IPv6 Security
Different, but almost the same
Carsten Strotmann
Created: 2025-01-30 Thu 09:47
Agenda
- IPv6 Security Issues
- Tools
ICMPv6 neighbor solicitation/advertisement spoofing
ICMPv6 neighbor solicitation/advertisement spoofing
- Possible mitigation
- Host isolation - assigning a /64 prefix per node
DHCP spoofing
- Attacker can launch malicious DHCPv6 server (via malware/trojan
software)
- Distribute wrong network configuration
- Distribute wrong IPv6 addresses
- Creates MITM and DoS attack possibilities
- Mitigation
Spoofed DNS Resolver in Router Advertisements
- Router Advertisements (RA) messages are not authenticated
- Attacker can spoof this messages with any content
- The RA can contain the IP-Addresses of DNS resolver to be used
- By changing the DNS resolver of clients, an attacker can redirect or manipulate network traffic
Spoofed DNS Resolver in Router Advertisements
- Mitigation
- Use of DNSSEC for security critical domains (e.g. internal Active Directory)
- Use of authenticated DNS-over-TLS/DNS-over-HTTPS (using x509 certificates)
- Distribute manual configured DNS resolver addresses (through configuration management systems)
- Use of manual configured site-local multicast addresses for DNS resolver
Router/Neighborhood Advertisements Flooding (DoS)
- Attackers can trigger a high number of Neighborhood-Discovery (ND)
events from a Router or from network devices, for example through
a network scan
- The high number of events can create a denial-of-service attack onto the router infrastructure
- Mitigation strategies
- Rate-Limiting of ND events
- Filter (parts of) the unused address space
- For Router-to-Router connections, use a /127 network prefix
- Using only link-local addresses on links where there are only routers
- RFC 6583 "Operational Neighbor Discovery Problems"
Fragmentation Attacks
- Stateless filtering in firewalls can be bypassed by creative use
of IPv6 fragmentation headers
- Firewall and security devices should drop first fragments that do
not contain the entire IPv6 header chain (including the
transport-layer header)
- Destination nodes should discard first fragments that do not
contain the entire IPv6 header chain (including the
transport-layer header).
- RFC 6980 "Security Implications of IPv6 Fragmentation with IPv6 Neighbor Discovery"
IPv6 Address Scanning
- it is widely assumed that it would take a huge effort to perform
address-scanning attacks against IPv6 networks
- IPv6 address-scanning attacks have been considered unfeasible
- However based on the "randomness" of the source of IPv6
Interface-IDs, IPv6 address-canning might be possible
- Manual continuous address assignment
- IPv6 Interface IDs from "well-known" Hardware-Addresses
- DHCPv6 Host "reservations"
- Node-Information-Queries over ICMPv6
IPv6 Address Scanning
- Security should not rely on hiding IPv6 addresses in the vast
IPv6 address space (aka "Security by Obscurity")
- See
Security Implications of Dual-Stack Networks
- Running IPv6 and IPv4 in the same network (aka "Dual-Stack") can
create it's own security issues
- Attacker can choose the weakest protocol
- Attacker can tunnel one Protocol inside the other to hide
- Security policies need to in sync between IPv6 and IPv4 (Firewall
rules, Intrusion Detection systems)
- Firewalls should allow a common ruleset for IPv6 and IPv4 (use "nftables" not "iptables" on Linux)
Security Implications of Dual-Stack Networks
- Control or block Protocol tunnel technologies (see RFC 9099 for guidance)
- See
The Hackers Choice IPv6 Toolkit
- The Hackers Choice IPv6 Toolkit is a collection of Linux/Unix
command line tools to test the security properties of IPv6 networks
- "The Hacker's Choice" IPv6 toolkit: https://www.thc.org/
- As these tools can also be mis-used for attacks, be careful when
using them to test foreign networks
SI6 Toolkit
- A set of IPv6 security assessment and trouble-shooting tools:
Chiron
- Chiron is an IPv6 Security Assessment Framework, written in
Python and employing Scapy
- IPv6 Scanner
- IPv6 Local Link Security Tests
- IPv4-to-IPv6 Proxy
- IPv6 Attack Module
- IPv6 Proxy
- Source: https://github.com/aatlasis/Chiron
Conclusion
- IPv6 is neither more, nor less secure compared to IPv4
- In Dual-Stack networks, Administrators have to deal with security
issues of both protocols
- Attacker have twice the attack space
- A motivation to move to IPv6-only networks sooner (remove IPv4 where possible)