SlideShare a Scribd company logo
IPv6 Security
Where is the challenge?

Marco Hogewoning
External Relations
RIPE NCC
Biggest Hurdle Deploying IPv6




  (NRO: Global IPv6 Deployment Survey)




                                         2
Increased Awareness?




     (Ernst & Young: Global Information Security Survey)




                                                           3
Where is the Risk?
Threat or Vulnerability?

•   Threat: the potential to cause harm
    – DoS,   unauthorised access, viruses


•   Vulnerability: a weakness that can be exploited
    – Bugs,   configuration errors, design flaws


•   Risk: the possibility that a vulnerability will be
    exploited by somebody to cause harm

                                                         5
Human Factor

•   Vulnerabilities exist because of human errors:
    – Coding    errors
    – Configuration       errors
    – Design   flaws
•   Doesn’t mean it is your fault
    – But   a lot of times you can limit the risk




                                                     6
Examples
Is this IPv6 related?
Rogue Router Advertisement

•   IPv6 relies on routers to announce themselves
    using ICMPv6 multicasts
•   Protocol has little to no security
•   Every machine can claim to be a router
    – Reconfigure    clients to another subnet
    – Redirect   or intercept traffic




                                                    8
Rogue Router Advertisement (IPv4)

•   Every machine can start a DHCP server
    – Reconfigure     clients to another subnet
    – Redirect   or intercept traffic
    – NAT44   makes it much easier to hide it
•   ARP spoofing
    – Pretend    I am the router by claiming its MAC address




                                                               9
Protection at Protocol Layer

•   “RA Guard” feature
    – Filter   route announcements on switches
    – On    all ports except for the known router
    – Present     in a lot of equipment already
•   SEcure Neighbor Discovery (SEND)
    – Fix   the protocol by adding verification
    – Add      cryptographic certificates and signatures
    – No    widespread implementation


                                                          10
What About Layer 2?

•   Securing access to the physical network:
    – 802.1x    authentication
    – Disable   unused ports on switches
    – Strengthen    wireless passwords
    – MAC    address counters or filters (port security)
•   Lowers the risk for both protocols
    – Can   protect for other vulnerabilities




                                                          11
Another Example
ND Table Exhaustion

•   An IPv6 subnet contains 264 addresses
•   Scanning the range triggers neighbor discovery
    messages to be send out
•   Can result in denial of service:
    – Too   many packets
    – High   CPU load
    – Exhaust   available memory



                                                     13
“Ping Pong Issue”

•   Can happen on point-to-point links that don’t
    use neighbor discovery (i.e. Sonet)
•   Packet destined for a non-existing address on
    the point-to-point will bounce between the two
    routers
•   Exists in IPv4 as well
    – But   we learned to use small prefixes (/30, /31)



                                                         14
Smurf Attack (IPv4)

•   Send a (spoofed) ICMP ping to a network
    broadcast address
•   Multiple replies go to the source, causing a
    denial of service




                                                   15
ARP Flooding

•   There are 248 MAC addresses possible
    – Minus   a few reserved or in use
•   Send a number of packets while changing the
    source MAC address:
    – Switch   will run out of memory
    – Floods   all packets to all ports




                                                  16
IPv6-Specific Measures

•   ICMPv6 protocol changed in March 2006
    – Prevents      “ping pong” issue
•   Filter or rate limit ICMPv6 Neighbor Discovery
    – Not   advisable, makes the attack easier
•   Do they really need to talk to you?
    – Filter/rate   limit inbound TCP syn packets
    – Rate   limit inbound ICMPv6 (do not block!)
•   Use of /127 on point-to-point links

                                                     17
Local Attacks Still Possible

•   Securing access to the physical network:
    – 802.1x    authentication
    – Disable   unused ports on switches
    – Strengthen    wireless passwords
    – MAC   address counters or filters (port security)
•   Lowers the risk for both protocols
    – Can   protect for other vulnerabilities




                                                         18
Upper Layers
Where are you?
Vulnerabilities are Everywhere

•   Most security incidents caused in the application
    layers:
    – Buffer   overflows
    – SQL   injection
    – Man-in-the-middle    attacks
    – Weak     authentication




                                                        20
General Prevention Methods

•   Don’t run any unnecessary services
•   Keep up to date with software patches
•   Use encryption where possible
•   Use two-factor authentication
•   Keep it simple




                                            21
Source of Incidents




  (PWC: Information Security Survey)




                                       22
The Human Factor

•   Attacks are triggered by somebody


•   Known vulnerabilities are ignored


•   Mistakes can and will happen




                                        23
Capacity Building

•   Test your implementations before deploying
    – Don’t   rely on the glossy brochure
•   Build up knowledge
    – Learn   to identify potential risks
    – Learn   how to deal with them
•   Make use of available resources
    – Training   courses and tutorials
    – Share   your experiences


