We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byJustus Pound
Modified over 2 years ago
IPv6 and Tunnels
IPv6 and Tunnels in the same presentation? The work for both was done around the same time Most IPv6 traffic at the time was still tunneled (and likely still is at most sites) 2
IPv6 It’s turned on like you’d expect it to be and you can’t turn it off Not overly exciting – Different addresses in your logs Lots of strange edge cases supported 3
Tunnels Everyone has tunnels – Even if you don’t know it Most tunnels are for locally enabling IPv6 on end hosts 4
Tunnel Decapsulators Teredo IP-in-IP (includes 6to4) AYIYA GTPv1 SOCKS – Yes, SOCKS is a proxy protocol but internally we treat it similar to a tunnel 5
Tunnel Recursion Tunnels in tunnels 6
Forensic Logs - tunnel.log 7 ts1232039480.93499 uidYQCEFJ6DEh1 id18.104.22.168503622.214.171.12465123 tunnel_typeTunnel::TEREDO actionTunnel::DISCOVER ts1232039548.03295 uidYQCEFJ6DEh1 id126.96.36.1995036188.8.131.5265123 tunnel_typeTunnel::TEREDO actionTunnel::CLOSE
Forensic Logs - conn.log 8 ts1232039480.93499 uidYQCEFJ6DEh1 id184.108.40.2065036220.127.116.1165123 protoudp serviceteredo duration66.901215 orig_bytes100565 resp_bytes23818
Forensic Logs - conn.log 9 ts1232039480.93499 uidmYlaTkpbEY9 id 2001:0:4137:9e50:3c6e:3b46:9c0e:a91251232 2001:0:4137:9e50:414:19c:5b94:3ca221050 protoudp service- duration66.901215 orig_bytes85545 resp_bytes10386 tunnel_parentsYQCEFJ6DEh1
Summary Awareness of IPv6 and Tunnels in Bro Normally don’t need to worry about them 10
King of Limitations Present by: Ao-Jan Su. Accuracy? Accuracy depends on the distance of end hosts and their authoritative name servers. Not true for.
1 IPv6 and IPv4 Interoperation and Transition Tony Hain co-chair IETF ngtrans WG
1 Chapter 3: Multiprotocol Network Design Designs That Include Multiple Protocols IPX Design Concepts AppleTalk Design Concepts SNA Design Concepts.
UNIT 2 LESSON 4 CS PRINCIPLES. OBJECTIVES Students will be able to: Describe the redundancy of routing between two points on the Internet. Send messages.
Socket Programming with IPv6. Why IPv6? Addressing and routing scalability Address space exhaustion Host autoconfiguration QoS of flow using flowlabel.
IPv4 - IPv6 Integration and Coexistence Strategies Warakorn Sae-Tang Network Specialist Professional Service Department A Subsidiary.
Objective 1.Understand Network 2.Understand IP Addressing (IPv4 and IPv6) 3.Understand Subnetting 4.Examples 5.IP addressing and Vlan’s in TIFR 6.TIFR.
The Bro Network Security Monitor Overview and Recent Developments.
Campus IPv6 Deployment Phillip Deneault WPI Network Security Officer 1.
MPTCP Proxy Support Costin Raiciu. Explicit Proxies The MPTCP host knows about the proxy (e.g. via DHCP) All connections are made to the proxy – Signaling.
Transition Mechanisms for Ipv6 Hosts and Routers RFC2893 By Michael Pfeiffer.
Firewalls and proxies Unit objectives
1 Computer Networks IPv6. 2 Motivation The primary motivation from changing the IP datagram format is to increase the size of the useable address space.
V4 traversal for IPv6 mobility protocols - Scenarios Mip6trans Design Team MIP6 and NEMO WGs, IETF 63.
1 Computer Networks IP: The Internet Protocol. 2 IP is a connection-less, unreliable network layer protocol IP provides best effort services in the sense.
1 Features of IPv6 Larger Address Extended Address Hierarchy Flexible Header Format Improved Options Provision For Protocol Extension Support for Auto-configuration.
FOOTPRINTING PROXY A proxy server is essentially a middle computer that sits between the attacker and the Victim. To mask your ip under a proxy server.
Application Level Control of Ports in a Service Provider NAT environment Dave Thaler Dan Wing Alain Durand 1.
TDC 375 Winter 2002John Kristoff1 Network Protocols IPv6.
© 2017 SlidePlayer.com Inc. All rights reserved.