like
IPv4)
60
REALITY:
MULTIPLE ADDRESSES ON EACH HOST
• Same host appears in logs with different addresses
9/3/2015 Chris Grundemann
Myth:
96 more bits, no magic (It’s just like
IPv4)
61
REALITY:
SYNTAX CHANGES
• Training!
9/3/2015 Chris Grundemann
Myth:
Configure IPv6 Filters Same AS IPv4
629/3/2015 Chris Grundemann
Myth:
Configure IPv6 Filters Same As IPv4
63
REALITY:
DHCPV6 && ND INTRODUCE NUANCE
• Neighbor Discovery uses ICMP
• DHCPv6 message exchange:
• Solicit: [your link local]:546 -> [ff02::1:2]:547
• Advertise: [upstream link local]:547 -> [your link
local]:546
• and two more packets, both between your link locals.
9/3/2015 Chris Grundemann
Reality: Example Firewall Filter (mikrotik)
64
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; Not just ping - ND runs over icmp6.
chain=input action=accept protocol=icmpv6 in-interface=ether1-gateway
1 chain=input action=accept connection-state=established in-interface=ether1-
gateway
2 ;;; related means stuff like FTP-DATA
chain=input action=accept connection-state=related in-interface=ether1-
gateway
3 ;;; for DHCP6 advertisement (second packet, first server response)
chain=input action=accept protocol=udp src-address=fe80::/16 dst-
address=fe80::/16
in-interface=ether1-gateway dst-port=546
4 ;;; ssh to this box for management (note non standard port)
chain=input action=accept protocol=tcp dst-address=[myaddr]/128 dst-
port=2222
5 chain=input action=drop in-interface=ether1-gateway
9/3/2015 Chris Grundemann
Myth:
It supports IPv6
659/3/2015 Chris Grundemann
Myth:
It supports IPv6
66
REALITY:
IT PROBABLY DOESN’T
• Hardware, Software, Services, Applications (VM, Crypto, etc.)
• Detailed requirements (RFP)
• RIPE-554
• Lab testing
• Independent/outside verification
9/3/2015 Chris Grundemann
Myth:
There are no IPv6 Security BCPs yet
679/3/2015 Chris Grundemann
Myth:
There are no IPv6 Security BCPs yet
68
• Perform IPv6 filtering at the perimeter
• Use RFC2827 filtering and Unicast RPF checks throughout the network
• Use manual tunnels (with IPsec whenever possible) instead of dynamic
tunnels and deny packets for transition techniques not used
• Use common access-network security measures (NAC/802.1X, disable
unused switch ports, Ethernet port security, MACSec/TrustSec) because
SeND won’t be available any time soon
• Strive to achieve equal protections for IPv6 as with IPv4
• Continue to let vendors know what you expect in terms of IPv6 security
features
REALITY:
THERE ARE!
9/3/2015 Chris Grundemann
Myth:
There are no IPv6 Security Resources
699/3/2015 Chris Grundemann
Myth:
There are no IPv6 Security Resources
70
• IPv6 Security, By Scott Hogg and Eric Vyncke, Cisco Press, 2009
• CPNI Viewpoint: Security Implications of IPv6
• Operational Security Considerations for IPv6 Networks
• IPv6 Hackers is a forum for IPv6 security researchers and networking
pros
• Deploy360 has a section specifically on IPv6 Security
• Search engines are your friends! There’s lots more info out there!
REALITY:
THERE ARE!
9/3/2015 Chris Grundemann
The Reality of Dual-Stack
71
• Two sets of filters
• Two sets of bugs
IPv6IPv4
9/3/2015 Chris Grundemann
Thank you!
72
@ChrisGrundemann
http://chrisgrundemann.com
http://www.internetsociety.org/deploy3
60/
Gratitude and Credit:
• Scott Hogg – My IPv6 Security Guru
• Fernando Gont – For review
• Rob Seastrom – For the Mikrotik
example
• The Internet – Lots of searching
• You – Thanks for listening!
9/3/2015 Chris Grundemann
Brandon Ross
bross@netuf.net
404-635-6667
Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012,
Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only 73

Mais conteúdo relacionado

Mais procurados

Linux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic ControlLinux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic Controlsandy_vasan
 
Tech 2 Tech: Network performance
Tech 2 Tech: Network performanceTech 2 Tech: Network performance
Tech 2 Tech: Network performanceJisc
 
Mitigating worm attacks
Mitigating worm attacksMitigating worm attacks
Mitigating worm attacksdkaya
 
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010Priyanka Aash
 
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlowAuditor
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2Anne Starr
 
IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud
IEEE MACSec and NSA ESS: How to  Protect Your WAN, LAN and CloudIEEE MACSec and NSA ESS: How to  Protect Your WAN, LAN and Cloud
IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and CloudPriyanka Aash
 
Secure your network - Segmentation and segregation
Secure your network - Segmentation and segregationSecure your network - Segmentation and segregation
Secure your network - Segmentation and segregationMagnus Jansson
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Muhammad Usman
 
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...PROIDEA
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reportsShakib Ansaar
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRicha Singh
 

Mais procurados (20)

Linux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic ControlLinux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic Control
 
Vpn
VpnVpn
Vpn
 
Tech 2 Tech: Network performance
Tech 2 Tech: Network performanceTech 2 Tech: Network performance
Tech 2 Tech: Network performance
 
Mitigating worm attacks
Mitigating worm attacksMitigating worm attacks
Mitigating worm attacks
 
