SlideShare una empresa de Scribd logo
1 de 34
IPv6 Can No Longer Be Ignored
1Copyright 2010 - ISecure LLC
Prepared for Attendees
of the
2010 ISSA Rochester Security Summit
Presenters
• Kevin Wilkins, CISSP – Sr. Network Engineer, iSecure LLC
– My professional experience includes 12 years of ISP and
VOIP operations. In the last few years, a focus on
information security at iSecure has brought my
experiences together into a consolidated viewpoint of
enterprise-wide security policy and implementation.
Presenters
• Peter Rounds – Sr. Network Engineer, Syracuse University
– Senior network engineer at Syracuse University for 11
years. Responsible for maintaining core network
infrastructure, including Internet traffic management
implementation and security profiles.
Synopsis
• Hidden risks to enterprise network resources may exist
through unmonitored use of IPv6 and IPv4-to-IPv6 transition
mechanisms like encapsulated IPv6 protocols 6to4, Intrasite
Automatic Tunnel Addressing Protocol (ISATAP or IP Protocol
41) , and Teredo. This discussion includes an introduction to
IPv6, the identification of encapsulated IPv6 protocols, their
potential threats to enterprise resources, and mitigation
strategies designed to protect enterprise resources from
these potential threats.
What is IPv6?
• IPv6 is a revised IP protocol intended to supplement and
replace IPv4.
• IPv6 was ratified in 1998 as RFC 2460.
• IPv6 addresses use a 128 bit value, vs. IPv4's 32 bits. This
provides an address space on the order of 3.4x10^38
addresses. (Nearly a "duodecillion"!!)
What is IPv6 for?
• IPv6 has this large address space as a necessary enhancement
to IPv4's much more limited 4.29X10^9 possible addresses.
(4.29 billion)
• The Internet Engineering Task Force (IETF) has foreseen an
eventual depletion of available IPv4 addresses, thus IPv6 was
designed.
Projected IPv4 Exhaustion
• Projected IANA Unallocated Address Pool Exhaustion:
05-Jun-2011
• INTEC Systems Institute "IPv4 Exhaustion Counter“
• http://inetcore.com/project/ipv4ec/index_en.html
IPv4 Example…
• IPv4 address range:
0.0.0.0 -> 255.255.255.255 = 4,294,967,296 possible
addresses
• An IPv4 address: "173.194.35.104”
IPv6 Example…
• IPv6 address range:
0000:0000:0000:0000:0000:0000:0000:0000 ->
ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff =
340,282,366,920,938,463,463,374,607,431,768,211,456
possible addresses!
• An IPv6 address:
0023:a46e:0000:0000:0000:87ba:00ac:58ce
23:a46e:0:0:0:87ba:ac:58ce
23:a46e::87ba:ac:58ce
Where is IPv6?
• As a commonly accepted protocol, IPv6 has seen difficulty
gaining momentum. Almost the entire IT industry is perfectly
happy with IPv4, and converting an established network to
use IPv6 addresses is a monumental task.
• Most use of IPv6 today is found in research, dedicated
networks, and by an inquisitive few.
Where is IPv6... Really?
• Since 2008, the US Government has mandated that new purchases
of computer and network equipment must support certain
minimum standards for IPv6. See NIST Special Publication 500-267.
• IPv6 is becoming generally supported in network devices, operating
systems, remote management protocols, and other networked
applications.
• Microsoft Windows XP/Server 2003 offered optional support for
IPv6. Microsoft Windows Vista/Server 2008 and beyond have
nearly complete IPv6 support, and the protocol is enabled by
default. Linux and Cisco also support IPv6.
• Recent versions of Microsoft Windows also include utilities which
will encapsulate IPv6 traffic within an IPv4 tunnel.
So I might be running IPv6 now?
• Yes! And this new IPv6 capability in contemporary systems
represents an unknown security risk.
• The IT industries' propensity to ignore IPv6 in favor of IPv4
means that local administrators might be unaware of the
potential IPv6 traffic traversing their network and interacting
with their information systems.
• Furthermore, support for IPv6 on contemporary network
security devices seems to be lagging behind IPv6 support in
operating systems and routers. Network based Content
Inspection, Intrusion Prevention, and Antivirus may be
ineffective at scanning native or encapsulated IPv6 traffic.
IPv6 Interfaces in Windows Vista
IPv6 Routes in Windows Vista
Windows Vista is Listening on IPv6
DNS: “A” record and “AAAA” Record
Wait, what was this about
encapsulated IPv6?
• Encapsulation technologies such as Teredo, 6to4 and IP
Protocol 41 (ISATAP) were developed to aid in the transition to
IPv6.
• These transition aids are necessary, as both IPv4 and IPv6 will
coexist for quite some time.
• RFC 5211 “An Internet Transition Plan” describes the use of
these IPv6 encapsulation mechanisms as the IPv4 address
space becomes depleted and organizations are forced to
migrate to IPv6.
• Network security devices might not be able to "peel the
onion" to discover what applications and threats might be
utilizing IPv6 resources within the IPv4 encapsulation.
Teredo and Windows
• Windows Vista and Windows 7 have an IPv6 encapsulation
service called Teredo, which is enabled by default.
• Teredo will automatically seek out a Teredo gateway
( teredo.ipv6.microsoft.com ), assign an IPv6 address to the
Teredo interface, and attempt to route IPv6 traffic.
• Teredo is intended for tunneling IPv6 traffic via an IPv4 NAT
router.
Pinging Via Teredo
Example: IPv6/Teredo in Wireshark
6to4 and Windows
• 6to4 is intended for tunneling IPv6 traffic via non-NAT IPv4
transport.
