An Analysis of IPv6 Security CmpE-209: Team Research Paper Presentation CmpE-209 / Spring 20081 Presented by: Dedicated Instructor: Hiteshkumar Thakker.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Secure Mobile IP Communication
Internetworking II: MPLS, Security, and Traffic Engineering
Introduction to IPv6 Presented by: Minal Mishra. Agenda IP Network Addressing IP Network Addressing Classful IP addressing Classful IP addressing Techniques.
IPv6 The New Internet Protocol Integrated Network Services Almerindo Graziano.
CS 265 – Project IPv6 Security Aspects Surekha Shinde.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
IPv6 Overview Brent Frye EECS710. Overview Google Drive Microsoft Cloud Drive Dropbox Paid-for alternatives 2.
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
IPv4 vs. IPv6 Anne-Marie Ethier Andrei Iotici "This report was prepared for Professor L. Orozco- Barbosa in partial fulfillment of the requirements for.
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
IP Version 6 Next generation IP Prof. P Venkataram ECE Dept. IISc.
IPv6 Network Security.
IP Version 6 (IPv6) Dr. Adil Yousif. Why IPv6?  Deficiency of IPv4  Address space exhaustion  New types of service  Integration  Multicast  Quality.
NAT TRAVERSAL FOR IPSEC Research Seminar on Datacommunications Software HIIT
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
Internet Protocol Security An Overview of IPSec. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security. 
Firewalls and Intrusion Detection Systems
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
By Rod Lykins.  Background  Benefits  Security Advantages ◦ Address Space ◦ IPSec  Remaining Security Issues  Conclusion.
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
Cryptography and Network Security
1 Pertemuan 11 IPSec dan SSL Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
1 IPv6 Address Management Rajiv Kumar. 2 Lecture Overview Introduction to IP Address Management Rationale for IPv6 IPv6 Addressing IPv6 Policies & Procedures.
G53SEC 1 Network Security Hijacking, flooding, spoofing and some honey.
Introduction to IPv6 NSS Wing,BSNL Mobile Services, Ernakulam 1.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
7 IPv6: transition and security challenges Selected Topics in Information Security – Bazara Barry.
An Introduction to Encrypting Messages on the Internet Mike Kaderly INFS 750 Summer 2010.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
TCP/IP Protocols Contains Five Layers
Universal, Ubiquitous, Unfettered Internet © ui.com Pte Ltd Mobile Internet Protocol under IPv6 Amlan Saha 3UI.COM Global IPv6 Summit,
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
Network Security7-1 Today r Reminder Ch7 HW due Wed r Finish Chapter 7 (Security) r Start Chapter 8 (Network Management)
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
IPv 邱文揚 Joseph 李家福 Frank. Introduction The scale of IPv4 Internet has become far larger than one could ever imagine when designing.
Chapter 27 IPv6 Protocol.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
K. Salah1 Security Protocols in the Internet IPSec.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
Security Data Transmission and Authentication Lesson 9.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Improving Security Over Ipv6 Authentication Header Protocol using IP Traceback and TTL Devon Thomas, Alex Isaac, Majdi Alharthi, Ali Albatainah & Abdelshakour.
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IP Version 6 (IPv6).
RFC 3775 IPv6 Mobility Support
Presenter: Patrick N. zwane Advisor: Dr. Kai-Wei Kea Date: 25/01/2016
CSE 4905 IPsec.
Next Generation: Internet Protocol, Version 6 (IPv6) RFC 2460
IT443 – Network Security Administration Instructor: Bo Sheng
Virtual Private Networks (VPNs)
Virtual Private Networks (VPNs)
Computer Networks Protocols
Internet Protocol version 6 (IPv6)
Presentation transcript:

An Analysis of IPv6 Security CmpE-209: Team Research Paper Presentation CmpE-209 / Spring Presented by: Dedicated Instructor: Hiteshkumar Thakker Prof. Richard Sinn Jimish Shah Network security Krunal Soni Department of CmpE Engg Kuldipsinh Rana Nghia Nguyen Sajjad Tabib 04/08/2008

Agenda Introduction to IPv6 ◦ IPv6 vs IPv4 IPsec Protocol IPv6 Deployment IPv6 Security Issues ◦ Recconnaissance ◦ Redirect Attacks ◦ Spoofing Attacks in Tunneling ◦ Dual-Stack Attacks ◦ Teredo Attacks Summary CmpE-209 / Spring 20082

Introduction to IPv6 What is IPv6 ??? ◦ Network layer protocol used for Internet which is replacing IPv4 Why IPv6 ??? Exhaustion of IPv4 Address Pool Larger Address Space (3.4 x addresses) for global reachability and scalability Simplified header for Routing efficiency and performance Server-less auto-configuration, easier renumbering, multi- homing, and improved plug and play support Security with mandatory IP Security (IPSec) support CmpE-209 / Spring 20083

