Routing Loop Attack Using IPv6 Automatic Tunnels: Problem Statement and Proposed Mitigations (RFC 6324) Po-Kang Chen Oct 19, 2011 1.

Slides:



Advertisements
Similar presentations
IPv4 - IPv6 Integration and Coexistence Strategies Warakorn Sae-Tang Network Specialist Professional Service Department A Subsidiary.
Advertisements

TCP/IP Protocol Suite 1 Chapter 27 Upon completion you will be able to: Next Generation: IPv6 and ICMPv6 Understand the shortcomings of IPv4 Know the IPv6.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_b Subnetting,Supernetting, CIDR IPv6 Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
December 5, 2007 CS-622 IPv6: The Next Generation 1 IPv6 The Next Generation Saroj Patil Nadine Sundquist Chuck Short CS622-F2007 University of Colorado,
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
CS440 Computer Networks 1 IPv6 Neil Tang 11/10/2008.
Project by: Palak Baid (pb2358) Gaurav Pandey (gip2103) Guided by: Jong Yul Kim.
IPv6 Privacy Hannes Tschofenig, Tara Whalen. Agenda Privacy Threats Layering Addressing Policy Questionnaire.
1 Teredo - Tunneling IPv6 through NATs Date: Speaker: Quincy Wu National Chiao Tung University.
IPv4 & IPv6 Coexistence & Migration Joe Zhao SW2 Great China R&D Center ZyXEL Communications, Inc.
Transition from IPv4 to IPv6 By Anita Kanuganti Hemanth Rao Raparthi.
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
IPv6: The Next Generation Internet Protocol Luke Simpson and Martin Bouts ECE 4112 Spring 2005 May 2nd, 2005.
IPv6 Transition : Why a new security mechanisms model is necessary?
By Rod Lykins.  Background  Benefits  Security Advantages ◦ Address Space ◦ IPSec  Remaining Security Issues  Conclusion.
資 管 Lee Lesson 11 Coexistence and Migration. 資 管 Lee Lesson Objectives Coexistence and migration overview Coexistence mechanisms ◦ Dual Stack ◦ Tunneling.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Overview of SHIM6 Multihoming Protocol Fuad Bin Naser Std. No A presentation for CSE6806: Wireless & Mobile Communication Networks.
CSE 8343 Group 3 Advanced OS Inter Operability Between IPv4 and IPv6 Team Members Aman Preet Singh Rohit Singh Nipun Aggarwal Chirag Shah Eugene Novak.
Coexistence and Migration
Guide to TCP/IP Fourth Edition
Basic Transition Mechanisms for IPv6 Hosts and Routers -RFC 4213 Kai-Po Yang
IPv6 and IPv4 Coexistence Wednesday, October 07, 2015 IPv6 and IPv4 Coexistence Motorola’s Views for Migration and Co-existence of 3GPP2 Networks to Support.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
IPV6-VOIP ANIL K NARAM A1263 CN426-SVU. Introduction IPV4 IPV6 VOIP IPV4 to IPV6 Migration of VOIP to IPV6.
IPv6, the Protocol of the Future, Today Mathew Harris.
IPv6 Rapid Deployment in Taiwan Academic Network (TANet) Authors: Po-Kang Chen Chia-Wen Lu Quincy Wu 1.
ISP Edge NAT 10/8 “Home” Network Upstreams and Peers /32
DNS and IP Scalability Communication Systems Design 2002.
4: Network Layer4b-1 IPv6 r Initial motivation: 32-bit address space completely allocated by r Additional motivation: m header format helps speed.
1 NCM _05_2001_c1 © 2001, Cisco Systems, Inc. All rights reserved. How would you prepare for the technology you need.
RFC 3964 Security Considerations for 6to4 Speaker: Chungyi Wang Adviser: Quincy Wu Date:
Network Performance Test on IPv Technology Laboratory, KT Choi Sung Mi
1 Use of VLANs for IPv4-IPv6 Coexistence in Enterprise Networks presented by tech3 R322 rfc 4554.
W&L Page 1 CCNA CCNA Training 3.4 Describe the technological requirements for running IPv6 in conjunction with IPv4 Jose Luis Flores /
Chapter 27 IPv6 Protocol.
Encapsulated Security Payload Header ● RFC 2406 ● Services – Confidentiality ● Plus – Connectionless integrity – Data origin authentication – Replay protection.
Engineering Workshops Transition and Tunnels Dale Finkelson.
IPv6 An Overview of Internet Protocol Version 6 Network Management Justin Houk May 3, 2010.
ICC Module 3 Lesson 4 – Networking 1 / 9 © 2015 Ph. Janson Information, Computing & Communication Networking – Clip 6 – Internet addressing School of.
Routing Information Protocol
Network Performance Test on IPv Technology Laboratory, KT Choi Sung Mi
IETF #57 in Viena1 IPv6 Address Assignment and Route Selection for End-to-End Multihoming Kenji Ohira Kyoto University draft-ohira-assign-select-e2e-multihome-01.txt.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
IPv6 Transition Mechanisms - 6DISS Workshop - 5 March 2006 IPv6 Transition Mechanisms, their Security and Management Georgios Koutepas National Technical.
Computer Network Architecture Lecture 7: OSI Model Layers Examples II 1 26/12/2012.
Internet Protocol Version 6 Specifications
Introduction Wireless devices offering IP connectivity
Presenter: Patrick N. zwane Advisor: Dr. Kai-Wei Kea Date: 25/01/2016
Network Fundamentals – Chapter 5
Chapter Outline 27.1 Introduction 27.2 Packet Format
IPv6 / IP Next Generation
Network Fundamentals – Chapter 5
Network Fundamentals – Chapter 5
Network Fundamentals – Chapter 5
Key concepts covered in Midterm III
A Unified Approach to IP Segment Routing
Network Fundamentals – Chapter 5
Network Fundamentals – Chapter 5
Network Fundamentals – Chapter 5
Chapter 20. Network Layer: IP
Network Fundamentals – Chapter 5
Network Fundamentals – Chapter 5
Refs: Chapter 10, Appendix A
Network Fundamentals – Chapter 5
Network Fundamentals – Chapter 5
Review of Internet Protocols Network Layer
Network Fundamentals – Chapter 5
Presentation transcript:

Routing Loop Attack Using IPv6 Automatic Tunnels: Problem Statement and Proposed Mitigations (RFC 6324) Po-Kang Chen Oct 19,

Introduction Internet Protocol Version 6 (IPv6) – Because of the IPv4 exhaustion Transition Mechanisms – Dual Stack – Tunneling – Translator Transition Mechanisms Dual Stack TunnelingTranslator 2

Introduction (cont.) Tunneling mechanism 3 IPv6 Header Transport Layer Header Data IPv6 Header Transport Layer Header Data IPv4 Header Encapsulating IPv6 in IPv4

Introduction (cont.) Protocol-41 (RFC 4213) – ISATAP – 6to4 – 6RD 4

Routing Loop Attack Denial of Service Attack (DoS - RFC 4732) How can it occur? – Misconfiguration – Malicious attack 5

Routing Loop Attack (cont.) IPv6IPv4 Router 1 Router 2 src = Prf1 + IP2 dst = Prf2 + IP1 IPv6 src = Prf1 + IP2 dst = Prf2 + IP1 IPv6 src = IP2 dst = IP1 IPv4 src = Prf1 + IP2 dst = Prf2 + IP1 IPv6 6

Routing Loop Attack (cont.) Mitigations – Verification of Endpoint Existence – Operational Measures – Destination and Source Address Checks Security Issue – The mitigation checks do not introduce new security threats. 7

Reference RFC 4213 RFC