IPv6Security Slides
IPv6Security Slides
Training Course
April 2021
09:00 - 09:30 Co ee, Tea
17:30 End
2
ff
Introductions
• Name
• Number in the list
• Experience with Security and IPv6
• Goals
Introduction
Legend
Learning / Understanding
Attacker Protecting
5
Introduction to IPv6
Security
Section 1
IPv6 is Happening…
8
IPv6 Security Statements
1 2 3 4 5 6 7 8
Reason:
• RFC 4294 - IPv6 Node Requirements: IPsec MUST
Reality:
• RFC 8504 - IPv6 Node Requirements: IPsec SHOULD
Reason:
• End-2-End paradigm. Global addresses. No NAT
Reality:
• Global addressing does not imply global reachability
fi
Reason:
• Common LAN/VLAN use /64 network pre x
• 18,446,744,073,709,551,616 hosts
Reality:
• Brute force scanning is not possible [RFC5157]
fi
Reason:
• Lack of knowledge about IPv6 (it’s happening!)
Reality:
• There are tools, threats, attacks, security patches, etc.
Reason:
• Routing and switching work the same way
Reality:
• Whole new addressing architecture
Reason:
• Question: “Does it support IPv6?”
Reality:
• IPv6 support is not a yes/no question
Reason:
• Networks only designed and con gured for IPv4
Reality:
• IPv6 available in many hosts, servers, and devices
ffi
fi
Reason:
• Considering IPv6 completely di erent than IPv4
Reality:
• Use IP independent security policies
ff
Conclusions
17
Source Address
Destination Address
20
ffi
Basic IPv6 Header: Threat #1
IP spoo ng:
Using a fake IPv6 source address
Solution:
ingress ltering and RPF (reverse path forwarding)
21
fi
fi
Source Address
Destination Address
22
ffi
Basic IPv6 Header: Threats #2
Covert Channel:
Using Tra c Class and/or Flow Label
Solution:
Inspect packets (IDS / IPS)
Expected values:
- Traffic Class: 0 (unless QoS is used)
- Flow Label: 0
23
ffi
Destination Options*
Routing
Fragment
IPsec: AH
IPsec: ESP
24
25
• Flexibility means complexity
26
fi
Routing Header
27
fi
28
ffi
fi
A B
Target
S
Attacker
D
Addr[1] = A Addr[1] = B
Addr[2] = A Basic Hdr RH0
Addr[2] = B
… … S | B Segs = 126
Addr[126] = B Addr[126] = A
Addr[127] = A Addr[127] = D
S | A Segs = 125
S | B Segs = 124
S | A Segs = 1
S | B Segs = 0 S | D Segs = 0
29
Extension Headers Solutions
Deprecated [RFC5095]
Use of RH0
Do not use or allow
30
Fragment Header
- Used by IPv6 source node to send a packet bigger than path MTU
Identi cation
32 bits
M Flag:
1 = more fragments to come;
0 = last fragment
31
fi
ff
EH Threats: Fragmentation
32
ff
ff
EH Solutions: Fragmentation
33
Bypassing RA Filtering/RA-Guard
Using any Extension Header
34
Bypassing RA Filtering/RA-Guard
Using Fragment Extension Header
35
Extension Headers Solutions
36
fi
Authentication
AH Provides Integrity
MAY
Header (AH) be implemented
37
fi
IPsec or manual
IKE
PROTECTED
1 2
Pkt IPsec
SA IPsec SA
PROTECT
UNPROTECTED
Pkt Pkt
SPD
Send BYPASS
DISCARD
38
IPsec Modes
S Internet R2
R1
D
S
S
Internet
R2
R1
D
D
39
IPsec: Authentication Header
Unprotected IPv6
IPv6 EHs Upper Layers
Integrity
Immutable/predictable elds
ICV Hash
AH in Tunnel Mode
IPv6 EHs AH IPv6 EHs Upper Layers
Integrity
* Options for IPs in routing header
** Options for destination IP 40
fi
fi
IPsec: ESP
Unprotected IPv6 EH1 = Hop-by-Hop,