• A host or router intending to use 6to4 must have inherent
IPv6 support and a routable (non-NAT) IPv4 address.
• IPv6 traffic is encapsulated and tunneled via an IPv4 network
from one IPv6 network to another IPv6 network on the
remote end.
ISATAP and Windows
• ISATAP traffic is another transition mechanism where IPv6
traffic is tunneled via IPv4
• ISATAP packets use IPv4 with the IP Protocol field set to 41
• ISATAP is typically seen on an Intranet for host to host
communications, but host to router communication is also
possible.
How do I control this IPv6 traffic?
• First - awareness is the key. Check your networked systems to
see which components offer IPv6 support, and if IPv6 support
is enabled. Run packet captures and analyze your systems to
see if native or encapsulated IPv6 traffic traverses your
network.
• In a server farm or corporate environment where there is no
need for IPv6 at this time, consider establishing a policy to
disable the IPv6 interfaces on computer systems and block or
null-route IPv6 traffic in the network.
How do I control this IPv6 traffic?
• In ISP, government, higher education, or research
environments, the use of IPv6 might be legitimate. In this
case, monitoring and granular control is warranted.
• Check your network security equipment to see how it handles
IPv6. The integrated Proxies and Application Layer Gateways
might not yet handle IPv6 traffic.
• Network security devices might not be able to "peel the
onion" to discover what applications and threats might be
utilizing IPv6 resources within the IPv4 encapsulation.
This Removes the Native IPv6 Interface
Also shut off the tunnel interfaces…
Control IPv6 at Internet Edge
• IPv6 related Protocol types and Descriptions
41 ISATAP
43 IPv6-Route Routing Header for IPv6
44 IPv6-Frag Fragment Header for IPv6
58 IPv6-ICMP ICMP for IPv6
59 IPv6-NoNxt No Next Header for IPv6
60 IPv6-Opts Destination Options for IPv6
• Inbound ACL:
deny 41 any any
deny 43 any any
deny 44 any any
deny 58 any any
deny 59 any any
deny 60 any any
• Outbound ACL:
deny udp any any eq 3544 - used by Teredo to reach Internet locations
deny ip any host 192.88.99.1 - is the 6 to 4 relay anycast address
Story Time with Peter Rounds
• In the spring, an SU Sys-admin came to Peter Rounds with a
concern – he was able to bypass the datacenter firewall and
open an RDP connection to datacenter servers via IPv6.
• Teredo was tunneling through their datacenter firewall and
presenting itself to the public Internet via IPv6.
• In the interim, SU has implemented firewall policies to block
ISATAP, IPv6, and Teredo negotiation protocols in their router
ACLs.
Story Time with Peter Rounds
• Disabling IPv6 and tunneling mechanisms represents a
stopgap measure which break the transition technologies
designed to aid in the general deployment of IPv6.
• Transition is coming very soon! Verizon Business Solutions
has said that the “last drop of oil” will be tapped in a matter
of months. Verizon will be unable to provide IPv4 blocks and
will instead be assigning IPv6 address space.
Conclusions
• IPv6 isn’t "bad", and may represent the future for a lot of
networks. Some say that IPv4 will never go away, but in the
meantime, IPv6 is here.
• IT Administrators need to be aware of IPv6 as a protocol
which is gaining legitimacy and is actually supported on a
wide number of systems.
• IPv4 to IPv6 encapsulation mechanisms exist as a tool to aid in
the migration from a predominantly IPv4 environment to an
IPv6 environment.
• With this awareness comes the requirement to control IPv6
with the same attention to detail that they would apply to
controlling the more commonplace IPv4 traffic.
References – Transitional Security Issues
• Security Concerns With IP Tunneling
http://tools.ietf.org/html/draft-ietf-v6ops-tunnel-
security-concerns-02
• Support for IPv6 in Windows Server 2008 R2 and Windows 7
http://technet.microsoft.com/en-
us/magazine/2009.07.cableguy.aspx
• IPv6 Security Considerations and Recommendations
http://technet.microsoft.com/en-us/library/bb726956.aspx
References – Threat Mitigation
• How to prevent ipv6 tunneling across firewalls and
routers
http://www.howfunky.com/2010/02/how-to-prevent-ipv6-
tunneling-across.html
• Disable all IPv6 in Windows
http://tutorials-tips-tricks.info/disable-and-turn-off-
ipv6-in-windows
• Wiki - IPv6 Firewalls
http://www.getipv6.info/index.php/IPv6_Firewalls
• IPv6 firewalling knows no middle ground
http://arstechnica.com/hardware/news/2007/05/ipv6-
firewall-mixed-blessing.ars
References – Guidelines for IPv6 Adoption
• An Internet Transition Plan
http://tools.ietf.org/html/rfc5211
• Hurricane Electric IPv6 Certification Project
http://ipv6.he.net/certification/
• NIST Special Publication 800-119 - Guidelines for the
Secure Deployment of IPv6 (Draft)
http://csrc.nist.gov/publications/drafts/800-119/draft-
sp800-119_feb2010.pdf
• Microsoft Windows Server 2008 Whitepaper - IPv6
Transition Technologies
http://download.microsoft.com/download/1/2/4/124331bf-
7970-4315-ad18-0c3948bdd2c4/IPv6Trans.doc
References – Guidelines for IPv6 Adoption
• Tier 1 for IPv4! = Tier 1 for IPv6
http://www.networkworld.com/community/blog/tier-1-ipv4-
tier-1-ipv6
• BT Diamond IP IPv6 Address Management Guide
http://btdiamondip.com/software/offers/confirm_ipv6.aspx
• Google, Microsoft, Netflix in talks to create shared
list of IPv6 users
http://www.networkworld.com/news/2010/032610-dns-ipv6-
whitelist.html