                                                 24
Improving Security with IPv6

•   Multiple subnets makes it easier to separate
    functions or people
•   Lack of NAT
    – Makes    everything much more visible
    – Security   moves to the end hosts
    – Forces   you to think
•   Somebody might already use IPv6!
    – Using   tunnels to hide what is going on


                                                   25
Conclusion

•   IPv6 might add some vulnerabilities


•   IPv6 is not a threat


•   You are the biggest risk




                                          26
Questions?
 marcoh@ripe.net

More Related Content

PDF
Pentesting
PDF
Digital self defense
PDF
The New Landscape of Airborne Cyberattacks
PDF
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
PDF
Attacking and Securing WPA Enterprise Networks
PDF
IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud
PPTX
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
PDF
Shape your remote connection to your GCE instance
Pentesting
Digital self defense
The New Landscape of Airborne Cyberattacks
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Attacking and Securing WPA Enterprise Networks
IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Shape your remote connection to your GCE instance

What's hot (20)

PDF
Chapter 7 security tools i
PPTX
SPINS: Security Protocols for Sensor Networks
PPTX
How to hack a telecommunication company and stay alive. Sergey Gordeychik
PDF
Строим ханипот и выявляем DDoS-атаки
PPT
Anton Chuvakin on Honeypots
PPTX
Linta
PPTX
Rat a-tat-tat
PPTX
Improvement in Rogue Access Points - SensePost Defcon 22
PPTX
Offence oriented Defence
PPTX
Capturing Malicious Bots using a beneficial bot and wiki
PPTX
Network Security Nmap N Nessus
PPT
Attacking Automatic Wireless Network Selection
PPT
Hacking Cisco
PPTX
G3t R00t at IUT
PPT
PPT
Sectools
PDF
CISSP Week 7
PDF
DDoS Attack Preparation and Mitigation
PDF
The state of wireless security
Chapter 7 security tools i
SPINS: Security Protocols for Sensor Networks
How to hack a telecommunication company and stay alive. Sergey Gordeychik
Строим ханипот и выявляем DDoS-атаки
Anton Chuvakin on Honeypots
Linta
Rat a-tat-tat
Improvement in Rogue Access Points - SensePost Defcon 22
Offence oriented Defence
Capturing Malicious Bots using a beneficial bot and wiki
Network Security Nmap N Nessus
Attacking Automatic Wireless Network Selection
Hacking Cisco
G3t R00t at IUT
Sectools
CISSP Week 7
DDoS Attack Preparation and Mitigation
The state of wireless security
Ad

Viewers also liked (14)

PPTX
IPv6 Security
PPTX
Eric Vyncke - IPv6 security in general
PPTX
IPv6 Security Challenges: TechNet Augusta 2015
PPTX
Survey on IPv6 security issues
PPT
E payment 2
PDF
IPv6 Security - Myths and Reality
PDF
The IPv6 Snort Plugin (at DeepSec 2014)
PDF
IPv6 and the IP Security Protocol
PPTX
AF-23- IPv6 Security_Final
PDF
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
PDF
Socket Programming in C++
PPTX
Implementation & Challenges of IPv6
DOCX
Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set)
KEY
IPV6 SIMPLE SECURITY CAPABILITIES
IPv6 Security
Eric Vyncke - IPv6 security in general
IPv6 Security Challenges: TechNet Augusta 2015
Survey on IPv6 security issues
E payment 2
IPv6 Security - Myths and Reality
The IPv6 Snort Plugin (at DeepSec 2014)
IPv6 and the IP Security Protocol
AF-23- IPv6 Security_Final
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
Socket Programming in C++
Implementation & Challenges of IPv6
Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set)
IPV6 SIMPLE SECURITY CAPABILITIES
Ad

Similar to IPv6 Security - Where is the Challenge? (20)