IPv6 EHs Upper Layers Dest. Options*,
Routing, Fragment
EH2 = Destination Options**
Hash
Encryption
Integrity
Hash
Encryption
Integrity
* Options for IPs in routing header
** Options for destination IP 41
• Goals:
• Time: 30 minutes
• Tasks:
43
ROUTER
::1
USER X
Network Prefix:
2001:DB8:F:X::/64
44
IPv6 Addressing
Architecture
Section 2.2
340,282,366,920,938,463,463,374,607,431,768,211,456
End-to-end
/64 /64
/64
/64
/64
/64
Multiple Addresses
Link-local
Global (GUA)
Multicast
46
IPv6 Address Scope
GLOBAL SITE
LINK
INTERFACE
47
ff
ff
ff
IPv6 Network Scanning
64 bits 64 bits
48
fi
fi
IID Generation Options
64 bits
Interface ID (IID)
DHCPv6
Manually
49
fi
SLAAC IIDs Currently
• Consider IID bits “opaque”, no value or meaning [RFC7136]
50
ff
fi
fi
fi
Guessing IIDs
51
Locally Scanning IPv6 Networks
Tra c Snooping
Dual-stack
Routing Protocols
LLMNR [RFC4795]
52
ffi
Special / Reserved IPv6 Addresses
Name IPv6 Address Comments
Unspeci ed ::/128 When no address available
Loopback ::1/128 For local communications
IPv4-mapped :: :0:0/96 For dual-stack sockets. Add IPv4 address 32 bits
Documentation 2001:db8::/32 RFC 3849
IPv4/IPv6 Translators 64: 9b::/96 RFC 6052
Discard-Only Address
100::/64 RFC 6666
Block
Teredo 2001::/32 IPv6 in IPv4 Encapsulation Transition Mechanism
6to4 2002::/16 IPv6 in IPv4 Encapsulation Transition Mechanism
ORCHID 2001:10::/28 Deprecated RFC 5156
Benchmarking 2001:2::/48 RFC 5180
Link-local fe80::/10 RFC 4291
Unique-local fc00::/7 RFC 4193
6Bone 3ffe::/16, 5f00::/8 Deprecated RFC 3701
IPv4-compatible ::/96 Deprecated RFC 5156
http://www.iana.org/assignments/iana-ipv6-special-registry/
53
ff
ff
ff
fi
Security Tips
• Use hard to guess IIDs
- RFC 7217 better than Modified EUI-64
- RFC 8064 establishes RFC 7217 as the default
54
• Time: 10 minutes
• Tasks:
- Use The IPv6 Toolkit to scan your lab’s subnet
- Use THC-IPV6 to scan your lab’s subnet
56
IPv6 Associated
Protocols Security
Section 3
ICMPv6
Section 3.1
ICMPv6 [RFC4443] is an integral part of IPv6
59
ICMPv6 Format
• General Format
Message Body
Time Exceeded
60
Type Code
No route to destination (0)
Communication with destination administratively prohibited (1)
Beyond scope of source address (2)
Address Unreachable (3)
Destination Ureachable (1)
Port Unreachable (4)
Source address failed ingress/egress policy (5)
Reject route to destination (6)
Error in Source Routing Header (7)
Packet Too Big (2)
Packet Too Big (0)
Parameter = next hop MTU
Hop Limit Exceeded in Transit (0)
Time Exceeded (3)
Fragment Reassembly Time Exceeded (1)
Erroneous Header Field Encountered (0)
Parameter Problem (4) Unrecognized Next Header Type (1)
Parameter = o set to error Unrecognized IPv6 Option (2)
IPv6 First Fragment has incomplete IPv6 Header Chain (3)
61
ff
62
ICMPv6 Security
63
fi
NDP
Section 3.2
NDP [RFC4861] is used on a link
Redirect
65
fi
fi
Hop Limit = 255 NDP has vulnerabilities
[RFC3756]
[RFC6583]
if not then discard
66
fi
NDP Threats
• Neighbor Solicitation/Advertisement Spoo ng
• Redirection/DoS attack
67
fi
IPv6 ICMPv6 NS
68
fi
Unsolicited NA (Redirection / DoS)
Neighbour Cache
IP1 11:11:11:11:11:11 IPr
R MACr = 12:34:56:78:9a:bc