Simplified IPv6 Header CmpE-209 / Spring 20084

IPsec IPsec is a suite of protocols that provide network layer security. What it means to provide network layer security? ◦ Network Layer Confidentiality ◦ Source Authentication Main security goals ◦ Confidentiality ◦ Integrity ◦ Authentication CmpE-209 / Spring 20085

IPsec protocols Two protocols in IPsec that provide security. ◦ AH: Authentication Header protocol  Source authentication  Data Integrity  No confidentiality ◦ ESP: Encapsulation Security Payload  Authentication  Data Integrity  Confidentiality

Authentication Header Protocol Procedure 1. Host establishes Security Association (SA) with Destination. ◦ SA is a handshake which creates a logical connection between two machines and establishes a common secret key to be used for 2. Host send secure datagrams to desintation 3. Destination determines the SA from SPI field of the datagram. 4. Destination authenticates datagram based on SA and Authentication data field. 1.AH usews HMAC for authentication and integrity on Authentication data.

AH Protocol Diagram

ESP: Encapsulation Security Payload Authentication mechanism similar to AH – Establish SA, etc. Provides confidentiality by encrypting the TCP/UDP segment using DES-CBC.

ESP – Diagram

IPv6 Deployment Flag Day - x Dual-Stack: to allow IPv4 and IPv6 to co- exist in the same networks Tunneling: IPv6 node on sending side of tunnel puts its IPv6 datagram in data field of IPv4 datagram. Now more than 15 methods available for transition. CmpE-209 / Spring

IPv6 Security Issues Reconnaissance in IPv6 Neighbor Discovery attacks Anycast and Addressing Security L3-L4 spoofing attacks in tunneling Attacks through teredo Routing header type-0 attack Attacks through header manipulation and fragmentation Dual-Stack Attack CmpE-209 / Spring

Recconnaissance in IPv subnet addresses are in IPv6 So, harder to scan every address though scan million packets per second- It will take years to find the one host on the network. It is possible in IPv4 through NMAP, but IPv6 does not support NMAP. Pros and cons CmpE-209 / Spring

Other Security Issues Addressing Security Effects of self-generated addresses ◦ Addresses can be “stolen” by others [DoS] ◦ Addresses cannot have pre-established IPsec ◦ IPsec hard to set up in advance as It requires SA and destination address No authorization mechanism exists for anycast destination addresses ◦ Spoofing is possible Attacks through Header manipulation and Fragmentation ◦ Routing Header Type - 0 mechanism issue ◦ Fragmentation ◦ Flow label CmpE-209 / Spring

Neighbor Discovery Attacks Redirect Attacks: A malicious node redirects packets away from a legitimate receiver to another node on the link Denial of Service Attacks(DoS): A malicious node prevents communication between the node under attack and other nodes Flooding Attacks: A malicious node redirects other hosts’ traffic to a victim node creating a flood of bogus traffic at the victim host MIPv6 Challenges CmpE-209 / Spring

Redirect Attacks CmpE-209 / Spring

Spoofing Attacks in Tunneling CmpE-209 / Spring

Solution on the way… CmpE-209 / Spring

IPv6 Dual-stack Attack CmpE-209 / Spring

Prevention using Multiple addresses CmpE-209 / Spring

Attack by Teredo(UDP Port-3544) CmpE-209 / Spring

Precautions to stop attacks Block protocol 41 Handle Teredo as a “dangerous UDP port” at IPv4 firewalls Look for Router Advertisements and Neighbor Discovery Packets (SEND) CmpE-209 / Spring

Security Threats similar to IPv4 Sniffing: without IPsec, IPv6 is no more or less likely to fall victim to a sniffing attack than IPv4 Application Layer Attack: Even with IPsec, the majority of vulnerabilities on the internet today are at the application layer, something that IPsec will do nothing to prevent. Rogue Devices will be as easy to insert into an IPv6 network as in IPv4. Man-in-the-middle-attacks(MITM): without IPsec, any attacks utilizing MITM will have the same likelihood in IPv6 as in IPv4. Flooding attacks CmpE-209 / Spring

Summary IPv6 makes some things better, other things worse, and most things are just different, but no more or less secure Better: Automated scanning and worm propagation is harder due to huge subnets Worse: Increased complexity in addressing and configuration Lack of familiarity with IPv6 among operators Vulnerabilities in transition techniques Dual-stack infrastructures require both IPv4 and IPv6 security rules CmpE-209 / Spring

Conclusion Security in IPv6 is very much like in IPv4 IPsec is mandatory for the security of IPv6 IPv6(IP sec) are still emerging technologies IPv6 is a very complex protocol Its code is new and Untested, so while testing also there could be attack on existing network Research is going on to overcome threats by IETF Secure Transition is a major goal of IPv6 now. CmpE-209 / Spring

References htm htm CmpE-209 / Spring

Thank You !! CmpE-209 / Spring

Questions ??? CmpE-209 / Spring