new ipv6 security · 2014. 2. 5. · mixed ipv4/ipv6 environments some security issues with...

45
IPv6 Security Formation IPv6 RENATER -Rouen, FR

Upload: others

Post on 12-Oct-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

IPv6 Security

Formation IPv6 RENATER -Rouen, FR

Page 2: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 2

Copy Rights This slide set is the ownership of the 6DEPLOY project via its

partners The Powerpoint version of this material may be reused and

modified only with written authorization Using part of this material must mention 6DEPLOY courtesy PDF files are available from www.6deploy.org Looking for a contact ?

•  Mail to : [email protected] •  Or [email protected]

Page 3: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Acknowledgements •  Carlos Martinez, Arturo Servin – LACNIC •  Jordi Palet - Consulintel •  János Mohácsi, NIIF/HUNGARNET - Hungary •  Octavio Medina, Octavio Medina, Laurent Toutain, ENST •  Bernard Tuy, Jérôme Durand, Emmanuel Goiffon, Renater •  Peter Kirstein, Steve Hailes, Piers O’Hanlon, UCL •  Wolfgang Fritsche, IABG •  Jim Bound, Hewlett Packard •  Patrick Grostete, Cisco (now Arch Rock) •  Mohsen Souissi, AFNIC •  Alain Durand, Sun Microsystems •  Bill Manning, ISI •  Alain Baudot, France Telecom R&D •  Pedro Lorga, FCCN •  And many others

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 3

Page 4: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Agenda •  Security issues •  Vulnerabilities in IPv6 •  Recommendations

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 4

Page 5: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Security impacts

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 5

Flux injection

Id usurpation

Hacking

Privacy data access

Threats

Infrastructure

Illicite use

Malicious acts

Sabotage

Privacy/secret violation

Security risks

Financial, legal…

Financial, legal…

Financial, image …

Legal, image …

Impacts

Ø  Absence of flux control mechanism

Ø  Absence of flot filter and separation mechanism

Ø  No tracability mechanism

Potential Threats

Page 6: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Threats identified

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 6

IP, SIGTRAN SIP, IMS, P2P Frauds & Image

NGN

VoIP/ToIP

Fix / Mobile Convergence Fraud & Image

Contenu

Stealing content Loss profit & Legal Sanctions

Malwares/ Spam Virus, Spyware Spam SMS, MMS Frauds, Abuses & Image

Workstation Security Access Confidential data Disclosure informations

Office

Remote access Tiers Contracts managemt CA, Illicite use

Externalisation

Authentification

Id Usurpation Repudiation acts & Frauds

« CNIL », Confidencial data access Legal sanctions, Image

Privacy

Page 7: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Security approach •  The security is a global approach

•  Infrastructure, •  Work station, •  Applications, •  Stored and exchanged data

•  … and an association between physical and functional scope

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 7

Page 8: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Architecture Model

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 8

Facilities Management

Suppliers Partners

Collect Renater

2 External

Connectivity 4

Technical Support

5

6

3

Access

1

Service platform

7

Technical Support

5

Technical Support

5

Page 9: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Physical scope

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 9

Facilities Management

Suppliers Partners

Collect Renater

2 External

Connectivity 4

Technical Support

5

6

3

Access

1

Service platform

7

Technical Support

5

Technical Support

5

Support platform •  Supervision •  IT

Service platform •  Standard service •  VA Services • ….

Equipment •  Access •  Core •  Border

3rd-party Equipment •  Sub-contractors •  Partners

Page 10: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Functional scope

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 10

Facilities Management

Suppliers Partners

Collect Renater

2 External

Connectivity 4

Technical Support

5

6

3

Access

1

Service platform

7

Technical Support

5

Technical Support

5

Equipment Security rules

Application Security rules

Data Security rules

Services

Security rules

OM Security rules

Special Security

Security rules

Page 11: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Physical & Functional scope

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 11

Facilities Management

Suppliers Partners

Collect Renater

2 External

Connectivity 4

Technical Support

5

6

3

Access

1

Service platform

7

Technical Support

5

Technical Support

5

Equipment Security rules

Application Security rules

Data Security rules

Services

Security rules

OM Security rules

Special Security

Security rules

Technical Support

Support platform •  Supervision •  IT

Service platform •  Standard service •  VA Services • ….

