SlideShare a Scribd company logo
IPv6
Access SecurityTim Martin
CCIE #2020
Solutions Architect
4 Nov. 2015
Cisco Confidential 2© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Agenda
•  Why IPv6, Why Now
•  IPv6 Host Asignments
•  IPv6 First Hop Security
•  SeND
•  802.1x
•  Alternatives
•  Summary
Market Factors Driving IPv6 Adoption
IPv6
IPv4 Address Depletion
2011
National IPv6 Strategies
STEM
Mandate
Infrastructure Evolution
4G, DOCSIS 3.0, CGN
IPv6 OS, Content &
Applications
Preferred by App’s & Content
RF Mesh (IEEE 802.15.4), PLC (IEEE 1901.2), LTE, Bluetooth LE, 6LoWPAN, RPL
IPv6 for the Enterprise in 2015
http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/enterprise-ipv6-solution/whitepaper_c11-586154.pdf
Framing the Attack Surface
•  Layer 2 tyipcally involves Ethernet (switches) or WiFi (controllers) links
•  Security is only as strong as your weakest link
•  When it comes to networking, layer 2 can be a relativley weak link
Physical Links
MAC Addresses
IP Addresses
Protocols/Ports
Application Stream Application
Presentation
Session
Transport
Network
Data Link
Physical
Application
Presentation
Session
Transport
Network
Data Link
Physical
Initial Compromise
Compromised
IPv6 Host Address Assingments
IPv6 Host Portion Address Assignment
Similar to IPv4 New in IPv6
Manually configured StateLess Address AutoConfiguration
SLAAC EUI64
SLAAC
Privacy Extensions
Assigned via DHCPv6
00 90 27 ff fe 17 fc 0f
OUI Device Identifier
00 90 27 17 fc 0f
02 90 27 ff fe 17 fc 0f
0000 00U0 U=
1 = Universel/unique
0 = Local/not unique
U bit must
be flipped
ff fe
00 90 27 17 fc 0f
IPv6 Privacy Extensions (RFC 4941)
•  Generated on unique 802 using MD5, then stored for next iteration
•  Enabled by default in Windows, Android, iOS, Mac OS/X, Linux
•  Temporary or Ephemeral addresses for client application (web browser)
Recommendation: Good for the mobile user, but not for your
organization/corporate networks (Troubleshooting and accountability)
2001 DB8
/32 /48 /64
Random Generated Interface ID
0000 1234
Stable Interface ID Generation (RFC 7217)
•  RID = hash (Prefix, Net_Iface, DAD_Counter, secret_key)
•  Generate IID’s that are Stable/Constant for Each Network Interface
•  IID’s Change As Hosts Move From One Network to Another
10
Implementation of the RID is left to the OS Vendor and MAY differ between
Client and Server
2001 DB8
/32 /48 /64
Random ID
0000 1234
DHCPv6
DHCPv6 Server
2001:db8::feed:1
DHCPv6 Solicit
•  Source – fe80::1234, Destination - ff02::1:2
•  Client UDP 546, Server UDP 547
•  Original Multicast Encapsulated in Unicast (Relay)
•  DUID – Different from v4, used to identify clients
•  ipv6 dhcp relay destination 2001:db8::feed:1
DHCPv6 Relay
DHCPv6 Relay
SOLICIT (any servers)
ADVERTISE (want this address)
REQUEST (I want that address)
REPLY (It’s yours)
Disabling Ephemeral Addressing
•  Enable DHCPv6 via the M flag
•  Disable auto configuration via the A bit in option 3
•  Enable Router preference to high
•  Enable DHCPv6 relay
interface fastEthernet 0/0
ipv6 address 2001:db8:1122:acc1::1/64
ipv6 nd managed-config-flag
ipv6 nd prefix default no-autoconfig
ipv6 nd router-preference high
ipv6 dhcp relay destination 2001:db8:add:café::1
IPv6
First Hop Security
•  Catalyst Integrated Security Features (CISF)
•  Dsniff - Dug Song
•  Ettercap – source forge
IPv4 vulnerabilities & Countermeasures
Port
Security
IPv6 Hacking Tool’s
•  ARP is replaced by Neighbor Discovery Protocol
•  Nothing authenticated
•  Static entries overwritten by dynamic ones
•  Stateless Address Autoconfiguration
•  rogue RA (malicious or not)
•  Attack tools are real!