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
 
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2
 
Firewall and vpn
Firewall and vpnFirewall and vpn
Firewall and vpn
 
VPN Theory
VPN TheoryVPN Theory
VPN Theory
 
IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud
IEEE MACSec and NSA ESS: How to  Protect Your WAN, LAN and CloudIEEE MACSec and NSA ESS: How to  Protect Your WAN, LAN and Cloud
IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud
 
Cloud Architecture
Cloud ArchitectureCloud Architecture
Cloud Architecture
 
Secure your network - Segmentation and segregation
Secure your network - Segmentation and segregationSecure your network - Segmentation and segregation
Secure your network - Segmentation and segregation
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "
 
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
 
VPN Network
VPN NetworkVPN Network
VPN Network
 
VPN presentation - moeshesh
VPN presentation - moesheshVPN presentation - moeshesh
VPN presentation - moeshesh
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Securityic2
Securityic2Securityic2
Securityic2
 

Destaque

Eric Vyncke - IPv6 security in general
Eric Vyncke - IPv6 security in generalEric Vyncke - IPv6 security in general
Eric Vyncke - IPv6 security in generalIKT-Norge
 
IPv6 Technical Overview: Address Architecture, DHCPv6 and DNS
IPv6 Technical Overview: Address Architecture, DHCPv6 and DNSIPv6 Technical Overview: Address Architecture, DHCPv6 and DNS
IPv6 Technical Overview: Address Architecture, DHCPv6 and DNSNetwork Utility Force
 
Network Utility Force IPv6 training brochure
Network Utility Force IPv6 training brochureNetwork Utility Force IPv6 training brochure
Network Utility Force IPv6 training brochureNetwork Utility Force
 
IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?RIPE NCC
 
Survey on IPv6 security issues
Survey on IPv6 security issuesSurvey on IPv6 security issues
Survey on IPv6 security issuesbathinin1
 
Mobicents Summit 2012 - Silvano Girardi - InPhonex's migration to Mobicents S...
Mobicents Summit 2012 - Silvano Girardi - InPhonex's migration to Mobicents S...Mobicents Summit 2012 - Silvano Girardi - InPhonex's migration to Mobicents S...
Mobicents Summit 2012 - Silvano Girardi - InPhonex's migration to Mobicents S...telestax
 
IETF 90 Report – DNS, DHCP, IPv6 and DANE
IETF 90 Report – DNS, DHCP, IPv6 and DANEIETF 90 Report – DNS, DHCP, IPv6 and DANE
IETF 90 Report – DNS, DHCP, IPv6 and DANEMen and Mice
 
The Network Protocol Stack Revisited
The Network Protocol Stack RevisitedThe Network Protocol Stack Revisited
The Network Protocol Stack Revisitedinbroker
 
IPv6 Security - Myths and Reality
IPv6 Security - Myths and RealityIPv6 Security - Myths and Reality
IPv6 Security - Myths and RealitySwiss IPv6 Council
 
The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)Martin Schütte
 
IPv6 and the IP Security Protocol
IPv6 and the IP Security ProtocolIPv6 and the IP Security Protocol
IPv6 and the IP Security ProtocolMiguel Luis
 
IPV6 Addressing
IPV6 Addressing IPV6 Addressing
IPV6 Addressing Heba_a
 
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaIpv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaWardner Maia
 
Socket Programming in C++
Socket Programming in C++Socket Programming in C++
Socket Programming in C++saeed_delphi
 

Destaque (20)

IPv6 Security
IPv6 SecurityIPv6 Security
IPv6 Security
 
Eric Vyncke - IPv6 security in general
Eric Vyncke - IPv6 security in generalEric Vyncke - IPv6 security in general
Eric Vyncke - IPv6 security in general
 
IPv6 Technical Overview: Address Architecture, DHCPv6 and DNS
IPv6 Technical Overview: Address Architecture, DHCPv6 and DNSIPv6 Technical Overview: Address Architecture, DHCPv6 and DNS
IPv6 Technical Overview: Address Architecture, DHCPv6 and DNS
 
Network Utility Force IPv6 training brochure
Network Utility Force IPv6 training brochureNetwork Utility Force IPv6 training brochure
Network Utility Force IPv6 training brochure
 
IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?
 
Survey on IPv6 security issues
Survey on IPv6 security issuesSurvey on IPv6 security issues
Survey on IPv6 security issues
 
IPv6 Implementation and Migration
IPv6 Implementation and MigrationIPv6 Implementation and Migration
IPv6 Implementation and Migration
 
Mobicents Summit 2012 - Silvano Girardi - InPhonex's migration to Mobicents S...
Mobicents Summit 2012 - Silvano Girardi - InPhonex's migration to Mobicents S...Mobicents Summit 2012 - Silvano Girardi - InPhonex's migration to Mobicents S...
Mobicents Summit 2012 - Silvano Girardi - InPhonex's migration to Mobicents S...
 
IETF 90 Report – DNS, DHCP, IPv6 and DANE
IETF 90 Report – DNS, DHCP, IPv6 and DANEIETF 90 Report – DNS, DHCP, IPv6 and DANE
IETF 90 Report – DNS, DHCP, IPv6 and DANE
 
The Network Protocol Stack Revisited
The Network Protocol Stack RevisitedThe Network Protocol Stack Revisited
The Network Protocol Stack Revisited
 
I pv6
I pv6I pv6
I pv6
 
E payment 2
E payment 2E payment 2
E payment 2
 
IPv6 Security - Myths and Reality
IPv6 Security - Myths and RealityIPv6 Security - Myths and Reality
IPv6 Security - Myths and Reality
 
AF-23- IPv6 Security_Final
AF-23- IPv6 Security_FinalAF-23- IPv6 Security_Final
AF-23- IPv6 Security_Final
 
