ipv6 threat presentation

31
IPv6 Threats IPV6 THREATS TO GOVERNMENT NETWORKS [email protected]

Upload: johnmcclure00

Post on 13-Apr-2017

116 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: IPv6 Threat Presentation

IPv6  ThreatsIPV6  THREATS   TO   GOVERNMENT   NETWORKS

[email protected]

Page 2: IPv6 Threat Presentation

Agenda◦ Introduction◦ IPv6  background◦ How  we  got  here◦ Advantages  of  IPv6

◦ IPvX interesting   facts◦ IPv6  and  the  Federal  Government◦ How  do  IPv6  threats  differ   from  IPv4  threats◦ Specific  IPv6  Threats◦ Are  you  ready  to  defend   IPv6  threats?◦ IPv6  threat  detection  and  mitigation◦ Q&A

2

Page 3: IPv6 Threat Presentation

Introduction◦ About  me◦ KimberSystems,  LLC◦ Supported  multiple  USG  entities:  USDA,  GSA,  DOC,  FBI,  DOD◦ Background   in  security,  networking,  and  data  centers◦ Focused  on  cybersecurity,   cloud,  and  threat   intelligence

3

Page 4: IPv6 Threat Presentation

IPv6  Background◦ How  we  got  here◦ IPv4  is  a  REALLY  old  protocol  (1980)◦ We  are  running  out  of  usable   IPv4  addresses

◦ Advantages  of  IPv6◦ Extremely   large  address  space◦ Autoconfiguration /  network  management◦ Jumbograms◦ No  fragmentation◦ Unique  addressing◦ Security:   IPSec  built-­‐in

4

Page 5: IPv6 Threat Presentation

Just  How  Big  is  IPv6?◦ IPv4 has  32  bits,  allowing  approximately  4.3  billion  addresses.  Not  even  enough  to  give  a  unique  address   to  each  human  being  on  Earth.

◦ IPv6 has  128  bits,  allowing  340,282,366,920,938,000,000,000,000,000,000,000,000 (340  undecillion)  unique  addresses.

◦ 79,228,162,514,264,229,685,068,130,493 IPv4  Internets   can  fit  into  IPv6  address   space.

◦ IPv6  could  provide  each  and  every  square  micrometer  of  the  earth’s   surface  with  5,000  unique  addresses.  What’s  a  micrometer?  About  one  tenth  the  diameter  of  a  droplet  of  fog!

5

Page 6: IPv6 Threat Presentation

2526

Page 7: IPv6 Threat Presentation

IPvX Interesting  Facts◦ IPv4  depleted   in  early  2011◦ IPv6  is  still  less  than  1%  of  all  Internet   traffic◦ Windows  7,  Windows  8,  OS  X,  and  Linux  can  all  suffer   from  IPv6  attacks  that  are  invisible  to  IPv4

◦ Standard  subnet   size  for  IPv6  is  a  /64  (18,446,744,073,709,551,616  addresses)

◦ 6in4  traffic  is  identified  as  IP  protocol  41

7

Page 8: IPv6 Threat Presentation

IPv6  and  the  Federal  Government◦ Required  backbone  move  to  IPv6  by  2008  (OMB  memo  05-­‐22)◦ Required  move  as  per  OMB  memo  from  Federal  CIO  dated  September   2010◦ Upgrade  public/external   facing  servers  and  services  (e.g.  web,  email,  DNS,  ISP  services,  etc.)  to  operationally   use  native  IPv6  by  the  end  of  FY  2012

◦ Upgrade  internal  client   applications   that  communicate  with  public   Internet  servers  and  supporting   enterprise   networks  to  operationally   use  native  IPv6  by  the  end  of  FY  2014

◦ 29%  complete  (September   2013)◦ Why  aren’t  we  moving  faster?◦ Challenges

8

Page 9: IPv6 Threat Presentation

IPv6  and  the  Federal  Government

Completed  USG  IPv6  Enabled  Domains

1,318  Domains  tested   on  4  September  2013

9

Page 10: IPv6 Threat Presentation

IPv6  CND  Challenges◦ It  won’t  solve  or  mitigate  current  cyber  threats  (e.g.   SQLi,  buffer  overflows,   XSS,  spear  phishing,  etc.)

◦ Shadow  networks  /  latent  threat◦ NDP  spoofing◦ SLAAC  attacks◦ Privacy  (no  NAT)◦ If  using  Privacy  IPv6  addresses   it  may  create  challenges   in  attribution,  incident   response,  forensic  analysis,   firewall  policies,   etc.

10

Page 11: IPv6 Threat Presentation

IPv6  CND  Challenges◦ New  approaches   to  management,   troubleshooting,   administration,  etc.

