81
INTRODUCTION TO IPV6 SECURITY Harith Dawood Computer Science Dept. Cihan University Erbil - IRAQ. E-mail: [email protected] E-mail: [email protected]

iNTRODUCTION TO IPv6 SECURITY - MENOG

  • Upload
    lamphuc

  • View
    244

  • Download
    1

Embed Size (px)

Citation preview

Page 1: iNTRODUCTION TO IPv6 SECURITY - MENOG

INTRODUCTION TO

IPV6 SECURITY

Harith DawoodComputer Science Dept.

Cihan University

Erbil - IRAQ.

E-mail: [email protected]

E-mail: [email protected]

Page 2: iNTRODUCTION TO IPv6 SECURITY - MENOG

1. Motivation for this presentation

2. Introduction.

3. IPv6 Key Features.

4. IPv6 Security Considerations.

Agenda

2 Harith Dawood

8. Questions and Answers

4. IPv6 Security Considerations.

5. Some Common Attacks.

6. IPv6 Transition plan (Security Policy)

7. Conclusion.

8. Questions and Answers

Page 3: iNTRODUCTION TO IPv6 SECURITY - MENOG

Motivation for this

presentation

3Harith Dawood

Page 4: iNTRODUCTION TO IPv6 SECURITY - MENOG

Motivation for this presentation

1) This talk is about ongoing work toidentify IPv6 security considerations &how to mitigate those problems.

2) Part of my research has been published2) Part of my research has been publishedin ISC-TURKEY 2012 Conf. Ankara-TURKEY. http://www.iscturkey.org.

3) Much of this is “work in progress”

→ your input is welcome!

Harith Dawood 4

Page 5: iNTRODUCTION TO IPv6 SECURITY - MENOG

INTRODUCTIONINTRODUCTIONINTRODUCTIONINTRODUCTION

5Harith Dawood

Page 6: iNTRODUCTION TO IPv6 SECURITY - MENOG

Introduction• On 22 March 2008, the US government’s

Office of Management and Budget (OMB)

issued a memorandum requiring that by June

2008 “all agencies” infrastructure (network 2008 “all agencies” infrastructure (network

backbones) must be using IPv6 .

• Emerging Standards, Published by the IEEE

Computer Society , 1540-7993/07 © 2007 IEEE

6Harith Dawood

Page 7: iNTRODUCTION TO IPv6 SECURITY - MENOG

Sooner or later you will need to deploy IPv6

● In fact, you have (at least) partially deployed it, already

● IPv6 represents a number of challenges: What can we

do about them?

Introduction

Harith Dawood 7

Page 8: iNTRODUCTION TO IPv6 SECURITY - MENOG

This means that:

STOP IPv4 …

Introduction

&

START IPv6 …

8Harith Dawood

Page 9: iNTRODUCTION TO IPv6 SECURITY - MENOG

We Must Start Now !!

9Harith Dawood

Page 10: iNTRODUCTION TO IPv6 SECURITY - MENOG

headaches from having to stuff

No doubt some will suffer

headaches from having to stuff

new knowledge into their

Introduction

new knowledge into their

heads, but trust me,

it's worth it.

10Harith Dawood

Page 11: iNTRODUCTION TO IPv6 SECURITY - MENOG

IntroductionIntroduction

With millions of new With millions of new digital devices digital devices becoming IP aware, becoming IP aware,

the need for increased addressing and plug & play the need for increased addressing and plug & play

networking networking

is only met with the implementation of IPvis only met with the implementation of IPv66

IPv6 – Internet for everything!11Harith Dawood

Page 12: iNTRODUCTION TO IPv6 SECURITY - MENOG

Broadband Home – A necessity for IPv6 !