The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)
 
IPv6 and the IP Security Protocol
IPv6 and the IP Security ProtocolIPv6 and the IP Security Protocol
IPv6 and the IP Security Protocol
 
IPV6 Addressing
IPV6 Addressing IPV6 Addressing
IPV6 Addressing
 
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaIpv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
 
Socket Programming in C++
Socket Programming in C++Socket Programming in C++
Socket Programming in C++
 

Semelhante a IPv6 Security Challenges: TechNet Augusta 2015

Network Utility Force IPv6 NAT64 Presentation for North American IPv6 Summit
Network Utility Force IPv6 NAT64 Presentation for North American IPv6 SummitNetwork Utility Force IPv6 NAT64 Presentation for North American IPv6 Summit
Network Utility Force IPv6 NAT64 Presentation for North American IPv6 SummitNetwork Utility Force
 
Introduction to Wide Area Network Routing
Introduction to Wide Area Network RoutingIntroduction to Wide Area Network Routing
Introduction to Wide Area Network RoutingNetwork Utility Force
 
IPv6 in Cellular Networks
IPv6 in Cellular NetworksIPv6 in Cellular Networks
IPv6 in Cellular NetworksAPNIC
 
Regional Internet Registry and Whois
Regional Internet Registry and WhoisRegional Internet Registry and Whois
Regional Internet Registry and WhoisAPNIC
 
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...akg1330
 
Cloud-Scale BGP and NetFlow Analysis
Cloud-Scale BGP and NetFlow AnalysisCloud-Scale BGP and NetFlow Analysis
Cloud-Scale BGP and NetFlow AnalysisAlex Henthorn-Iwane
 
Blackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream PresentationBlackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream PresentationOpenDNS
 
npNOG 5: Securing Internet Routing
npNOG 5: Securing Internet Routing npNOG 5: Securing Internet Routing
npNOG 5: Securing Internet Routing APNIC
 
Syed Gouse Pasha
Syed Gouse PashaSyed Gouse Pasha
Syed Gouse Pashasyed ghouse
 
Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?APNIC
 
computer-networks-class-xii-part-2-eng.pdf
computer-networks-class-xii-part-2-eng.pdfcomputer-networks-class-xii-part-2-eng.pdf
computer-networks-class-xii-part-2-eng.pdfSangeethManojKumar
 
prop-115: Registration of detailed assignment information in whois DB
prop-115: Registration of detailed assignment information in whois DBprop-115: Registration of detailed assignment information in whois DB
prop-115: Registration of detailed assignment information in whois DBAPNIC
 
Brian Fitts-Resume (2)
Brian Fitts-Resume (2)Brian Fitts-Resume (2)
Brian Fitts-Resume (2)Brian Fitts
 
12 steps for IPv6 Deployment in Governments and Enterprises
12 steps for IPv6 Deployment in Governments and Enterprises12 steps for IPv6 Deployment in Governments and Enterprises
12 steps for IPv6 Deployment in Governments and EnterprisesAPNIC
 
PLNOG 5: Merike Kaeo - Something Old Is New Again
PLNOG 5: Merike Kaeo - Something Old Is New AgainPLNOG 5: Merike Kaeo - Something Old Is New Again
PLNOG 5: Merike Kaeo - Something Old Is New AgainPROIDEA
 
NP - Unit 5 - Bootstrap, Autoconfigurion and BGP
NP - Unit 5 - Bootstrap, Autoconfigurion and BGPNP - Unit 5 - Bootstrap, Autoconfigurion and BGP
NP - Unit 5 - Bootstrap, Autoconfigurion and BGPhamsa nandhini
 
BSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingBSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingAPNIC
 
Demystifying SharePoint Infrastructure – for NON-IT People
 Demystifying SharePoint Infrastructure – for NON-IT People  Demystifying SharePoint Infrastructure – for NON-IT People
Demystifying SharePoint Infrastructure – for NON-IT People SPC Adriatics
 

Semelhante a IPv6 Security Challenges: TechNet Augusta 2015 (20)

Network Utility Force IPv6 NAT64 Presentation for North American IPv6 Summit
Network Utility Force IPv6 NAT64 Presentation for North American IPv6 SummitNetwork Utility Force IPv6 NAT64 Presentation for North American IPv6 Summit
Network Utility Force IPv6 NAT64 Presentation for North American IPv6 Summit
 
Introduction to Wide Area Network Routing
Introduction to Wide Area Network RoutingIntroduction to Wide Area Network Routing
Introduction to Wide Area Network Routing
 
IPv6 in Cellular Networks
IPv6 in Cellular NetworksIPv6 in Cellular Networks
IPv6 in Cellular Networks
 
Regional Internet Registry and Whois
Regional Internet Registry and WhoisRegional Internet Registry and Whois
Regional Internet Registry and Whois
 
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
Resource Public Key Infrastructure - A Step Towards a More Secure Internet Ro...
 