◦ Vulnerability   scanning◦ Deep  packet  inspection◦ Don’t  know  you’re  running  it◦ Threat  detection  models  aren’t   current/configured   for  IPv6  threats◦ Analysts  may  not  understand   the  protocol

11

Page 12: IPv6 Threat Presentation

IPv6  Threats◦ They  are  real  and  bad  guys  are  leveraging   IPv6◦ Under   the  radar◦ Tunneling  (e.g.  Teredo)◦ Multiple  addresses   for  single  host◦ Detection   infrastructure   not  ready  to  support◦ Rest  of  the  threat  community  isn’t  focused  on  it◦ You  think  it  doesn’t  matter

12

Page 13: IPv6 Threat Presentation

IPv6  Threat  Ready?NOPE!◦ Tools  aren’t   ready◦ Analysts  aren’t   ready◦ Threat   intelligence  still  focused  on  IPv4◦ Blackholes◦ IP  reputation  services

BYOD  over  IPv6  – the  perfect  storm!

13

Page 14: IPv6 Threat Presentation

ThreatsEverything  we  see   in  IPv4  plus…◦ NDP  Spoofing◦ SLAAC  Attack◦ Teredo Tunneling

14

Page 15: IPv6 Threat Presentation

NDP  SpoofingNDP  (Neighbor  Discovery  Protocol)   is  the  new  ARP  (in  this  example)◦ An  attacker  can  spoof  an  address  by  snooping  a  Neighbor  Solicitation◦ Attacker  then  conducts  attack  via  Neighbor  Advertisement◦ Similar  to  ARP  poisoning   by  advertising   L2  address

15

Page 16: IPv6 Threat Presentation

Network  Discovery  Protocol

Happy  IPv6

16

Page 17: IPv6 Threat Presentation

NDP  Neighbor  Solicitation

Neighbor  Solicitation

17

Page 18: IPv6 Threat Presentation

NDP  Network  Advertisement

Neighbor  Advertisement

18

Page 19: IPv6 Threat Presentation

Happy  IPv6  Remix

Happy  IPv6

19

Page 20: IPv6 Threat Presentation

Network  Discovery  Protocol

Happy  IPv6

20

Page 21: IPv6 Threat Presentation

NDP  NA  (bad  guy)

Neighbor  Advertisement

21

Page 22: IPv6 Threat Presentation

Unhappy  IPv6  (bad  guy  wins)

Unhappy  IPv6

22

Page 23: IPv6 Threat Presentation

SLAAC  AttackRogue  Router  Announcements   (RA)  as  being  able  to  route  IPv6  traffic◦ Host  that   is  configured  to  use   IPv6  (most  current  operating  systems)  will  begin  to  route  traffic  to  the  RA  host;  no  verification/authorization

◦ SuddenSix attack  (SLAAC  attack):  https://github.com/Neohapsis/suddensix

23

Page 24: IPv6 Threat Presentation

Happy  IPv4

24

Page 25: IPv6 Threat Presentation

Rogue  Router

25

Page 26: IPv6 Threat Presentation

Rogue  Router  Advertisement

26

Page 27: IPv6 Threat Presentation

Teredo Tunneling◦ Like  most  things,  it  wasn’t  designed   to  be  bad◦ Can  be  used   for  legitimate  purposes◦ Built  into  Microsoft  products◦ IPv6  tunneling  across  NAT  boundaries◦ Doesn’t  require  firewall  to  support   IPv6  or6to4  ◦ IPv4  over  UDP

27

Page 28: IPv6 Threat Presentation

28

Teredo Tunneling

Page 29: IPv6 Threat Presentation

IPv6  Threat  DetectionSimilar  to  IPv4◦ Smart  analysts◦ Know  your  traffic◦ Know  what  you’re  looking  for◦ Protocol  41  ◦ Tunneling  ?

◦ Upgrade/update   your  detection  mechanisms◦ Don’t  trust  v4  rules  to  detect  v6  traffic;  regardless  of  what  your  vendors  say◦ Talk  to  your  vendors

29

Page 30: IPv6 Threat Presentation

Things  to  Consider◦ Do  you  know  how  many  or  which  of  your  hosts  are  using  IPv6?◦ How  many  of  your  blackhole and  block  lists  have   IPv6  entries?◦ Do  all  of  your  logging  devices   and  infrastructure   log  IPv6  correctly  (frequently   truncated)?

◦ Hosts  with  multiple  IPv6  addresses;   can  send  spam/badness   from  many  addresses

◦ 2002::/16  6to4  tunnel  prefix◦ Don’t block ICMP;  needed for  MTU  discovery◦ You have to  wrap addresses in  brackets because of  “:”  e.g.   scp file.txt\[2001::1\]

30

Page 31: IPv6 Threat Presentation

Q&AFor  more  information:

John  F.  McClure◦ [email protected]◦ (202)  630-­‐0726◦ @johnmcclure00◦ linkedin.com/in/johnmcclure

KimberSystems,   LLC◦ kimbersystems.com◦ @KimberSystems◦ linkedin.com/company/kimbersystems-­‐llc◦ facebook.com/KimberSystems

31