Wireless LaptopWireless Laptop

• Distance learning

• Video calls

• MP3 downloadsPDAPDA

IP PhoneIP Phone

PrinterPrinter

Home NetworkingHome Networking• At the heart of the digital home sits the Broadband access point distributing

a host of enhanced content and services throughout the home• Internet access

• Multiple voice lines

• Wireless printing

• Wireless IP Phone

Wireless GamingWireless Gaming

Broadband Internet AccessBroadband Internet Access

Wired DevicesWired Devices

• Streaming Video/Audio

• Print/file sharing

Broadband Access PointBroadband Access Point

• Multiplayer gaming

• Video on demand

• Home security

• Digital audio

• Domestic appliances

Triple Play ServicesTriple Play Services

•• Multiple devices served in a Multiple devices served in a HomeHome•• Commercial download• TV guide

12Harith Dawood

Page 13: iNTRODUCTION TO IPv6 SECURITY - MENOG

IPvIPvIPvIPv6 6 6 6 KEY FEATURESKEY FEATURESKEY FEATURESKEY FEATURES

13Harith Dawood

Page 14: iNTRODUCTION TO IPv6 SECURITY - MENOG

IPv6 Key Features

14Harith Dawood

Page 15: iNTRODUCTION TO IPv6 SECURITY - MENOG

Header Format Simplification

Multicast

Additionally,

IPv6 Key Features

Jumbograms Mobility

Additionally, others IPv6

features

15Harith Dawood

Page 16: iNTRODUCTION TO IPv6 SECURITY - MENOG

IPv4IPv4

1. Larger Address Space

IPv4• 32 bits or 4 bytes long

4,200,000,000 possible addressable nodes

IPv6• 128 bits or 16 bytes: four times the bits of IPv4

3.4 * 1038 possible addressable nodes

340,282,366,920,938,463,374,607,432,768,211,456

5 * 1028 addresses per person

~=

~=~=

~=

16Harith Dawood

Page 17: iNTRODUCTION TO IPv6 SECURITY - MENOG

2. Simple and Efficient Header

A simpler and more efficient header means:

• 64-bit aligned fields and fewer fields

• Hardware-based, efficient processing

• Improved routing efficiency and performance

• Faster forwarding rate with better scalability

Page 18: iNTRODUCTION TO IPv6 SECURITY - MENOG

IPv4 and IPv6 Header Comparison

Fragment

OffsetFlags

Total LengthType of

ServiceIHL

Source Address

Header ChecksumProtocolTime to Live

Identification

Version

IPv4 Header

Next

HeaderHop Limit

Flow LabelTraffic

Class

Payload Length

Version

IPv6 Header

PaddingOptions

Destination Address

Source Address

Destination Address

Source Address

Field’s Name Kept from IPv4 to IPv6

Fields Not Kept in IPv6

Name and Position Changed in IPv6

New Field in IPv6

Leg

en

d

18Harith Dawood

Page 19: iNTRODUCTION TO IPv6 SECURITY - MENOG

3. IPv6 Extension Headers

Simpler and more efficient header means:• IPv6 has extension headers.• IPv6 handles the options more efficiently.• IPv6 enables faster forwarding rate and end

nodes processing.19Harith Dawood

Page 20: iNTRODUCTION TO IPv6 SECURITY - MENOG

IPv6 SECURITY

CONSIDERATIONS

20Harith Dawood

Page 21: iNTRODUCTION TO IPv6 SECURITY - MENOG

Problem

21Harith Dawood

Page 22: iNTRODUCTION TO IPv6 SECURITY - MENOG

Problem

Does IPv6 solve all the

security problemssecurity problems

of IPv4?

22Harith Dawood

Page 23: iNTRODUCTION TO IPv6 SECURITY - MENOG

IPV6 SECURITY CONSIDERATIONS

1. Ipv6 Address Spoofing (Mac Address Spoofing).

2. Large Address Space Consideration.

3. Multiple Addresses Security Consideration

4. Multicast Security Consideration.4. Multicast Security Consideration.

5. Extension Header Consideration.

6. Fragmentation Security Consideration.

7. Neighbor Discovery And Solicitation Security

Consideration.

23Harith Dawood

Page 24: iNTRODUCTION TO IPv6 SECURITY - MENOG

1. IPV6 ADDRESS SPOOFING (MAC ADDRESS

SPOOFING) SECURITY CONSIDERATION

• In today's IPv4-based Internet, a typical

Internet user connects to an Internet service

provider (ISP) and obtains an IPv4 address

using the Point-to-Point Protocol (PPP) andusing the Point-to-Point Protocol (PPP) and

the Internet Protocol Control Protocol (IPCP).

Each time the user connects, a different IPv4

address might be obtained. Because of this, it

is difficult to track a dial-up user's traffic on

the Internet on the basis of IP address.

