SlideShare une entreprise Scribd logo
1  sur  19
IPv6 Enterprise Security:
The NAT Returns
Sanjeev Gupta
Vice-Chairman
IPv6 Forum (Singapore)
sanjeev@dcs1.biz
IPv6 Review
 It will happen
 In our careers
 In our ISPs
 In our enterprises
 On our consumer devices
 In things we cannot think of yet.
IPv6 Review
 It is happening
 ISPs are turning it on, to offload traffic
from IPv4
 Alternative is to run CGN or NAT 444,
both of which are expensive, and short-
term
 31% of Verizon Mobile traffic is over
IPv6, with users not realizing (Apr 2013)
 Your “enterprise” OS have it turned on!
IPv6 Review
 Recent news
 Starhub has turned on 6to4 on MaxOnline, so
your home router has IPv6
 And without your knowledge, therefore, so may
your home PC
 So what is IPv6, and how does it differ
from IPv4?
IPv6 vis-à-vis IPv4
 Some things remain the same
 The concepts of Routing, Networks, and the 7-
layer OSI Stack. Firewalls, TCP, UDP, all remain
the same.
 Enough things change
 The definitions of default routers
 Address assignments
 Neighbour Discovery
 And the entire language changes …
IPv6 vis-à-vis IPv4
 Examples of minor changes
 Cisco: show ip becomes show ipv6
 Examples of major changes
 Multicast
 Need to understand Scopes
 Multiple ways to write the same IPv6 address
 2405:FC00:0000:0000:0000:0876:0001:0053
 2405:FC00:0:0:0:876:1:53
 2405:FC00::876:1:53
 IPv6 devices will autoconfigure
magically!
IPv6 Security Implications
 Autoconfiguration
 As devices set themselves up, they will
start talking to each other, even when
you may not want them too.
 Routers get discovered, and used.
 Multiple Routers on a link are not only
possible, they are likely
 Network discovery is easier, which may
be good or bad.
IPv6 Security Implications
 Rouge Routers
 Similar to the problem of rouge DHCP
servers in IPv4
 A rouge router can override your real
router
 Reasonably easy to setup MITM with
SLAAC
 DAD conflicts
 A rouge host can use DAD to block any
other host from assigning an IP address.
IPv6 Security Implications
 Global Routability
 Since we have as many IPv6 addresses
as we need, we would like (and are
encouraged) to use Globally Routable
Unicast Addresses
 Hence, we say goodbye to the RFC1918
addresses
 But this opens up a massive hole on our
edge!
IPv6 and NAT
 NAT is generally a bad thing
 Everyone says this, from the IETF to me!
 NAT breaks many things, and makes
some protocols harder to run or debug
 SIP: STUN, ICE
 VNC: Teamviewer, etc
 Even FTP and multi-player games
 But NAT is good for one thing: a “default
deny incoming” policy.
IPv6 and NAT
 Default Deny: we allow all outgoing (and
related), we deny all incoming
 Why do we need this? Because host
firewalls are mis-configured, non-auditable,
or non-existant
 Currently, anyone with a server/listener on
their host, cannot have packets routed in
from the Internet: RFC1918 is non-routable
 Most SME IT managers cannot manage a
stateful FW, the number of rules would be
impossible to track part-time.
IPv6 and NAT
 One solution (the simple and correct
one) is to use host-based firewalls
 This works for your Server, PC, Laptop
 Does your Network Printer have a firewall?
 Does your Attendance Fingerprint Scanner?
 Alternative is to implement rules on
your edge firewall
 With SLAAC, do you know what the
printer’s current IPv6 address(es)
 Do you know your CFO’s?
IPv6 and NAT
 Alternative 1:
 Turn off SLAAC, either use manual addressing(!)
or DHCPv6
 Maintain rule tables in firewall, and spend all day
opening and closing ports (there are lots of
them)
 BTW: make sure no one has admin control over
his laptop, he might change his IP address.
IPv6 and NAT
 Alternative 2:
 Use Unique Local Addresses (ULA)
 Pick a 48-bit number randomly
(1111:2222:3333)
 Concatanate to fd00::/8, to get a 64-bit
prefix (fd00:1111:2222:3333::/64)
 SLAAC away!
 FD00 is reasonably unique, but non-
routable
 NAT away (as you have been doing)
between your Global IPv6 address
(singular) and the ULAs inside.
IPv6 and NAT
 Alternative 2 (cont):
 Do a 1-to-1 NAT
 NAT away (as you have been doing)
between your Global IPv6 address (singular
or subnet) and the ULAs inside
 Deny all incoming, except explicitly decided
 You can examine Ports, or not
 If your Global range changes, when you
change ISPs, you do not need to
reconfigure the LAN
 Security becomes managable, again.
IPv6 and NAT
 Disadvantages of #2 (ULA+NAT)
over #1
 You are still not Edge-to-Edge, which was a
major driver for IPv6
 You will be sneered at by your smarter colleagues
 BitTorrent will be slower
 People running servers need to come talk to you.
IPv6 and NAT
 Advantages of #2 (ULA+NAT) over
#1
 Your old model of NAT being Firewall works
 Default deny for incoming (Local addresses, even
if they leak out, will not be routed by your ISP)
 Your printer is cleanly visible inside your network,
yet not accesible from the outside
 You can use SLAAC!!!
 You do not need PI address space, you can use
your ISPs, avoid renumbering
 People running servers need to come talk to you.
IPv6 and NAT: The Sequel
 In an ideal world, we would do away
NAT 
 But in an ideal world, we would not
need Firewalls 
 It is very likely that NAT will remain,
but in newer guises
 Maybe NAT64? NAT46? NAT66?
 Just when you thought he was dead, he returned!
Freddy Krueger returns!