IPr 12:34:56:78:9a:bc
IP2 22:22:22:22:22:22
IP2 aa:aa:aa:aa:aa:a
a
IP1 IP2
11 MAC1 = 11:11:11:11:11:11 2 MAC2 = 22:22:22:22:22:22
IPv6 ICMPv6 NA
69
NUD Failure (DoS attack)
NA NS
Answer to NS 1
70
Answer to NS Answer to NS
NA NS
NS NS
71
fi
NDP
Exercise 3.2-a
Exercise 3.2-a NDP
• Description: Create packets to poison neighbor cache
• Goals:
- Practice with Scapy tool
- Learn how to modify the neighbor cache of another host in the same
network
• Time: 15 minutes
73
IP2 22:22:22:22:22:22
IPb cc:cc:cc:cc:cc:cc
IPa IPb
1A MACa = aa:aa:aa:aa:aa:aa 2B MACb = bb:bb:bb:bb:bb:bbb
IPc
MACc = cc:cc:cc:cc:cc:cc
IPv6 ICMPv6 NS
C
74
3.2-a: Neighbor cache attack using NA
Neighbor Cache # ip neighbour show
IPb bb:bb:bb:bb:bb:bb
IP2 22:22:22:22:22:22
IPb cc:cc:cc:cc:cc:cc
IPa IPb
1A MACa = aa:aa:aa:aa:aa:aa 2B MACb = bb:bb:bb:bb:bb:bbb
IPc
MACc = cc:cc:cc:cc:cc:cc
IPv6 ICMPv6 NA C
75
Malicious Last Hop Router
(lifetime = 0)
22
RA RA
RA RA RA RS
Periodic RAs Answer to RS 1
1
76
Bogus On-Link Pre x
RA
DoS
77
fi
fi
Bogus Address Con guration Pre x
RA
DoS
78
fi
fi
fi
Parameter Spoo ng: Hop Limit
RA
DoS
79
fi
Parameter Spoo ng: DHCPv6
ATTACKER’S
DHCP SERVER
RA
M: 1
O: 1
DoS
80
fi
Spoofed Redirect Message
Neighbour Cache Routes on Host 1:
::/0 - fe80::a:b:c
IP1 11:11:11:11:11:11 IPr = fe80::a:b:c
2001:db8::face:b00c - fe80::a R MACr = 12:34:56:78:9a:bc
IPr 12:34:56:78:9a:bc
IP1
11 MAC1 = 11:11:11:11:11:11
IPa = fe80::a
MACa = aa:aa:aa:aa:aa:aa
IPv6 ICMPv6 Redirect
81
IPr = fe80::a:b:c
MACr = 12:34:56:78:9a:bc
NS
82
fi
NDP
Exercise 3.2-b
Exercise 3.2-b NDP
• Description: Send RA messages to perform attacks
• Goals:
- Practice with Scapy tool
- Use RA messages to perform attacks on a link
• Time: 20 minutes
• Tasks:
- Send RA messages with bogus address configuration prefix
84
- RA-GUARD
- MLD Snooping
- DHCPv6 Guard
85
fi
IPv6 Snooping
IP2 IP1
12 MAC2
2
1 MAC1
NA NA
NS NS
NS
NA
IPa
MACa
86
IPv6 Source / Pre x Guard
IP2
12 MAC2
Source
Source
IPa
MACa
87
fi
IPv6 Destination Guard
Internet
Destination
IPa 2 IPb
88
Rogue Router Advertisements
RA
89
Rogue RA Solutions
1 2
Link Monitoring SEND
3 4
MANUAL CONFIGURATION Host Packet Filtering
+ Disable Autocon g
5 6
Router Preference Option ACLs on Switches
[RFC4191]
7
RA Snooping on Switches (RA GUARD)
90
fi
RA-GUARD [RFC6105]
91
Implementing RA-GUARD
Stateless RA Guard
Stateful RA Guard
Stateful RA Guard
Learns dynamically
92
fi
Filtering
• Use Access Control Lists (ACLs) in switches
Source/destination Source/destination
MAC address IPv6 address
Next Header
93
Filtering Example
(config-ipv6-acl)#exit
(config)#interface FastEthernet0/5
(config-if)#ipv6 traffic-filter RA-GUARD in
94
Conclusions / Tips
95
MLD
Section 3.3
• MLD (Multicast Listener Discovery) is:
- Uses ICMPv6
97
MLDv1
General
Speci c
98
fi
Src: fe80::2
Dst: SolicitedNode(2)
2 fe80::2
fe80::a R REPORT SolicitedNode(2)
QUERY
Src: fe80::a
Dst: FF02::1
99
MLDv2
100
fi
fi
fi
MLDv2
QUERY REPORT-v2
101
fi
fi
fi
MLD Details
• Nodes MUST process QUERY to any of its unicast or
multicast addresses
102
MLD Flooding
REPORT
RAM Exhaustion
CPU Exhaustion
103
MLD Flooding
REPORT
104
MLD Tra c ampli cation
REPORT
..
