21
Security in IPv6

Security in IPv6 - IPv6 Summit, Inc

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Security in IPv6 - IPv6 Summit, Inc

Security in IPv6

Page 2: Security in IPv6 - IPv6 Summit, Inc

Security in IPv6

Basic Security Requirements and Techniques

ConfidentialityThe property that stored or transmitted information cannot be read or altered by an unauthorized party

IntegrityThe property that any alteration of transmitted or stored information can be detected

Page 3: Security in IPv6 - IPv6 Summit, Inc

Security in IPv6

Current SolutionsInternet adoption grew

Applications were designed and operated “ad hoc” security solutions

Provides semi-trusted and semi-secure Internet accessDon’t address fundamental issuesMostly concerned with fighting symptoms

Page 4: Security in IPv6 - IPv6 Summit, Inc

Security in IPv6Current Solutions

Packet Filters and FirewallsFilters traffic based on predefined rules

IP addressport numbersvirus patterns

May determine “unusual” behavior

Page 5: Security in IPv6 - IPv6 Summit, Inc

Security in IPv6 - example

Page 6: Security in IPv6 - IPv6 Summit, Inc

Security in IPv6The IPSEC framework

A formally defined standard (RFC 2401)

Contains 6 distinct elementsDescription of security requirements and mechanisms on the network layer

Security element for encryption (RFC 2406)

Security element for authentication (RFC 2402)

Concrete cryptographic algorithms for encryption and authentication

Definition of Security policy and Security associations between partners

IPSEC key management

ISAKMP - RFC 2408 - Internet Security Association and Key Management Protocol

Page 7: Security in IPv6 - IPv6 Summit, Inc

Source: “IPv6 Essentials”, O’Reilly Press, 2002

Security in IPv6

The IPSEC framework

Page 8: Security in IPv6 - IPv6 Summit, Inc

Security in IPv6

Authentication in IPv6Extension Header type 51 provides integrity and authentication for end to end data

Page 9: Security in IPv6 - IPv6 Summit, Inc

Security in IPv6

Authentication in IPv6Next HeaderLength of Payload in x32 bitsReservedSPI - Indicates which checksum algorithm has been usedSequence Number - Prevents replay attacks

Not to exceed 232 to prevent replay. Re-negotiation should occurIt is know that packets may arrive out of order

Authentication Data - variable lengthA cryptographically secure checksum over the payload and possibly other fields

Page 10: Security in IPv6 - IPv6 Summit, Inc

Security in IPv6

Authentication in IPv6Cryptographical checksum is also known as a message digest or hash. Uses rules

IP Header, version, class, and flow label are excluded from the computation. Hop Limit is assumed to contain zeroAll Extension Headers that change en-route are computed as a sequence of zeroIf Routing Extension Header is present the IPv6 destination address is set to the final destinationIPv6 implementations MUST support

Keyed message digest No. 5 (MD5)requires “key”considered theoretically breakable

Secure Hash Algorithm No. 1 (SHA-1)

Page 11: Security in IPv6 - IPv6 Summit, Inc

Security in IPv6

Authentication in IPv6Payload Authentication

Transport mode authenticates all end to end payload plus selected headers (described previously)

Payload LengthNext HeaderExtension headers (not listed previously)Upper layer headers and dataSome IP header fields are not protectedWill not work with NAT environment

Page 12: Security in IPv6 - IPv6 Summit, Inc

Security in IPv6

Authentication in IPv6Header and Payload Authentication

Accomplished by creating a tunnel between 2 gatewaysGateway may be a routerMay be a VPN implementation

Wraps the original packet in a new packetApplies checksum to entire packet

Page 13: Security in IPv6 - IPv6 Summit, Inc

Security in IPv6

Encryption in IPv6Extension Header type 50 provides integrity and confidentiality

Page 14: Security in IPv6 - IPv6 Summit, Inc

Security in IPv6

Encryption in IPv6SPI - Indicates which encryption algorithm has been usedSequence Number - Prevents replay attacks

Not to exceed 232 to prevent replay. Re-negotiation should occurIt is know that packets may arrive out of order

Encryption Parameters - variable lengthDepends on the encryption algorithm used

Encrypted Data

Page 15: Security in IPv6 - IPv6 Summit, Inc

Security in IPv6

Encryption in IPv6Trailer

Contains Optional authentication information to protect the encrypted data and the sequence numberPadding (for 64 bit alignment)Next Header value (in the encrypted packet)

IPv6 specification contains one encryption algorithm that must be supported by every implementation

DES-CBC (Data Encryption Standard in Cipher Block Chaining Mode)

Other stronger algorithms may be negotiated using corresponding SA and SPI

Government export controls

Page 16: Security in IPv6 - IPv6 Summit, Inc

Security in IPv6

Encryption in IPv6Payload encryption

Transport mode encrypts all end to end extension headers and payload

Extension headers must not be looked at in path

Page 17: Security in IPv6 - IPv6 Summit, Inc

Security in IPv6

Encryption in IPv6Header and Payload encryption

Accomplished by creating a tunnel between 2 gatewaysGateway may be a routerMay be a VPN implementation

Wraps the original packet in a new packetApplies checksum to entire packet

Page 18: Security in IPv6 - IPv6 Summit, Inc

Security in IPv6

Encryption in IPv6Combining Authentication and Encryption

It was originally intended to use bothBut increased IPv6 packet size was not goodDecided to included AH functionality in ESP

Page 19: Security in IPv6 - IPv6 Summit, Inc

Security in IPv6

IPSEC may solve many issues on the Internet

FTP, Telnet, DNS, and SNMPHowever other issues exist

IPSEC tunnels break through firewalls or NATTunneled IPSEC traffic may contain malicious dataQOS doesn’t work in IPSECMobility issues

Dynamic IP addresses cause IPSEC to fail

Page 20: Security in IPv6 - IPv6 Summit, Inc

Security in IPv6

IPv6 deployment slowed due to IPv4 workarounds

NAT and CIDRSSLSSHS/MIME, PGP

IPSEC deployment issueslack of public key infrastructurelack of vendor/IPv6 adoption

Page 21: Security in IPv6 - IPv6 Summit, Inc

Questions?