•  Parasit6
•  Fakerouter6
•  Alive6
•  Scapy6
•  …
IPv6 Snooping
IPv6 First Hop Security (FHS)
IPv6 FHS
RA
Guard
DHCPv6
Guard
Source/Prefix
Guard
Destination
Guard
Protection:
•  Rogue or
malicious RA
•  MiM attacks
Protection:
•  Invalid DHCP
Offers
•  DoS attacks
•  MiM attacks
Protection:
•  Invalid source
address
•  Invalid prefix
•  Source address
spoofing
Protection:
•  DoS attacks
•  Scanning
•  Invalid
destination
address
RA
Throttler
ND
Multicast
Suppress
Reduces:
•  Control traffic
necessary for
proper link
operations to
improve
performance
Core Features Advance Features Scalability & Performance
Facilitates:
•  Scale
converting
multicast traffic
to unicast
Address Exhaustion – Parasite6
•  Attacker hacks any victim's DAD attempts
•  Victim will need manual intervention to configure IP address
Src = UNSPEC
Dst = Solicited-node multicast A
Data = A
Query = Does anybody use A?
Src = any C’s IF address
Dst = A
Option = link-layer address of C
A B
NS
NA
C
Misconfiguration
•  Admin/Intern sends RA’s with false prefix
•  Enthusiast who has a tunnel broker account
•  The most frequent threat by non-malicious user
B
Src = C link-local address
Dst = All-nodes
Options = prefix BAD
RA
A C
Malicious Attack – Floodrouter6
•  Flooding RA’s overwhelms the system, OSX, MSFT, ipad/phone, Android
B
RA, prefix BAD1
A 2 3 5
RA, prefix BAD2
RA, prefix BAD3
RA, prefix BAD4
RA, prefix BAD5
RA, prefix BAD6
C
Update: MSFT Addresses Vulnerability in
IPv6 Could Allow Denial of Service
(2904659) Published: February 11, 2014
Malicious Attack – Fakerouter6
•  Attacker spoofs Router Advertisement with false on-link prefix
•  MITM, Splash Screen, Capture
B
Src = B’s link-local address
Dst = All-nodes
Options = prefix BAD
RA
A C
•  Port ACL
•  interface FastEthernet0/2
•  ipv6 traffic-filter ACCESS_PORT in
deny icmp any any router-advertisement
•  Feature Based
•  interface FastEthernet0/2
•  ipv6 nd raguard
•  Policy Based
ipv6 snooping policy HOST!
security-level guard! ! ! ! !
limit address-count 2 !
device-role node!
interface GigabitEthernet1/0/2!
ipv6 snooping attach-policy HOST!
HOST
Device-role
RA
RA
RA
RA
RA
ROUTER
Device-role
IPv6 FHS – DHCPv6 Guard
Prevent Rogue DHCP responses from misleading the client
DHCP Server
DHCP Req.
I am a DHCP
Server
DHCP Client
•  Deep control packet Inspection
•  Address Glean (ND , DHCP, data)
•  Address watch
•  Binding Guard
IPv6 FHS – Snooping
Instrumental link-operation security feature that analyzes control/data
switch traffic, detect IP address, and store/update them in Binding Table
to ensure rogue users cannot spoof or steal addresses.
