Security Considerations For Ipv6 Networks
Security Considerations For Ipv6 Networks
Agenda
,ntrodu;tion < =a>or ?eatures in ,-./ ,-./ @ore se;ure tAan ,-.BC ,-De; ,-.B .s ,-./E a FAreat Go@parison NH re.isited NH0related FAreatsE an I.er.ieJ De;urity Kisks Huring ,-.B,-./ Fransition Lo@e ,-./ NetJork KeMeren;es NppendiO ,
Extended Address Space Autoconfiguration Header Structure / Extension Headers Mandatory IPSec Support QoS Route Aggregation Efficient Transmission
Lets agree that IPv6 is (will) not inherently be more or less secure than IPv4
Lets agree that IPv6 is (will) not inherently be more or less secure than Ipv4 In many cases, IPv4 security practices and policies can be replicated for IPv6
Fairly ne
"ncalculated Factors# tunneling and all $to/in% &ac' of understanding (ulnera)ilities un'no n
Fairly ne
"ncalculated Factors# tunneling and all $to/in% &ac' of understanding (ulnera)ilities un'no n
IPSec
)ut...
IPSec
)ut...
"se of IPSec not re/uired 0ill IPSec )e used more fre/uently in IP!$1 Pro)a)ly not2 3omplexity Issues +'ey management4 configuration complexity etc,
ARP +IP!%, attac's replaced )y 56-related +IP!$, attac's &ac' of 7roadcast in IP!$ means no more amplification attac's +may)e, "naut*ori8ed access to IP!$ net or's could )e more idespread +at first, start, 5o significant c*ange in Application-le!el attac's +after a slo
$econnaissance Attacks harder to achieve with IPv6 %&ut sti'' #ossi&'e( ARP +IP!%, attac's replaced )y 56-related +IP!$, attac's &ac' of 7roadcast in IP!$ means no more amplification attac's +may)e, "naut*ori8ed access to IP!$ net or's could )e more idespread +at first, start, 5o significant c*ange in Application-le!el attac's +after a slo
A$P %IPv4( attacks re#'aced &y N)*re'ated %IPv6( attacks &ac' of 7roadcast in IP!$ means no more amplification attac's +may)e, "naut*ori8ed access to IP!$ net or's could )e more idespread +at first, start, 5o significant c*ange in Application-le!el attac's +after a slo
ARP +IP!%, attac's replaced )y 56-related +IP!$, attac's +ack of ,roadcast in IPv6 means no more am#'ification attacks %may&e( "naut*ori8ed access to IP!$ net or's could )e more idespread +at first, start, 5o significant c*ange in Application-le!el attac's +after a slo
ARP +IP!%, attac's replaced )y 56-related +IP!$, attac's &ac' of 7roadcast in IP!$ means no more amplification attac's +may)e, -nauthori.ed access to IPv6 networks cou'd &e more wides#read %at first( 5o significant c*ange in Application-le!el attac's +after a slo start,
ARP +IP!%, attac's replaced )y 56-related +IP!$, attac's &ac' of 7roadcast in IP!$ means no more amplification attac's +may)e, "naut*ori8ed access to IP!$ net or's could )e more idespread +at first, No significant change in A##'ication*'eve' attacks %after a s'ow start(
Efficient use of different types of addressing Increase difficulty in net or' scanning +random su)nets4 random interface I6s, "se IPSec for aut*entication 6e!ise a proper I3MP!$ filtering policy (see Appendix I) Secure tunnelled en!ironments +complicated,
6efault 6E59 is still considered )est practice 7loc' IP!$ traffic on IP!%-only net or's and !ice-!ersa
N) $evisited
IP!$ Address Autoconfiguration 6etermine 5et or' Prefixes +and ot*er configuration info, 6uplicate Address 6etection +6A6, 5eig*)or "nreac*a)ility 6etection +5"6, 6etect c*anges in lin'-layer addresses
N) $evisited
Rogue RAs# rogue routers inserted on &A5 Rogue RAs# rogue RAs from :legitimate; nodes Spoofed responses to 6A6 messages < 6=S attac' Spoofed 5S/5A messages can cause redirect attac's
Host A +A>A :t*e !ictim;, sends 5eig*)or Solicitation +5S, to Host 7 Host 3 +A>A :t*e attac'er;, replies it* 5eig*)or Ad!ertisement +5A, instead of t*e real *ost 7 to gracious 5eig*)or Solicitation +5S, message )y *ost A. Host A updates its 56P cac*e )inding t*e lin'-layer address of t*e attac'er to t*e legitimate IP address of *ost 7. T*e !ictim ill send pac'ets to t*e attac'er instead of legitimate Host 7.
