IPv6 Security
Where is the challenge?
Marco Hogewoning
External Relations
RIPE NCC
Sunday, April 21, 2013
Biggest Hurdle Deploying IPv6
2
(NRO: Global IPv6 Deployment Survey)
Sunday, April 21, 2013
Increased Awareness?
3
(Ernst & Young: Global Information Security Survey)
Sunday, April 21, 2013
Where is the Risk?
Sunday, April 21, 2013
Threat or Vulnerability?
• Threat: the potential to cause harm
– DoS, unauthorised access, viruses
• Vulnerability: a weakness that can be exploited
– Bugs, configuration errors, design flaws
• Risk: the possibility that a vulnerability will be
exploited by somebody to cause harm
5
Sunday, April 21, 2013
Human Factor
• Vulnerabilities exist because of human errors:
– Coding errors
– Configuration errors
– Design flaws
• Doesn’t mean it is your fault
– But a lot of times you can limit the risk
6
Sunday, April 21, 2013
Examples
Is this IPv6 related?
Sunday, April 21, 2013
Rogue Router Advertisement
• IPv6 relies on routers to announce themselves
using ICMPv6 multicasts
• Protocol has little to no security
• Every machine can claim to be a router
– Reconfigure clients to another subnet
– Redirect or intercept traffic
8
Sunday, April 21, 2013
Rogue Router Advertisement (IPv4)
• Every machine can start a DHCP server
– Reconfigure clients to another subnet
– Redirect or intercept traffic
– NAT44 makes it much easier to hide it
• ARP spoofing
– Pretend I am the router by claiming its MAC address
9
Sunday, April 21, 2013
Protection at Protocol Layer
• “RA Guard” feature
– Filter route announcements on switches
– On all ports except for the known router
– Present in a lot of equipment already
• SEcure Neighbor Discovery (SEND)
– Fix the protocol by adding verification
– Add cryptographic certificates and signatures
– No widespread implementation
10
Sunday, April 21, 2013
What About Layer 2?
• Securing access to the physical network:
– 802.1x authentication
– Disable unused ports on switches
– Strengthen wireless passwords
– MAC address counters or filters (port security)
• Lowers the risk for both protocols
– Can protect for other vulnerabilities
11
Sunday, April 21, 2013
Upper Layers
Where are you?
Sunday, April 21, 2013
Vulnerabilities are Everywhere
• Most security incidents caused in the application
layers:
– Buffer overflows
– SQL injection
– Man-in-the-middle attacks
– Weak authentication
13
Sunday, April 21, 2013
General Prevention Methods
• Don’t run any unnecessary services
• Keep up to date with software patches
• Use encryption where possible
• Use two-factor authentication
• Keep it simple
14
Sunday, April 21, 2013
Source of Incidents
15
(PWC: Information Security Survey)
Sunday, April 21, 2013
The Human Factor
• Attacks are triggered by somebody
• Known vulnerabilities are ignored
• Mistakes can and will happen
16
Sunday, April 21, 2013
Capacity Building
• Test your implementations before deploying
– Don’t rely on the glossy brochure
• Build up knowledge
– Learn to identify potential risks
– Learn how to deal with them
• Make use of available resources
– Training courses and tutorials
– Share your experiences
17
Sunday, April 21, 2013
Improving Security with IPv6
• Multiple subnets makes it easier to separate
functions or people
• Lack of NAT
– Makes everything much more visible
– Security moves to the end hosts
– Forces you to think
• Somebody might already use IPv6!
– Using tunnels to hide what is going on
18
Sunday, April 21, 2013
Conclusion
• IPv6 might add some vulnerabilities
• IPv6 is not a threat
• You are the biggest risk
19
Sunday, April 21, 2013
Questions?
marcoh@ripe.net
Sunday, April 21, 2013