Equipment •  Access •  Core •  Border

3rd-party Equipment •  Sub-contractors •  Partners

Page 12: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Vulnerabilities and Attacks

Formation IPv6 RENATER -Rouen, FR

Page 13: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Inherent vulnerabilities •  Less experience working with IPv6 •  New protocol stack implementations •  Security devices such as Firewalls and IDSs have

less support for IPv6 than IPv4 •  More complex networks

•  Overlaid with tunnels •  Dual stack (two protocols on the same wire)

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 13

Page 14: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Neighbor Discovering Protocol •  Instead of ARP (IPv4), IPv6 uses Neighbor

Discovering Protocol (NDS) •  NDP is based on ICMPv6 •  Instead of a broadcast (ARP), NDP uses Neighbor

Solicitation y Neighbor Advertisement messages

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 14

Page 15: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

NDP associated vulnerabilities •  DoS attacks to routers by filling Neighbor Cache

with many entries •  Some mitigations are:

•  Rate-limit processing the Neighbor Solicitation (NS) •  Monitoring NDP traffic (i.e. NDPMon) •  Deploy SEND (SEcure Neighbor Discovery) RFC3791 •  Static entries •  draft-gashinsky-v6nd-enhance-00

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 15

Page 16: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Autoconfiguration •  Two flavors:

•  Stateless: SLAAC (Stateless Address Auto-Configuration), based in ICMPv6 (Router Solicitation and Router Advertisement)

•  Stateful: DHCPv6 •  SLAAC is mandatory and DHCPv6 is optional

•  Routers send Router Advertisement (RA) messages to communicate configuration parameters: •  Prefixes •  Routes •  MTU, hop-limit •  Timers

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 16

Page 17: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Vulnerabilities associated with autoconfiguration •  Rogue RAs and Rogue DHCPv6 servers

o  Intentionally §  Man in the middle attacks

o  Accidentally §  Windows sharing!!!

•  DoS attacks •  Some considerations documented in RFC6104 and

draft-gont-v6ops-ra-guard-evasion

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 17

Page 18: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Mitigation of Rogue RAs •  RA-guard for switches (RFC6105) and RA-monitor

•  But only for accidental RAs •  Cannot detect complex attacks (next hop, fragmentation) •  Router Advert MONitoring Daemon (RAMOND)

•  SEND •  Static configuration

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 18

Page 19: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Attack on Address Resolution Attacker can claim victim’s IP address

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 19

Page 20: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Attack on DAD •  Attacker hacks any victim’s DAD attempts •  IP address can’t be configured

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 20

Page 21: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

SEND ? •  SEND offers efficient mitigation to many issues,

but not all, and is not easy to deploy •  Proxying link-operation at first-hop could provide

almost the same and a simpler deployment model •  Requires deployment of smart switches

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 21

Page 22: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Transition Mechanisms •  Protocol 41 and other tunnels

•  Unauthorized traffic leaving your network as tunnels (6to4, Teredo, tunnels)

•  Automatic tunnels •  Where is your traffic going?

•  Relays to IPv6 •  Who is using your relays?

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 22

Page 23: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

End-to-End Model •  End-to-End connectivity without NAT •  NAT and NAT-PT (Protocol Translation) for IPv4

used as security strategy (should it be?) •  RFC5902 “Thoughts on IPv6 NAT” •  IPv6-to-IPv6 address mapping (stateless NAT66

as discussed by IETF). Maps a private IPv6 address range (ULA)

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 23

Page 24: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

In IPv4 Networks •  I do not have IPv6 in my network and I won’t

support it. I do not care then •  Well, you should •  Even though you do not run IPv6 in your network,

you may be vulnerable: •  Rogue RA (Windows Network Sharing) •  6to4, Teredo and other tunnel technologies

•  All these may open holes in your network security

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 24

Page 25: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Recommendations

Formation IPv6 RENATER -Rouen, FR

Page 26: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Countering Threats in IPv6 •  Scanning Gateways and Hosts for weakness •  Scanning for Multicast Addresses •  Unauthorised Access Control •  Firewalls •  Protocol Weaknesses •  Distributed Denial of Service •  Transition Mechanisms

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 26

Page 27: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Scanning Gateways and Hosts Subnet Size is much larger

About 500,000 years to scan a /64 subnet@1M addresses/sec

But… -  IPv6 Scanning methods are changing

-  DNS based, parallelised scanning, common numbering -  Compromising a router at key transit points