Added 3omplexity )y dual stac' operations Immaturity +or e!en lac', of IP!$ security products / lac' of !endor support "naut*ori8ed/un'no n IP!$ clients "se of IP!$ )y t*e :attac'er; community (ulnera)ilities in IP!$
Added Com#'e1ity &y dua' stack o#erations ? x configurations < ? x t*ings t*at can go IP!% still supported for legacy systems Immaturity +or lac', of IP!$ security products / lac' of !endor support "naut*ori8ed/un'no n IP!$ clients "se of IP!$ )y t*e :attac'er; community (ulnera)ilities in IP!$ rong Security infrastructure possi)ly not a are of dual en!ironment
Added 3omplexity )y dual stac' operations Immaturity %or 'ack( of IPv6 security #roducts 0 'ack of vendor su##ort Security !endors are aiting for customer demand (arious le!els of IP!$ :support; offered &ac' of standardi8ation of IP!$ support "naut*ori8ed/un'no n IP!$ clients "se of IP!$ )y t*e :attac'er; community (ulnera)ilities in IP!$
Added 3omplexity )y dual stac' operations Immaturity +or e!en lac', of IP!$ security products / lac' of !endor support -nauthori.ed0unknown IPv6 c'ients IP!$ support is often ena)led )y default Acti!e $to% interfaces "se of IP!$ )y t*e :attac'er; community (ulnera)ilities in IP!$
Added 3omplexity )y dual stac' operations Immaturity +or e!en lac', of IP!$ security products / lac' of !endor support "naut*ori8ed/un'no n IP!$ clients -se of IPv6 &y the 2attacker3 community Fire alls often ignore IP!$ traffic Attac'ers ena)ling IP!$ on compromised systems IP!$ traffic usually not monitored (ulnera)ilities in IP!$
Added 3omplexity )y dual stac' operations Immaturity +or e!en lac', of IP!$ security products / lac' of !endor support "naut*ori8ed/un'no n IP!$ clients "se of IP!$ )y t*e :attac'er; community 4u'nera&i'ities in I#v6 56-related +as discussed, @-day exploits
"se 5et or' Filters +stateless,to )loc' un anted traffic +spoofed4 Martians etc, "se stateful fire alls for fine grained access I3MP!$ Filtering +as discussed, Management Interfaces s*ould not )e offered !ia 0A5 "se Se56 +if a!aila)le,
6eploy pac'et filters +ipta)les4 pf etc, "se RA guards +if applica)le, 5o :*iding; )e*ind 5AT anymore2 "se pri!acy extensions A!oid Man In T*e Middle +MITM, attac's # use IPSec
Semi-Paranoid# Exposed MA3 addresses due to S&AA3 +eui-$%, may result to specific */ fla Paranoid! Interface can )e trac'ed *en mo!ing around +from static interface I6,
As mentioned4 lessons learned from IP!%4 can )e re-used 6efense in dept* Patc*ing
As mentioned4 lessons learned from IP!%4 can )e re-used 6efense in dept* Patc*ing Sane 3onfiguration Management
As mentioned4 lessons learned from IP!%4 can )e re-used 6efense in dept* Patc*ing Sane 3onfiguration Management Access 3ontrol
As mentioned4 lessons learned from IP!%4 can )e re-used 6efense in dept* Patc*ing Sane 3onfiguration Management Access 3ontrol Fre/uent re!ision of security policies
.dou)les*otsecurity.com
IP!$ Routing Header Security - P*ilippe 7iondi4 Arnaud E)alard Buidelines for t*e Secure 6eployment of IP!$ A 5IST Special Pu)lication C@@-DDE Se56 - *ttp#//tools.ietf.org/*tml/rfcFEGD Rogue RAs - *ttp#//tools.ietf.org/*tml/rfc$D@% RA Buard - *ttp#//tools.ietf.org/*tml/rfc$D@H Simple Security for IP!$ 3PEs - *ttp#//tools.ietf.org/*tml/rfc$@E? Pri!acy Extensions for S&AA3 in IP!$ - *ttp#//tools.ietf.org/*tml/rfc%E%D IP!$ Implications for 5et or' Scanning - *ttp#//tools.ietf.org/*tml/rfcHDHG Filtering I3MP!$ in Fire alls - *ttp#//tools.ietf.org/*tml/rfc%CE@ Routing &oop Attac' / auto Ip!$ Tunnels *ttp#//tools.ietf.org/searc*/draft-ietf-!$ops-tunnel-loops-@G