IPv6-security
Download
Report
Transcript IPv6-security
IPv6 Security Topics
TAU Security Forum
February 2005
Yoni Appel
IPv6 Project Manager
[email protected]
©2005 Check Point Software Technologies Ltd. Proprietary & Confidential
Agenda
Novelties in IPv6
– A short overview
IPv6 deployment today
–
–
–
–
Asia
Cellular industry
U.S Department of Defense
Academia
Security topics with IPv6
–
–
–
–
New network stacks and logic
Application security
End to end encryption
Transition and tunneling
2
©2005 Check Point Software Technologies Ltd.
Novelties in IPv6
©2005 Check Point Software Technologies Ltd. Proprietary & Confidential
Novelties in IPv6
Address size is 128 bits
– 340,282,366,920,938,463,463,374,607,431,768,211,456 possible
IP addresses
– Efficient addressing
Simpler header format, reduced number of
fields
Offload computation effort from the router to the
end points
– Fragmentation handled by the end points
– Extension headers
Built in authentication and encryption
Address auto configuration
4
©2005 Check Point Software Technologies Ltd.
IPv6 deployment today
©2005 Check Point Software Technologies Ltd. Proprietary & Confidential
Security topics with IPv6
Asia
Major investment in IPv6 infrastructure is
made by governments and technology
vendors
This effort is driven mainly by the
shortage of IPv4 addresses
6
©2005 Check Point Software Technologies Ltd.
Security topics with IPv6
Asia – Japan
In Japan there is a strong collaborative effort to
push IPv6 by government, vendors and service
providers
Such collaboration is the key for solving the
“Chicken and Egg” problem, which is a main
theme for IPv6
– A native IPv6 link is already available for homes in
Japan
– NTT/Verio has built a worldwide IPv6 backbone
7
©2005 Check Point Software Technologies Ltd.
Security topics with IPv6
Asia – Japan cont.
8
©2005 Check Point Software Technologies Ltd.
Security topics with IPv6
Asia – Japan cont.
– Webcam, VoIP and other end point
equipment vendors are adding IPv6 support
– 18 M$ allocated by the Japanese
government for IPv6 R&D
– IPv6 networks role out during 2005
9
©2005 Check Point Software Technologies Ltd.
Security topics with IPv6
Asia - China
– CNGI – China Next Generation Internet roles
out during 2005
– The project will be the core of China’s
infrastructure for 3G and other
telecommunication services for the next
decades
– 169 M$ will be invested in IPv6 infrastructure
by 2010
10
©2005 Check Point Software Technologies Ltd.
Security topics with IPv6
Asia – additional countries
Substantial government investment will
also be done in the next few years in
additional Asian countries
– 72 M$ in South Korea
– 78 M$ in Taiwan
11
©2005 Check Point Software Technologies Ltd.
Security topics with IPv6
Cellular industry
The mobile phone – a killer application for IPv6
Handsets supporting IPv6 are ready
3GPP release 5 introduces IMS –
IP Multimedia Subsystem
IMS is based on SIP and will enable advanced
mobile services
– Video Streaming
– Gaming
– Chat
IMS requires usage of IPv6
12
©2005 Check Point Software Technologies Ltd.
Security topics with IPv6
U.S Department of Defense
The DoD plans transition to IPv6 by 2008
The DoD’s efforts are driven by the
needs of the future battle field
Intensive industry wide IPv6 testing is
conducted in the Moonv6 interoperability
events
The transition will effect DoD partners
and major contractors
13
©2005 Check Point Software Technologies Ltd.
Security topics with IPv6
Academia
Universities worldwide are experimenting
with IPv6
Fully active deployments in many
universities
14
©2005 Check Point Software Technologies Ltd.
Security topics with IPv6
©2005 Check Point Software Technologies Ltd. Proprietary & Confidential
Security topics with IPv6
New IP stacks
More devices are connected to the web and are
more widely accessible as there is no NAT
Low end devices are less flexible and with little
security awareness
New IP logic and new IP stack implementation
will result in new vulnerabilities, and tweaks in
the old ones
16
©2005 Check Point Software Technologies Ltd.
Security topics with IPv6
New IP stacks - examples
The Rose Attack - incomplete fragments
causing resource exhaustion at the attacked
node
Denial of Service attacks – we have witnessed
several attacks during the last year where a
series of crafted packets caused a crash at the
attacked node – both routers and hosts
Many IPv6 stacks may be vulnerable to these
kind of attacks
17
©2005 Check Point Software Technologies Ltd.
Security topics with IPv6
Sweep Scan
A worm scans a network to see which nodes
are candidates for it to spread itself to e.g.
which nodes are listening to a specific port
The Welchia worm used a ping based sweep
scan for its propagation
With IPv6, Sweep scans are less practical as
there will be numerous IP addresses on the
local network
Sweep scan can be detected before locating a
critical mass of possible propagation
candidates
18
©2005 Check Point Software Technologies Ltd.
Security topics with IPv6
Application security
Applications that deal extensively with IP
addresses may be vulnerable due to
–
–
–
–
fast application conversions of legacy code
incorrect buffer handling
incorrect address calculations
different applicative logic related to IPv6
Servers are exposed to application level
attacks even in an IPv6 experimentation
environment
19
©2005 Check Point Software Technologies Ltd.
Security topics with IPv6
DNS – An Application Security example
New resource record types have been added
for IPv6 – AAAA, A6 and DNAME
The A6 and DNAME resource records support
a distributed database containing partial
information regarding IPv6 addresses
BitString labels – a new way of representing
IPv6 addresses in DNS
IPv6 resource records can pass in IPv4 DNS
requests
20
©2005 Check Point Software Technologies Ltd.
Security topics with IPv6
End to End Encryption
IPv6 mandates encryption as an integral
part of an endpoint’s implementation
This method has notable advantages
– Prevents eavesdropping inside the LAN
– Simplifies the security requirements at the
application layer
– Increases interoperability
21
©2005 Check Point Software Technologies Ltd.
Security topics with IPv6
End to End Encryption
End to end encryption implies network and
application security at the endpoints
However the endpoint may lack the required
abilities to address security at design and
deployment phases
–
–
–
–
–
Awareness
Expertise
Responsiveness
Flexibility
Distribution mechanism
22
©2005 Check Point Software Technologies Ltd.
Security topics with IPv6
Transition Mechanisms
There are several transition mechanisms
between IPv6 and IPv4
– NAT-PT – translates IPv6 to IPv4 and vice
versa
– SIT – Six in Tunnel (several methods)
– Teredo – a NAT-friendly IPv4 tunnel (based
on UDP encapsulation)
23
©2005 Check Point Software Technologies Ltd.
Security topics with IPv6
Transition and tunneling
IPv6 in IPv4 may be used by malicious
applications to bypass security
inspections
It is best practice to
– Block all of these tunnels for IPv4
deployments or
– Be the endpoint of these tunnels and make
sure that the encapsulated traffic gets
inspected
24
©2005 Check Point Software Technologies Ltd.
Questions ?
25
©2005 Check Point Software Technologies Ltd.