“Survey on Ipv4 and Ipv6 Using Dual Stack, Tunneling and Translation”
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Routing Loop Attacks Using Ipv6 Tunnels
Routing Loop Attacks using IPv6 Tunnels Gabi Nakibly Michael Arov National EW Research & Simulation Center Rafael – Advanced Defense Systems Haifa, Israel {gabin,marov}@rafael.co.il Abstract—IPv6 is the future network layer protocol for A tunnel in which the end points’ routing tables need the Internet. Since it is not compatible with its prede- to be explicitly configured is called a configured tunnel. cessor, some interoperability mechanisms were designed. Tunnels of this type do not scale well, since every end An important category of these mechanisms is automatic tunnels, which enable IPv6 communication over an IPv4 point must be reconfigured as peers join or leave the tun- network without prior configuration. This category includes nel. To alleviate this scalability problem, another type of ISATAP, 6to4 and Teredo. We present a novel class of tunnels was introduced – automatic tunnels. In automatic attacks that exploit vulnerabilities in these tunnels. These tunnels the egress entity’s IPv4 address is computationally attacks take advantage of inconsistencies between a tunnel’s derived from the destination IPv6 address. This feature overlay IPv6 routing state and the native IPv6 routing state. The attacks form routing loops which can be abused as a eliminates the need to keep an explicit routing table at vehicle for traffic amplification to facilitate DoS attacks. the tunnel’s end points. In particular, the end points do We exhibit five attacks of this class. One of the presented not have to be updated as peers join and leave the tunnel. attacks can DoS a Teredo server using a single packet. The In fact, the end points of an automatic tunnel do not exploited vulnerabilities are embedded in the design of the know which other end points are currently part of the tunnels; hence any implementation of these tunnels may be vulnerable. -
Allied Telesis Solutions Tested Solution:Ipv6 Transition Technologies
Allied Telesis Solutions IPv6 Transition Technologies Tested Solution: IPv6 Transition Technologies Moving a network from IPv4 addressing to IPv6 addressing cannot be performed in a single step. The transition necessarily proceeds in stages, with islands of IPv6 developing within the IPv4 network, and gradually growing until they cover the whole network. During this transition process, the islands of IPv6 need to be able to communicate with each other across the IPv4 network. Additionally, it is desirable to be able to transition some network functions across to IPv6 while the majority of the network is still using IPv4. Allied Telesis provides robust solutions for IPv4-to-IPv6 network transitioning, using IPv6 tunneling and dual IPv4/IPv6 network management. The Allied Telesis IPv6 transition technologies integrate seamlessly with the complementary facilities provided within Microsoft server and workstation operating systems. The Allied Telesis IPv6 transition solution will be presented here by a detailed description of an example IPv4/IPv6 hybrid network, consisting of Allied Telesis switches and servers and workstations running various versions of Microsoft Windows Network topology The example network used in this example consists of two sections of IPv4 network, and a section of pure IPv6 network. IPv4 133.27.65.34 v4 router 139.72.129.56/24 Vista 136.34.23.11/24 133.27.65.2 6to4 host/router x600 6to4 relay XP 2002:8B48:8139::10/64 136.34.23.10/24 139.72.129.57/24 2002:8B48:8139:1001::12/64 6to4 host/router IPv6 router Server 2008 2002:8b48:8139:1003::12/642002:8b48:8139:1002::12/64 ISATAP router 2002:8b48:8139:1003::10/64 192.168.2.254 192.168.2.54 IPv6 v4 router Server 2008 192.168.3.254 2002:8b48:8139:1002::10/64 192.168.3.11 IPv4 8000S ISATAP The workstations in the upper IPv4 network are able to communicate using both IPv4 and IPv6. -
Ipv6 Multicast Layer 3 Features
