On the whole, this draft is already in a very good state.

I have some additional input for this draft

I think it's also useful to distinguish between on-link and on-net attacks.

New reconnaissance method:

3.1.2.1 Snooping of DHCPv6 relay packets

DHCPv6 deployment in enterprise networks often relies on one or more centrally located DHCPv6 servers that serve the entire enterprise from one or more highly-available sites.

Although the end host interacts with local on-link routers, these router may forward the DHCPv6 requests over the WAN to the centrally located DHCPv6 server(s) using DHCPv6 relay [https://tools.ietf.org/html/rfc3315#section-7]

The relay packets are not encrypted and thus may be vulnerable to on-net snooping, potentially allowing an attacker to leverage existing on-net access to gain additional knowledge about remote LANs that they do not yet have access to. Obtaining access to a DHCPv6 server would also be a very high value target, and such servers should be tightly secured.

Some potential additional text for 3.2.1
> 3.2.1.  Reducing the subnet ID search space

There are a number of documents available online e.g. [http://www.ietf.org/rfc/rfc5375.txt http://www.ripe.net/ripe/docs/ripe-552 ] that provide recommendations for allocation of address space in the /3 to /64 range, which address various operational considerations, including: RIR assignment policy, ability to delegate reverse DNS zones to different servers, ability to aggregate routes efficiently, address space preservation, ability to delegate address assignment within the organization, ability to add allocate new sites/prefixes to existing entities without updating ACLs, and ability to de-aggregate and advertise sub-spaces via various AS interfaces.

Some of the allocation databases may even be publicly searchable. Allocation schemes may also be algorithmic e.g. simple incremental from 1 upwards, but also sparse allocation over a fixed bit range [http://www.ripe.net/ripe/docs/ripe-343#3]

The net effect of these administrative policies is that the address space from 2000/3 to the /64 prefix assigned to a LAN may be highly structured, and allocations of individual elements within this structure may be predictable once other elements are known. For example, if an attacker assumes or knows that the address space contains a "region of 6 bits that is sparsely assigned" then region 1 =1 region 2 may be 32, region 3 may be 16). This assumption may be easily tested with just a few probes (e.g. by waiting for an ICMP unreachable reply from an upstream router).

Thus the amount of entropy for this portion of the address search space from /3 to /64 may be vastly reduced compared to uniformly random /64 allocations.


12. Obtaining Network Information with traceroute6

As well as using traceroute6 as a source of information, if an organization allows ICMP unreachable messages from routers, an on-net attacker could probe the subnet search space to gain knowledge of the network structure, and thus the address assignment policy. For example, if a large number of traceroutes, or indeed any other connection probe, consistently generate a response with an ICMP unreachable Type 1 code 0 "no route to destination", all originating from a common router on the path, this could indicate that this router is either a boundary router, or a router that it performs route aggregation. This then gives a hint of how the address space is structured for reducing the subnet ID search space.

11. Gleaning Information from switch MAC tables and other equipment using SNMP

If the underlying infrastructure is not properly secured, an attacker can use knowledge gained from the switch TCAM forwarding table to learn network structure, as well as MAC addresses in use in the network, which can in many cases be mapped back to IPv6 addresses and machines. Obviously SNMP and other management access should be secured.


--
Regards,
RayH

_______________________________________________
OPSEC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsec

Reply via email to