Cloud-Scale BGP and NetFlow Analysis
Cloud-Scale BGP and NetFlow AnalysisCloud-Scale BGP and NetFlow Analysis
Cloud-Scale BGP and NetFlow Analysis
 
Blackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream PresentationBlackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream Presentation
 
npNOG 5: Securing Internet Routing
npNOG 5: Securing Internet Routing npNOG 5: Securing Internet Routing
npNOG 5: Securing Internet Routing
 
Syed Gouse Pasha
Syed Gouse PashaSyed Gouse Pasha
Syed Gouse Pasha
 
Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?
 
computer-networks-class-xii-part-2-eng.pdf
computer-networks-class-xii-part-2-eng.pdfcomputer-networks-class-xii-part-2-eng.pdf
computer-networks-class-xii-part-2-eng.pdf
 
CV
CVCV
CV
 
prop-115: Registration of detailed assignment information in whois DB
prop-115: Registration of detailed assignment information in whois DBprop-115: Registration of detailed assignment information in whois DB
prop-115: Registration of detailed assignment information in whois DB
 
Brian Fitts-Resume (2)
Brian Fitts-Resume (2)Brian Fitts-Resume (2)
Brian Fitts-Resume (2)
 
12 steps for IPv6 Deployment in Governments and Enterprises
12 steps for IPv6 Deployment in Governments and Enterprises12 steps for IPv6 Deployment in Governments and Enterprises
12 steps for IPv6 Deployment in Governments and Enterprises
 
PLNOG 5: Merike Kaeo - Something Old Is New Again
PLNOG 5: Merike Kaeo - Something Old Is New AgainPLNOG 5: Merike Kaeo - Something Old Is New Again
PLNOG 5: Merike Kaeo - Something Old Is New Again
 
NP - Unit 5 - Bootstrap, Autoconfigurion and BGP
NP - Unit 5 - Bootstrap, Autoconfigurion and BGPNP - Unit 5 - Bootstrap, Autoconfigurion and BGP
NP - Unit 5 - Bootstrap, Autoconfigurion and BGP
 
BSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet RoutingBSides: BGP Hijacking and Secure Internet Routing
BSides: BGP Hijacking and Secure Internet Routing
 
Demystifying SharePoint Infrastructure – for NON-IT People
 Demystifying SharePoint Infrastructure – for NON-IT People  Demystifying SharePoint Infrastructure – for NON-IT People
Demystifying SharePoint Infrastructure – for NON-IT People
 
PACE-IT: Introducing_NAT - N10 006
PACE-IT: Introducing_NAT - N10 006 PACE-IT: Introducing_NAT - N10 006
PACE-IT: Introducing_NAT - N10 006
 

Mais de AFCEA International

AFCEA Defense Health Agency (DHA) Brainstorming Session Notes
AFCEA Defense Health Agency (DHA) Brainstorming Session NotesAFCEA Defense Health Agency (DHA) Brainstorming Session Notes
AFCEA Defense Health Agency (DHA) Brainstorming Session NotesAFCEA International
 
Secure Optical LAN: TechNet Augusta 2015
Secure Optical LAN: TechNet Augusta 2015Secure Optical LAN: TechNet Augusta 2015
Secure Optical LAN: TechNet Augusta 2015AFCEA International
 
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015AFCEA International
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015AFCEA International
 
Network Convergence: TechNet Augusta 2015
Network Convergence: TechNet Augusta 2015Network Convergence: TechNet Augusta 2015
Network Convergence: TechNet Augusta 2015AFCEA International
 
The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...AFCEA International
 
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...AFCEA International
 
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015AFCEA International
 
Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015AFCEA International
 
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015AFCEA International
 

Mais de AFCEA International (20)

William Halal
William HalalWilliam Halal
William Halal
 
Steve Rieber
Steve RieberSteve Rieber
Steve Rieber
 
Stephen Wallo
Stephen WalloStephen Wallo
Stephen Wallo
 
Bob Gourley
Bob GourleyBob Gourley
Bob Gourley
 
Ben Gibson
Ben GibsonBen Gibson
Ben Gibson
 
Joseph Witt
Joseph WittJoseph Witt
Joseph Witt
 
Lin Wells
Lin WellsLin Wells
Lin Wells
 
Tod Levitt
Tod LevittTod Levitt
Tod Levitt
 
Major Steven Nielson
Major Steven NielsonMajor Steven Nielson
Major Steven Nielson
 
Lt Gen Arnold W. Bunch, Jr
Lt Gen Arnold W. Bunch, JrLt Gen Arnold W. Bunch, Jr
Lt Gen Arnold W. Bunch, Jr
 
AFCEA Defense Health Agency (DHA) Brainstorming Session Notes
AFCEA Defense Health Agency (DHA) Brainstorming Session NotesAFCEA Defense Health Agency (DHA) Brainstorming Session Notes
AFCEA Defense Health Agency (DHA) Brainstorming Session Notes
 
Secure Optical LAN: TechNet Augusta 2015
Secure Optical LAN: TechNet Augusta 2015Secure Optical LAN: TechNet Augusta 2015
Secure Optical LAN: TechNet Augusta 2015
 
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015
 
Network Convergence: TechNet Augusta 2015
Network Convergence: TechNet Augusta 2015Network Convergence: TechNet Augusta 2015
Network Convergence: TechNet Augusta 2015
 
The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...
 
