IPv6-Session-Market and Technology
IPv6-Session-Market and Technology
IPv6-Session-Market and Technology
Ciprian Popoviciu
Technical Leader
Cisco Systems – NSITE
but
ICMPv6, “ARP”,
ICMP ICMP
SLAAC, PMTU
Serverless,
Autoconfiguration DHCP
Reconfiguration,
DHCP-PD, DHCP
IPv6 has improved Quality-of- Not true, the flow label could provide
Service added capabilities but it is not used
IPv6 Multicast services are True, primarily due to large address space
easier to deploy and scopping
IPv6 is more Secure than Not true, the claim is based on IPsec
IPv4 requirement
1996
IPv6 Prototype 2002
IPv6 in HW
1998
IPv6 code available May 2003
12.3 Mainline
June 2000
Announced the 3 phase IPv6 Roadmap 2001-2005
Leader of 6NET Today
May 2001 Phase I Complete
DOCSIS3.0
IPv6 across the widest breath of platforms in industry
efforts. 1
0.75
PPP / DHCP (temporal address sharing) 0.5
0.25
CIDR (classless inter-domain routing) 0
Home A Home B
Internet
N N
Private A Public
Global A Private
IPv4 T IPv4
IPv6 T IPv4
http://www.cisco.com/en/US/products/ps6553/products_w
hite_paper0900aecd8032b2ad.shtml
145.95.0.0 v4 v6 2001:0421::
6PE P P 6PE
Dual Stack IPv4-IPv6 routers Dual Stack IPv4-IPv6 routers
2001:0621:: v6
CE P P
6PE IPv4 6PE
192.76.10.0 v4 MPLS v4 192.254.10.0
CE CE
6PE-1
LDPv4 binds label
to 192.254.10.17 192.254.10.17
6PE-2
P1 P2
• Translation of v6 BGP
Next_Hop into v4 address
• Recursion of this address
via IGPv4
6PE-2
LDP/IGPv4 MP-BGP label IPv6 packet
label1 to 6PE-2 to 2001:421:: to 2001:421::
192.254.10.17
P1 P2
IPv6 network
PE1 PE2 IPv6 network
2001:100:1000::/48 CE2 2001:100:1100::/48
200.10.10.1 200.11.11.1
CE1
MP-iBGP peering
IPv6+label
VPN B V6 only
P P
MPLS
Backbone
VPN A V4 and v6 VPN
P P
V6 only VPN B
VPN B V6 only
MPLS
CE
IF1 PE
Site-B
IF2
IF3
CE
IF4
Site-C
CE
Site-D
tables RIBv6, FIBv6
I/F list IF3, IF4
Policies Route-map
Protocols IPv6
Route-targets
vrf yellow
Dual-stack network
P1 P2
Site-1 Dual-stack network
CE1 CE2
2001:101::/64 PE1 PE2 Site-2
10.101/16 VRF red
Note: the recent IPv4 route growth is accelerated, observed 25K – 50K/year growth rate.
VPNv6 route consumes more memory than VPNv4 route
Prefix limit should be used as in VPNv4 to encourage aggregation
Large VPN customers can have thousands of sites
10K sites will result in 20K + VPN routes
PE shared with Internet and VPN suppose are facing more pressure from the Internet
as well as VPN route growth
More scalable control plane implementation and well planed deployment are needed
Addressing
Deployment Options
Planning
Challenges:
IANA Multihoming and renumbering
concerns could slow adoption
in large enterprises:
Registries
- Lack of simple multihoming
mechanisms
- Lack of agreed upon
ISP
multihoming strategy (SHIM6
rejected by NANOG)
Enterprise Large enterprises like to own
their address space
IANA
Provider Provider
Registries
Dependent Independent
ISP Org
Level Four
Enterprise
2000::/3
IANA
/32 (35)
ISP Org
Recommend Enterprise
Level Four
/48
http://www.icann.org/announcements/announcement-12oct06.htm
© 2009 Cisco Systems, Inc. All rights reserved. 40
Provider Independent Policy (ARIN)
IANA 2000::/3
Level Four
Enterprise
http://www.arin.net/policy/archive/2005_1_orig.html
http://www.afrinic.net/docs/policies/afpol-v6200701.htm
© 2009 Cisco Systems, Inc. All rights reserved. 41
Allocation Recommendations
Pro Con
draft-baker-v6ops-b2b-private-routing
© 2009 Cisco Systems, Inc. All rights reserved. 43
Deployment
Considerations
- Deployment Options -
Cisco
Environment Scenario IOS
support
Few customers, no native IPv6
service form the PoP or Data link is
Access Tunnels Yes
not (yet) native IPv6 capable, ie:
Cable Docsis
Native IPv4-IPv6 services between
Dual Stack Yes
aggregation and end-users
Dedicated circuits – IPv4 – IPv6 Dual Stack Yes
The IPv6 and IPv4 IGPs will most likely use separate
resources (use of ISIS-ST, the only option available
today for using a single IGP, is too restrictive)
There are differences between the IPv4 and IPv6 IGPs that