PPTX
Henrik Strøm - IPv6 from the attacker's perspective
PDF
ML13198A410.pdf
PDF
ML13198A410.pdf
PDF
We live in the earh seventy or eight years
PDF
ML13198A410.pdf
PDF
shivam sahu (firewall).pdfb jndvhjfvhjjf
PDF
IPV6 - Threats and Countermeasures / Crash Course
PDF
Fernando Gont - The Hack Summit 2021 - State of the Art in IPv6 Security
PDF
A firewall is an important and necessary part of that security, but cannot be...
PPTX
Security concepts
PDF
PLNOG 5: Merike Kaeo - Something Old Is New Again
PDF
Internet Facing VMs and the DDoS Problem, Wido den Hollander, Your.Online
PPTX
DevLink - WiFu: You think your wireless is secure?
PDF
Bh fed-03-kaminsky
PDF
Multi-Layer DDoS Mitigation Strategies
PPTX
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
PDF
fgont-h2hc-2020-ipv6-security.pdf
PDF
25 years of firewalls and network filtering - From antiquity to the cloud
PDF
ECE560 Wireless and Mobile Security Fall2020..pdf
PPT
Nomura UCCSC 2009
Henrik Strøm - IPv6 from the attacker's perspective
ML13198A410.pdf
ML13198A410.pdf
We live in the earh seventy or eight years
ML13198A410.pdf
shivam sahu (firewall).pdfb jndvhjfvhjjf
IPV6 - Threats and Countermeasures / Crash Course
Fernando Gont - The Hack Summit 2021 - State of the Art in IPv6 Security
A firewall is an important and necessary part of that security, but cannot be...
Security concepts
PLNOG 5: Merike Kaeo - Something Old Is New Again
Internet Facing VMs and the DDoS Problem, Wido den Hollander, Your.Online
DevLink - WiFu: You think your wireless is secure?
Bh fed-03-kaminsky
Multi-Layer DDoS Mitigation Strategies
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
fgont-h2hc-2020-ipv6-security.pdf
25 years of firewalls and network filtering - From antiquity to the cloud
ECE560 Wireless and Mobile Security Fall2020..pdf
Nomura UCCSC 2009

More from RIPE NCC (20)

PDF
A Look at a Root Cause for DNS Latency - APRICOT 2025
PDF
Internet Landscape and Network Resiliency in South East Europe
PDF
ondrej-caletka-INEX-Deploying_IPv6_mostly.pdf
PDF
jelena-cosic-internet-landscape-and-network-resiliency-in-south-east-europe.pdf
PDF
RIPE Atlas & other RIPE NCC Internet Measurement Tools
PDF
Securing BGP with RPKI - Ondřej Caletka, RIPE NCC
PDF
Minimising Impact before incidents occur with RIPE Atlas
PDF
Know Your Network: Utilising RIS and RIPE Atlas to your advantage
PDF
Know Your Network: Why every network operator should host a RIPE Atlas probe
PDF
Know Your Network; why every network operator should host a RIPE Atlas probe
PDF
Taiwan's Digital Landscape with RIPE NCC Tools
PDF
Navigating IP Addresses: Insights from your Regional Internet Registry
PDF
Traces of Power: Internet Governance and Climate Action
PDF
Governing Environmental Sustainability in Tech
PDF
Gerardo-Viviers-RPKI-presentation-DKNOG14.pdf
PDF
LIA HESTINA - Minimising impact before incidents occur with RIPE Atlas and RIS
PDF
Intro to RIPE and RIPE NCC: RIPE Atlas workshop
PDF
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
PDF
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
PDF
RIPE NCC Internet Measurement Tools
A Look at a Root Cause for DNS Latency - APRICOT 2025
Internet Landscape and Network Resiliency in South East Europe
ondrej-caletka-INEX-Deploying_IPv6_mostly.pdf
jelena-cosic-internet-landscape-and-network-resiliency-in-south-east-europe.pdf
RIPE Atlas & other RIPE NCC Internet Measurement Tools
Securing BGP with RPKI - Ondřej Caletka, RIPE NCC
Minimising Impact before incidents occur with RIPE Atlas
Know Your Network: Utilising RIS and RIPE Atlas to your advantage
Know Your Network: Why every network operator should host a RIPE Atlas probe
Know Your Network; why every network operator should host a RIPE Atlas probe
Taiwan's Digital Landscape with RIPE NCC Tools
Navigating IP Addresses: Insights from your Regional Internet Registry
Traces of Power: Internet Governance and Climate Action
Governing Environmental Sustainability in Tech
Gerardo-Viviers-RPKI-presentation-DKNOG14.pdf
LIA HESTINA - Minimising impact before incidents occur with RIPE Atlas and RIS
Intro to RIPE and RIPE NCC: RIPE Atlas workshop
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
RIPE NCC Internet Measurement Tools

Recently uploaded (20)

PDF
Architecture types and enterprise applications.pdf
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Chapter 5: Probability Theory and Statistics
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
Modernising the Digital Integration Hub
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
project resource management chapter-09.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
1. Introduction to Computer Programming.pptx
PPT
What is a Computer? Input Devices /output devices
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
August Patch Tuesday
PDF
Assigned Numbers - 2025 - Bluetooth® Document
Architecture types and enterprise applications.pdf
Getting Started with Data Integration: FME Form 101
Chapter 5: Probability Theory and Statistics
WOOl fibre morphology and structure.pdf for textiles
Modernising the Digital Integration Hub
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Group 1 Presentation -Planning and Decision Making .pptx
project resource management chapter-09.pdf
Zenith AI: Advanced Artificial Intelligence
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Programs and apps: productivity, graphics, security and other tools
A contest of sentiment analysis: k-nearest neighbor versus neural network
1. Introduction to Computer Programming.pptx
What is a Computer? Input Devices /output devices
observCloud-Native Containerability and monitoring.pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
August Patch Tuesday
Assigned Numbers - 2025 - Bluetooth® Document

IPv6 Security - Where is the Challenge?