Intf IPv6 MAC VLAN State
g1/0/10 ::000A 001A 110 Active
g1/0/11 ::001C 001C 110 Stale
g1/0/16 ::001E 001E 200 Verifying
IPv6 Binding Table (RFC6620)
IPv6 Source
Guard
IPv6 Destination
Guard
Device Tracking
IPv6 FHS – IPv6 Source Guard
Mitigates Address High Jacking, Ensures Proper Prefix
Intf IPv6 MAC VLAN State
g1/0/10 ::000A 001A 110 Active
g1/0/11 ::001C 001C 110 Stale
g1/0/16 ::001E 001E 200 Verifying
g1/0/21 ::0021 0021 200 Active
~Host A
NDP or DHCPv6
Host A
IPv6 Destination Guard
• Mitigate prefix-scanning attacks and Protect ND cache
• Drops packets for destinations without a binding entry
Intf IPv6 MAC VLAN State
g1/0/10 ::0001 001A 110 Active
g1/0/11 ::001C 001C 110 Stale
g1/0/16 ::001E 001E 200 Verifying
Forward packet
Lookup
Table
found
No
Ye
s
NS
2001:db8::1
Ping 2001:db8::1
Ping 2001:db8::4
Ping 2001:db8::3
Ping 2001:db8::2
SeND
Secure Neighbor Discovery – SeND (RFC 3756)
•  Each device has a RSA key pair
•  Ultra light check for validity
SHA-1
RSA Keys
Priv Pub
Subnet
Prefix
Interface
Identifier
Crypto. Generated Address
Signature
SeND Messages
Modifier
Public
Key
Subnet
Prefix
CGA Params
SeND Operation
Router R
host
Certificate Authority CA0
Certificate Authority
Certificate C0
Router
certificate
request
Router certificate CR
Certificate Path Solicit (CPS): I trust CA0, who are you ?
Certificate Path Advertize (CPA): I am R, this is my certificate CR
1
2
3
4
5
6 Verify CR against CA0
7 Start using R as default gateway
Router Advertisement
SeND OS Support
•  Microsoft Windows 7 or Server 2008
•  No native Supplicant
•  TrustRouter application (not NA/NS)
•  WinSEND application works with all NDP traffic
•  Apple Mac
•  No native Supplicant
•  TrustRouter application (not NA/NS)
•  Linux and/or Unix
•  Easy-SEND
•  ND-Protector
•  IPv6-Send-CGA
802.1x
Fundamentals of 802.1X
RADIUS802.1X
Ethernet / WLAN IP / Layer 3
Windows
Native
Apple OSX
Native
Cisco
Anyconnect
Open 1X
Ethernet
Switch
Router
Wireless
Controller
Access
Point
Identity
Services
Engine
Network
Policy
Server
Free
RADIUS
Access
Control
Server
Active Directory
Token Server
Open
LDAP
Supplicant Authenticator
Authentication
Server
Identity
Store
RADIUS802.1X
Ethernet / WLAN IP / Layer 3
Supplicant Authenticator
Authentication
Server
Identity
Store
Fundamentals of 802.1X
RADIUS: ACCESS-REQUEST
RADIUS SERVICE-TYPE: FRAMED
EAP: EAP-RESPONSE-IDENTITY
Credentials
(Certificate / Password / Token)
802.1X
EAP
EAP
RADIUS
EAP EAP
EAP: Extensible Authentication Protocol
RADIUS802.1X
IP / Layer 3
Supplicant Authenticator
Authentication
Server
Identity
Store
Fundamentals of 802.1X
EAP: EAP-SUCCESS
RADIUS: ACCESS-ACCEPT
[+Authorization Attributes ]
802.1X
RADIUS
EAP
Port-Authorized
802.1X
EAP
Port-Unauthorized
(If authentication fails)
EAP: Extensible Authentication Protocol
Three proven deployment scenarios
Authentication without
Access control
Minimal impact to
users and the network
Highly Secure, Good
for logical isolation
Alternatives
MAC Authentication Bypass
MAB
802.1X
Timeout
EAPoL: EAP Request Identity
EAPoL: EAP Request Identity
EAPoL: EAP Request Identity
Any Packet RADIUS: ACCESS-REQUEST
RADIUS Service-Type: Call-Check
AVP: 00-10-23-AA-1F-38
RADIUS: ACCESS-ACCEPT
MAC Authentication Bypass (MAB) requires a MAC database | MAB may cause delayed network access due to EAP timeout
Bypassing “Known” MAC Addresses
00-10-23-AA-1F-38 Authenticator Authentication Server
LAN
802.1X
No
802.1X
Endpoints without supplicant will fail 802.1X authentication!