24Harith Dawood

Page 25: iNTRODUCTION TO IPv6 SECURITY - MENOG

• For IPv6-based dial-up connections, the user isassigned a 64-bit prefix after the connection ismade through router discovery and statelessaddress auto-configuration. If the interfaceidentifier is always based on the EUI-64

1. IPV6 ADDRESS SPOOFING (MAC ADDRESS

SPOOFING) SECURITY CONSIDERATION

identifier is always based on the EUI-64address (as derived from the static IEEE 802address), it is possible to identify the traffic ofa specific node regardless of the prefix,making it easy to track a specific user andtheir use of the Internet.

25Harith Dawood

Page 26: iNTRODUCTION TO IPv6 SECURITY - MENOG

The conversion of a universally administered, unicast

IEEE 802 address to an IPv6 interface identifier

48 Bit Interface Identifier

26Harith Dawood

Page 27: iNTRODUCTION TO IPv6 SECURITY - MENOG

Tracking the user’s moves

Harith Dawood 27

Page 28: iNTRODUCTION TO IPv6 SECURITY - MENOG

• Because of IPv6 address depends on MACaddress which in a sense the MAC address is acomputer's true name on a LAN.

• Therefore, many people changing their MAC

1. IPV6 ADDRESS SPOOFING (MAC ADDRESS

SPOOFING) SECURITY CONSIDERATION

• Therefore, many people changing their MACaddress in different operating systems(Window XP/Vista, Linux & Mac OS X) eithermanually or by software. Unfortunately, this isprivacy risk, because anyone who has yourMAC address also has your IP address !!

28Harith Dawood

Page 29: iNTRODUCTION TO IPv6 SECURITY - MENOG

2. LARGE ADDRESS SPACE SECURITY

CONSIDERATION

2. LARGE ADDRESS SPACE SECURITY

CONSIDERATION

• Port scanning is one of the most commontechniques in use today.

• Default subnets in IPv6 have 264 addresses

10 Mpps = more than 50,000 years

• In IPv6 networks, IPv6 subnets use 64 bits for• In IPv6 networks, IPv6 subnets use 64 bits forallocating host addresses. Scanning such a largeaddress space (264) is not absolutely impossible[Szigeti, S.; Risztics, P. Ref. no.8].

• Many of IPv6 attack tools are already available andrelatively easy to install and operate. Tools such asScapy6 and the Hacker's Choice IPv6 Toolkit.

29Harith Dawood

Page 30: iNTRODUCTION TO IPv6 SECURITY - MENOG

IPv6 Address Format

30Harith Dawood

Page 31: iNTRODUCTION TO IPv6 SECURITY - MENOG

3. MULTIPLE ADDRESSES SECURITY

CONSIDERATION

• IPv6 assigns multiple addresses to an interface

which challenges the filtering rules in the

firewalls & access control lists [10]. In such

cases, a firewall will need to learn all thecases, a firewall will need to learn all the

addresses dynamically and the filtering rules

will need to be automatically generate-able

using sophisticated policy rule sets. And such

capabilities are not available.

31Harith Dawood

Page 32: iNTRODUCTION TO IPv6 SECURITY - MENOG

4. MULTICAST SECURITY CONSIDERATION.

• IPv6 has no broadcast method of packet

forwarding and instead uses multicast for all

one-to-many communications.

32Harith Dawood

Page 33: iNTRODUCTION TO IPv6 SECURITY - MENOG

4. MULTICAST SECURITY CONSIDERATION.

• If an attacker could send traffic to these

multicast groups and all the systems that are

part of these groups respond, that would give

the attacker information that could be usedthe attacker information that could be used

for further attacks.

• Multicast could not only be used for

reconnaissance but also as a way to amplify

traffic volumes for DoS attacks.

33Harith Dawood

Page 34: iNTRODUCTION TO IPv6 SECURITY - MENOG

5. EXTENSION HEADER SECURITY

CONSIDERATION

• The figure shows the structure of an extension

header and describes how they form a linked

list of headers before the packet payload.

34Harith Dawood

Page 35: iNTRODUCTION TO IPv6 SECURITY - MENOG

5. EXTENSION HEADER SECURITY

CONSIDERATION

• An attacker could perform headermanipulation on the extension headers tocreate attacks. Someone could create an IPv6packet that meets the protocol specificationand has an unlimited number of extensionand has an unlimited number of extensionheaders linked together in a big list.

