• Aucun résultat trouvé

Network Security ThreatsNetwork Security Threats

N/A
N/A
Protected

Academic year: 2022

Partager "Network Security ThreatsNetwork Security Threats"

Copied!
11
0
0

Texte intégral

(1)

HERVÉ SCHAUER CONSULTANTS HERVÉ SCHAUER CONSULTANTS

Network Security Consulting Agency since 1989 Network Security Consulting Agency since 1989 Specialized in Unix, Windows, TCP/IP and Internet Specialized in Unix, Windows, TCP/IP and Internet

IPv6 IPv6

Network Security Threats Network Security Threats

Nicolas Collignon Nicolas Collignon

nicolas.collignon@hsc.fr - www.hsc.fr

(2)

Copyright Hervé Schauer Consultants 2000-2006 - Reproduction prohibited 2 / 112 / 11

Agenda Agenda

1. Covert channels

2. Application-level impacts 3. IDS impacts

4. Firewall / ACL bypassing

5. Mobiles Networks considerations

(3)

Covert Channels Covert Channels

IPv6 extensions : Hop-by-Hop, Fragmentation, Routing ...

TLV Options (Type-Length-Value) parallel streams hiding possibilities:

Specially crafted IPv6 extensions

« Home maid » TLV options

IPv6 Header Next: TCP

TCP Header Data+

IPv6 Header Next: Routing

IPv6 Header Next: Routing

Routing Header Next: TCP

Fragment Header Next: TCP TCP Header

Data+

TCP Header +

Data Routing Header

Next: Fragment

(4)

Copyright Hervé Schauer Consultants 2000-2006 - Reproduction prohibited 4 / 114 / 11

Applications impacts Applications impacts

Low impacts on simple application-level protocols

High impacts on application-level protocol carrying IP addresses A different IP addressing approach

Temporary Addresses, Privacy extensions

Session identification using IP addresses : authentication, statistics

(5)

An IDS nightmare :) An IDS nightmare :)

Big addresses spaces

/64 =~ 2 000 000 000 TCP+UDP scans with unique addresses

Increasing use of IPsec

Skip encrypted traffic and miss attacks ?

Decrypt all IPsec traffic is not always possible

Very modular IPv6 header's structure

Hard to design attacks signatures More covert channel possibilities

Multiple packets routing methods

How to handle dual protocol sessions ?

(6)

Copyright Hervé Schauer Consultants 2000-2006 - Reproduction prohibited 6 / 116 / 11

Routing Header type 0 Routing Header type 0

Concept similar to « source routing »

Destination address changes at every hop

Complete header inspection needed to setup black-listing filtering

Most IPv6 enabled (including Internet connected) hosts support Routing Header type 0 and permit relaying

(7)

IPv6 IPv6

ACL bypass : Routing Headers ACL bypass : Routing Headers

Establish bidirectional tunnels

Client / IPv6 Server / IPv6

Relay host / IPv6

(8)

Copyright Hervé Schauer Consultants 2000-2006 - Reproduction prohibited 8 / 118 / 11

ACL bypass : 6to4 tunnels ACL bypass : 6to4 tunnels

Use 6to4 gateways to bypass IPv4 ACLs A lot of 6to4 gateways open on Internet

IPv6 IPv4

6to4 Gateway

Server / IPv4 Client / IPv6

(9)

Mobiles networks considerations Mobiles networks considerations

Mobile to Mobile uncontrolled data streams

3GPP specifications say one /48 network per mobile Volume based accounting vs. Routing Headers

IPv6 Mobility

may be dangerous: DoS

complex Routing Header filtering

(10)

Copyright Hervé Schauer Consultants 2000-2006 - Reproduction prohibited 10 / 1110 / 11

IPv6 myths IPv6 myths

Scanning IPv6 networks take a very long time ? Yes but ...

Increasing use of DNS, Sequential IP allocations (DHCP, GGSN) Routing Headers may be used to speed up scan

Worms won't take longer to propagate: Multicast, EUI-64

IPv6 is more secure than IPv4 ? No

No standardized built-in key exchange protocol Only 1 SEND implementation available

Is it hard to define ACLs on an IPv6 network ? Yes

Huge address space

IPv6 protocol and architecture complexity

(11)

Questions ? Questions ?

...

Références

Documents relatifs

Network Security Bible is organized to provide the reader with an understanding of the fundamentals of information system security by covering their basic principles,

Copyright Hervé Schauer Consultants 2000-2003 - Reproduction Interdite 2 / 30 / 30..

Copyright Hervé Schauer Consultants 2000-2012 - Reproduction Interdite 3/30.. Why

Copyright Hervé Schauer Consultants 2000-2010 - Reproduction Interdite 2/28?. Hervé

Active Directory is not a security service, but nearly all the security mechanisms built into Windows rely upon the Active Directory as a storage mechanism for security

Keywords: RSA, Rabin, public key cryptography, SETUP, kleptogra- phy, random oracle, security threats, attacks, malicious cryptography..

Introduction to security involves discussing the types of threats we face in our secure environments.. Policies and processes help us protect our secure environments from threats

The scope of this document is to combine Host Identity Protocol (HIP) and the Proxy Mobile IPv6 (PMIPv6) in order to have a secure global and localized mobility management scheme for