Don’t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy

TitleDon’t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy
Publication TypeConference Paper
Year of Publication2016
AuthorsCzyz, J., Luckie M., Allman M., & Bailey M.
Published inProceedings of the Network and Distributed System Security Symposium (NDSS)
Abstract

There is growing operational awareness of the challenges in securely operating IPv6 networks. Through a measurement study of 520,000 dual-stack servers and 25,000 dual-stack routers, we examine the extent to which security policy codified in IPv4 has also been deployed in IPv6. We find several high-value target applications with a comparatively open security policy in IPv6 including: (i) SSH, Telnet, SNMP, are more than twice as open in IPv6 as they are in IPv4, (ii) nearly half of routers with BGP open, were only open in IPv6, (iii) in the server dataset, SMB was twice as open in IPv6 as in IPv4. We conduct a detailed study of where port blocking policy is being applied and find that protocol openness discrepancies are consistent within network boundaries, suggesting a systemic failure in organizations to deploy consistent security policy. We successfully communicate our findings with ten different network operators and all ten confirm that the relative openness was unintentional. Eight of the ten immediately deployed a congruent IPv6 security policy, reflecting real operational concern. Finally, we revisit the belief that the security impact of this comparative openness in IPv6 is mitigated by the infeasibility of IPv6 network-wide scanning\textemdash we find that, for both of our datasets, host addressing practices make discovering these high-value hosts feasible by scanning alone. To help operators accurately measure their own IPv6 security posture, we make our scanning system publicly available.

URLhttp://www.icir.org/mallman/pubs/CLAB16/CLAB16.pdf
ICSI Research Group

Networking and Security