• Chaining lots of extension headers together isa way for attackers to avoid firewalls andIntrusion Prevention Systems (IPS).

35Harith Dawood

Page 36: iNTRODUCTION TO IPv6 SECURITY - MENOG

6. FRAGMENTATION SECURITY

CONSIDERATION

36Harith Dawood

Page 37: iNTRODUCTION TO IPv6 SECURITY - MENOG

• In IPv6, fragmentation is never performed by theintermediary routers but by the end nodesthemselves. So, only the end hosts are allowed tocreate and reassemble fragments.

• This process can be used by attackers to either

6. FRAGMENTATION SECURITY

CONSIDERATION

• This process can be used by attackers to eitherhide their attacks or to attack a node. By puttingthe attack into many small fragments, theattacker can try to bypass filtering or detection.

• Fragmentation attacks are typically used byhackers with tools such as: Whisker, Fragrouter,Teardrop, and Bonk [5].

37Harith Dawood

Page 38: iNTRODUCTION TO IPv6 SECURITY - MENOG

• In IPv4, subnets are generally small,

made just large enough to cover the

actual number of machines on the

subnet.

7. NEIGHBOR DISCOVERY AND

SOLICITATION SECURITY CONSIDERATION.

subnet.

• In contrast, the default IPv6 subnet size is

a /64, a number so large it covers trillions

of addresses, the overwhelming number

of which will be unassigned.

38Harith Dawood

Page 39: iNTRODUCTION TO IPv6 SECURITY - MENOG

• Consequently, simplistic implementations of

Neighbor Discovery can be vulnerable to denial of

service attacks whereby they attempt to perform

address resolution for large numbers of unassigned

addresses.

7. NEIGHBOR DISCOVERY AND

SOLICITATION SECURITY CONSIDERATION.

addresses.

• Such denial of service attacks can be launched

intentionally (by an attacker), or result from legal

operational tools that scan networks for inventory

and other purposes.

39Harith Dawood

Page 40: iNTRODUCTION TO IPv6 SECURITY - MENOG

SOME COMMON

ATTACKS

40Harith Dawood

Page 41: iNTRODUCTION TO IPv6 SECURITY - MENOG

Viruses and Worms in IPv6

Viruses and email worms: IPv6 brings no change

Other worms:

IPv4: dependence on network scanning.

IPv6: not so easy => will use alternative IPv6: not so easy => will use alternative

techniques.

Worm developers will adapt to IPv6

Harith Dawood 41

Page 42: iNTRODUCTION TO IPv6 SECURITY - MENOG

IPv6 Attacks with Strong IPv4

Similarities

• Sniffing

Without IPSec, IPv6 is no more or less likely to fall victim to a sniffing attack than IPv4

• Application layer attacks

Even with IPSec, the majority of vulnerabilities on Even with IPSec, the majority of vulnerabilities on the Internet today are at the application layer, something that IPSec will do nothing to prevent

• Flooding

Flooding attacks are identical between IPv4 and IPv6

Harith Dawood 42

Page 43: iNTRODUCTION TO IPv6 SECURITY - MENOG

SOME COMMON ATTACKS

• Internet (DMZ, web pages, pop-ups).

• Header manipulation, session hijacking, man-in-the middle.

• Buffer overflows, SQL injection, cross-site scripting.

• Email (attachments, phishing, hoaxes)• Email (attachments, phishing, hoaxes)

• Distributed denial of service (DDoS)

• Macros, Trojan horses, spyware, malware, key loggers

• VPN, business-to-business (B2B)

• Chat, peer-to-peer (P2P)

• Malicious insider, physical security, rogue devices,

dumpster diving.

43Harith Dawood

Page 44: iNTRODUCTION TO IPv6 SECURITY - MENOG

By the Way:

It Is Real IPv6 Hacking Tools?