could lead to new design perspectives
The IPv6 IGP implementations might not be fully optimized
Not all knobs for Fast Convergence might be available
Lack of large scale operational experience with IPv6
0.5 0.7
0.45
0.6
0.4
0.35 0.5 IPv4 OSPF
IPv4 OSPF
0.3 0.4
Tim e
Tim e
0.25
IPv4 OSPF 0.3 IPv4 OSPF
0.2
IPv6 OSPF IPv6 OSPF
0.15 0.2
0.1
0.1
0.05
0 0
0 500 1000 1500 2000 2500 3000 0 500 1000 1500 2000 2500 3000
Number of Perfixes Number of Perfixes
Internet
Encrypted
Private 1 Private 2
The proposed end-to-end (E2E) IPsec model required by
RFC2460 is not practical for several reasons:
Inconsistent stack implementations
It is not feasible to implement IPsec support on all devices (phones, simple
sensors, etc)
Large Scale key distribution infrastructure needed
Network Administrators are not willing to drop the ability to “see” what is carried
in a packet entering or exiting their network
Internet
Encrypted
Private 1 Private 2
Hybrid
Internet
Private 1 Private 2
Perimeter
A perimeter-E2E hybrid might become an acceptable compromise
but for now, the IPv6 Security Architecture is similar to IPv4’s =
perimeter!
© 2009 Cisco Systems, Inc. All rights reserved. 57
IPv6 Security Considerations
Multihoming
Conformance
IPv4-IPv6 Parity
Security
Scalability
Simplicity ISP-A ISP-B
–Operations and Management
–Cooperation between Transit Site exit router A Site exit router B
Multi-homed host
Internet
connectivity
ISP-A ISP-B
Topology hiding NAT transforms subnet bits Untraceable addresses using IGP host
in the address routes /or MIPv6 tunnels for stationary
Renumbering and Multi- Address translation at Preferred lifetime per prefix & Multiple
homing border addresses per interface
© 2009 Cisco Systems, Inc. All rights reserved. 74
Adoption Challenges Conclusion
2001:0410::70
2001 Interface ID
Temporary addresses for IPv6 host client application,
e.g. web browser
Inhibit device/user tracking but many organizations want
to do the tracking
Random 64 bit interface ID, run DAD before using it
Rate of change based on local policy
Significant changes
More relied upon
ICMP Message Type ICMPv4 ICMPv6
Connectivity Checks X X
Informational/Error Messaging X X
Fragmentation Needed Notification X X
Address Assignment X
Address Resolution X
Multicast Group Management X
Mobile IPv6 Support X
Internet
ICMPv4 ICMPv4
Action Src Dst Name
Type Code
Permit Any A 0 0 Echo Reply
Dst. Unreachable—
Permit Any A 3 0
Net Unreachable
Dst. Unreachable—
Permit Any A 3 4
Frag. Needed
Time Exceeded—
Permit Any A 11 0
TTL Exceeded
Internet
ICMPv6 ICMPv6
Action Src Dst Name
Type Code
Permit Any A 128 0 Echo Reply
Time Exceeded—
Permit Any A 3 0
TTL Exceeded
Internet
ICMPv6 ICMPv6
Action Src Dst Name
Type Code
Permit Any A 4 0 Parameter Problem
Neighbor Solicitation
Permit Any B 133/134 0
and Advertisement
*RFC 4890
© 2009 Cisco Systems, Inc. All rights reserved. 97
IPv6 Header Manipulation
Unlimited size of header chain (spec wise) can make filtering
difficult
DoS a possibility with poor IPv6 stack implementations
More boundary conditions to exploit
Can I overrun buffers with a lot of extension headers?
Fragment Header
Next Header Reserved Fragment Offset
Identification
Fragment Data
Next Header = 43
IPv6 Basic Header
Routing Header
Routing Header
Routing Header
Next Header Ext Hdr Length Routing Type Segments Left
Host1 src=host1,dst=web,
payload proto=tcp, dport=80
rtheader=host2, segments
left=1 src=host1,
dst=host2
rtheader=web,
segments left=0
payload proto=tcp,
IPv6 dport=80
Network Host2
Firewall
1.2.3.0/24
.1
1. RS 2. RA 2. RA
1. RS: 2. RA:
ICMP Type = 133 ICMP Type = 134
Src = :: Src = Router Link-local Address
Dst = All-Routers multicast Address Dst = All-nodes multicast address
query= please send RA Data= options, prefix, lifetime, autoconfig
flag
Security Mechanisms
A B Built into Discovery
Protocol = None
Another Bootstrap
Security Problem
ICMP type = 135
Src = A
Dst = Solicited-node multicast of B
Data = link-layer address of A
Query = what is your link address?