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
 
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
 
Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015
 
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
 

Último

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

IPv6 Security Challenges: TechNet Augusta 2015

  • 1. IPv6 Security Implications Eric Oosting VP, Core Routing Practice eoosting@netuf.net +1-404-941-6678 1Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
  • 2. IPv4 and IPv6: Brief History • Internet Protocol version 4 – 1978: Developed for ARPANET – 4 billion addresses – Allocation based on documented need – Deployed globally and well entrenched • Internet Protocol version 6 – IETF forecasts IPv4 depletion between 2010 and 2017 – 1996: IPv6 design begins – 340 undecillion addresses – 1999: Completed, tested, and available ⎻ Management and use similar to IPv4 ⎻ Today: IPv4 address pool is already depleted for many RIRs as of 2014. Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
  • 3. The Case for IPv6 Limitations of IPv4 • IPv4 address space exhaustion • Exponential Internet growth • Requirement for security at the IP level • Need for simpler configuration • Support for real-time delivery of data Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only Exponential Internet Growth • Internet Users or PC • Emerging population/geopolitical and Address space • PDA, Tablet, Notepad,… • Mobile phones • Transportation • Planes, cars • Consumer devices • Billions of Home and Industrial Appliances
  • 4. Interim Solutions... • Drop address classes A, B, and C • Assign addresses in power- of-two chunks • Assign several Class C addresses instead of one Class B address • Assign providers large contiguous address block to be used for customers • Advertise chunks instead of individual address assignments Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only Conservation Efforts • PPP / DHCP address sharing • CIDR (classless inter- domain routing) • NAT (network address translation) • Address reclamation
  • 5. Deployment Benefits • Chance to eliminate some complexity in IP header • Improve per-hop processing • Chance to upgrade functionality – Multicast, QoS, mobility • Chance to include new features • Binding updates Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
  • 6. IPv6 Features • Larger address space • Simplified header format • Stateless and stateful address configuration • QoS: – Hierarchical architecture for prioritized delivery – Integrated services (int-serv), Differentiated Services (DiffServ) • Required IPSec header support • Multicast interaction • Support for mobility • Extensibility Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
  • 7. Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only IPv4 vs IPv6 Length in Bits 32 128 Amount of Addresses 232 4,294,967,296 2128 340,282,366,920,939,463,374,607,43 1,768,211,456 Address Format Dotted Decimal 192.168.100.1 Hexadecimal Dynamic Addressing DHCP SLAAC/DHCPv6 IPSec Optional Mandatory Header Length Variable Fixed Minimal Packet Size 576 bytes (fragmented) 1280 bytes Header Checksum Yes No Header Options Yes No (extensions) Flow No Packet Flow Label
  • 8. Packet Structure IPv6 Format and Header Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only IPv6 Header Upper layer Protocol Data Unit Payload IPv6 Packet Extension Headers
  • 9. Chain of Pointers from Next Header Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only IPv6 Header Next Header = 6 (TCP) TCP Segment IPv6 Header Next Header = 43 (Routing) TCP SegmentRouting Header Next Header = 6 (TCP) Authentication Header Next Header = 6 (TCP) IPv6 Header Next Header = 43 (Routing) Routing Header Next Header = 51 (AH) TCP Segment
  • 10. IPv6 Fragmentation Broken into two pieces: • Unfragmentable Part – Includes main header of original datagram + any extension headers that need to be present in each fragment. Must be present in each fragment • Hop-By-Hop Options, Destination Options (for options processed by devices along route) and Routing • Fragmentable Part – Data portion of the datagram + other extension headers if present • Authentication Header, Encapsulating Security Payload and/or Destination Options (for options processed only by final destination) – Split up among fragments Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
  • 11. IPv6 Fragmentation Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only Unfragmentable part Fragmentable part First fragment Fragment Hdr Unfragmentable part Second fragment Fragment Hdr Unfragmentable part Third fragment Fragment Hdr Original IPv6 Packet
  • 12. Interface ID • Two Parts: – 64-bit network prefix used for routing – 64-bit interface identifier used to identify a host’s network interface • 64 bits long – Derived from EUI-64 addresses • Combined with a network prefix, (routing prefix and subnet ID), to determine a corresponding IPv6 address for the device • Unique within subnet prefix Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only • Lowest-order 64-bit field of unicast address – Assignment: • Auto-configured from a 64- bit EUI-64 • Expanded from a 48-bit MAC address (e.g.,Ethernet address) • Auto-generated pseudo- random number (privacy concerns) • Assigned via DHCP • Manually configured
  • 13. Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only 00 22 b0 75 b5 99 00 22 b0 75 b5 99 FF FE 00 22 b0 75 b5 99FF FE 0000 00X0 X=1, X is universal bit 02 22 b0 75 b5 99FF FE IEEE 802 48- bit MAC IEEE 802 64- bit MAC IEEE EUI-64 Converting MAC to EUI-64 • Split MAC address – First three octets of MAC: Company-ID – Last three octets of MAC: Node-ID • 0xfffe inserted between Company-ID and Node-ID • Universal/Local-Bit (U/L-bit) is set to 1 for global scope
  • 14. ICMPv6 • Updated version of the Internet Control Message Protocol (ICMP) for IPv6 • Reports delivery or forwarding errors and a simple echo service for troubleshooting • Provides a framework for: – Multicast Listener Discovery (MLD) – Neighbor Discovery (ND) – Mobile IPv6 Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