-  Can discover addresses in use

Avoid: Using easy to guess addresses

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 27

Page 28: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Scanning Multicast Addresses New Multicast Addresses - IPv6 supports new multicast addresses enabling attacker to identify key resources on a network and attack them

•  E.g. Site-local all DHCP servers (FF05::5), and All Routers (FF05::2)

•  Addresses must be filtered at the border in order to make them unreachable from the outside §  To prevent smurf type of attacks: IPv6 specs forbid the generation

of ICMPv6 packets in response to messages to global multicast addresses that contain requests

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 28

Page 29: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Security of IPv6 addresses Cryptographically Generated Addresses (CGA) IPv6

addresses [RFC3972] •  Host-ID part of address is an encoded hash

§  Binds IPv6 address to public key •  Used for securing Neighbour Discovery [RFC3971] •  Is being extended for other uses [RFC4581]

Privacy addresses as defined [RFC 4941] •  Prevents device/user tracking from •  Makes accountability harder

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 29

Page 30: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Unauthorised Access Control Policy implementation in IPv6 with Layer 3 and

Layer 4 is still done in firewalls Some design considerations

•  Filter site-scoped multicast addresses at site boundaries •  Filter IPv4 mapped IPv6 addresses on the wire

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 30

Page 31: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Unauthorised Access control Non-routable + bogon (unallocated) address

filtering slightly different •  in IPv4 easier deny non-routable + bogons •  in IPv6 simpler to permit legitimate (almost)

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 31

host/net 2001:db8::/32 deny

service any host/net 2002::/16 permit service any host/net 2001::/16 permit

service any host/net 2003::/16 permit

any any deny service any host/net 3ffe::/16 Deny

Dst port Src port Dst Src Action

6bone - NO

6to4 - YES

Doc prefix - NO

Consult for non exisiting addresses at: http://www.space.net/~gert/RIPE/ipv6-filters.html

Page 32: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Spoofing IPv6 address are globally aggregated making spoof

mitigation at aggregation points easy to deploy Simpler to protect due to IPv6 address hierarchy However host part of the address is not protected

•  You need IPv6 <– >MAC address (user) mapping for accountability!

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 32

Page 33: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Amplification (DDoS) Attacks There are no broadcast addresses in IPv6

•  This stops any type of amplification attacks that send ICMP packets to the broadcast address

•  Global multicast addresses for special groups of devices, e.g. link-local addresses, etc.

IPv6 specifications forbid the generation of ICMPv6 packets in response to messages to global multicast addresses •  Many popular operating systems follow the specification •  No packets with multicast sources should be allowed

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 33

Page 34: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Mitigation of IPv6 amplification Be sure that your host implementations follow the

ICMPv6 spec [RFC 4443] Implement Ingress Filtering

•  Defeats Denial of Service Attacks which employ IP Source Address Spoofing [RFC 2827]

Implement ingress filtering of IPv6 packets with IPv6 multicast source address

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 34

Page 35: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Mixed IPv4/IPv6 environments Some security issues with transition

mechanisms •  Tunnels often interconnect networks over areas supporting the

“wrong” version of protocol •  Tunnel traffic often not anticipated by the security policies. It

may pass through firewall systems due to their inability to check two protocols in the same time

Do not operate completely automated tunnels •  Avoid “translation” mechanisms between IPv4 and IPv6, use

dual stack instead •  Only authorised systems should be allowed as tunnel end-points

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 35

Page 36: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

IPv6 transition mechanisms ~15 methods possible in combination Dual stack:

•  enable the same security for both protocol

Tunnels: •  ip tunnel – punching the firewall (protocol 41) •  gre tunnel – probably more acceptable since used several times

before IPv6 •  l2tp tunnel – udp therefore better handled by NATs

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 36

Page 37: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

L3 – L4 Spoofing in IPv4 with 6to4 For example, via 6to4 tunnelling spoofed traffic can

be injected from IPv4 into IPv6. •  IPv4 Src: IPv4 Address •  IPv4 Dst: 6to4 Relay Anycast (192.88.99.1) •  IPv6 Src: 2002:: Spoofed Source •  IPv6 Dst: Valid Destination