44Harith Dawood

Page 45: iNTRODUCTION TO IPv6 SECURITY - MENOG

IPv6 Hacking Tools parasite6: icmp neighbor solicitation/advertisement spoofer, puts you as man-in

the-middle, same as ARP mitm (and parasite)

alive6: an effective alive scanning, which will detect all systems listening to this

address

fake_router6: announce yourself as a router on the network, with the highest

priority

redir6: redirect traffic to you intelligently (man-in-the-middle) with a clever icmp6 redir6: redirect traffic to you intelligently (man-in-the-middle) with a clever icmp6

redirect spoofer

toobig6: mtu decreaser with the same intelligence as redir6

detect-new-ip6: detect new ip6 devices which join the network, you can run a

script to automatically scan these systems etc.

dos-new-ip6: detect new ip6 devices and tell them that their chosen IP collides on

the network (DOS).

http://www.darknet.org.uk/2010/07/thc-ipv6-toolkit-attacking-the-ipv6-

protocol/45Harith Dawood

Page 46: iNTRODUCTION TO IPv6 SECURITY - MENOG

IPv6 Hacking Tools fake_mld6: announce yourself in a multicast group of your choice on the net

fake_mipv6: steal a mobile IP to yours if IPSEC is not needed for

authentication

fake_advertiser6: announce yourself on the network

smurf6: local smurfer

rsmurf6: remote smurfer, known to work only against linux at the moment rsmurf6: remote smurfer, known to work only against linux at the moment

sendpees6: a tool by willdamn(ad)gmail.com, which generates a neighbor

solicitation requests with a lot of CGAs to keep the CPU busy.

http://www.darknet.org.uk/2010/07/thc-ipv6-toolkit-attacking-

the-ipv6-protocol/

46Harith Dawood

Page 47: iNTRODUCTION TO IPv6 SECURITY - MENOG

IPv6 Hacking Tools dnsdict6: paralyzed dns ipv6 dictionary brute forcer

trace6: very fast traceroute6 with supports ICMP6 echo request and TCP-SYN

flood_router6: flood a target with random router advertisements

flood_advertise6: flood a target with random neighbor advertisements

fuzz_ip6: fuzzier for ipv6

implementation6: performs various implementation checks on ipv6 implementation6: performs various implementation checks on ipv6

implementation6d: listen daemon for implementation6 to check behind a

FW

http://www.darknet.org.uk/2010/07/thc-ipv6-toolkit-attacking-

the-ipv6-protocol/

47Harith Dawood

Page 48: iNTRODUCTION TO IPv6 SECURITY - MENOG

Other IPv6 Hacking ToolsSniffers/packet capture

• Snort

• TCPdump

• Sun Solaris snoop

• COLD

• Ethereal

Scanners

•IPv6 Security Scanner

•Halfscan6

•Nmap

•Strobe

•Netcat• Ethereal

• Analyzer

• Windump

• WinPcap

• NetPeek

• SnifferPro

Worms

• Slapper

48

•Netcat

DoS Tools

•6tunneldos

•4to6ddos

•Imps6-tools

Packet forgers

•SendIP

•Packit

•Spak6Harith Dawood

Page 49: iNTRODUCTION TO IPv6 SECURITY - MENOG

Problem

What are the alternatives to avoid

IPv6 in your business ?

IPv6 is the only future – proof solution IPv6 is the only future – proof solution

that can satisfy the expected user needs.

Therefore, there are no plans to avoid or

delay the deployment of IPv6.

49Harith Dawood

Page 50: iNTRODUCTION TO IPv6 SECURITY - MENOG

The Solution ?

Providing native IPv6

services in your services in your

business.

50Harith Dawood

Page 51: iNTRODUCTION TO IPv6 SECURITY - MENOG

IPv6 Security Summary• IPv6 is no more or less secure than IPv4

– Lack of knowledge of IPv6 is an issue

• There aren’t as many security products that support IPv6 yet

• IPv6 will change traffic patterns (p2p, MIPv6)

• IPv6 larger addresses makes worms and scanning less effective but thereare still ways to find hosts

• IPv6 hierarchical addressing and no NAT should reduce the anonymity of• IPv6 hierarchical addressing and no NAT should reduce the anonymity ofhackers and allow for full IPSec

• LAN-based attacks exist in IPv6, Physical Security, Ethernet port security,NAC, 802.1X, SEND can help

• Perform IPv6 filtering at the perimeter

• Use RFC2827 filtering and Unicast Reverse Path Forwarding (uRPF) checksthroughout the network

• Use manual tunnels instead of dynamic tunnels

• Remember physical security

51Harith Dawood

Page 52: iNTRODUCTION TO IPv6 SECURITY - MENOG

IPv6 Transition Plan

(Security Policy)

52Harith Dawood

Page 53: iNTRODUCTION TO IPv6 SECURITY - MENOG

Creating an IPv6 Security Policy

When creating an organization-wide

security policy, you need to make sure

that it has the following critical

characteristics. If any one of these is characteristics. If any one of these is

missing, the security policy is doomed to

fail:

53Harith Dawood

Page 54: iNTRODUCTION TO IPv6 SECURITY - MENOG

• It must be written down.