  • 15. Functions • Router discovery • Prefix discovery • Autoconfiguration of address & other parameters • Duplicate address detection (DAD) • Neighbor unreachability detection (NUD) • Link-layer address resolution • First-hop redirect Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
  • 16. Neighbor Discovery (NDP) • Messages and processes that determine relationships between neighboring nodes Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only ND for Routers: • Advertise their presence, host config parameters, routes and on-link preferences • Inform hosts of best next-hop address for destination ND for Hosts: • Address autoconfig of nodes • Find routers and DNS server ND for Nodes: • Discover other nodes on link and determine their link-layer addresses • Determine if neighboring node’s link-layer address changes and if still reachable 16
  • 17. Router Solicitation (RS) Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only • RS Message sent by hosts at system startup and in response to router solicitation messages – Immediately autoconfigure without needing to wait for next scheduled RA message – Host does not have a configured unicast address – Source address in router solicitation messages is usually unspecified IPv6 address (0:0:0:0:0:0:0:0)
  • 18. Router Advertisement (RA) • Periodically sent out each configured interface of an IPv6 router • Used to announce network configuration information to local hosts • Advertised prefix length in RA messages must always be 64 bits for autoconfiguration • The RA messages are sent to the all-nodes multicast address Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
  • 19. Router Discovery: Process 1. IPv6 routers periodically send a Router Advertisement message on the local link advertising their existence as routers. ● Also provide configuration parameters such as default hop limit, MTU, and prefixes 2. Active IPv6 hosts on local link receive the RA messages ● Use contents to maintain the default router list, the prefix list, and other configuration parameters 3. Starting up Host sends a Router Solicitation message 4. Receipt of RA message, all routers on the local link send unicast RA message to node that sent the Router Solicitation 5. Node receives RA messages ● Use contents to build default router and prefix lists, set other configuration parameters Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
  • 20. Autoconfiguration Overview • IPv6 interfaces can configure themselves – Even without a stateful configuration protocol (DHCPv6) – Link-local address for each interface by default • Host uses router discovery to determine: – Additional addresses – Router addresses – Other configuration parameters • DHCP is available Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only • Hosts use RA to construct address – Subnet prefix(es): learned from periodic multicast advertisement from neighboring router(s) – Interface IDs: generated locally – MAC addresses: pseudo- random temporary • Other IP-layer parameters also learned from router adverts (router addresses, recommended hop limit, etc…) • Higher-layer info discovered by multicast/ anycast-based service-location protocol
  • 21. Types of Autoconfiguration 1. Stateless (SLAAC) – Receipt of Router Advertisement messages with one or more Prefix Information options 2. Stateful – Use of a stateful address configuration protocol such as DHCPv6 3. Both – Receipt of Router Advertisement messages and stateful configuration protocol For all types, a link-local address is always configured Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
  • 22. Neighbor Solicitation (NS) Message • Determine link-layer address of another node – Source address in an NS message is the IPv6 address of the node sending the neighbor solicitation message • Destination (Target) address in NS message – Solicited-node multicast address corresponding to the IPv6 address of the destination node • Includes the link-layer address of the source node • Used to verify reachability of a neighbor after the link-layer address of a neighbor is identified • To verify the reachability of a neighbor, destination address in an NS message is the neighbor’s unicast address. Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
  • 23. Neighbor Advertisement (NA) Message • Informs mapping of an IPv6 address to a link-layer address • Destination node replies to neighbor solicitation message on the local link • Source and destination addresses are in the NA message – Source: IPv6 address of the node interface sending the neighbor advertisement message – Destination (Target): IPv6 address of the node that sent the neighbor solicitation message. • Data portion of NA message includes link-layer address of the node sending the neighbor advertisement message • NA messages are also sent in response to change in the link-layer address of node on local link Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
  • 24. Address Resolution • An exchange of Neighbor Solicitation and Neighbor Advertisement messages to resolve the link-layer address of the next-hop address – Multicast Neighbor Solicitation message – Unicast Neighbor Advertisement message • Both hosts update their neighbor caches • Unicast traffic can now be sent Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
  • 25. Redirect Message • Router informs Inform hosts of better first hop for a destination • Router must be able to determine link-local address for each neighboring router – Ensure the target address in a redirect message identifies the neighbor router by its link-local address Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