More Related Content

PDF
Hiding in Plain Sight: The Danger of Known Vulnerabilities
PPTX
NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...
PDF
Network Security Tools
PPT
Network Security Tools and applications
PPTX
Webinar On Ethical Hacking & Cybersecurity - Day2
PDF
Akila srinivasan microsoft-bug_bounty-(publish)
PDF
How secure are your systems
PDF
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Hiding in Plain Sight: The Danger of Known Vulnerabilities
NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...
Network Security Tools
Network Security Tools and applications
Webinar On Ethical Hacking & Cybersecurity - Day2
Akila srinivasan microsoft-bug_bounty-(publish)
How secure are your systems
Yehia Mamdouh @ DTS Solution - The Gentleman Thief

What's hot (20)

PDF
Cambodia CERT Seminar: Incident response for ransomeware attacks
PDF
Experience Sharing on School Pentest Project (Updated)
PPTX
Introduction of computer security
PPT
Network security presentation
PDF
Computer Security and Risks
PPTX
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
PPT
Brucon presentation
PPTX
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
PDF
BugBounty Roadmap with Mohammed Adam
PPTX
Vulnerability assessment & Penetration testing Basics
PPTX
Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsa...
PPTX
Security in Computer System
PDF
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
PDF
The Current State of Cybersecurity
PDF
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
PPTX
PhD-Guidance-in-Security
PDF
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
PPTX
Hacking
PDF
Introduction to the advanced persistent threat and hactivism
PPTX
Information Security Engineering
Cambodia CERT Seminar: Incident response for ransomeware attacks
Experience Sharing on School Pentest Project (Updated)
Introduction of computer security
Network security presentation
Computer Security and Risks
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
Brucon presentation
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
BugBounty Roadmap with Mohammed Adam
Vulnerability assessment & Penetration testing Basics
Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsa...
Security in Computer System
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
The Current State of Cybersecurity
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
PhD-Guidance-in-Security
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Hacking
Introduction to the advanced persistent threat and hactivism
Information Security Engineering
Ad

Viewers also liked (12)

PDF
IPv6 Autoconfig
PDF
I pv6 autoconfig20c
PPTX
IPV6 Addressing
PPTX
Eric Vyncke - IPv6 security in general
PPT
Presentación IPv6
PPTX
PPT
PPTX
IPV6 ppt
PPTX
IPv6 technical introduction
PPTX
PPT
ipv6 ppt
PDF
IPv6 Autoconfig
I pv6 autoconfig20c
IPV6 Addressing
Eric Vyncke - IPv6 security in general
Presentación IPv6
IPV6 ppt
IPv6 technical introduction
ipv6 ppt
Ad

Similar to IPv6 Security - Where is the Challenge (20)

PDF
IPv6 Security - Where is the Challenge?
PDF
IPv6 Security Overview by QS Tahmeed, APNIC RCT
PDF
IPV6 - Threats and Countermeasures / Crash Course
PPT
Wolfgang Fritsche (IABG) – Secure IPv6 deployment
PPTX
Henrik Strøm - IPv6 from the attacker's perspective
PDF
Internet Security, A Solid Foundation for Sustainable Internet Development
PPTX
Slides from IPv6 Threats
PDF
10 fn s05
PDF
10 fn s05
PDF
Internet Security - A Solid Foundation for Sustainable Internet Development.
PDF
IPv6 Threat Presentation
PDF
Presd1 09
PPT
Chapter 4.ppt
PDF
V6 v4-threats
PPT
Cloud Computing & Security
PPT
Security Framework for the IPv6 Era
PPTX
Ron Broersma dren-stavanger-22 nov2011
PPT
Adressing IPv6 strategy
PDF
IPv6 Deployment: Why and Why not?
PPT
Security - ch5.ppt
IPv6 Security - Where is the Challenge?
IPv6 Security Overview by QS Tahmeed, APNIC RCT
IPV6 - Threats and Countermeasures / Crash Course
Wolfgang Fritsche (IABG) – Secure IPv6 deployment
Henrik Strøm - IPv6 from the attacker's perspective
Internet Security, A Solid Foundation for Sustainable Internet Development
Slides from IPv6 Threats
10 fn s05
10 fn s05
Internet Security - A Solid Foundation for Sustainable Internet Development.
IPv6 Threat Presentation
Presd1 09
Chapter 4.ppt
V6 v4-threats
Cloud Computing & Security
Security Framework for the IPv6 Era
Ron Broersma dren-stavanger-22 nov2011
Adressing IPv6 strategy
IPv6 Deployment: Why and Why not?
Security - ch5.ppt