A B
From RFC 2462:
« If a Duplicate @ Is
Discovered… the
ICMP type = 135 Address Cannot Be
Src = 0 (::) Assigned to the
Dst = Solicited-node multicast of A Interface»
Data = link-layer address of A Ù What If: Use MAC@
Query = what is your link address? of the Node You Want
to DoS and Fabricate
Its IPv6 @
Src = A
R1 Dst IP = 2001:DB8:C18:2::1
Dst Ethernet = R2 (default router)
Redirect:
Src = R2
Dst = A
2001:DB8:C18:2::/64 Data = good router = R1
Redirect attacks
A malicious node redirects packets away from a legitimate
receiver to another node on the link
Denial-of-service attacks
A malicious node prevents communication between the node
under attack and other nodes
Certification paths
Anchored on trusted parties, expected to certify the authority of
the routers on some prefixes
Available: Linux
Coming in Microsoft Vista SP1
Future implementation: Cisco IOS
Belgian
ICMP REQ D=160.154.5.255 S= 172.18.1.2 Schtroumpf
Dual stack
Consider security for both protocols
Cross v4/v6 abuse
Resiliency (shared resources)
Tunnels
Bypass firewalls (protocol 41)
Public IPv4
Internet
IPv6 Network IPv6 Network
IPv6 in IPv4
tunnel
Server A Server B
© 2009 Cisco Systems, Inc. All rights reserved. 134
IP Mobility
2001:db8:c18::1
Correspondent Node
Home Agent
Mobile Node
Optimized Routing
Not Possible in IPv4
Mobile Node
2001:2:a010::5
Mobility Means:
Mobile devices are fully supported while moving
Built-in on IPv6
Any node can use it
Optimized routing means performance for end-users
Filtering challenges
© 2009 Cisco Systems, Inc. All rights reserved. 135
Mobile IPv6 Security Features Overview
interface Ethernet0
ipv6 traffic-filter BLOCK out Ethernet0
line vty 0 4
ipv6 access-class VTY in
policy-map CoPP
class ipv6
police rate 100 pps
conform-action transmit
exceed-action drop
control-plane
service-policy input CoPP
uRPF
v6 Frag guard
IPv6 header security checks
Management access via IPv6
Telnet, SSH, HTTPS
Attack P or PE routers.
Attack CE routers.
Target
Target the
the SP’s
SP’s PE
PE or
or P
P router.
router.
PEER Network
Need
Need IP
IP address
address to
to target.
target.
6PE-3
Border Router
6PE-1
6PE-2
CE4
CE2
Infrastructure IPv6
PE-CE Aggregate to Do no advertise
CE1 MPLS Backbone
IPv6 PE-CE to IGP CE3
Null 0
6PE-1
6PE-2
CE4
CE2
Do no advertise
IPv6 Loopbacks
© 2009 Cisco Systems, Inc. All rights reserved. 157
Attack Vector – Target SP’s Router
Failsafe:
Failsafe: rACL/CoPP
rACL/CoPP –– Point
Point
protection
protection on
on the
the router
router in
in case
case the
the
primary
primary defenses
defenses fail.
fail.
PEER Network
6PE-3
Border Router
IPv6 rACL or CoPP
Point Protection
CE1 MPLS Backbone CE3
6PE-1
6PE-2
CE4
CE2
Target
Target the
the Customer’s
Customer’s CE
CE Router.
Router.
PEER Network
Need
Need IP
IP address
address to
to target.
target.
6PE-3
Border Router
6PE-1
6PE-2
CE4
CE2
6PE-1
6PE-2
CE4
CE2 Link Drops – Interface
Drops, Customer’s IPv6
Block loses access path
Link Back Up
© 2009 Cisco Systems, Inc. All rights reserved. 160
Attack Vector – Target CE Routers (Local Flap)
Target
Target the
the Customer’s
Customer’s Network
Network
Saturated
Saturated Link
Link Drops
Drops connection.
connection.
PEER Network
DOS
DOS Flaps
Flaps between
between Customer
Customer and
and
Aggregate.
Aggregate.
6PE-3
Border Router Attack Goes to
Aggregate
6PE-1
6PE-2
CE4
CE2 Link Drops – Interface
Drops, Customer’s IPv6
Block loses access path
Link Back Up
© 2009 Cisco Systems, Inc. All rights reserved. 161
6PE/6VPE Security Considerations
Revealing the addresses of the IPv4 infrastructure
through IPv6 traceroutes:
CE#traceroute 2001:6FC::1
Type escape sequence to abort.
Tracing the route to 2001:6FC::1
1 ::FFFF:172.20.25.1 [MPLS: Labels 38/73 Exp 0] 40 msec 32 msec 32 msec
2 ::FFFF:172.20.10.1 [MPLS: Labels 30/73 Exp 0] 60 msec 32 msec 32 msec
3 2001:6FC::1 [MPLS: Label 73 Exp 0] 32 msec 32 msec 16 msec