Authentication
ServerAuthenticator
LAN
RADIUS
Server
Cisco ISE
Web
Server
Web Pages: Login, Login Expiry,
Auth-Success, Auth-Failure, etc.
Settings: Max Sessions, Timeout,
Max Fail Attempts, TCP-Port, etc.
HTTP(S)
LAN
RADIUS
Server
HTTP(S) RADIUS
Authenticator
Web Pages: Login, Login Expiry,
Auth-Success, Auth-Failure
Settings: Max Sessions, Timeout,
Max Fail Attempts, Banner, etc.
Web Authentication
Secure alternative to 802.1X Typically meant for Guest user authentication Doesn’t require a supplicant.1X
Local Web Authentication (LWA) Central Web Authentication (CWA)
IP address prior to authentication Authenticator hosts web pages
Separate method like .1X & MAB RADIUS Service-Type: Outbound
IP address prior to authentication Central Server hosts web pages
.1X / MAB is authorized w URL Centralized administration
Private VLAN’s
38
•  Prevent Node-Node Layer-2 communication
•  Promiscuous (router port) talks to all other port types
•  Isolated port can only contact a promiscuous port/s
•  Community ports can contact their group and promiscuous port/s
•  DAD ND Proxy
•  Prevents address conflicts
•  Internet Edge, Data Center
•  Reducing attack surface, malware propagation
•  Service Provider
•  Client/customer isolation
Community
Ports
Community
Ports Isolated
Port
Promiscuous
Port
R
Summary
§  Gain Operational Experience now
§  Security enforcement is possible
§  Control IPv6 traffic as you would IPv4
§  “Poke” your Provider’s
§  Lead your OT/LOB’s into the Internet
Key Take Away
Fedv6tf-fhs

More Related Content

PPTX
PDF
PPTX
The Osi Model
PPTX
Gateway and firewall
PPTX
Network switch
PPTX
Border Gateway Protocol
PPTX
DHCP Snooping
PPTX
CCNP Switching Chapter 1
The Osi Model
Gateway and firewall
Network switch
Border Gateway Protocol
DHCP Snooping
CCNP Switching Chapter 1

What's hot (20)

PDF
VRF Configuration
PDF
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
PDF
Cisco ospf
PDF
Ccna notes
PPTX
Protocolo IPv6 básico versión 2.0
PDF
CCNA - Routing & Switching Commands
PPTX
Wireless Communication – Issues, Challenges and Applications
PDF
Cisco Internetworking Operating System (ios)
PPTX
OSPF Basics
PPTX
Open Shortest Path First
PDF
Cisco ospf
PPTX
Ipv4 & ipv6
PPTX
PPT
Mail server
PPTX
Route Redistribution between OSPF and EIGRP
PPTX
IPV6 INTRODUCTION
PDF
Cisco IPv6 Tutorial by Hinwoto
PPTX
Mac addresses(media access control)
PPTX
Network Devices
VRF Configuration
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Cisco ospf
Ccna notes
Protocolo IPv6 básico versión 2.0
CCNA - Routing & Switching Commands
Wireless Communication – Issues, Challenges and Applications
Cisco Internetworking Operating System (ios)
OSPF Basics
Open Shortest Path First
Cisco ospf
Ipv4 & ipv6
Mail server
Route Redistribution between OSPF and EIGRP
IPV6 INTRODUCTION
Cisco IPv6 Tutorial by Hinwoto
Mac addresses(media access control)
Network Devices
Ad

Similar to Fedv6tf-fhs (20)

PDF
IPv6 Security - Myths and Reality
PDF
Is IPv6 Security Still an Afterthought?