Más contenido relacionado

La actualidad más candente

Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet OverviewCisco Canada
 
An infrastructual secure wireless sensing and actuating solution
An infrastructual secure wireless sensing and actuating solutionAn infrastructual secure wireless sensing and actuating solution
An infrastructual secure wireless sensing and actuating solutionusman sarwar
 
Slides from Introduction to IPv6
Slides from Introduction to IPv6Slides from Introduction to IPv6
Slides from Introduction to IPv6Cyren, Inc
 
Successfully Deploying IPv6
Successfully Deploying IPv6Successfully Deploying IPv6
Successfully Deploying IPv6Zivaro Inc
 
Cisco Connect Toronto 2017 - Your time is now
Cisco Connect Toronto 2017 - Your time is nowCisco Connect Toronto 2017 - Your time is now
Cisco Connect Toronto 2017 - Your time is nowCisco Canada
 
Cisco Connect Halifax 2018 Application insight and zero trust policies with...
Cisco Connect Halifax 2018   Application insight and zero trust policies with...Cisco Connect Halifax 2018   Application insight and zero trust policies with...
Cisco Connect Halifax 2018 Application insight and zero trust policies with...Cisco Canada
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zeroCisco Canada
 
Creator Ci40 IoT kit & Framework - scalable LWM2M IoT dev platform for business
Creator Ci40 IoT kit & Framework - scalable LWM2M IoT dev platform for businessCreator Ci40 IoT kit & Framework - scalable LWM2M IoT dev platform for business
Creator Ci40 IoT kit & Framework - scalable LWM2M IoT dev platform for businessPaul Evans
 
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...
Cisco Connect Ottawa 2018 dna automation   the evolution to intent-based netw...Cisco Connect Ottawa 2018 dna automation   the evolution to intent-based netw...
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...Cisco Canada
 
Cisco Connect Toronto 2018 cloud and on premises collaboration security exp...
Cisco Connect Toronto 2018   cloud and on premises collaboration security exp...Cisco Connect Toronto 2018   cloud and on premises collaboration security exp...
Cisco Connect Toronto 2018 cloud and on premises collaboration security exp...Cisco Canada
 
Cisco Connect Toronto 2018 dc-aci-anywhere
Cisco Connect Toronto 2018   dc-aci-anywhereCisco Connect Toronto 2018   dc-aci-anywhere
Cisco Connect Toronto 2018 dc-aci-anywhereCisco Canada
 
Cisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network IntuitiveCisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network IntuitiveCisco Canada
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...Cisco Canada
 
Cisco Connect Toronto 2017 - UCS and Hyperflex update
Cisco Connect Toronto 2017 - UCS and Hyperflex updateCisco Connect Toronto 2017 - UCS and Hyperflex update
Cisco Connect Toronto 2017 - UCS and Hyperflex updateCisco Canada
 