Chapter 13 IPv6 Multicast Support Prerequisites for IPv6 Multicast 13 IPv6 Multicast Support • Prerequisites for IPv6 Multicast, page 13-1 • Restrictions for IPv6 Multicast, page 13-1 • Information About IPv6 Multicast Support, page 13-2 • How to Configure IPv6 Multicast Support, page 13-4 • Verifying the IPv6 Multicast Layer 3 Configuration, page 13-4 Tip For additional information about Cisco Catalyst 6500 Series Switches (including configuration examples and troubleshooting information), see the documents listed on this page: http://www.cisco.com/en/US/products/hw/switches/ps708/tsd_products_support_series_home.html Participate in the Technical Documentation Ideas forum Prerequisites for IPv6 Multicast None. Restrictions for IPv6 Multicast • The PFC and DFCs provide hardware support for the following: – Completely switched IPv6 multicast flows – IPv6 PIM-Sparse Mode (PIM-SM) (S,G) and (*,G) forwarding – Multicast RPF check for IPv6 PIM-SM (S,G) traffic using the NetFlow table – Rate limiting of IPv6 PIM-SM (S,G) traffic that fails the multicast RPF check – Static IPv6 multicast routes – SSM Mapping for IPv6 (PIM-SSM) – IPv6 multicast forwarding information base (MFIB) using the NetFlow table – IPv6 distributed MFIB (dMFIB) using the NetFlow table – Link-local and link-global IPv6 multicast scopes – Egress multicast replication with the ipv6 mfib hardware-switching command – Ingress interface statistics for multicast routes (egress interface statistics not available) – RPR and RPR+ redundancy mode (see Chapter 9, “Route Processor Redundancy -
Guidelines for the Secure Deployment of Ipv6
Special Publication 800-119 Guidelines for the Secure Deployment of IPv6 Recommendations of the National Institute of Standards and Technology Sheila Frankel Richard Graveman John Pearce Mark Rooks NIST Special Publication 800-119 Guidelines for the Secure Deployment of IPv6 Recommendations of the National Institute of Standards and Technology Sheila Frankel Richard Graveman John Pearce Mark Rooks C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 December 2010 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Dr. Patrick D. Gallagher, Director GUIDELINES FOR THE SECURE DEPLOYMENT OF IPV6 Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-119 Natl. Inst. Stand. Technol. Spec. Publ. 800-119, 188 pages (Dec. 2010) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. -
S5800 Series Ipv6 Service CLI | FS.COM
FiberstoreOS IPv6 Service Command Line Reference Contents 1 Tunnel Commands...........................................................................................................................4 1.1 interface..............................................................................................................................................................4 1.2 tunnel mode ipv6ip............................................................................................................................................ 5 1.3 tunnel source...................................................................................................................................................... 6 1.4 tunnel destination...............................................................................................................................................7 1.5 tunnel ttl............................................................................................................................................................. 7 1.6 tunnel dscp......................................................................................................................................................... 8 1.7 ipv6 mtu............................................................................................................................................................. 9 1.8 show interface tunnel....................................................................................................................................... 10 1.9 show -
Security Vulnerabilities of Ipv6 Tunnels
Security Vulnerabilities of IPv6 Tunnels This article talks about novel security vulnerabilities of IPv6 tunnels – an important type of migration mechanisms from IPv4 to IPv6 implemented by all major operating systems and routers. The vulnerabilities allow an attacker to form routing loops which can easily produce DoS attacks. I will describe the principles of the attack and then show how to actually implement it. The vulnerabilities were first presented at Usenix W00T ’09 in a paper I co-authored with Michael Arov. IPv6 background IPv6 is the next generation version of the omnipresent Internet Protocol. It was designed to answer the future exhaustion of the IPv4 address pool. IPv4 address space is 32 bits which translates to just above 4 billion addresses. IPv6 address space is 128 bits. This roughly translates to the entire address space of the IPv4 for every square nanometer on planet earth (a square nanometer is about the size of a molecule!). The IPv6 specification has been released almost 13 years ago, however it has seen little adoption so far since the IPv4 address space hasn’t depleted yet. But this is about to change very soon. ISPs in Asia-Pacific are already unable to request new IPv4 addresses for their customers. In other regions of the world IPv4 address pools are expected to drain within a year or so. So IPv6 is definitely here to stay. Migration to IPv6 using tunnels As one might imagine the migration to IPv6 will be very gradual. Some estimate that IPv4 and IPv6 will co-exist on the Internet for decades. -
