[ipv6hackers] IPv6 security presentation at Hack.lu 2011

fred fred at fredbovy.com
Fri Sep 30 03:49:56 CEST 2011


Ok, I get it but I never found any way to set your stack to ignore the IP
REDIRECT. I never look for a way to do it to be honest.

Maybe it is something you can do by setting a variable and building a new
kernel in UNIX/Linux ?
On MAC OS X a variable and build a new kernel as well ?

Maybe a registry in Windows let you do this ?

I have never in my life found any IT people doing such setting on any
Workstation or servers. But it is a long time I am not working with IT
people who configure everything...

So I did not know it was something which could be set easily and was done
by everybody in the field so it was not an open issue for IPV4!

Thanks
Fred







Le 29/09/2011 22:57, « Owen DeLong » <owend at he.net> a écrit :

>The difference is that in IPv4, most (security conscious) people turn off
>the ability to pay attention to redirects.
>
>In IPv6, you cannot (unless you want to deal with static routes or a
>routing
>protocol on EVERY host) ignore RA.
>
>Owen
>
>On Sep 29, 2011, at 1:50 PM, fred wrote:
>
>> Hi Owen,
>> 
>> I read and read again and I am not sure I understand your point.
>> 
>> If you send a rogue ICMP Redirect to intercept the traffic.
>> So the source will use your IP address as the next hop instead of the
>> legitimate gateway, OK ?
>> Then you capture the packet and get the payload and then what prevent
>>you
>> from forwarding the packet to the legitimate gateway ?
>> 
>> What is the difference with a rogue RA again ?
>> 
>> I must be stupid but I don't get your point here and it seems that I am
>> the only one on this list ;-)
>> 
>> TIA
>> Fred
>> 
>> 
>> 
>> Le 27/09/2011 17:27, « Owen DeLong » <owend at he.net> a écrit :
>> 
>>> The key difference is that in IPv4, most of those mechanisms break
>>>things
>>> visibly where a rogue RA can still forward the packets to the
>>>legitimate
>>> gateway
>>> after capturing them.
>>> 
>>> Owen
>>> 
>>> On Sep 27, 2011, at 3:51 AM, fred wrote:
>>> 
>>>> You are right that the big issue with ND is that RA can be used
>>>> announce a
>>>> Rogue router and without SEND or at least RA Guard, we have no way to
>>>> control this efficiently.
>>>> 
>>>> On the other hand, with IPv4 we had the ICMP REDIRECT since day 1
>>>>which
>>>> has
>>>> the potential to do basically the same damage and reprogram the
>>>>default
>>>> gateway of any host to an arbitrary address. And we have been living
>>>> with
>>>> this threat for 30 years pretty good!
>>>> 
>>>> RA go a bit further as they can advertize much more than a default
>>>> gateway.
>>>> 
>>>> But in IPv4 you can also have rogue DNS servers and rogue DHCP servers
>>>> which
>>>> can break even more things than a rogue RA which can be identified
>>>>very
>>>> quickly with a good IDS and blasted to stop its attack!
>>>> 
>>>> Fred
>>>> 
>>>> 
>>>> 
>>>> 
>>>> Le 27/09/2011 05:04, « Jim Small » <jim.small at cdw.com> a écrit :
>>>> 
>>>>> Fred,
>>>>> 
>>>>> So why NDP could be worse than ARP ?
>>>>> [JRS>] Better and worse.  Better in the sense that it has more
>>>>> features and
>>>>> flexibility.  Worse in the sense that since it uses IPv6 it can use
>>>>> (abuse)
>>>>> extension headers to bypass current security mechanisms like ACLs and
>>>>> RA
>>>>> Guard.
>>>>> 
>>>>> Because it can advertise a default router with a RA? If the answer is
>>>>> yes
>>>>> maybe there is a way (which I would
>>>>> not recommend anyway) to stop the router from sending RA and
>>>>>configure
>>>>> the
>>>>> end node from DHCPv6 or manually. Just like IPv4 would do.
>>>>> [JRS>] Currently DHCPv6 is not capable of provisioning a default
>>>>> gateway, it
>>>>> relies on SLAAC for this.  So currently disabling SLAAC would prevent
>>>>> DHCPv6
>>>>> from working.
>>>>> 
>>>>> Or is there anything else where NDP spoofing is worst than ARP
>>>>> spoofing ? I
>>>>> would really think the opposite...
>>>>> [JRS>] I think it will end up being superior, but first the issues
>>>>>with
>>>>> extension header abuse and getting mainstream vendors like Microsoft
>>>>> and Apple
>>>>> to implement SeND must be addressed.
>>>>> 
>>>>> --Jim
>>>>> 
>>>>> 
>>>>> _______________________________________________
>>>>> Ipv6hackers mailing list
>>>>> Ipv6hackers at lists.si6networks.com
>>>>> http://lists.si6networks.com/listinfo/ipv6hackers
>>>> 
>>>> -- 
>>>> 
>>>> Fred Bovy
>>>> fred at fredbovy.com
>>>> Skype: fredericbovy
>>>> Mobile: +33676198206
>>>> Siret: 5221049000017
>>>> Twitter: http://twitter.com/#!/FredBovy
>>>> Blog: http://fredbovyipv6.blogspot.com/
>>>> ccie #3013
>>>> 
>>>> 
>>>> 
>>>> 
>>>> _______________________________________________
>>>> Ipv6hackers mailing list
>>>> Ipv6hackers at lists.si6networks.com
>>>> http://lists.si6networks.com/listinfo/ipv6hackers
>>> 
>>> _______________________________________________
>>> Ipv6hackers mailing list
>>> Ipv6hackers at lists.si6networks.com
>>> http://lists.si6networks.com/listinfo/ipv6hackers
>> 
>> 
>> _______________________________________________
>> Ipv6hackers mailing list
>> Ipv6hackers at lists.si6networks.com
>> http://lists.si6networks.com/listinfo/ipv6hackers
>
>_______________________________________________
>Ipv6hackers mailing list
>Ipv6hackers at lists.si6networks.com
>http://lists.si6networks.com/listinfo/ipv6hackers





More information about the Ipv6hackers mailing list