PPTX
7 slaac-rick graziani
PDF
IPv6 Security Overview by QS Tahmeed, APNIC RCT
PPT
Chapter14ccna
PDF
Neighbor Discovery Deep Dive – IPv6-Networking-Referat
PPTX
Getting started with IPv6
PDF
IPv6 Security - Hacker Halted 2013
PDF
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
PPTX
IPv6 DHCP
PPTX
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...
PPTX
Lync 2010 deep dive edge
PDF
DDoS Mitigation using BGP Flowspec
PDF
Обеспечение безопасности сети оператора связи с помощью BGP FlowSpec
PDF
18-20180514_SRv6_RIPE.pdf
PDF
IPv6 SenD
PDF
Fedv6tf-IPv6-new-friends
PPT
Chapter14ccna
PPT
Chapter14ccna
IPv6 Security - Myths and Reality
Is IPv6 Security Still an Afterthought?
7 slaac-rick graziani
IPv6 Security Overview by QS Tahmeed, APNIC RCT
Chapter14ccna
Neighbor Discovery Deep Dive – IPv6-Networking-Referat
Getting started with IPv6
IPv6 Security - Hacker Halted 2013
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
IPv6 DHCP
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...
Lync 2010 deep dive edge
DDoS Mitigation using BGP Flowspec
Обеспечение безопасности сети оператора связи с помощью BGP FlowSpec
18-20180514_SRv6_RIPE.pdf
IPv6 SenD
Fedv6tf-IPv6-new-friends
Chapter14ccna
Chapter14ccna
Ad

Recently uploaded (20)

PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPTX
artificial intelligence overview of it and more
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
Funds Management Learning Material for Beg
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
DOCX
Unit-3 cyber security network security of internet system
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPTX
innovation process that make everything different.pptx
Power Point - Lesson 3_2.pptx grad school presentation
artificial intelligence overview of it and more
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
presentation_pfe-universite-molay-seltan.pptx
Decoding a Decade: 10 Years of Applied CTI Discipline
WebRTC in SignalWire - troubleshooting media negotiation
Paper PDF World Game (s) Great Redesign.pdf
Introuction about ICD -10 and ICD-11 PPT.pptx
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Funds Management Learning Material for Beg
Module 1 - Cyber Law and Ethics 101.pptx
An introduction to the IFRS (ISSB) Stndards.pdf
Unit-3 cyber security network security of internet system
SASE Traffic Flow - ZTNA Connector-1.pdf
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
innovation process that make everything different.pptx

Fedv6tf-fhs

  • 1. IPv6 Access SecurityTim Martin CCIE #2020 Solutions Architect 4 Nov. 2015
  • 2. Cisco Confidential 2© 2013-2014 Cisco and/or its affiliates. All rights reserved. Agenda •  Why IPv6, Why Now •  IPv6 Host Asignments •  IPv6 First Hop Security •  SeND •  802.1x •  Alternatives •  Summary
  • 3. Market Factors Driving IPv6 Adoption IPv6 IPv4 Address Depletion 2011 National IPv6 Strategies STEM Mandate Infrastructure Evolution 4G, DOCSIS 3.0, CGN IPv6 OS, Content & Applications Preferred by App’s & Content RF Mesh (IEEE 802.15.4), PLC (IEEE 1901.2), LTE, Bluetooth LE, 6LoWPAN, RPL
  • 4. IPv6 for the Enterprise in 2015 http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/enterprise-ipv6-solution/whitepaper_c11-586154.pdf
  • 5. Framing the Attack Surface •  Layer 2 tyipcally involves Ethernet (switches) or WiFi (controllers) links •  Security is only as strong as your weakest link •  When it comes to networking, layer 2 can be a relativley weak link Physical Links MAC Addresses IP Addresses Protocols/Ports Application Stream Application Presentation Session Transport Network Data Link Physical Application Presentation Session Transport Network Data Link Physical Initial Compromise Compromised