• It must be approved by management.

• It must be agreed upon by everyone and have

universal participation.

Creating an IPv6 Security Policy

universal participation.

• It must be well publicized.

• It must be monitored and enforced.

• It must be regularly reviewed and updated.

54Harith Dawood

Page 55: iNTRODUCTION TO IPv6 SECURITY - MENOG

The policy development process

OPEN

Anyone can participate

Need

DiscussEvaluate

TRANSPARENT‘BOTTOM UP’

All decisions & policies are documented & available

Internet community proposes and approves policy

Discuss

Implement Consensus

Evaluate

55Harith Dawood

Page 56: iNTRODUCTION TO IPv6 SECURITY - MENOG

• How much will it cost?

• How long will the testing take?

Router: 4-5 weeks

Difficulties

Router: 4-5 weeks

Layer 3/Optical Switch: 3-4 weeks

Server: 2-3 weeks

Host/Workstation: 2-3 weeks

Security Device: 3-4 weeks

Network Appliance: 2-5 weeks

56

Page 57: iNTRODUCTION TO IPv6 SECURITY - MENOG

• What if my device fails testing?

Retesting or conformance regression testing

is an easy option.

• Will there be an IPv6 Information Assurance

Difficulties

• Will there be an IPv6 Information Assurance

(IA) Testing Certification?

• Does my software need to be production or

modified ?

• How long will the training staff take?

57

Page 58: iNTRODUCTION TO IPv6 SECURITY - MENOG

Conclusion

58Harith Dawood

Page 59: iNTRODUCTION TO IPv6 SECURITY - MENOG

ConclusionDefiantly, before deploying IPv6 you should be aware of

the following aspects of security for IPv6 traffic:

■ Protection host from scanning and attacking.

■ Protection of IPv6 packets.■ Protection of IPv6 packets.

■ Protecting & Controlling of what traffic is exchanged

with the Internet.

■ Authorization for automatically assigned addresses

and configurations.

■ Prevention systems (firewalls and intrusion detection).

59Harith Dawood

Page 60: iNTRODUCTION TO IPv6 SECURITY - MENOG

Conclusion• IPsec is not the answer to every IPv6 security

issues.

• IPv6 is not a panacea for IP-layer/network-layer security concerns. A new protocol brings new security issues & challenges with it. security issues & challenges with it.

( Solve one problem, create another)

• Mobile IPv6 brings also many security challenges with it .

• The lack of IPv6 training for network and security staff is probably the biggest threat.

60Harith Dawood

Page 61: iNTRODUCTION TO IPv6 SECURITY - MENOG

ACKNOWLEDGMENTS

• At first I must thank my lovely wife and

my family, for their support.

• I would also like to thank (my teacher)

Mr. Alaa Al-Din Al-Radhi for providing me

such good guidance.

61Harith Dawood

Page 62: iNTRODUCTION TO IPv6 SECURITY - MENOG

REFERENCES[1] Al-Radhi, A, A. 2011. IPv6 Promised Role in Mitigating[1] Al-Radhi, A, A. 2011. IPv6 Promised Role in Mitigating

Cyber Attacks: Really it’s Time!. Swiss Cyber Storm-

International I.T. Security Conference, Switzerland.

[2] Khaldoun, B. Khaled, B. Amer, A. 2011. THE NEED FOR

IPv6. International Journal of Academic Research, Vol. 3.No.3. May 2011, II Part. PP.431-448, Azerbaijan.IPv6. International Journal of Academic Research, Vol. 3.No.3. May 2011, II Part. PP.431-448, Azerbaijan.

http://www.ijar.lit.az

[3] Minoli, D. Kouns, J. 2009. Security in an IPv6 Environment.

CRC Press, USA.

[4] Davies, J. 2008. Understanding IPv6. Microsoft Press, USA.

2nd edition.

62Harith Dawood

Page 63: iNTRODUCTION TO IPv6 SECURITY - MENOG

REFERENCES[5] Hogg, S. Vyncke, E. 2009. IPv6 Security, Cisco Press, USA.[5] Hogg, S. Vyncke, E. 2009. IPv6 Security, Cisco Press, USA.

