IPv6 Security

Different, but almost the same

Carsten Strotmann

Created: 2025-01-30 Thu 09:47

Agenda

  • IPv6 Security Issues
  • Tools

IPv6 Security Issues

Security and IPv6

ICMPv6 neighbor solicitation/advertisement spoofing

ICMPv6 neighbor solicitation/advertisement spoofing

  • Possible mitigation
  • Host isolation - assigning a /64 prefix per node

Router spoofing

Router spoofing

DHCP spoofing

Spoofed DNS Resolver in Router Advertisements

  • Router Advertisements (RA) messages are not authenticated
    • Attacker can spoof this messages with any content
    • The RA can contain the IP-Addresses of DNS resolver to be used
    • By changing the DNS resolver of clients, an attacker can redirect or manipulate network traffic

Spoofed DNS Resolver in Router Advertisements

  • Mitigation
    • Use of DNSSEC for security critical domains (e.g. internal Active Directory)
    • Use of authenticated DNS-over-TLS/DNS-over-HTTPS (using x509 certificates)
    • Distribute manual configured DNS resolver addresses (through configuration management systems)
    • Use of manual configured site-local multicast addresses for DNS resolver

Router/Neighborhood Advertisements Flooding (DoS)

  • Attackers can trigger a high number of Neighborhood-Discovery (ND) events from a Router or from network devices, for example through a network scan
    • The high number of events can create a denial-of-service attack onto the router infrastructure
  • Mitigation strategies
    • Rate-Limiting of ND events
    • Filter (parts of) the unused address space
    • For Router-to-Router connections, use a /127 network prefix
    • Using only link-local addresses on links where there are only routers
  • RFC 6583 "Operational Neighbor Discovery Problems"

Extension Header attacks

Extension Header attacks

Fragmentation Attacks

  • Stateless filtering in firewalls can be bypassed by creative use of IPv6 fragmentation headers
  • Firewall and security devices should drop first fragments that do not contain the entire IPv6 header chain (including the transport-layer header)
  • Destination nodes should discard first fragments that do not contain the entire IPv6 header chain (including the transport-layer header).
  • RFC 6980 "Security Implications of IPv6 Fragmentation with IPv6 Neighbor Discovery"

IPv6 Address Scanning

  • it is widely assumed that it would take a huge effort to perform address-scanning attacks against IPv6 networks
    • IPv6 address-scanning attacks have been considered unfeasible
  • However based on the "randomness" of the source of IPv6 Interface-IDs, IPv6 address-canning might be possible
    • Manual continuous address assignment
    • IPv6 Interface IDs from "well-known" Hardware-Addresses
    • DHCPv6 Host "reservations"
    • Node-Information-Queries over ICMPv6

IPv6 Address Scanning

Security Implications of Dual-Stack Networks

  • Running IPv6 and IPv4 in the same network (aka "Dual-Stack") can create it's own security issues
    • Attacker can choose the weakest protocol
    • Attacker can tunnel one Protocol inside the other to hide
  • Security policies need to in sync between IPv6 and IPv4 (Firewall rules, Intrusion Detection systems)
    • Firewalls should allow a common ruleset for IPv6 and IPv4 (use "nftables" not "iptables" on Linux)

Security Implications of Dual-Stack Networks

Tools

The Hackers Choice IPv6 Toolkit

  • The Hackers Choice IPv6 Toolkit is a collection of Linux/Unix command line tools to test the security properties of IPv6 networks

SI6 Toolkit

Chiron

  • Chiron is an IPv6 Security Assessment Framework, written in Python and employing Scapy
    • IPv6 Scanner
    • IPv6 Local Link Security Tests
    • IPv4-to-IPv6 Proxy
    • IPv6 Attack Module
    • IPv6 Proxy
  • Source: https://github.com/aatlasis/Chiron

Conclusion

Conclusion

  • IPv6 is neither more, nor less secure compared to IPv4
  • In Dual-Stack networks, Administrators have to deal with security issues of both protocols
    • Attacker have twice the attack space
    • A motivation to move to IPv6-only networks sooner (remove IPv4 where possible)

Questions?

questions.png