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonCisco DevNet
 
IoX - tech-intro-for-paris-hackathon
IoX - tech-intro-for-paris-hackathonIoX - tech-intro-for-paris-hackathon
IoX - tech-intro-for-paris-hackathonCisco DevNet
 
IPv6 Development in ITB 2013
IPv6 Development in ITB 2013IPv6 Development in ITB 2013
IPv6 Development in ITB 2013Affan Basalamah
 
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018   Anatomy of attackCisco Connect Halifax 2018   Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attackCisco Canada
 
Creating the open source building blocks for IoT
Creating the open source building blocks for IoT Creating the open source building blocks for IoT
Creating the open source building blocks for IoT Ian Skerrett
 

La actualidad más candente (20)

Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet Overview
 
An infrastructual secure wireless sensing and actuating solution
An infrastructual secure wireless sensing and actuating solutionAn infrastructual secure wireless sensing and actuating solution
An infrastructual secure wireless sensing and actuating solution
 
Slides from Introduction to IPv6
Slides from Introduction to IPv6Slides from Introduction to IPv6
Slides from Introduction to IPv6
 
Successfully Deploying IPv6
Successfully Deploying IPv6Successfully Deploying IPv6
Successfully Deploying IPv6
 
Cisco Connect Toronto 2017 - Your time is now
Cisco Connect Toronto 2017 - Your time is nowCisco Connect Toronto 2017 - Your time is now
Cisco Connect Toronto 2017 - Your time is now
 
Cisco Connect Halifax 2018 Application insight and zero trust policies with...
Cisco Connect Halifax 2018   Application insight and zero trust policies with...Cisco Connect Halifax 2018   Application insight and zero trust policies with...
Cisco Connect Halifax 2018 Application insight and zero trust policies with...
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zero
 
Creator Ci40 IoT kit & Framework - scalable LWM2M IoT dev platform for business
Creator Ci40 IoT kit & Framework - scalable LWM2M IoT dev platform for businessCreator Ci40 IoT kit & Framework - scalable LWM2M IoT dev platform for business
Creator Ci40 IoT kit & Framework - scalable LWM2M IoT dev platform for business
 
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...
Cisco Connect Ottawa 2018 dna automation   the evolution to intent-based netw...Cisco Connect Ottawa 2018 dna automation   the evolution to intent-based netw...
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...
 
Cisco Connect Toronto 2018 cloud and on premises collaboration security exp...
Cisco Connect Toronto 2018   cloud and on premises collaboration security exp...Cisco Connect Toronto 2018   cloud and on premises collaboration security exp...
Cisco Connect Toronto 2018 cloud and on premises collaboration security exp...
 
Cisco Connect Toronto 2018 dc-aci-anywhere
Cisco Connect Toronto 2018   dc-aci-anywhereCisco Connect Toronto 2018   dc-aci-anywhere
Cisco Connect Toronto 2018 dc-aci-anywhere
 
Cisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network IntuitiveCisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network Intuitive
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
 
Cisco Connect Toronto 2017 - UCS and Hyperflex update
Cisco Connect Toronto 2017 - UCS and Hyperflex updateCisco Connect Toronto 2017 - UCS and Hyperflex update
Cisco Connect Toronto 2017 - UCS and Hyperflex update
 
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathon
 
IoX - tech-intro-for-paris-hackathon
IoX - tech-intro-for-paris-hackathonIoX - tech-intro-for-paris-hackathon
IoX - tech-intro-for-paris-hackathon
 
Ipv6 tutorial
Ipv6 tutorialIpv6 tutorial
Ipv6 tutorial
 
IPv6 Development in ITB 2013
IPv6 Development in ITB 2013IPv6 Development in ITB 2013
IPv6 Development in ITB 2013
 
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018   Anatomy of attackCisco Connect Halifax 2018   Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attack
 
Creating the open source building blocks for IoT
Creating the open source building blocks for IoT Creating the open source building blocks for IoT
Creating the open source building blocks for IoT
 

Similar a IPv6 Can No Longer Be Ignored

Roadmap to Next Generation IP Networks: A Review of the Fundamentals
Roadmap to Next Generation IP Networks: A Review of the FundamentalsRoadmap to Next Generation IP Networks: A Review of the Fundamentals
Roadmap to Next Generation IP Networks: A Review of the FundamentalsNetwork Utility Force
 
Understanding i pv6 2
Understanding i pv6 2Understanding i pv6 2
Understanding i pv6 2srmanjuskp
 