Contenu connexe

En vedette (6)

AIA101.4.Automating Access
AIA101.4.Automating AccessAIA101.4.Automating Access
AIA101.4.Automating Access
 
Chapter 6 report (MS Access)
Chapter 6 report (MS Access)Chapter 6 report (MS Access)
Chapter 6 report (MS Access)
 
Five Common SQL Errors
Five Common SQL ErrorsFive Common SQL Errors
Five Common SQL Errors
 
Presentazione G55 - Coworking/Fablab Partanna
Presentazione G55 - Coworking/Fablab PartannaPresentazione G55 - Coworking/Fablab Partanna
Presentazione G55 - Coworking/Fablab Partanna
 
Chuchura Aroggyo Final Round 2017
Chuchura Aroggyo Final Round  2017Chuchura Aroggyo Final Round  2017
Chuchura Aroggyo Final Round 2017
 
Sanghati Utsav Final Round 2016
Sanghati Utsav Final Round  2016Sanghati Utsav Final Round  2016
Sanghati Utsav Final Round 2016
 

Dernier

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

IPv6 Enterprise Security - The Nat Returns

  • 1. IPv6 Enterprise Security: The NAT Returns Sanjeev Gupta Vice-Chairman IPv6 Forum (Singapore) sanjeev@dcs1.biz
  • 2. IPv6 Review  It will happen  In our careers  In our ISPs  In our enterprises  On our consumer devices  In things we cannot think of yet.
  • 3. IPv6 Review  It is happening  ISPs are turning it on, to offload traffic from IPv4  Alternative is to run CGN or NAT 444, both of which are expensive, and short- term  31% of Verizon Mobile traffic is over IPv6, with users not realizing (Apr 2013)  Your “enterprise” OS have it turned on!
  • 4. IPv6 Review  Recent news  Starhub has turned on 6to4 on MaxOnline, so your home router has IPv6  And without your knowledge, therefore, so may your home PC  So what is IPv6, and how does it differ from IPv4?
  • 5. IPv6 vis-à-vis IPv4  Some things remain the same  The concepts of Routing, Networks, and the 7- layer OSI Stack. Firewalls, TCP, UDP, all remain the same.  Enough things change  The definitions of default routers  Address assignments  Neighbour Discovery  And the entire language changes …
  • 6. IPv6 vis-à-vis IPv4  Examples of minor changes  Cisco: show ip becomes show ipv6  Examples of major changes  Multicast  Need to understand Scopes  Multiple ways to write the same IPv6 address  2405:FC00:0000:0000:0000:0876:0001:0053  2405:FC00:0:0:0:876:1:53  2405:FC00::876:1:53  IPv6 devices will autoconfigure magically!
  • 7. IPv6 Security Implications  Autoconfiguration  As devices set themselves up, they will start talking to each other, even when you may not want them too.  Routers get discovered, and used.  Multiple Routers on a link are not only possible, they are likely  Network discovery is easier, which may be good or bad.
  • 8. IPv6 Security Implications  Rouge Routers  Similar to the problem of rouge DHCP servers in IPv4  A rouge router can override your real router  Reasonably easy to setup MITM with SLAAC  DAD conflicts  A rouge host can use DAD to block any other host from assigning an IP address.
  • 9. IPv6 Security Implications  Global Routability  Since we have as many IPv6 addresses as we need, we would like (and are encouraged) to use Globally Routable Unicast Addresses  Hence, we say goodbye to the RFC1918 addresses  But this opens up a massive hole on our edge!