More from RIPE NCC (20)

PDF
A Look at a Root Cause for DNS Latency - APRICOT 2025
PDF
Internet Landscape and Network Resiliency in South East Europe
PDF
ondrej-caletka-INEX-Deploying_IPv6_mostly.pdf
PDF
jelena-cosic-internet-landscape-and-network-resiliency-in-south-east-europe.pdf
PDF
RIPE Atlas & other RIPE NCC Internet Measurement Tools
PDF
Securing BGP with RPKI - Ondřej Caletka, RIPE NCC
PDF
Minimising Impact before incidents occur with RIPE Atlas
PDF
Know Your Network: Utilising RIS and RIPE Atlas to your advantage
PDF
Know Your Network: Why every network operator should host a RIPE Atlas probe
PDF
Know Your Network; why every network operator should host a RIPE Atlas probe
PDF
Taiwan's Digital Landscape with RIPE NCC Tools
PDF
Navigating IP Addresses: Insights from your Regional Internet Registry
PDF
Traces of Power: Internet Governance and Climate Action
PDF
Governing Environmental Sustainability in Tech
PDF
Gerardo-Viviers-RPKI-presentation-DKNOG14.pdf
PDF
LIA HESTINA - Minimising impact before incidents occur with RIPE Atlas and RIS
PDF
Intro to RIPE and RIPE NCC: RIPE Atlas workshop
PDF
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
PDF
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
PDF
RIPE NCC Internet Measurement Tools
A Look at a Root Cause for DNS Latency - APRICOT 2025
Internet Landscape and Network Resiliency in South East Europe
ondrej-caletka-INEX-Deploying_IPv6_mostly.pdf
jelena-cosic-internet-landscape-and-network-resiliency-in-south-east-europe.pdf
RIPE Atlas & other RIPE NCC Internet Measurement Tools
Securing BGP with RPKI - Ondřej Caletka, RIPE NCC
Minimising Impact before incidents occur with RIPE Atlas
Know Your Network: Utilising RIS and RIPE Atlas to your advantage
Know Your Network: Why every network operator should host a RIPE Atlas probe
Know Your Network; why every network operator should host a RIPE Atlas probe
Taiwan's Digital Landscape with RIPE NCC Tools
Navigating IP Addresses: Insights from your Regional Internet Registry
Traces of Power: Internet Governance and Climate Action
Governing Environmental Sustainability in Tech
Gerardo-Viviers-RPKI-presentation-DKNOG14.pdf
LIA HESTINA - Minimising impact before incidents occur with RIPE Atlas and RIS
Intro to RIPE and RIPE NCC: RIPE Atlas workshop
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
RIPE NCC Internet Measurement Tools

Recently uploaded (20)

PPTX
Modernising the Digital Integration Hub
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPT
Geologic Time for studying geology for geologist
PDF
Architecture types and enterprise applications.pdf
DOCX
search engine optimization ppt fir known well about this
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PPTX
Microsoft Excel 365/2024 Beginner's training
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PPTX
2018-HIPAA-Renewal-Training for executives
PPT
What is a Computer? Input Devices /output devices
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
Modernising the Digital Integration Hub
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Getting started with AI Agents and Multi-Agent Systems
Flame analysis and combustion estimation using large language and vision assi...
1 - Historical Antecedents, Social Consideration.pdf
Developing a website for English-speaking practice to English as a foreign la...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Taming the Chaos: How to Turn Unstructured Data into Decisions
Geologic Time for studying geology for geologist
Architecture types and enterprise applications.pdf
search engine optimization ppt fir known well about this
The influence of sentiment analysis in enhancing early warning system model f...
Microsoft Excel 365/2024 Beginner's training
Custom Battery Pack Design Considerations for Performance and Safety
2018-HIPAA-Renewal-Training for executives
What is a Computer? Input Devices /output devices
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
NewMind AI Weekly Chronicles – August ’25 Week III

