what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Security Implications Of IPv6 Extensions Headers With Neighbor Discovery

Security Implications Of IPv6 Extensions Headers With Neighbor Discovery
Posted Jun 1, 2011
Authored by Fernando Gont | Site ietf.org

IPv6 Extension Headers with Neighbor Discovery messages can be leveraged to circumvent simple local network protections, such as "Router Advertisement Guard". Since there is no legitimate use for IPv6 Extension Headers in Neighbor Discovery messages, and such use greatly complicates network monitoring and simple security mitigations such as RA-Guard, this document proposes that hosts silently ignore Neighbor Discovery messages that use IPv6 Extension Headers.

tags | paper, local
SHA-256 | ae1239dbe215828238bde7e4d18f0fa35e3f33bfb61ed97549a17cb1ea60cd42

Security Implications Of IPv6 Extensions Headers With Neighbor Discovery

Change Mirror Download



IPv6 maintenance Working Group (6man) F. Gont
Internet-Draft UK CPNI
Updates: 4861 (if approved) May 31, 2011
Intended status: Standards Track
Expires: December 2, 2011


Security Implications of the Use of IPv6 Extension Headers with IPv6
Neighbor Discovery
draft-gont-6man-nd-extension-headers-00

Abstract

IPv6 Extension Headers with Neighbor Discovery messages can be
leveraged to circumvent simple local network protections, such as
"Router Advertisement Guard". Since there is no legitimate use for
IPv6 Extension Headers in Neighbor Discovery messages, and such use
greatly complicates network monitoring and simple security
mitigations such as RA-Guard, this document proposes that hosts
silently ignore Neighbor Discovery messages that use IPv6 Extension
Headers.

Status of this Memo

This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79. This document may not be modified,
and derivative works of it may not be created, and it may not be
published except as an Internet-Draft.

Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."

This Internet-Draft will expire on December 2, 2011.

Copyright Notice

Copyright (c) 2011 IETF Trust and the persons identified as the
document authors. All rights reserved.

This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents



Gont Expires December 2, 2011 [Page 1]

Internet-Draft ND and IPv6 Extension Headers May 2011


(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.


Table of Contents

1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Specification . . . . . . . . . . . . . . . . . . . . . . . . . 4
3. Security Considerations . . . . . . . . . . . . . . . . . . . . 5
4. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 6
5. References . . . . . . . . . . . . . . . . . . . . . . . . . . 7
5.1. Normative References . . . . . . . . . . . . . . . . . . . 7
5.2. Informative References . . . . . . . . . . . . . . . . . . 7
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 8
































Gont Expires December 2, 2011 [Page 2]

Internet-Draft ND and IPv6 Extension Headers May 2011


1. Introduction

IPv6 Router Advertisement Guard (RA-Guard) is a mitigation technique
for attack vectors based on ICMPv6 Router Advertisement messages.
describes the problem statement of "Rogue IPv6 Router
Advertisements", and specifies the "IPv6 Router Advertisement Guard"
functionality.

[draft-gont-v6ops-ra-guard-evasion] describes how IPv6 Extension
Headers can be leveraged to circumvent the RA-Guard protection.
Additionally, the use of Extension Headers (and of the Fragmentation
Header in particularly) greatly increases the difficulty to monitor
Neighbor Discovery traffic (e.g., with tools such as NDPMon).

Since there is no current legitimate use for IPv6 Extension Headers
in IPv6 Neighbor Discovery packets, and since avoiding their use for
such packets greatly simplifies monitoring of Neighbor Discovery
traffic and the possible mitigations for Neighbor Discovery attacks,
this document proposes that hosts silently ignore Neighbor Discovery
messages that employ IPv6 Extension Headers.

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].



























Gont Expires December 2, 2011 [Page 3]

Internet-Draft ND and IPv6 Extension Headers May 2011


2. Specification

Hosts SHOULD silently ignore Neighbor Discovery messages (Neighbor
Solicitation, Neighbor Advertisement, Router Solcicitation, and
Router Advertisement messages) that employ IPv6 Extension Headers.














































Gont Expires December 2, 2011 [Page 4]

Internet-Draft ND and IPv6 Extension Headers May 2011


3. Security Considerations

IPv6 Extension Headers can be leveraged to circumvent network
monitoring and mechanisms such as RA-Guard
[draft-gont-v6ops-ra-guard-evasion]. By updating the relevant
specifications such that IPv6 Extension Headers are not allowed in
Neighbor Discovery messages, protection of local network against
Neighbor Discovery attacks, and monitoring of Neighbor Discovery
traffic is greatly simplified.

[draft-gont-v6ops-ra-guard-evasion] discusses possible filtering
rules that could be enforced to mitigate Neighbor Discovery attacks
that employ IPv6 Extension Headers.






































Gont Expires December 2, 2011 [Page 5]

Internet-Draft ND and IPv6 Extension Headers May 2011


4. Acknowledgements

This document resulted from the project "Security Assessment of the
Internet Protocol version 6 (IPv6)" [CPNI-IPv6], carried out by
Fernando Gont on behalf of the UK Centre for the Protection of
National Infrastructure (CPNI). The author would like to thank the
UK CPNI, for their continued support.












































Gont Expires December 2, 2011 [Page 6]

Internet-Draft ND and IPv6 Extension Headers May 2011


5. References

5.1. Normative References

[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.

[RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman,
"Neighbor Discovery for IP version 6 (IPv6)", RFC 4861,
September 2007.

5.2. Informative References

[RFC6104] Chown, T. and S. Venaas, "Rogue IPv6 Router Advertisement
Problem Statement", RFC 6104, February 2011.

[RFC6105] Levy-Abegnoli, E., Van de Velde, G., Popoviciu, C., and J.
Mohacsi, "IPv6 Router Advertisement Guard", RFC 6105,
February 2011.

[draft-gont-v6ops-ra-guard-evasion]
Gont, F., "IPv6 Router Advertisement Guard (RA Guard)
Evasion", IETF Internet Draft,
draft-gont-v6ops-ra-guard-evasion, work in progress,
May 2011.

[CPNI-IPv6]
Gont, F., "Security Assessment of the Internet Protocol
version 6 (IPv6)", UK Centre for the Protection of
National Infrastructure, (to be published).





















Gont Expires December 2, 2011 [Page 7]

Internet-Draft ND and IPv6 Extension Headers May 2011


Author's Address

Fernando Gont
Centre for the Protection of National Infrastructure

Email: fernando@gont.com.ar
URI: http://www.gont.com.ar












































Gont Expires December 2, 2011 [Page 8]

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    0 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close