  • 10. IPv6 and NAT  NAT is generally a bad thing  Everyone says this, from the IETF to me!  NAT breaks many things, and makes some protocols harder to run or debug  SIP: STUN, ICE  VNC: Teamviewer, etc  Even FTP and multi-player games  But NAT is good for one thing: a “default deny incoming” policy.
  • 11. IPv6 and NAT  Default Deny: we allow all outgoing (and related), we deny all incoming  Why do we need this? Because host firewalls are mis-configured, non-auditable, or non-existant  Currently, anyone with a server/listener on their host, cannot have packets routed in from the Internet: RFC1918 is non-routable  Most SME IT managers cannot manage a stateful FW, the number of rules would be impossible to track part-time.
  • 12. IPv6 and NAT  One solution (the simple and correct one) is to use host-based firewalls  This works for your Server, PC, Laptop  Does your Network Printer have a firewall?  Does your Attendance Fingerprint Scanner?  Alternative is to implement rules on your edge firewall  With SLAAC, do you know what the printer’s current IPv6 address(es)  Do you know your CFO’s?
  • 13. IPv6 and NAT  Alternative 1:  Turn off SLAAC, either use manual addressing(!) or DHCPv6  Maintain rule tables in firewall, and spend all day opening and closing ports (there are lots of them)  BTW: make sure no one has admin control over his laptop, he might change his IP address.
  • 14. IPv6 and NAT  Alternative 2:  Use Unique Local Addresses (ULA)  Pick a 48-bit number randomly (1111:2222:3333)  Concatanate to fd00::/8, to get a 64-bit prefix (fd00:1111:2222:3333::/64)  SLAAC away!  FD00 is reasonably unique, but non- routable  NAT away (as you have been doing) between your Global IPv6 address (singular) and the ULAs inside.
  • 15. IPv6 and NAT  Alternative 2 (cont):  Do a 1-to-1 NAT  NAT away (as you have been doing) between your Global IPv6 address (singular or subnet) and the ULAs inside  Deny all incoming, except explicitly decided  You can examine Ports, or not  If your Global range changes, when you change ISPs, you do not need to reconfigure the LAN  Security becomes managable, again.
  • 16. IPv6 and NAT  Disadvantages of #2 (ULA+NAT) over #1  You are still not Edge-to-Edge, which was a major driver for IPv6  You will be sneered at by your smarter colleagues  BitTorrent will be slower  People running servers need to come talk to you.
  • 17. IPv6 and NAT  Advantages of #2 (ULA+NAT) over #1  Your old model of NAT being Firewall works  Default deny for incoming (Local addresses, even if they leak out, will not be routed by your ISP)  Your printer is cleanly visible inside your network, yet not accesible from the outside  You can use SLAAC!!!  You do not need PI address space, you can use your ISPs, avoid renumbering  People running servers need to come talk to you.
  • 18. IPv6 and NAT: The Sequel  In an ideal world, we would do away NAT   But in an ideal world, we would not need Firewalls   It is very likely that NAT will remain, but in newer guises  Maybe NAT64? NAT46? NAT66?  Just when you thought he was dead, he returned!