464XLAT Tutorial
464XLAT Tutorial464XLAT Tutorial
464XLAT TutorialAPNIC
 
Rapid IPv6 Deployment for ISP Networks
Rapid IPv6 Deployment for ISP NetworksRapid IPv6 Deployment for ISP Networks
Rapid IPv6 Deployment for ISP NetworksSkeeve Stevens
 
A secure tunnel technique using i pv6 transition over ipv4 channel
A secure tunnel technique using i pv6 transition over ipv4 channelA secure tunnel technique using i pv6 transition over ipv4 channel
A secure tunnel technique using i pv6 transition over ipv4 channelMade Artha
 
Tech 2 Tech IPv6 presentation
Tech 2 Tech IPv6 presentationTech 2 Tech IPv6 presentation
Tech 2 Tech IPv6 presentationJisc
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test MethodologyIxia
 
IPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for MobilesIPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for MobilesAPNIC
 
Henrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveHenrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveIKT-Norge
 
A Scenario-Based Review Of IPv6 Transition Tools
A Scenario-Based Review Of IPv6 Transition ToolsA Scenario-Based Review Of IPv6 Transition Tools
A Scenario-Based Review Of IPv6 Transition ToolsTye Rausch
 
A Survey On Next Generation Internet Protocol IPv6
A Survey On Next Generation Internet Protocol  IPv6A Survey On Next Generation Internet Protocol  IPv6
A Survey On Next Generation Internet Protocol IPv6Carrie Romero
 
ARIN 34 IPv6 IAB/IETF Activities Report
ARIN 34 IPv6 IAB/IETF Activities ReportARIN 34 IPv6 IAB/IETF Activities Report
ARIN 34 IPv6 IAB/IETF Activities ReportARIN
 
Da for dummies techdays 2012
Da for dummies techdays 2012Da for dummies techdays 2012
Da for dummies techdays 2012Alex de Jong
 
Update on IPv6 activity in CERNET2
Update on IPv6 activity in CERNET2Update on IPv6 activity in CERNET2
Update on IPv6 activity in CERNET2APNIC
 
On the migration of a large scale network from i pv4 to ipv6 environment
On the migration of a large scale network from i pv4 to ipv6 environmentOn the migration of a large scale network from i pv4 to ipv6 environment
On the migration of a large scale network from i pv4 to ipv6 environmentIJCNCJournal
 

Similar a IPv6 Can No Longer Be Ignored (20)

Roadmap to Next Generation IP Networks: A Review of the Fundamentals
Roadmap to Next Generation IP Networks: A Review of the FundamentalsRoadmap to Next Generation IP Networks: A Review of the Fundamentals
Roadmap to Next Generation IP Networks: A Review of the Fundamentals
 
Understanding i pv6 2
Understanding i pv6 2Understanding i pv6 2
Understanding i pv6 2
 
Kinber ipv6-education-healthcare
Kinber ipv6-education-healthcareKinber ipv6-education-healthcare
Kinber ipv6-education-healthcare
 
464XLAT Tutorial
464XLAT Tutorial464XLAT Tutorial
464XLAT Tutorial
 
Rapid IPv6 Deployment for ISP Networks
Rapid IPv6 Deployment for ISP NetworksRapid IPv6 Deployment for ISP Networks
Rapid IPv6 Deployment for ISP Networks
 
IPv6 on the Interop Network
IPv6 on the Interop NetworkIPv6 on the Interop Network
IPv6 on the Interop Network
 
A secure tunnel technique using i pv6 transition over ipv4 channel
A secure tunnel technique using i pv6 transition over ipv4 channelA secure tunnel technique using i pv6 transition over ipv4 channel
A secure tunnel technique using i pv6 transition over ipv4 channel
 
Tech 2 Tech IPv6 presentation
Tech 2 Tech IPv6 presentationTech 2 Tech IPv6 presentation
Tech 2 Tech IPv6 presentation
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test Methodology
 
IPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for MobilesIPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for Mobiles
 
Henrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveHenrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspective
 
A Scenario-Based Review Of IPv6 Transition Tools
A Scenario-Based Review Of IPv6 Transition ToolsA Scenario-Based Review Of IPv6 Transition Tools
A Scenario-Based Review Of IPv6 Transition Tools
 
A Survey On Next Generation Internet Protocol IPv6
A Survey On Next Generation Internet Protocol  IPv6A Survey On Next Generation Internet Protocol  IPv6
A Survey On Next Generation Internet Protocol IPv6
 
3hows
3hows3hows
3hows
 
ARIN 34 IPv6 IAB/IETF Activities Report
ARIN 34 IPv6 IAB/IETF Activities ReportARIN 34 IPv6 IAB/IETF Activities Report
ARIN 34 IPv6 IAB/IETF Activities Report
 
Da for dummies techdays 2012
Da for dummies techdays 2012Da for dummies techdays 2012
Da for dummies techdays 2012
 