Ipv4 to Ipv6 Transition Mechanism in a Fixed Environment
الجمهورية اليمنية Republic of Yemen جامعة صنعاء Sanaꞌa University كلية الهندسة Faculty of Engineering قسم الهندسة الكهربائية Electrical Engineering Department IPv4 to IPv6 transition mechanism in a fixed environment: The case of Yemen Abdulsalam Alkholidi, Sanaꞌa University, Faculty of Engineering [email protected] MENOG16 Istanbul Turkey 1 23-24 March 2016 Agenda: Introduction IPv6 in Yemen: a short history Necessity of transition to IPv6 IPv6 Transition Mechanism (TM): Proposed scenarios - Scenario 1: Dual stack mechanism - Scenario 2: Tunneling mechanism - Scenario 3: Static NAT-PT Mechanism Simulation results and discussion - Delay - Throughput - Jitter and latency Challenges and obstacles Conclusions Introduction -1 IPv6 transition mechanisms have become an important issue for most Internet Service Providers (ISPs) to: - Expand IP address space - Increase Internet usage -> increasing demand for IP addresses - Introduce new services for customers - Use the Smart Home Platform. Action plan for the deployment of IPv6 in Yemen is slowly Transition mechanism in Yemen from IPv4 toward IPv6 needs more time to startup seriously Internet density in this country is considered as among the lowest in the Middle East Introduction 2 - Motivation Explore the present status of internet in Yemen Propose scientific solutions based on series of simulations results Describe step by step of proposed transition scenarios Concentrate on analyzing performance proposed scenarios Discuss and share the transition scenarios with MENOG 16 experts Benefit IPv6 as a bigger address space Transition to IPv6 is not possible that quickly as the installed general network infrastructure is IPv4 based Demand co-existence of them and integration between them for a period of time until the process of migration is complete. -
Internet Address Space: Economic Considerations in the Management of Ipv4”, OECD Digital Economy Papers, No
Please cite this paper as: OECD (2008-06-18), “Internet Address Space: Economic Considerations in the Management of IPv4”, OECD Digital Economy Papers, No. 145, OECD Publishing, Paris. http://dx.doi.org/10.1787/230461618475 OECD Digital Economy Papers No. 145 Internet Address Space ECONOMIC CONSIDERATIONS IN THE MANAGEMENT OF IPV4 OECD DSTI/ICCP(2007)20/FINAL FOREWORD The report provides an analysis of economic considerations associated with the transition from IPv4 to IPv6. It provides background analysis supporting the forthcoming ICCP-organised Ministerial-level meeting on ―The Future of the Internet Economy‖, to take place in Seoul, Korea on 17-18 June 2008. This report was prepared by Ms. Karine Perset of the OECD‘s Directorate for Science Technology and Industry. It was declassified by the ICCP Committee at its 54th Session on 5-7 March 2008. It is published under the responsibility of the Secretary-General of the OECD. This paper has greatly benefited from the expert input of Geoff Huston from APNIC, David Conrad from the IANA, Patrick Grossetête from CISCO Systems, Bill Woodcock from Packet Clearing House, Marcelo Bagnulo Braun from the University of Madrid, Alain Durand from Comcast, and Vincent Bataille from Mulot Déclic, although interpretations, unless otherwise stated, are those of the author. 2 DSTI/ICCP(2007)20/FINAL TABLE OF CONTENTS FOREWORD ................................................................................................................................................... 2 MAIN POINTS .............................................................................................................................................. -
Dual-Stack Architecture with Ipv6