IPv6 Security - Where is the Challenge

  • 1. IPv6 Security Where is the challenge? Marco Hogewoning External Relations RIPE NCC Sunday, April 21, 2013
  • 2. Biggest Hurdle Deploying IPv6 2 (NRO: Global IPv6 Deployment Survey) Sunday, April 21, 2013
  • 3. Increased Awareness? 3 (Ernst & Young: Global Information Security Survey) Sunday, April 21, 2013
  • 4. Where is the Risk? Sunday, April 21, 2013
  • 5. Threat or Vulnerability? • Threat: the potential to cause harm – DoS, unauthorised access, viruses • Vulnerability: a weakness that can be exploited – Bugs, configuration errors, design flaws • Risk: the possibility that a vulnerability will be exploited by somebody to cause harm 5 Sunday, April 21, 2013
  • 6. Human Factor • Vulnerabilities exist because of human errors: – Coding errors – Configuration errors – Design flaws • Doesn’t mean it is your fault – But a lot of times you can limit the risk 6 Sunday, April 21, 2013
  • 7. Examples Is this IPv6 related? Sunday, April 21, 2013
  • 8. Rogue Router Advertisement • IPv6 relies on routers to announce themselves using ICMPv6 multicasts • Protocol has little to no security • Every machine can claim to be a router – Reconfigure clients to another subnet – Redirect or intercept traffic 8 Sunday, April 21, 2013
  • 9. Rogue Router Advertisement (IPv4) • Every machine can start a DHCP server – Reconfigure clients to another subnet – Redirect or intercept traffic – NAT44 makes it much easier to hide it • ARP spoofing – Pretend I am the router by claiming its MAC address 9 Sunday, April 21, 2013
  • 10. Protection at Protocol Layer • “RA Guard” feature – Filter route announcements on switches – On all ports except for the known router – Present in a lot of equipment already • SEcure Neighbor Discovery (SEND) – Fix the protocol by adding verification – Add cryptographic certificates and signatures – No widespread implementation 10 Sunday, April 21, 2013
  • 11. What About Layer 2? • Securing access to the physical network: – 802.1x authentication – Disable unused ports on switches – Strengthen wireless passwords – MAC address counters or filters (port security) • Lowers the risk for both protocols – Can protect for other vulnerabilities 11 Sunday, April 21, 2013
  • 12. Upper Layers Where are you? Sunday, April 21, 2013
  • 13. Vulnerabilities are Everywhere • Most security incidents caused in the application layers: – Buffer overflows – SQL injection – Man-in-the-middle attacks – Weak authentication 13 Sunday, April 21, 2013
  • 14. General Prevention Methods • Don’t run any unnecessary services • Keep up to date with software patches • Use encryption where possible • Use two-factor authentication • Keep it simple 14 Sunday, April 21, 2013
  • 15. Source of Incidents 15 (PWC: Information Security Survey) Sunday, April 21, 2013
  • 16. The Human Factor • Attacks are triggered by somebody • Known vulnerabilities are ignored • Mistakes can and will happen 16 Sunday, April 21, 2013
  • 17. Capacity Building • Test your implementations before deploying – Don’t rely on the glossy brochure • Build up knowledge – Learn to identify potential risks – Learn how to deal with them • Make use of available resources – Training courses and tutorials – Share your experiences 17 Sunday, April 21, 2013
  • 18. Improving Security with IPv6 • Multiple subnets makes it easier to separate functions or people • Lack of NAT – Makes everything much more visible – Security moves to the end hosts – Forces you to think • Somebody might already use IPv6! – Using tunnels to hide what is going on 18 Sunday, April 21, 2013
  • 19. Conclusion • IPv6 might add some vulnerabilities • IPv6 is not a threat • You are the biggest risk 19 Sunday, April 21, 2013