I pv6
I pv6I pv6
I pv6
 
Update on IPv6 activity in CERNET2
Update on IPv6 activity in CERNET2Update on IPv6 activity in CERNET2
Update on IPv6 activity in CERNET2
 
On the migration of a large scale network from i pv4 to ipv6 environment
On the migration of a large scale network from i pv4 to ipv6 environmentOn the migration of a large scale network from i pv4 to ipv6 environment
On the migration of a large scale network from i pv4 to ipv6 environment
 
V6 v4-threats
V6 v4-threatsV6 v4-threats
V6 v4-threats
 

Más de Rochester Security Summit

Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleRochester Security Summit
 
Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)Rochester Security Summit
 
A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudRochester Security Summit
 
State Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork QuiltState Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork QuiltRochester Security Summit
 
You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…Rochester Security Summit
 
A Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT BudgetA Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT BudgetRochester Security Summit
 
Business Impact and Risk Assessments in Business Continuity and Disaster Reco...
Business Impact and Risk Assessments in Business Continuity and Disaster Reco...Business Impact and Risk Assessments in Business Continuity and Disaster Reco...
Business Impact and Risk Assessments in Business Continuity and Disaster Reco...Rochester Security Summit
 

Más de Rochester Security Summit (16)

Radio Reconnaissance in Penetration Testing
Radio Reconnaissance in Penetration TestingRadio Reconnaissance in Penetration Testing
Radio Reconnaissance in Penetration Testing
 
Real Business Threats!
Real Business Threats!Real Business Threats!
Real Business Threats!
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)
 
Dissecting the Hack: Malware Analysis 101
Dissecting the Hack: Malware Analysis 101 Dissecting the Hack: Malware Analysis 101
Dissecting the Hack: Malware Analysis 101
 
GRC– The Way Forward
GRC– The Way ForwardGRC– The Way Forward
GRC– The Way Forward
 
A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public Cloud
 
Finding Patterns in Data Breaches
Finding Patterns in Data BreachesFinding Patterns in Data Breaches
Finding Patterns in Data Breaches
 
State Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork QuiltState Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork Quilt
 
It's All About the Data!
It's All About the Data!It's All About the Data!
It's All About the Data!
 
You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…
 
A Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT BudgetA Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT Budget
 
Business Impact and Risk Assessments in Business Continuity and Disaster Reco...
Business Impact and Risk Assessments in Business Continuity and Disaster Reco...Business Impact and Risk Assessments in Business Continuity and Disaster Reco...
Business Impact and Risk Assessments in Business Continuity and Disaster Reco...
 
Losing Control to the Cloud
Losing Control to the CloudLosing Control to the Cloud
Losing Control to the Cloud
 
Firewall Defense against Covert Channels
Firewall Defense against Covert Channels Firewall Defense against Covert Channels
Firewall Defense against Covert Channels
 