  • 6. IPv6 Host Address Assingments
  • 7. IPv6 Host Portion Address Assignment Similar to IPv4 New in IPv6 Manually configured StateLess Address AutoConfiguration SLAAC EUI64 SLAAC Privacy Extensions Assigned via DHCPv6
  • 8. 00 90 27 ff fe 17 fc 0f OUI Device Identifier 00 90 27 17 fc 0f 02 90 27 ff fe 17 fc 0f 0000 00U0 U= 1 = Universel/unique 0 = Local/not unique U bit must be flipped ff fe 00 90 27 17 fc 0f
  • 9. IPv6 Privacy Extensions (RFC 4941) •  Generated on unique 802 using MD5, then stored for next iteration •  Enabled by default in Windows, Android, iOS, Mac OS/X, Linux •  Temporary or Ephemeral addresses for client application (web browser) Recommendation: Good for the mobile user, but not for your organization/corporate networks (Troubleshooting and accountability) 2001 DB8 /32 /48 /64 Random Generated Interface ID 0000 1234
  • 10. Stable Interface ID Generation (RFC 7217) •  RID = hash (Prefix, Net_Iface, DAD_Counter, secret_key) •  Generate IID’s that are Stable/Constant for Each Network Interface •  IID’s Change As Hosts Move From One Network to Another 10 Implementation of the RID is left to the OS Vendor and MAY differ between Client and Server 2001 DB8 /32 /48 /64 Random ID 0000 1234
  • 11. DHCPv6 DHCPv6 Server 2001:db8::feed:1 DHCPv6 Solicit •  Source – fe80::1234, Destination - ff02::1:2 •  Client UDP 546, Server UDP 547 •  Original Multicast Encapsulated in Unicast (Relay) •  DUID – Different from v4, used to identify clients •  ipv6 dhcp relay destination 2001:db8::feed:1 DHCPv6 Relay DHCPv6 Relay SOLICIT (any servers) ADVERTISE (want this address) REQUEST (I want that address) REPLY (It’s yours)
  • 12. Disabling Ephemeral Addressing •  Enable DHCPv6 via the M flag •  Disable auto configuration via the A bit in option 3 •  Enable Router preference to high •  Enable DHCPv6 relay interface fastEthernet 0/0 ipv6 address 2001:db8:1122:acc1::1/64 ipv6 nd managed-config-flag ipv6 nd prefix default no-autoconfig ipv6 nd router-preference high ipv6 dhcp relay destination 2001:db8:add:café::1
  • 14. •  Catalyst Integrated Security Features (CISF) •  Dsniff - Dug Song •  Ettercap – source forge IPv4 vulnerabilities & Countermeasures Port Security
  • 15. IPv6 Hacking Tool’s •  ARP is replaced by Neighbor Discovery Protocol •  Nothing authenticated •  Static entries overwritten by dynamic ones •  Stateless Address Autoconfiguration •  rogue RA (malicious or not) •  Attack tools are real! •  Parasit6 •  Fakerouter6 •  Alive6 •  Scapy6 •  …
  • 16. IPv6 Snooping IPv6 First Hop Security (FHS) IPv6 FHS RA Guard DHCPv6 Guard Source/Prefix Guard Destination Guard Protection: •  Rogue or malicious RA •  MiM attacks Protection: •  Invalid DHCP Offers •  DoS attacks •  MiM attacks Protection: •  Invalid source address •  Invalid prefix •  Source address spoofing Protection: •  DoS attacks •  Scanning •  Invalid destination address RA Throttler ND Multicast Suppress Reduces: •  Control traffic necessary for proper link operations to improve performance Core Features Advance Features Scalability & Performance Facilitates: •  Scale converting multicast traffic to unicast