.
QUERY
105
ffi
fi
MLD Tra c ampli cation
..
.
106
ffi
fi
Passive MLD Scanning
REPORT
QUERY
DONE
107
Active MLD Scanning
QUERY
All Nodes (FF02::1)
REPORT
REPORT
REPORT
108
Built-in MLD Security
MLD Message
Source: Link local address only
Hop Limit = 1
109
MLD Snooping
RFC4541
QUERY
110
ffi
MLD Protection on Switches
QUERY
Only allow QUERIES on router’s port
QUERY
111
MLD
Exercise 3.3
Exercise 3.3 MLD
• Description: Network scanning using MLD
• Goals:
- Know about a new tool: Chiron
- Learn how to use Chiron to scan a network using MLD
• Time: 10 minutes
• Tasks:
- Scan your network using MLD Query message
113
DNS
Section 3.4
IPv6 DNS Con guration Attacks
NDP Autoconfiguration
Man-in-the-Middle SLAAC
115
fi
IPv6 DNS Con guration Attacks
116
fi
DHCPv6
Section 3.5
Introduction
ADVERTISE
UDP
REQUEST
Uses Relays REPLY
…
118
Multicast in DHCPv6
119
Triggering the use of DHCP
Looks
Looks like
like I’ll
I’ll need
need a
a DHCP
DHCP server
server to
to know
know
-- my public
where address
is the DNS Server
ATTACKER’S
DHCP SERVER - where is the DNS Server
RA
M
M 1
0
O
O 1-
120
fe80::a fe80::f
Dst: FF02::1:2
SOLICIT R-F (SOLICIT)
Src: FE80::a
Dst: FE80::a
ADVERTISE R-R (ADVERTISE)
Src: FE80::f
Dst: FF02::1:2
REQUEST R-F (REQUEST)
Src: FE80::a
Dst: FE80::a
REPLY R-R (REPLY)
Src: FE80::f
121
Privacy Considerations
122
Privacy Considerations
123
REPLY
REPLY
124
Rogue DHCP Server
REQUEST
125
Rogue DHCP Server
SOLICIT
ADVERTISE
Simple Attack
126
Rogue DHCP Server
ADVERTISE
REQUEST
REPLY
127
DHCPv6 Solutions
RFC8415 - Security Considerations
recommends RFC8213 - IPSec with Encryption
IPSec (with
(without
ESP)
encryption)
128
DHCPv6 Solutions
End-to-end encryption
Public key cryptography
Authentication
129
DHCPv6 Shield
RFC7610
130
IPv6 Filtering
Section 4
Filtering IPv6 Tra c
Section 4.1
ffi
Filtering in IPv6 is very Important!
Easier ltering!