Último

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

IPv6 Can No Longer Be Ignored

  • 1. IPv6 Can No Longer Be Ignored 1Copyright 2010 - ISecure LLC Prepared for Attendees of the 2010 ISSA Rochester Security Summit
  • 2. Presenters • Kevin Wilkins, CISSP – Sr. Network Engineer, iSecure LLC – My professional experience includes 12 years of ISP and VOIP operations. In the last few years, a focus on information security at iSecure has brought my experiences together into a consolidated viewpoint of enterprise-wide security policy and implementation.
  • 3. Presenters • Peter Rounds – Sr. Network Engineer, Syracuse University – Senior network engineer at Syracuse University for 11 years. Responsible for maintaining core network infrastructure, including Internet traffic management implementation and security profiles.
  • 4. Synopsis • Hidden risks to enterprise network resources may exist through unmonitored use of IPv6 and IPv4-to-IPv6 transition mechanisms like encapsulated IPv6 protocols 6to4, Intrasite Automatic Tunnel Addressing Protocol (ISATAP or IP Protocol 41) , and Teredo. This discussion includes an introduction to IPv6, the identification of encapsulated IPv6 protocols, their potential threats to enterprise resources, and mitigation strategies designed to protect enterprise resources from these potential threats.
  • 5. What is IPv6? • IPv6 is a revised IP protocol intended to supplement and replace IPv4. • IPv6 was ratified in 1998 as RFC 2460. • IPv6 addresses use a 128 bit value, vs. IPv4's 32 bits. This provides an address space on the order of 3.4x10^38 addresses. (Nearly a "duodecillion"!!)
  • 6. What is IPv6 for? • IPv6 has this large address space as a necessary enhancement to IPv4's much more limited 4.29X10^9 possible addresses. (4.29 billion) • The Internet Engineering Task Force (IETF) has foreseen an eventual depletion of available IPv4 addresses, thus IPv6 was designed.
  • 7. Projected IPv4 Exhaustion • Projected IANA Unallocated Address Pool Exhaustion: 05-Jun-2011 • INTEC Systems Institute "IPv4 Exhaustion Counter“ • http://inetcore.com/project/ipv4ec/index_en.html
  • 8. IPv4 Example… • IPv4 address range: 0.0.0.0 -> 255.255.255.255 = 4,294,967,296 possible addresses • An IPv4 address: "173.194.35.104”
  • 9. IPv6 Example… • IPv6 address range: 0000:0000:0000:0000:0000:0000:0000:0000 -> ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff = 340,282,366,920,938,463,463,374,607,431,768,211,456 possible addresses! • An IPv6 address: 0023:a46e:0000:0000:0000:87ba:00ac:58ce 23:a46e:0:0:0:87ba:ac:58ce 23:a46e::87ba:ac:58ce
  • 10. Where is IPv6? • As a commonly accepted protocol, IPv6 has seen difficulty gaining momentum. Almost the entire IT industry is perfectly happy with IPv4, and converting an established network to use IPv6 addresses is a monumental task. • Most use of IPv6 today is found in research, dedicated networks, and by an inquisitive few.
  • 11. Where is IPv6... Really? • Since 2008, the US Government has mandated that new purchases of computer and network equipment must support certain minimum standards for IPv6. See NIST Special Publication 500-267. • IPv6 is becoming generally supported in network devices, operating systems, remote management protocols, and other networked applications. • Microsoft Windows XP/Server 2003 offered optional support for IPv6. Microsoft Windows Vista/Server 2008 and beyond have nearly complete IPv6 support, and the protocol is enabled by default. Linux and Cisco also support IPv6. • Recent versions of Microsoft Windows also include utilities which will encapsulate IPv6 traffic within an IPv4 tunnel.
  • 12. So I might be running IPv6 now? • Yes! And this new IPv6 capability in contemporary systems represents an unknown security risk. • The IT industries' propensity to ignore IPv6 in favor of IPv4 means that local administrators might be unaware of the potential IPv6 traffic traversing their network and interacting with their information systems. • Furthermore, support for IPv6 on contemporary network security devices seems to be lagging behind IPv6 support in operating systems and routers. Network based Content Inspection, Intrusion Prevention, and Antivirus may be ineffective at scanning native or encapsulated IPv6 traffic.
  • 13. IPv6 Interfaces in Windows Vista
  • 14. IPv6 Routes in Windows Vista
  • 15. Windows Vista is Listening on IPv6
  • 16. DNS: “A” record and “AAAA” Record
  • 17. Wait, what was this about encapsulated IPv6? • Encapsulation technologies such as Teredo, 6to4 and IP Protocol 41 (ISATAP) were developed to aid in the transition to IPv6. • These transition aids are necessary, as both IPv4 and IPv6 will coexist for quite some time. • RFC 5211 “An Internet Transition Plan” describes the use of these IPv6 encapsulation mechanisms as the IPv4 address space becomes depleted and organizations are forced to migrate to IPv6. • Network security devices might not be able to "peel the onion" to discover what applications and threats might be utilizing IPv6 resources within the IPv4 encapsulation.
  • 18. Teredo and Windows • Windows Vista and Windows 7 have an IPv6 encapsulation service called Teredo, which is enabled by default. • Teredo will automatically seek out a Teredo gateway ( teredo.ipv6.microsoft.com ), assign an IPv6 address to the Teredo interface, and attempt to route IPv6 traffic. • Teredo is intended for tunneling IPv6 traffic via an IPv4 NAT router.