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 37

IPv6 net public IPv4 net

IPv6 net

attacker

6to4 relay 6to4 gateway

Page 38: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

L3 – L4 Spoofing in IPv4 with 6to4

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 38

Site 1 @IPv6-1

Internet IPv4

Site 2 @IPv6-2

Tunel IPv6-IPv4 (@v6-3)

@IPv4-1 @IPv4-2

@src=@IPv4-x @dest=@IPv4-2

@src=2002::@spoofed @dest=@IPv6-2::2

@IPv6-3::1 @IPv6-3::2

Illicit Data

IPv4 HDR IPv6 HDR IPv6 Data

@IPv4-x

Injection illicit IPv6 traffic Traffic IPv6 over IPv6-IPv4 tunel

@IPv6-1::1

@IPv6-2::2

6to4 Gateway

6to4 Relay

Page 39: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Firewalls IPv6 architecture and firewall -

requirements •  No need to NAT – same level of security with IPv6 possible as

with IPv4 (security and privacy) § Even better: e2e security with IPSec

•  Weaknesses of the packet filtering cannot be hidden by NAT •  IPv6 does not require end-to-end connectivity, but provides end-

to-end addressability •  Support for IPv4/IPv6 transition and coexistence •  Not breaking IPv4 security

Most firewalls are now IPv6-capable •  Cisco ACL/PIX, Juniper NetScreen, CheckPoint •  Modern OSes now provide IPv6 capable firewalls

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 39

Page 40: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Firewall setup No blind ICMPv6 filtering possible:

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 40

Required for normal operation – except static ND entry

NS/NA

For Stateless Address Autoconfigration RS/RA

Path MTU discovery Packet too big

Error report (e.g. Extension header errors) Parameter problem

Requirements in for multicast MLD

Error report TTL exceeded Debug – better error indication No route to destination

Debug Echo request/reply

IPv6

spec

ific

⎡ r

equi

red

Page 41: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

ICMP Filtering

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 41

ICMPv6 uses for configuring interface

=> Adapted filter ICMPv6

ICMP Message Type ICMPv4 ICMPv6 Connectivity Checks X X Informational/Error Messaging X X Fragmentation Needed Notification X X Address Assignment X Address Resolution X Router Discovery X Multicast Group Management X Mobile IPv6 Support X

Page 42: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Firewalls L4 issues Problematic protocols for stateful filtering

•  FTP §  Complex: PORT, LPRT, EPRT, PSV, EPSV, LPSV (RFC 1639, RFC

2428)

•  Other non trivially proxy-able protocol: §  No support (e.g.: H.323) §  Skype

Check with your firewall manufacturer for protocol support

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 42

Page 43: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Other threats IPv6 Routing Attack

•  Use traditional authentication mechanisms for BGP and IS-IS. •  Use IPsec to secure protocols such as OSPFv3 and RIPng

Viruses and Worms Sniffing

•  Without IPsec, IPv6 is no more or less likely to fall victim to a sniffing attack than IPv4

ICMP attacks – slight differences with ICMPv4 •  Recommendations for Filtering ICMPv6 Messages in Firewalls (RFC4890) •  TCP ICMP attacks – slight differences with ICMPv6

§  http://tools.ietf.org/html/draft-ietf-tcpm-icmp-attacks-06 Application Layer Attacks

•  Even with IPsec, the majority of vulnerabilities on the Internet today are at the application layer, something that IPsec will do nothing to prevent

Man-in-the-Middle Attacks (MITM) •  Without IPsec, any attacks utilizing MITM will have the same likelihood

in IPv6 as in IPv4 Flooding

•  Flooding attacks are identical between IPv4 and IPv6

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 43

Page 44: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Recommendations at a glance •  Learn IPv6 for mastering IPv6 protocol, •  Elaborate an coherent addressing plan and a

specific addressing plan for sensible equipments •  Use your IPv4 security knowledge •  Filter IPv6 traffic based on well-know address •  Deploy management tools adapted for IPv6

environment •  Use available security tools for audit and detect

security gap on IPv6 infrastructure •  Insure active “technology watch” for following

protocol evolution (security and functionality)

Janvier 2013 Formation IPv6 RENATER -Rouen, FR 44

Page 45: New IPv6 Security · 2014. 2. 5. · Mixed IPv4/IPv6 environments Some security issues with transition mechanisms • Tunnels often interconnect networks over areas supporting the

Questions ?

Formation IPv6 RENATER -Rouen, FR