  • 17. Address Exhaustion – Parasite6 •  Attacker hacks any victim's DAD attempts •  Victim will need manual intervention to configure IP address Src = UNSPEC Dst = Solicited-node multicast A Data = A Query = Does anybody use A? Src = any C’s IF address Dst = A Option = link-layer address of C A B NS NA C
  • 18. Misconfiguration •  Admin/Intern sends RA’s with false prefix •  Enthusiast who has a tunnel broker account •  The most frequent threat by non-malicious user B Src = C link-local address Dst = All-nodes Options = prefix BAD RA A C
  • 19. Malicious Attack – Floodrouter6 •  Flooding RA’s overwhelms the system, OSX, MSFT, ipad/phone, Android B RA, prefix BAD1 A 2 3 5 RA, prefix BAD2 RA, prefix BAD3 RA, prefix BAD4 RA, prefix BAD5 RA, prefix BAD6 C Update: MSFT Addresses Vulnerability in IPv6 Could Allow Denial of Service (2904659) Published: February 11, 2014
  • 20. Malicious Attack – Fakerouter6 •  Attacker spoofs Router Advertisement with false on-link prefix •  MITM, Splash Screen, Capture B Src = B’s link-local address Dst = All-nodes Options = prefix BAD RA A C
  • 21. •  Port ACL •  interface FastEthernet0/2 •  ipv6 traffic-filter ACCESS_PORT in deny icmp any any router-advertisement •  Feature Based •  interface FastEthernet0/2 •  ipv6 nd raguard •  Policy Based ipv6 snooping policy HOST! security-level guard! ! ! ! ! limit address-count 2 ! device-role node! interface GigabitEthernet1/0/2! ipv6 snooping attach-policy HOST! HOST Device-role RA RA RA RA RA ROUTER Device-role
  • 22. IPv6 FHS – DHCPv6 Guard Prevent Rogue DHCP responses from misleading the client DHCP Server DHCP Req. I am a DHCP Server DHCP Client
  • 23. •  Deep control packet Inspection •  Address Glean (ND , DHCP, data) •  Address watch •  Binding Guard IPv6 FHS – Snooping Instrumental link-operation security feature that analyzes control/data switch traffic, detect IP address, and store/update them in Binding Table to ensure rogue users cannot spoof or steal addresses. Intf IPv6 MAC VLAN State g1/0/10 ::000A 001A 110 Active g1/0/11 ::001C 001C 110 Stale g1/0/16 ::001E 001E 200 Verifying IPv6 Binding Table (RFC6620) IPv6 Source Guard IPv6 Destination Guard Device Tracking
  • 24. IPv6 FHS – IPv6 Source Guard Mitigates Address High Jacking, Ensures Proper Prefix Intf IPv6 MAC VLAN State g1/0/10 ::000A 001A 110 Active g1/0/11 ::001C 001C 110 Stale g1/0/16 ::001E 001E 200 Verifying g1/0/21 ::0021 0021 200 Active ~Host A NDP or DHCPv6 Host A
  • 25. IPv6 Destination Guard • Mitigate prefix-scanning attacks and Protect ND cache • Drops packets for destinations without a binding entry Intf IPv6 MAC VLAN State g1/0/10 ::0001 001A 110 Active g1/0/11 ::001C 001C 110 Stale g1/0/16 ::001E 001E 200 Verifying Forward packet Lookup Table found No Ye s NS 2001:db8::1 Ping 2001:db8::1 Ping 2001:db8::4 Ping 2001:db8::3 Ping 2001:db8::2
  • 26. SeND
  • 27. Secure Neighbor Discovery – SeND (RFC 3756) •  Each device has a RSA key pair •  Ultra light check for validity SHA-1 RSA Keys Priv Pub Subnet Prefix Interface Identifier Crypto. Generated Address Signature SeND Messages Modifier Public Key Subnet Prefix CGA Params
  • 28. SeND Operation Router R host Certificate Authority CA0 Certificate Authority Certificate C0 Router certificate request Router certificate CR Certificate Path Solicit (CPS): I trust CA0, who are you ? Certificate Path Advertize (CPA): I am R, this is my certificate CR 1 2 3 4 5 6 Verify CR against CA0 7 Start using R as default gateway Router Advertisement