133
fi
• ICMPv6
• Fragments Filtering
134
Filtering ICMPv6
Type - Code Description Action
Type 1 - all Destination Unreachable ALLOW
Type 2 Packet Too Big ALLOW
Type 3 - Code 0 Time Exceeded ALLOW
Type 4 - Code 0, 1 & 2 Parameter Problem ALLOW
Type 128 Echo Reply ALLOW for troubleshoot and services. Rate limit
Type 129 Echo Request ALLOW for troubleshoot and services. Rate limit
Types 131,132,133, 143 MLD ALLOW if Multicast or MLD goes through FW
Type 133 Router Solicitation ALLOW if NDP goes through FW
Type 134 Router Advertisement ALLOW if NDP goes through FW
Type 135 Neighbour Solicitation ALLOW if NDP goes through FW
Type 136 Neighbour Advertisement ALLOW if NDP goes through FW
Type 137 Redirect NOT ALLOW by default
Type 138 Router Renumbering NOT ALLOW
135
Filtering Extension Headers
136
fi
Filtering Fragments
Fragments
Several fragment headers
inside fragments
Fragmentation
External header hides fragmentation
inside a tunnel
137
fi
Filtering Fragments
138
ffi
Filtering TMs / Dual-stack
6in4 IP proto 41
6in4 (GRE) IP proto 47
6in4 (6-UDP-4) IP proto 17 + IPv6
6to4 IP proto 41
6RD IP proto 41
ISATAP IP proto 41
Teredo UDP Dest Port 3544
Tunnel Broker with TSP (IP proto 41) || (UDP dst port 3653 || TCP dst port 3653)
AYIYA UDP dest port 5072 || TCP dest port 5072
139
+
Common IPv4 Practices
+
New IPv6 Considerations
• Time: 20 minutes
• Tasks:
- Configure IPv6 packet filtering rules
142
::/0 fe80::a:b:c
IPr = fe80::a:b:c
2001:db8:bad:dad::1 fe80::a
R MACr = 12:34:56:78:9a:bc
IPa IPb
1A MACa = aa:aa:aa:aa:aa:aa 2B MACb = bb:bb:bb:bb:bb:bb
IPc = fe80::a
IPv6 ICMPv6 Redirect MACc = cc:cc:cc:cc:cc:cc
C
IPv6.Source fe80::a:b:c
IPv6.Destination IPa
Redirect.Target Addr fe80::a
Redirect.Dst Addr 2001:db8:bad:dad::1
143
Internet Wide IPv6
Security
Section 5
DDoS
Section 5.1
DDoS attacks in IPv6?
146
DDoS factors related with IPv6
147
fi
DDoS factors related with IPv6
Filter tra c
Don’t allow access to all IPv6 addresses
Update rmware
148
fi
ffi
fi
IPv6 Transition
Mechanisms
Section 5.2
Temporary solution…
150
• In IPv4-only infrastructure expect dual-stack hosts:
- VPNs or tunnels
- Undesired local IPv6 traffic
- Automatic Transition Mechanisms
- Problems with rogue RAs
151
Dual-stack
152
Tunnelling
IP-2 | IP-1 | DATA
IP-1 | DATA
Tunnel Tunnel
end point end point
Translation
154
fi
IPv6 Security Tips and
Tools
Section 6
Introduction
156
Tips
157
Up to date information
RFCs, I-Ds NVD, CVE OpenVAS CERT-EU Cisco, Juniper, NOGs, IETF, IPv6
Examples ENISA MS, Kaspersky, Hackers, Reddit,
EUROPOL/EC3 etc. Troopers, etc.
158
ff
ff
ff
ff
ff
Examples
Manual
CVE cve.mitre.org/cve/search_cve_list.html
Search for: ICMPv6 windows
NVD https://nvd.nist.gov/vuln/search
Search for: CVE-2020-16899
Go to vendor’s link
Automated
OpenVAS
159
Homework
Go to: cert.europa.eu
Select language lters
Search for IPv6
optional: con gure a subscription
Go to NVD: https://nvd.nist.gov/vuln/search
Search for IPv6 + your vendor
160
fi
fi
Security Tools
Type Can be used for Examples
Assessing IPv6 security
Packet Testing implementations Scapy, nmap,
Generators Learning about protocols Ostinato, TRex
Proof of concept of attacks/protocols
Understanding attacks and security measures
Packet Sni ers/ tcpdump, Scapy,
Learning about protocols and implementations
Analyzers Wireshark, termshark
Troubleshooting
Assessing IPv6 security
Specialised Learning about protocols and implementations THC-IPV6, The IPv6