[6] White Paper, (Published: September 2003 & Updated: January 2008). Microsoft Windows Server 2008, Introduction to IP Version 6, Microsoft Corporation, USA.

[7] White paper 2004. IPv6 and IPv4 Threat Comparison and

Best Practice Evaluation(v1.0) , Cisco Press, USA.Best Practice Evaluation(v1.0) , Cisco Press, USA.

[8] Szigeti, S.; Risztics, P. 2004. Will IPv6 bring better security?.

Proceedings 30th Euromicro Conference, vol., 532- 537, 31

Aug.-3 Sept.

[9] Sotillo, S. 2006. IPv6 Security Issues. East Carolina University, USA.

63Harith Dawood

Page 64: iNTRODUCTION TO IPv6 SECURITY - MENOG

REFERENCES[10] Choudhary, A. R. Sekelsky, A. 2010. Securing IPv6 Network[10] Choudhary, A. R. Sekelsky, A. 2010. Securing IPv6 Network

Infrastructure: a New Security Model. IEEE Conference,USA.

[11] Blanchet, M. 2006. Migrating to IPv6. John Wiley & SonsLtd, England.

[12] Hagen, S. 2006. IPv6 Essentials, O'Reilly Media, USA, 2nd[12] Hagen, S. 2006. IPv6 Essentials, O'Reilly Media, USA, 2nd

edition.

[13] Popoviciu, C. Abegnoli, E. L. Grossetete, P. 2006.Deploying IPv6 Networks. Cisco Press, USA.

[14] Karlsson, B. 2003. Cisco Self-Study: Implementing IPv6Networks (IPV6). Cisco Press, USA.

64Harith Dawood

Page 65: iNTRODUCTION TO IPv6 SECURITY - MENOG

REFERENCES[15] Li, Q. Jinmei, T. Shima, K. 2009. Mobile IPv6: Protocols and[15] Li, Q. Jinmei, T. Shima, K. 2009. Mobile IPv6: Protocols and

Implementation, Elsevier Inc. USA.

[16] Hauser, V. 2008, Attacking the IPv6 Protocol Suite, TheHacker‘s Choice, http://www.thc.org/thc-ipv6.

[17] Cisco IOS Learning Services. 2002. The ABCs of IP Version6, Cisco Press, www.cisco.com/go/abc.6, Cisco Press, www.cisco.com/go/abc.

[18] White Paper, October 2011, IPv6 Security Brief, CiscoPress, USA.

[19] Yoo, H. S. Cagalaban, G. A. Kim, S. H. 2009, A Study on the

Connectivity of IPv6 to IPv4 Domains and Its Security Issues,International Journal of Advanced Science and Technology,Vol. 10, Korea.

65Harith Dawood

Page 66: iNTRODUCTION TO IPv6 SECURITY - MENOG

REFERENCES[20] Kaeo. Merike. Green D. Bound, J. and Pouffary, Y. July 2006. IPv6 [20] Kaeo. Merike. Green D. Bound, J. and Pouffary, Y. July 2006. IPv6

Security Technology Paper. North American IPv6 Task Force (NAv6TF) Technology Report,

http://www.nav6tf.org/documents/nav6tf.security_report.pdf

[21] Warfield, M. H. 2003. Security Implications of IPv6 Whitepaper. Internet Security Systems, http://documents.iss.net/whitepapers/IPv6.pdf.http://documents.iss.net/whitepapers/IPv6.pdf.

[22] Santos, O. 2008. End-To-End Network Security: Defense-In-Depth. Cisco Press, USA.

[23] Hardjono, T. and Dondeti, L. R. 2003. Multicast and Group Security. Artech House computer security series. USA.

[24] White Paper. May, 2011. IPv6 Security v1.1. The Government of the Hong Kong Special Administrative Region.