  • 29. SeND OS Support •  Microsoft Windows 7 or Server 2008 •  No native Supplicant •  TrustRouter application (not NA/NS) •  WinSEND application works with all NDP traffic •  Apple Mac •  No native Supplicant •  TrustRouter application (not NA/NS) •  Linux and/or Unix •  Easy-SEND •  ND-Protector •  IPv6-Send-CGA
  • 31. Fundamentals of 802.1X RADIUS802.1X Ethernet / WLAN IP / Layer 3 Windows Native Apple OSX Native Cisco Anyconnect Open 1X Ethernet Switch Router Wireless Controller Access Point Identity Services Engine Network Policy Server Free RADIUS Access Control Server Active Directory Token Server Open LDAP Supplicant Authenticator Authentication Server Identity Store
  • 32. RADIUS802.1X Ethernet / WLAN IP / Layer 3 Supplicant Authenticator Authentication Server Identity Store Fundamentals of 802.1X RADIUS: ACCESS-REQUEST RADIUS SERVICE-TYPE: FRAMED EAP: EAP-RESPONSE-IDENTITY Credentials (Certificate / Password / Token) 802.1X EAP EAP RADIUS EAP EAP EAP: Extensible Authentication Protocol
  • 33. RADIUS802.1X IP / Layer 3 Supplicant Authenticator Authentication Server Identity Store Fundamentals of 802.1X EAP: EAP-SUCCESS RADIUS: ACCESS-ACCEPT [+Authorization Attributes ] 802.1X RADIUS EAP Port-Authorized 802.1X EAP Port-Unauthorized (If authentication fails) EAP: Extensible Authentication Protocol
  • 34. Three proven deployment scenarios Authentication without Access control Minimal impact to users and the network Highly Secure, Good for logical isolation
  • 36. MAC Authentication Bypass MAB 802.1X Timeout EAPoL: EAP Request Identity EAPoL: EAP Request Identity EAPoL: EAP Request Identity Any Packet RADIUS: ACCESS-REQUEST RADIUS Service-Type: Call-Check AVP: 00-10-23-AA-1F-38 RADIUS: ACCESS-ACCEPT MAC Authentication Bypass (MAB) requires a MAC database | MAB may cause delayed network access due to EAP timeout Bypassing “Known” MAC Addresses 00-10-23-AA-1F-38 Authenticator Authentication Server LAN 802.1X No 802.1X Endpoints without supplicant will fail 802.1X authentication! Authentication ServerAuthenticator
  • 37. LAN RADIUS Server Cisco ISE Web Server Web Pages: Login, Login Expiry, Auth-Success, Auth-Failure, etc. Settings: Max Sessions, Timeout, Max Fail Attempts, TCP-Port, etc. HTTP(S) LAN RADIUS Server HTTP(S) RADIUS Authenticator Web Pages: Login, Login Expiry, Auth-Success, Auth-Failure Settings: Max Sessions, Timeout, Max Fail Attempts, Banner, etc. Web Authentication Secure alternative to 802.1X Typically meant for Guest user authentication Doesn’t require a supplicant.1X Local Web Authentication (LWA) Central Web Authentication (CWA) IP address prior to authentication Authenticator hosts web pages Separate method like .1X & MAB RADIUS Service-Type: Outbound IP address prior to authentication Central Server hosts web pages .1X / MAB is authorized w URL Centralized administration
  • 38. Private VLAN’s 38 •  Prevent Node-Node Layer-2 communication •  Promiscuous (router port) talks to all other port types •  Isolated port can only contact a promiscuous port/s •  Community ports can contact their group and promiscuous port/s •  DAD ND Proxy •  Prevents address conflicts •  Internet Edge, Data Center •  Reducing attack surface, malware propagation •  Service Provider •  Client/customer isolation Community Ports Community Ports Isolated Port Promiscuous Port R
  • 40. §  Gain Operational Experience now §  Security enforcement is possible §  Control IPv6 traffic as you would IPv4 §  “Poke” your Provider’s §  Lead your OT/LOB’s into the Internet Key Take Away