  • 21. 6to4 and Windows • 6to4 is intended for tunneling IPv6 traffic via non-NAT IPv4 transport. • A host or router intending to use 6to4 must have inherent IPv6 support and a routable (non-NAT) IPv4 address. • IPv6 traffic is encapsulated and tunneled via an IPv4 network from one IPv6 network to another IPv6 network on the remote end.
  • 22. ISATAP and Windows • ISATAP traffic is another transition mechanism where IPv6 traffic is tunneled via IPv4 • ISATAP packets use IPv4 with the IP Protocol field set to 41 • ISATAP is typically seen on an Intranet for host to host communications, but host to router communication is also possible.
  • 23. How do I control this IPv6 traffic? • First - awareness is the key. Check your networked systems to see which components offer IPv6 support, and if IPv6 support is enabled. Run packet captures and analyze your systems to see if native or encapsulated IPv6 traffic traverses your network. • In a server farm or corporate environment where there is no need for IPv6 at this time, consider establishing a policy to disable the IPv6 interfaces on computer systems and block or null-route IPv6 traffic in the network.
  • 24. How do I control this IPv6 traffic? • In ISP, government, higher education, or research environments, the use of IPv6 might be legitimate. In this case, monitoring and granular control is warranted. • Check your network security equipment to see how it handles IPv6. The integrated Proxies and Application Layer Gateways might not yet handle IPv6 traffic. • Network security devices might not be able to "peel the onion" to discover what applications and threats might be utilizing IPv6 resources within the IPv4 encapsulation.
  • 25. This Removes the Native IPv6 Interface
  • 26. Also shut off the tunnel interfaces…
  • 27. Control IPv6 at Internet Edge • IPv6 related Protocol types and Descriptions 41 ISATAP 43 IPv6-Route Routing Header for IPv6 44 IPv6-Frag Fragment Header for IPv6 58 IPv6-ICMP ICMP for IPv6 59 IPv6-NoNxt No Next Header for IPv6 60 IPv6-Opts Destination Options for IPv6 • Inbound ACL: deny 41 any any deny 43 any any deny 44 any any deny 58 any any deny 59 any any deny 60 any any • Outbound ACL: deny udp any any eq 3544 - used by Teredo to reach Internet locations deny ip any host 192.88.99.1 - is the 6 to 4 relay anycast address
  • 28. Story Time with Peter Rounds • In the spring, an SU Sys-admin came to Peter Rounds with a concern – he was able to bypass the datacenter firewall and open an RDP connection to datacenter servers via IPv6. • Teredo was tunneling through their datacenter firewall and presenting itself to the public Internet via IPv6. • In the interim, SU has implemented firewall policies to block ISATAP, IPv6, and Teredo negotiation protocols in their router ACLs.
  • 29. Story Time with Peter Rounds • Disabling IPv6 and tunneling mechanisms represents a stopgap measure which break the transition technologies designed to aid in the general deployment of IPv6. • Transition is coming very soon! Verizon Business Solutions has said that the “last drop of oil” will be tapped in a matter of months. Verizon will be unable to provide IPv4 blocks and will instead be assigning IPv6 address space.
  • 30. Conclusions • IPv6 isn’t "bad", and may represent the future for a lot of networks. Some say that IPv4 will never go away, but in the meantime, IPv6 is here. • IT Administrators need to be aware of IPv6 as a protocol which is gaining legitimacy and is actually supported on a wide number of systems. • IPv4 to IPv6 encapsulation mechanisms exist as a tool to aid in the migration from a predominantly IPv4 environment to an IPv6 environment. • With this awareness comes the requirement to control IPv6 with the same attention to detail that they would apply to controlling the more commonplace IPv4 traffic.
  • 31. References – Transitional Security Issues • Security Concerns With IP Tunneling http://tools.ietf.org/html/draft-ietf-v6ops-tunnel- security-concerns-02 • Support for IPv6 in Windows Server 2008 R2 and Windows 7 http://technet.microsoft.com/en- us/magazine/2009.07.cableguy.aspx • IPv6 Security Considerations and Recommendations http://technet.microsoft.com/en-us/library/bb726956.aspx
  • 32. References – Threat Mitigation • How to prevent ipv6 tunneling across firewalls and routers http://www.howfunky.com/2010/02/how-to-prevent-ipv6- tunneling-across.html • Disable all IPv6 in Windows http://tutorials-tips-tricks.info/disable-and-turn-off- ipv6-in-windows • Wiki - IPv6 Firewalls http://www.getipv6.info/index.php/IPv6_Firewalls • IPv6 firewalling knows no middle ground http://arstechnica.com/hardware/news/2007/05/ipv6- firewall-mixed-blessing.ars
  • 33. References – Guidelines for IPv6 Adoption • An Internet Transition Plan http://tools.ietf.org/html/rfc5211 • Hurricane Electric IPv6 Certification Project http://ipv6.he.net/certification/ • NIST Special Publication 800-119 - Guidelines for the Secure Deployment of IPv6 (Draft) http://csrc.nist.gov/publications/drafts/800-119/draft- sp800-119_feb2010.pdf • Microsoft Windows Server 2008 Whitepaper - IPv6 Transition Technologies http://download.microsoft.com/download/1/2/4/124331bf- 7970-4315-ad18-0c3948bdd2c4/IPv6Trans.doc
  • 34. References – Guidelines for IPv6 Adoption • Tier 1 for IPv4! = Tier 1 for IPv6 http://www.networkworld.com/community/blog/tier-1-ipv4- tier-1-ipv6 • BT Diamond IP IPv6 Address Management Guide http://btdiamondip.com/software/offers/confirm_ipv6.aspx • Google, Microsoft, Netflix in talks to create shared list of IPv6 users http://www.networkworld.com/news/2010/032610-dns-ipv6- whitelist.html