[25] Ferguson, N. and Schneier, B. 2002. A Cryptographic Evaluation of IPsec, Counterpane Labs, http://www.counterpane.com/ipsec.html

66Harith Dawood

Page 67: iNTRODUCTION TO IPv6 SECURITY - MENOG

Web siteshttp://en.wikipedia.org/wiki/IPV6• http://en.wikipedia.org/wiki/IPV6

• www.6deploy.org

• www.6diss.org• www.6diss.org

• www.cisco.com/ipv6• http://www.ipv6tf.org

• http://www.cisco.com/ipv6

• http://www.microsoft.com/ipv6

67Harith Dawood

Page 68: iNTRODUCTION TO IPv6 SECURITY - MENOG

North American IPv6 Task Force (NAv6TF) • North American IPv6 Task Force (NAv6TF) Technology Report, “IPv6 Security Technology Paper”, by Merike Kaeo, David Green, Jim Bound, Yanick Pouffary

Web sites

http://www.nav6tf.org/documents/nav6tf.security_report.pdf

• NSA SNAC Guide for IPv6

http://www.nsa.gov/snac/downloads_cisco.cfm?MenuID=scg10.3.1

68Harith Dawood

Page 69: iNTRODUCTION TO IPv6 SECURITY - MENOG

• IPv6 Security• Scott Hogg &

Eric Vyncke

IPv6 Books

Eric Vyncke

• Cisco Press,

• Copyright © 2009,

• ISBN-13: 978-1-58705-594-2.

• ISBN-10: 1-58705-594-5

69Harith Dawood

Page 70: iNTRODUCTION TO IPv6 SECURITY - MENOG

• Security in an IPv6

Environment.

• Daniel Minoli & Jake

Kouns,

IPv6 Books

Kouns,

• CRC press,

• ISBN 978-1-4200-9229-5

70Harith Dawood

Page 71: iNTRODUCTION TO IPv6 SECURITY - MENOG

• Understanding

IPv6

• 2nd edition,

IPv6 Books

• 2 edition,

• Joseph Davies,

• Microsoft Press,

• Copyright © 2008,

• ISBN: 0735624461

71Harith Dawood

Page 72: iNTRODUCTION TO IPv6 SECURITY - MENOG

• IPv6 Essentials,

• 2nd Edition,

• Silvia Hagen,

• O’reilly Press,

IPv6 Books

• O’reilly Press,

• May, 2006,

• ISBN: 0596100582.

72Harith Dawood

Page 73: iNTRODUCTION TO IPv6 SECURITY - MENOG

IPv6 Books

• Running IPv6, • IIjitsck Van Beijnum,

• Apress• Apress

• ISBN: 1590595270.

73Harith Dawood

Page 74: iNTRODUCTION TO IPv6 SECURITY - MENOG

• Deploying IPv6 in

Broadband Access

Networks.

• Adeel Ahmed &

IPv6 Books

74

• Adeel Ahmed &

Salman Asadullah

• Wiley Press, USA.

Harith Dawood

Page 75: iNTRODUCTION TO IPv6 SECURITY - MENOG

• Deploying IPv6

Networks,

• Ciprian Popoviciu,

• Cisco Press

IPv6 Books

• Cisco Press

• ISBN: 1587052105.

75Harith Dawood

Page 76: iNTRODUCTION TO IPv6 SECURITY - MENOG

• An IPv6

Deployment Guide

• Editor: Martin Dunmore

IPv6 Books

• Editor: Martin Dunmore

• The 6NET Consortium,

Sep. 2005,

76Harith Dawood

Page 77: iNTRODUCTION TO IPv6 SECURITY - MENOG

• IPv6 Network

Programming.• Jun-ichiro itojun Hagino,

IPv6 Books

• Jun-ichiro itojun Hagino,

• Elsevier Digital Press,

• Copyright © 2004,

• ISBN: 1-55558-318-0

77Harith Dawood

Page 78: iNTRODUCTION TO IPv6 SECURITY - MENOG

• Cisco Self-Study:

Implementing Cisco

IPv6 Books

Implementing Cisco

IPv6 Networks

(IPv6).

. Cisco Press.

78Harith Dawood

Page 79: iNTRODUCTION TO IPv6 SECURITY - MENOG

• Mobile IPv6:

Protocols and

Implementation.

IPv6 Books

Implementation.

• Elsevier Inc.

• Copyright © 2009,

• ISBN 13: 978-0-12-

375075-4

79Harith Dawood

Page 80: iNTRODUCTION TO IPv6 SECURITY - MENOG

Harith Dawood 80

Page 81: iNTRODUCTION TO IPv6 SECURITY - MENOG

Any Questions ?

Have a Nice

Day …Day …

81Harith Dawood