Concepts & Examples ScreenOS Reference Guide Dual-Stack Architecture with IPv6 Release 6.3.0, Rev. 02 Published: 2012-12-10 Revision 02 Copyright © 2012, Juniper Networks, Inc. Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. JunosE is a trademark of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785. Copyright © 2009, Juniper Networks, Inc. All rights reserved. Revision History December 2012—Revision 02 Content subject to change. The information in this document is current as of the date listed in the revision history. SOFTWARE LICENSE The terms and conditions for using this software are described in the software license contained in the acknowledgment to your purchase order or, to the extent applicable, to any reseller agreement or end-user purchase agreement executed between you and Juniper Networks. -
Netsh Interface Ipv6
IPv6 Startup ARIN XVI Los Angeles, US October, 2005 Miguel Angel Díaz ([email protected]) César Olvera ([email protected]) Jordi Palet ([email protected]) Alvaro Vives ([email protected]) - 1 Agenda 1. IPv6 setup in several Platforms (Windows XP/2003, Linux, BSD) 2. Basic Configuration, Stateless/Stateful Autoconfiguration, Privacy, Static Routes 3. Transition Mechanisms Configuration 4. Examples of Applications - 2 Part 1 IPv6 Setup in several Platforms (Windows XP/2003, Linux, BSD) - 3 IPv6 Setup: XP/2003 (1) • In a DOS Prompt: – ipv6 install to install IPv6 as Network Protocol • ipconfig or ipv6 if to check if IPv6 was installed - 4 IPv6 Setup: XP/2003 (2) • Another option to check if IPv6 was installed – Network Connections > Local Area Connection > Properties • Also it is possible to install/uninstall IPv6 from here - 5 IPv6 Setup: XP/2003 (3) In a Command Prompt: – ipv6 uninstall to delete IPv6 as Network Protocol • ipconfig or ipv6 if to check if IPv6 was uninstalled - 6 IPv6 Setup: Linux (1) • To check if IPv6 is installed: #test -f /proc/net/if_inet6 && echo “Current Kernel supports IPv6“ • Module Installation: #modprobe ipv6 • Module check: #lsmod |grep -w 'ipv6' && echo “IPv6 module loaded" • Automatic Load/Unload of Module (/etc/modules.conf o /etc/conf.modules ): alias net-pf-10 ipv6 #enables load on demand alias net-pf-10 off #disables load on demand - 7 IPv6 Setup: Linux (2) # ifconfig to check eth0 Link encap:Ethernet HWaddr 00:E0:81:05:46:57 inet addr:10.0.0.3 Bcast:10.0.0.255 -
Ipv6 Intranet Intranet/Internet
How to Securely Operate an IPv6 Network BRKSPG-2603 Eric Vyncke, [email protected] @evyncke Abstract • This intermediate session describes how an IPv6 network can be securely operated. • The session explains how the management, control and data planes can be secured. • It also covers topics such as forensic, telemetry and lawful intercept. • The content is mainly geared to Service Providers but enterprises may also find it useful. • It is targeted to security and network architects with operational background. • There is also enterprise versions of this session BRKSEC-2003 (on-line only) / BRKSEC- 3200 which is more protocol oriented than operational. Beware that there is 30% overlap between BRKSEC-3200 and BRKSPG-2603. 3 Roadmap For IPv6 Security Sessions On www.ciscolive.com BRKSEC-2003 IPv6 Security Threats and Mitigations BRKSPG-2603 How to Securely Operate an IPv6 Network BRKSEC-3003 BRKSEC-3200 Operation Advanced IPv6 Security in Advanced IPv6 Security in the LAN the Core Architecture and design BRKSEC-3036 Advanced IPsec LTRSEC-3001 Advanced - IOS Dual-stack designs with FlexVPN FlexVPN Lab Products 4 IETF OPSEC Working Group 5 For Your Reference For Reference Slides • There are more slides in the hand-outs than presented during the class • Those slides are mainly for reference and are indicated by the book icon on the top right corner (as on this slide) • Some slides have also a call-out to another session (see below) BRKSEC- 3200 6 7 Agenda • Management Plane • Control Plane • Routing Information • Neighbor Discovery • Control -
Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) Guide
Intra-site Automatic Tunnel Addressing Protocol (ISATAP) Guide Microsoft Corporation Abstract The Intra-site Automatic Tunnel Addressing Protocol (ISATAP) in the Microsoft® Windows Server® 2008 R2, Windows Server 2008, Windows 7,and Windows Vista operating systems provides an Internet Protocol version 6 (IPv6) connectivity option for test labs and fortemporary connectivityon an existing Internet Protocol version 4 (IPv4)-only network. This white paper describes how to use ISATAP with Windows-based ISATAP hosts and routers and assumes that the reader has a basic understanding of networking, IPv6, and IPv6 transition technologies. Microsoft® Windows Server® 2008 R2 White Paper The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This White Paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document.