  • 1. IPv6 Security Where is the challenge? Marco Hogewoning External Relations RIPE NCC
  • 2. Biggest Hurdle Deploying IPv6 (NRO: Global IPv6 Deployment Survey) 2
  • 3. Increased Awareness? (Ernst & Young: Global Information Security Survey) 3
  • 4. Where is the Risk?
  • 5. Threat or Vulnerability? • Threat: the potential to cause harm – DoS, unauthorised access, viruses • Vulnerability: a weakness that can be exploited – Bugs, configuration errors, design flaws • Risk: the possibility that a vulnerability will be exploited by somebody to cause harm 5
  • 6. Human Factor • Vulnerabilities exist because of human errors: – Coding errors – Configuration errors – Design flaws • Doesn’t mean it is your fault – But a lot of times you can limit the risk 6
  • 8. Rogue Router Advertisement • IPv6 relies on routers to announce themselves using ICMPv6 multicasts • Protocol has little to no security • Every machine can claim to be a router – Reconfigure clients to another subnet – Redirect or intercept traffic 8
  • 9. Rogue Router Advertisement (IPv4) • Every machine can start a DHCP server – Reconfigure clients to another subnet – Redirect or intercept traffic – NAT44 makes it much easier to hide it • ARP spoofing – Pretend I am the router by claiming its MAC address 9
  • 10. Protection at Protocol Layer • “RA Guard” feature – Filter route announcements on switches – On all ports except for the known router – Present in a lot of equipment already • SEcure Neighbor Discovery (SEND) – Fix the protocol by adding verification – Add cryptographic certificates and signatures – No widespread implementation 10
  • 11. What About Layer 2? • Securing access to the physical network: – 802.1x authentication – Disable unused ports on switches – Strengthen wireless passwords – MAC address counters or filters (port security) • Lowers the risk for both protocols – Can protect for other vulnerabilities 11
  • 13. ND Table Exhaustion • An IPv6 subnet contains 264 addresses • Scanning the range triggers neighbor discovery messages to be send out • Can result in denial of service: – Too many packets – High CPU load – Exhaust available memory 13
  • 14. “Ping Pong Issue” • Can happen on point-to-point links that don’t use neighbor discovery (i.e. Sonet) • Packet destined for a non-existing address on the point-to-point will bounce between the two routers • Exists in IPv4 as well – But we learned to use small prefixes (/30, /31) 14
  • 15. Smurf Attack (IPv4) • Send a (spoofed) ICMP ping to a network broadcast address • Multiple replies go to the source, causing a denial of service 15
  • 16. ARP Flooding • There are 248 MAC addresses possible – Minus a few reserved or in use • Send a number of packets while changing the source MAC address: – Switch will run out of memory – Floods all packets to all ports 16
  • 17. IPv6-Specific Measures • ICMPv6 protocol changed in March 2006 – Prevents “ping pong” issue • Filter or rate limit ICMPv6 Neighbor Discovery – Not advisable, makes the attack easier • Do they really need to talk to you? – Filter/rate limit inbound TCP syn packets – Rate limit inbound ICMPv6 (do not block!) • Use of /127 on point-to-point links 17
  • 18. Local Attacks Still Possible • Securing access to the physical network: – 802.1x authentication – Disable unused ports on switches – Strengthen wireless passwords – MAC address counters or filters (port security) • Lowers the risk for both protocols – Can protect for other vulnerabilities 18
  • 20. Vulnerabilities are Everywhere • Most security incidents caused in the application layers: – Buffer overflows – SQL injection – Man-in-the-middle attacks – Weak authentication 20
  • 21. General Prevention Methods • Don’t run any unnecessary services • Keep up to date with software patches • Use encryption where possible • Use two-factor authentication • Keep it simple 21
  • 22. Source of Incidents (PWC: Information Security Survey) 22
  • 23. The Human Factor • Attacks are triggered by somebody • Known vulnerabilities are ignored • Mistakes can and will happen 23
  • 24. Capacity Building • Test your implementations before deploying – Don’t rely on the glossy brochure • Build up knowledge – Learn to identify potential risks – Learn how to deal with them • Make use of available resources – Training courses and tutorials – Share your experiences 24
  • 25. Improving Security with IPv6 • Multiple subnets makes it easier to separate functions or people • Lack of NAT – Makes everything much more visible – Security moves to the end hosts – Forces you to think • Somebody might already use IPv6! – Using tunnels to hide what is going on 25
  • 26. Conclusion • IPv6 might add some vulnerabilities • IPv6 is not a threat • You are the biggest risk 26