IPv6 and security: news from the front – May
Published articles
A article Published on Insinuator, a fairly comprehensive list of equipment supporting the RA Guard feature is provided: RA-GUARD SUPPORT AS OF 02/05/2013.
Jon Christmas published an article on Solera Networks' From The Trenches blog entitled: Topera the sneaky IPv6 Port Scanner. He briefly presents the operation of the new version of Topera (see below).
Jozef Pivarník and Matěj Grégr, from Brno University of Technology, studied the possibilities of bypassing the "Ra Guard" mechanisms of Cisco and H3C switches. They wrote an article presenting the results of their study: Rogue Router Advertisement Attack.
Conferences
James Small gave a presentation at the North American IPv6 Summit conference: IPV6 ATTACKS AND COUNTERMEASURES. It presents various attacks that can be carried out using IPv6 and the Cisco countermeasures that can be used. The slides are clear and well-illustrated. The following topics are covered:
- VPN Bypass
- Router Advertisement Spoofing/Flooding
- DHCPv6 Spoofing
- Remote Scanning/DoS Attack
- Monitoring and Detection
- Preventing Tunneling and Firewalling
- Loss of NAT “Security”
Tools
A new version of Topera has been released: the 0.0.2. This version includes the following improvements:
- Slow HTTP attacks (Slowloris over IPv6)
- Improved TCP port scanner
A new version of the THC-IPv6 tool suite has been released: the 2.3. Two new tools (thcsyn6 and redirsniff6) and two new scripts (thc-ipv6-setup.sh and 6to4test.sh) are included. Several bug fixes and improvements have been made to existing tools.
Vulnerabilities
A vulnerability affecting Microchip's IP stack has been discovered (OSVDB 92903). A fragmented and specially crafted IPv6 packet would make it possible to create a denial of service and, potentially, to execute code.
