440 likes | 644 Views
Security Implications of IPv6. Tim Helming Director of Product Management Corey, Nachreiner, CISSP, Sr. Network Security Strategist ,. Welcome to WatchGuard’s IPv6 Webinar Series!. 2. 1. 4. 3. Security Implications of IPv6 v6 in a v4 world v6 security advantages/disadvantages.
E N D
Security Implications of IPv6 Tim Helming Director of Product Management Corey, Nachreiner, CISSP, Sr. Network Security Strategist ,
Welcome to WatchGuard’s IPv6 Webinar Series! 2 1 4 3 • Security Implications of IPv6 • v6 in a v4 world • v6 security advantages/disadvantages
Part 1: Security Implications of IPv6 in a (mostly) IPv4 World
Talking Behind My Back? Within the confines of your network, many devices may be communicating over IPv6, even if they are not sending packets to and from the Internet!
Remember... …Which means...
The Big IPv6 Security Question Does IPv6 help or hinder network security? The Answer is not that simple!
Built-In IPSec Offers Better Security… Right? First, a quick but relevant digression IPSec is a mandatory part of the IPv6 Protocol
What’s IPSec Again? Internet Protocol Security (IPSec) is a standard for adding strong authentication, message integrity, antireply, and encryption (confidentiality) to IP packets, thus providing secure and private communications. • Among other things, IPSec consists of: • Authentication Headers (AH) – Provides data origin authentication and integrity (protects against replay attacks) • Encapsulating Security Payloads (ESP) – Adds encryption to the mix to provide confidentiality
What are IPv6 Extension Headers? • Ext. headers may include: • Hop-by-hop options • Destination Options • Routing • Fragmentation • AH Header • ESP Header • Etc… Dropped options need to go somewhere… IPv4 Header (20 bytes) IPv6 Header (40 bytes) Version IHL Type of Service Total Length Version Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit Time to Live Protocol Header Checksum Source Address Source Address Destination Address Destination Address Options Padding Remember IPv6 header simplification?
Built-In IPSec Offers Better Security… Right? • What does this really mean? • Part of IPv6 protocol stack, not an optional add-on • Implemented with AH and ESP Extension Headers • Follows one standard (less interop issues) • Every IPv6 device can do IPSec • However, IPSec usage is still OPTIONAL! Where were we? IPSec is a mandatory part of the IPv6 Protocol
Wait! Doesn’t IPv4 Offer IPSec too? So is this really a security benefit? • Short term – probably no measureable advantage over IPv4 IPSec • Long term – More applications will leverage it now that it’s mandatory! • Some truths about IPv6’s additional IPSec Security: • IPv4 has it too (though, not “natively”) • You don’t have to use it, and most don’t • Still complex • May require PKI Infrastructure
Vast Address Space Naturally Thwarts Certain Attacks IPv6 Address space is unimaginably huge (340 unidecillion) Too big for automated reconnaissance and attack:
Immature Protocols = Increased Vulnerability & Risk • During the creation life-cycle of new standards and protocols: • Security is often an after-thought • Unexpected problems happen due to complex interactions • Many issues don’t surface until the tech receives wider usage • These concepts have proven themselves with many new network protocols in the past. Most experts suspect there are many security issues in IPv6, and related protocols, that we have yet to uncover. Complexity Security
Unfamiliarity Causes Misconfigurations Many network administrators and IT practitioners are still relatively unfamiliar with all IPV6’s “ins and outs” • Common issues: • Not realizing IPv6 is already in their network • Ignorance of Tunneling Mechanisms • Lack of ACL policy for IPv6 multi-homing • Unawareness of potential privacy issues • Over permissiveness, just to get it to work
Automatic Addressing May Pose Privacy Concerns MAC Address: 90-3A-2B-06-2C-D1 Split in half: 90-3A-2B 06-2C-D1 Insert FFFE: 90:3A:2B:FF:FE:06:2C:D1 Change 7th bit to 1: 92:3A:2B:FF:FE:06:2C:D1
A Look Back at IPv4 ARP Poisoning I also have 192.168.20.1 Hey Everyone. I have 192.168.20.34 And 192.168.20.2, And ….. Who has 192.168.20.34? I Do. Here’s my MAC No authentication or security Problem: Remember ARP? ARP Poisoning
Neighborhood Discovery Suffers from Similar Issues Neighbor Solicitation I Do. Send traffic to me Neighbor Advertisement ND Spoofing Who has 2001::3/64? Who has 2001::3/64? I Do. Here’s my Layer 2 address No authentication or security Again: ND Address Resolution ND Spoofing
Many Other Neighbor and Router Discovery Issues • Other ND related attacks: • Duplicate Address Detection (DAD) DoS attack • ND spoofing attack for router (allows for MitM) • Neighbor Unreachability Detection (NAD) DoS attack • Last Hop Router spoofing (malicious router advertisements) • And many more… (http://rfc-ref.org/RFC-TEXTS/3756/chapter4.html) • Solution: SEcure Neighbor Discovery (SEND) – RFC 3971 • Essentially adds IPSec to ND communications • Requires PKI Infrastructure • Not available in all OSs yet. • 802.1X also an option
New Multicast Protocol Helps with Reconnaissance In the first webinar, we introduced IPv6 multicast addresses: IPv6 multicast includes a ton of reserved addresses. Here’s a few: Attackers can use these multicast addresses to enumerate your network. Note: RFC 2375
IPv6 Security Controls Lagging Hacking Arsenal/Tools THC-IPv6 Attack Suite Unfortunately, IPv6 security controls and products seems to be a bit behind. • Attackeralready have many IPv6 capable tools:
Neutral IPv6 Differences of Concern Some of IPv6’s differences have security connotations that you should know about. However, they aren’t necessarily inherently good or bad
Typical IPv6 Devices Have Multiple Addresses You will probably need MULTIPLE Firewall or ACL policies for these extra networks within your organization
Extra Security Can Cause Insecurity IPv6 IPSec is end-to-end Internet In-line content filters can’t filter
EXTRA: The Same There are some security issues that IPv6 has little effect on:
Coming Up Next…(1 month from now) 3 1 4 2 • What To Expect from IPv6 • ISP activities • Connecting the Islands
Major References • IPv6 and IPv4 Threat Comparison and Best-Practice Evaluation • http://www.cisco.com/web/about/security/security_services/ciag/documents/v6-v4-threats.pdf • IPv6 Security Challenges https://www.cs.siue.edu/~wwhite/CS447/TopicalPaper/Originals/Bridges_IPv6SecurityChallenges.pdf • IPv6 Security Challenges by Samuel Sotillo http://www.infosecwriters.com/text_resources/pdf/IPv6_SSotillo.pdf • IPv6 Security Best Practices http://www.cisco.com/web/SG/learning/ipv6_seminar/files/02Eric_Vyncke_Security_Best_Practices.pdf • IPv6 Security Considerations and Recommendations • http://technet.microsoft.com/en-us/library/bb726956.aspx • NIST: Guidelines for the Secure Deployment of IPv6 • http://csrc.nist.gov/publications/nistpubs/800-119/sp800-119.pdf • IPv6 Transition/Coexistence Security Considerations (RFC 4942) • http://www.ietf.org/rfc/rfc4942.txt • And many more….