  • 26. Neighbor Function Equivalents IPv4 Neighbor Function IPv6 Neighbor Function ARP Request message Neighbor Solicitation message ARP Reply message Neighbor Advertisement message ARP cache Neighbor cache Gratuitous ARP Duplicate Address Detection (DAD) Router Solicitation message (optional) Router Solicitation (required) Router Advertisement message (optional) Router Advertisement (required) Redirect message Redirect message Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
  • 27. Neighbor Reachabilty • Host A acquires the link-layer address of neighbor Host B • Host A can use NS and NA messages to check whether Host B is reachable 1. Host A sends an NS message whose destination address is the IPv6 address of Host B 2. If Host A receives an NA message from Host B, Host A decides that Host B is reachable Otherwise, Host B is unreachable Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
  • 28. DHCPv6 Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only • DHCPv6 infrastructure – Clients, servers, relay agents • Key Differences from IPv4 – On-Link flag in the Prefix Information option • Directly attached subnet route for a DHCPv6-assigned IPv6 address not configured by IPv6 hosts automatically – Default route configured from RA • No default route assignment in DHCPv6 Provides stateful or stateless address configuration settings for IPv6 hosts
  • 29. DHCPv6 Communication • User Datagram Protocol (UDP) messages – DHCPv6 clients listen on UDP port 546 – DHCPv6 servers and relay agents listen on UDP port 547 • Multicast addresses – DHCPv6 servers and relay agents listen on ff02::1:2 – DHCPv6 client sends messages to ff02::1:2 • Relay agent forwards multicasts as unicasts to configured DHCPv6 servers Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only
  • 30. DUID • Clients use the DHCP Unique Identifier (DUID) to get an IP address from a DHCPv6 server • 2 byte type field + type specific variable length data – Minimum length of 12 bytes (96 bits) and a maximum length of 20 bytes (160 bits). – Server compares DUID with its database and delivers configuration data (address, lease times, DNS servers, etc…) to the client • Must be globally unique but easy to generate • Three types: – LL: Link-layer address – LLT:Link-layer address + time – EN: Vendor-assigned unique ID based on Enterprise number Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only 30
  • 31. DUID Types 0 32 bits 31 15 16 Hardware Type Link Layer Address DUID Type: 1 Time DUID LLT Identifier Enterprise Number 0 32 bits DUID Type: 2 31 15 16 Enterprise Number (cont’d) DUID EN 0 32 bits 31 15 16 Link Layer Address Hardware TypeDUID Type: 3 0 0 DUID LL Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only 31
  • 32. Attribution 32 The following slides are courtesy of Chris Grundemann - Internet Society CO ISOC Founder NANOG-BCOP Chair IPv6 Author (Juniper Day One Books) IETF Contributor More: http://chrisgrundemann.com 9/3/2015 Chris Grundemann
  • 33. This section… 33 • Aims to debunk the most common IPv6 security myths • Is NOT a comprehensive look at IPv6 security practices • Should scare you a little • Should NOT discourage IPv6 Deployment – The more you know… 9/3/2015 Chris Grundemann
  • 34. SOME MYTHS… Let’s get to busting 349/3/2015 Chris Grundemann
  • 35. MYTH: I’M NOT RUNNING IPV6, I DON’T HAVE TO WORRY 359/3/2015 Chris Grundemann
  • 36. Reality: Your Applications are Using IPv6 Already 36 MYTH: I’M NOT RUNNING IPV6, I DON’T HAVE TO WORRY • Linux, Mac OS X, BSD, and Microsoft Vista/Windows 7 systems all come with IPv6 capability, some even have IPv6 enabled by default (IPv6 preferred) • They may try to use IPv6 first and then fall-back to IPv4 • If you are not protecting your IPv6 nodes then you have just allowed a huge back-door to exist! 9/3/2015 Chris Grundemann
  • 37. Reality: Your Users are Using IPv6 Already 37 MYTH: I’M NOT RUNNING IPV6, I DON’T HAVE TO WORRY 9/3/2015 Chris Grundemann IPv4 IPv4 Firewall
  • 38. Reality: Your Users are Using IPv6 Already 6to4 / Toredo 38 MYTH: I’M NOT RUNNING IPV6, I DON’T HAVE TO WORRY 9/3/2015 Chris Grundemann IPv4 Firewall IPv6 IPv6
  • 39. MYTH: IPv6 Has Security Designed In 399/3/2015 Chris Grundemann
  • 40. MYTH: IPv6 Has Security Designed In 40 • IPsec exists for IPv4 • IPsec mandates in IPv6 are no guarantee of security – Also are no longer in place REALITY: IPSEC IS NOT NEW 9/3/2015 Chris Grundemann
  • 41. MYTH: IPv6 Has Security Designed In 41 REALITY: IPV6 WAS DESIGNED 15-20 YEARS AGO 9/3/2015 Chris Grundemann
  • 43. MYTH: IPv6 Has Security Designed In 43 • Routing Header Type 0 (RH0) – Source Routing – Deprecated in RFC 5095: The functionality provided by IPv6's Type 0 Routing Header can be exploited in order to achieve traffic amplification over a remote path for the purposes of generating denial-of-service traffic. REALITY: 9/3/2015 Chris Grundemann
  • 44. MYTH: IPv6 Has Security Designed In 44 • Hop-by-Hop Options Header – Vulnerable to low bandwidth DOS attacks – Threat detailed in draft-krishnan-ipv6-hopbyhop REALITY: 9/3/2015 Chris Grundemann
  • 45. MYTH: IPv6 Has Security Designed In 45 • Extension Headers are vulnerable in general – Large extension headers – Lots of extension headers – Invalid extension headers REALITY: 9/3/2015 Chris Grundemann
  • 46. MYTH: IPv6 Has Security Designed In 46 • Rogue Router Advertisements (RAs) – Can renumber hosts – Can launch a Man In The Middle attack – Problem documented in RFC 6104 In this document, we summarise the scenarios in which rogue RAs may be observed and present a list of possible solutions to the problem. REALITY: 9/3/2015 Chris Grundemann
  • 47. MYTH: IPv6 Has Security Designed In 47 • Forged Neighbor Discovery messages • ICMP Redirects – just like IPv4 redirects • See RFC 6583 - Operational Neighbor Discovery Problems REALITY: 9/3/2015 Chris Grundemann
  • 48. MYTH: IPv6 Has Security Designed In 48 • Buffer overflows • SQL Injection • Cross-site scripting • E-mail/SPAM (open relays) REALITY: MANY ATTACKS ARE ABOVE OR BELOW IP 9/3/2015 Chris Grundemann
  • 49. Myth: NO IPv6 NAT Means Less Security 499/3/2015 Chris Grundemann