Toolkits Proof of concept of attacks/protocols Toolkit, Ettercap
Learn about new attacks
Finding devices and information
Scanners nmap, OpenVAS
Proactively protect against vulnerabilities
Understanding attacks and security measures
Learning about protocols and implementations
IDS/IPS Snort, Suricata, Zeek
Assessing IPv6 security
Learn about new attacks
161
ff
Devices Categories (RIPE-554)
Security
Host Switch Router CPE
Equipment
IPSec (if needed) HOST + HOST + HOST + Router
RH0 [RFC5095] IPv6 ACLs Security
Ingress Filtering Header chain
Overlapping Frags
and RPF [RFC7112] Equipment
FHS
[RFC5722] DHCPv6 Relay
RA-Guard Support EHs DHCPv6 Server
[RFC8213]
[RFC6105] Inspection Privacy Issues
Atomic Fragments
OSPFv3
[RFC6946] ICMPv6 ne
DHCPv6 guard Auth. [RFC4552] grained ltering
NDP
Fragmentation IPv6 snooping or / and [RFC7166]
Encapsulated
[RFC6980]
IPv6 source / Tra c Inspection
pre x guard
IS-IS
Header chain
[RFC7112] [RFC5310] IPv6 Tra c
IPv6
Filtering
destination guard or, less preferred,
Stable IIDs
[RFC8064][RFC7217] [RFC5304]
MLD snooping
[RFC7136] [RFC4541]
MBGP
Temp. Address DHCPv6-Shield
Extensions [RFC7610] TCP-AO [RFC5925]
[RFC8981] MD5 Signature Option
[RFC2385]
Disable if not used:
Obsoleted
LLMNR, mDNS,
DNS-SD, transition MBGP Bogon
mechanisms pre x ltering 162
ffi
fi
fi
fi
ffi
fi
fi
BGP
R Router
IPv6
P2P links
IGP NDP
MLD
R
R R
Firewall FW
NDP
DHCPv6
Switch FHS
MLD
DNS*
IPv6
Hosts Servers
163
http://www.ripe.net/training/ipv6security/survey
164
RIPE NCC
Academy
academy.ripe.net
165
Presentation Title
LAUNCHING SOON
Presentation Subtitle
https://www.ripe.net/certi edprofessionals
Type Of Session
RIPE NCC Learning & Development
fi
Title Text
The End! Kрай Y Diwedd
Fí
Соңы Finis
Liðugt
Ende Finvezh Kiнець
Konec Kraj Ënn Fund
1 1
1 Request 1 Request
2 2
Reply Reply
1 1
Echo Request Echo Request
1 1
N Request 1 Packet 1 Packet
N Request
Source: Victim Source: Victim
2 Destination: Broadcast 2 Destination: Multicast (FF02::1)
Reply Reply
IPv4 IPv6
? 168
? 169
Extra: MITM
• Man-In-The-Middle attack:
- The attacker is able to be on the path of the packets
1
22 1
22
? 170
2
Packet
2
Packet | nonce
? 171
Extra: Overlapping Fragments
Fragments
200 bytes
Fragments
200 bytes
HASH
Text ea326e4c7178ad
HASH
Function
Another Text bc835b33a22b0f
Not Reversible
? 173
Securing routing
updates
177
Neighbors/Peers Authentication
178
n
Conclusions
180
IPv6 Filtering
Section 4
Filtering IPv6 Routing
Information
Section 4.2
IPv6 BGP Bogon Pre x Filtering
Use Pre x
Default ::/0
Unspeci ed Address ::/128
Loopback Address ::1/128
IPv4-mapped Addresses :: :0.0.0.0/96
IPv4-compatible Addresses (deprecated) ::/96
Link-local Addresses fe80::/10
Site-local Addresses (deprecated) fec0::/10
Unique-local addresses fc00::/7
Multicast Addresses 00::/8
Documentation addresses 2001:db8::/32
6Bone Addresses (deprecated) 3 e::/16, 5f00::/8
ORCHID 2001:10::/28
183
ff
ff
ff
ff
fi
fi
fi
MANRS (www.manrs.org)
184
ff
Ingress Filtering
Prevent IP Spoofing uRPF
[RFC2827][RFC3704]
Check BGP
Prevent Incorrect Define Announcements
Routing Information Routing Policy
(RPKI / ROAs)
185
188
1 A B 2
,B]
Victim ,A P/29
P/29 [1,A] [1
29 [1,A,B]
P/ P/32 [3,D]
C D
P/29 [1,A,C]
P/32 [3]
Tra c to AS 1
/32 pre x
3
Attacker
189
ffi
ffi
fi
fi
BGP MITM - Fake AS-path
Tra c to AS 1
1 A X B 2
]
A ,B
Victim [1, P/29
P/29 [1,A] 29
P/ [1,A,B]
X
P/32 [A,C,3,D]
C D
X
P/
32
/32 pre x
3
Attacker
190
ffi
ffi
ffi
fi
fi
BGP Hijack: Solutions
2. RPKI
191
fi