IPv6Samurais.com: OpenBSD-current IPv6 audit

$Id: index.html,v 1.3 2007/09/06 14:32:14 itojun Exp $

Project overview

Audit OpenBSD-current source code as of August 2, 2007, based on "IPv6 Transition/Co-existence Security Considerations" ( draft-ietf-v6ops-security-overview-06.txt).

The result will be fed back into KAME tree, and then all the BSD communities/ commercial users.

Terminology

The issues and results

The list is taken from the table of contents of the draft.
2. Issues Due to IPv6 Protocol . . . . . . . . . . . . . . . . . 4
2.1. IPv6 Protocol-specific Issues . . . . . . . . . . . . . . 5
2.1.1. Routing Headers and Hosts . . . . . . . . . . . . . . 5
2.1.2. Routing Headers for Mobile IPv6 and Other Purposes . . 6
2.1.3. Site-scope Multicast Addresses . . . . . . . . . . . . 7
2.1.4. ICMPv6 and Multicast . . . . . . . . . . . . . . . . . 7
2.1.5. Bogus Errored Packets in ICMPv6 Error Messages . . . . 8
2.1.6. Anycast Traffic Identification and Security . . . . . 9
2.1.7. Address Privacy Extensions Interact with DDoS Defenses . . . . . . . . . . . . . . . . . . . . . . . 10
2.1.8. Dynamic DNS: Stateless Address Auto-Configuration, Privacy Extensions and SEND . . . . . . . . . . . . . 10
2.1.9. Extension Headers . . . . . . . . . . . . . . . . . . 11
2.1.9.1. Processing Extension Headers in Middleboxes . . . . 11
2.1.9.2. Processing Extension Header Chains . . . . . . . . . 12
2.1.9.3. Unknown Headers/Destination Options and Security Policy 12
2.1.9.4. Excessive Hop-by-Hop Options . . . . . . . . . . . . 13
2.1.9.5. Misuse of Pad1 and PadN Options . . . . . . . . . . 13
2.1.9.6. Overuse of Router Alert Option . . . . . . . . . . . 14
2.1.10. Fragmentation: Reassembly and Deep Packet Inspection . . . . . . . . . . . . . . . . . . . . . . 14
2.1.11. Fragmentation Related DoS Attacks . . . . . . . . . . 15
2.1.12. Link-Local Addresses and Securing Neighbor Discovery . . . . . . . . . . . . . . . . . . . . . . 15
2.1.13. Securing Router Advertisements . . . . . . . . . . . . 17
2.1.14. Host to Router Load Sharing . . . . . . . . . . . . . 18
2.1.15. Mobile IPv6 . . . . . . . . . . . . . . . . . . . . . 18
2.1.15.1. Obsolete Home Address Option in Mobile IPv6 . . . . 18
2.2. IPv4-mapped IPv6 Addresses . . . . . . . . . . . . . . . . 18
2.3. Increased End-to-End Transparency . . . . . . . . . . . . 20
2.3.1. IPv6 Networks without NATs . . . . . . . . . . . . . . 20
2.3.2. Enterprise Network Security Model for IPv6 . . . . . . 20
2.4. IPv6 in IPv6 Tunnels . . . . . . . . . . . . . . . . . . . 22
3. Issues Due to Transition Mechanisms . . . . . . . . . . . . . 22
3.1. IPv6 Transition/Co-existence Mechanism-specific Issues . . 22
3.2. Automatic Tunneling and Relays . . . . . . . . . . . . . . 23
3.3. Tunneling IPv6 Through IPv4 Networks May Break IPv4 Network Security Assumptions . . . . . . . . . . . . . . . 24
4. Issues Due to IPv6 Deployment . . . . . . . . . . . . . . . . 25
4.1. Avoiding the Trap of Insecure IPv6 Service Piloting . . . 25
4.2. DNS Server Problems . . . . . . . . . . . . . . . . . . . 27
4.3. Addressing Schemes and Securing Routers . . . . . . . . . 27
4.4. Consequences of Multiple Addresses in IPv6 . . . . . . . . 27
4.5. Deploying ICMPv6 . . . . . . . . . . . . . . . . . . . . . 28
4.5.1. Problems Resulting from ICMPv6 Transparency . . . . . 29
4.6. IPsec Transport Mode . . . . . . . . . . . . . . . . . . . 29
4.7. Reduced Functionality Devices . . . . . . . . . . . . . . 30
4.8. Operational Factors when Enabling IPv6 in the Network . . 30
4.9. Security Issues Due to Neighbor Discovery Proxies . . . . 31
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 31
6. Security Considerations . . . . . . . . . . . . . . . . . . . 31
7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 31
8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 32
8.1. Normative References . . . . . . . . . . . . . . . . . . . 32
8.2. Informative References . . . . . . . . . . . . . . . . . . 33
Appendix A. IPv6 Probing/Mapping Considerations . . . . . . . . . 36
Appendix B. IPv6 Privacy Considerations . . . . . . . . . . . . . 37
B.1. Exposing MAC Addresses . . . . . . . . . . . . . . . . . . 37
B.2. Exposing Multiple Devices . . . . . . . . . . . . . . . . 38
B.3. Exposing the Site by a Stable Prefix . . . . . . . . . . . 38

Contact

email: info AT ipv6samurais.com

We would love to see someone to fund this project.