  • 50. Myth: NO IPv6 NAT Means Less Security 50 REALITY: STATEFUL FIREWALLS PROVIDE SECURITY • NAT can actually reduce security 9/3/2015 Chris Grundemann
  • 51. Myth: IPv6 Networks are too Big to Scan 519/3/2015 Chris Grundemann
  • 52. Myth: IPv6 Networks are too Big to Scan 52 • SLAAC - EUI-64 addresses (well known OUIs) – Tracking! • DHCPv6 sequential addressing (scan low numbers) • 6to4, ISATAP, Teredo (well known addresses) • Manual configured addresses (scan low numbers, vanity addresses) • Exploiting a local node – ff02::1 - all nodes on the local network segment – IPv6 Node Information Queries (RFC 4620) – Neighbor discovery • Leveraging IPv4 (Metasploit Framework “ipv6_neighbor”) • IPv6 addresses leaked out by application-layer protocols (email) REALITY: 9/3/2015 Chris Grundemann
  • 53. Myth: IPv6 Networks are too Big to Scan 53 • Privacy addresses use MD5 hash on EUI-64 and random number • Often temporary – rotate addresses – Frequency varies – Often paired with dynamic DNS (firewall state updates?) • Makes filtering, troubleshooting, and forensics difficult • Alternative: Randomized DHCPv6 – Host: Randomized IIDs – Server: Short leases, randomized assignments REALITY: PRIVACY ADDRESSES (RFC 4941) 9/3/2015 Chris Grundemann
  • 54. Myth: IPv6 is too New to be Attacked 549/3/2015 Chris Grundemann
  • 55. Myth: IPv6 is too New to be Attacked 55 • THC IPv6 Attack Toolkit • SI6 IPv6 Toolkit • IPv6 port scan tools • IPv6 packet forgery tools • IPv6 DoS tools REALITY: TOOLS ARE ALREADY AVAILABLE 9/3/2015 Chris Grundemann
  • 56. Myth: IPv6 is too New to be Attacked 56 • Vendors • Open source software REALITY: BUGS AND VULNERABILITIES PUBLISHED 9/3/2015 Chris Grundemann
  • 57. Myth: IPv6 is too New to be Attacked 57 REALITY: SEARCH FOR “SECURITYFOCUS.COM INURL:BID IPV6” 9/3/2015 Chris Grundemann
  • 58. Myth: 96 more bits, no magic (It’s just like IPv4) 589/3/2015 Chris Grundemann
  • 59. Myth: 96 more bits, no magic (It’s just like IPv4) 59 REALITY: IPV6 ADDRESS FORMAT IS DRASTICALLY NEW • 128 bits vs. 32 bits • Hex vs. Decimal • Colon vs. Period • Multiple possible formats (zero suppression, zero compression) • Logging, grep, filters, etc. 9/3/2015 Chris Grundemann
  • 60. Myth: 96 more bits, no magic (It’s just like IPv4) 60 REALITY: MULTIPLE ADDRESSES ON EACH HOST • Same host appears in logs with different addresses 9/3/2015 Chris Grundemann
  • 61. Myth: 96 more bits, no magic (It’s just like IPv4) 61 REALITY: SYNTAX CHANGES • Training! 9/3/2015 Chris Grundemann
  • 62. Myth: Configure IPv6 Filters Same AS IPv4 629/3/2015 Chris Grundemann
  • 63. Myth: Configure IPv6 Filters Same As IPv4 63 REALITY: DHCPV6 && ND INTRODUCE NUANCE • Neighbor Discovery uses ICMP • DHCPv6 message exchange: • Solicit: [your link local]:546 -> [ff02::1:2]:547 • Advertise: [upstream link local]:547 -> [your link local]:546 • and two more packets, both between your link locals. 9/3/2015 Chris Grundemann
  • 64. Reality: Example Firewall Filter (mikrotik) 64 Flags: X - disabled, I - invalid, D - dynamic 0 ;;; Not just ping - ND runs over icmp6. chain=input action=accept protocol=icmpv6 in-interface=ether1-gateway 1 chain=input action=accept connection-state=established in-interface=ether1- gateway 2 ;;; related means stuff like FTP-DATA chain=input action=accept connection-state=related in-interface=ether1- gateway 3 ;;; for DHCP6 advertisement (second packet, first server response) chain=input action=accept protocol=udp src-address=fe80::/16 dst- address=fe80::/16 in-interface=ether1-gateway dst-port=546 4 ;;; ssh to this box for management (note non standard port) chain=input action=accept protocol=tcp dst-address=[myaddr]/128 dst- port=2222 5 chain=input action=drop in-interface=ether1-gateway 9/3/2015 Chris Grundemann
  • 66. Myth: It supports IPv6 66 REALITY: IT PROBABLY DOESN’T • Hardware, Software, Services, Applications (VM, Crypto, etc.) • Detailed requirements (RFP) • RIPE-554 • Lab testing • Independent/outside verification 9/3/2015 Chris Grundemann
  • 67. Myth: There are no IPv6 Security BCPs yet 679/3/2015 Chris Grundemann
  • 68. Myth: There are no IPv6 Security BCPs yet 68 • Perform IPv6 filtering at the perimeter • Use RFC2827 filtering and Unicast RPF checks throughout the network • Use manual tunnels (with IPsec whenever possible) instead of dynamic tunnels and deny packets for transition techniques not used • Use common access-network security measures (NAC/802.1X, disable unused switch ports, Ethernet port security, MACSec/TrustSec) because SeND won’t be available any time soon • Strive to achieve equal protections for IPv6 as with IPv4 • Continue to let vendors know what you expect in terms of IPv6 security features REALITY: THERE ARE! 9/3/2015 Chris Grundemann
  • 69. Myth: There are no IPv6 Security Resources 699/3/2015 Chris Grundemann
  • 70. Myth: There are no IPv6 Security Resources 70 • IPv6 Security, By Scott Hogg and Eric Vyncke, Cisco Press, 2009 • CPNI Viewpoint: Security Implications of IPv6 • Operational Security Considerations for IPv6 Networks • IPv6 Hackers is a forum for IPv6 security researchers and networking pros • Deploy360 has a section specifically on IPv6 Security • Search engines are your friends! There’s lots more info out there! REALITY: THERE ARE! 9/3/2015 Chris Grundemann
  • 71. The Reality of Dual-Stack 71 • Two sets of filters • Two sets of bugs IPv6IPv4 9/3/2015 Chris Grundemann
  • 72. Thank you! 72 @ChrisGrundemann http://chrisgrundemann.com http://www.internetsociety.org/deploy3 60/ Gratitude and Credit: • Scott Hogg – My IPv6 Security Guru • Fernando Gont – For review • Rob Seastrom – For the Mikrotik example • The Internet – Lots of searching • You – Thanks for listening! 9/3/2015 Chris Grundemann
  • 73. Brandon Ross bross@netuf.net 404-635-6667 Network Utility Force LLC, 15 Wieuca Trace Northeast, Atlanta, Georgia, 30342 -- +1-404-635-6667 -- sales@netuf.net © 2012, Network Utility Force LLC Companyconfidential information, transmittal to third parties by prior permission only 73