Unit 3 - Associated IPv6 Protocol Security Flashcards

(100 cards)

1
Q

What are the four basic ICMPv6 messages used specifically for errors?

A
  • Destination Unreachable
  • Packet Too Big
  • Time Exceeded
  • Parameter Problem
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the General ICMPv6 packet format?

A
  • Type - 8 bits - Identifies the ICMPv6 message type which determines the format of the remaining data.
  • Code - 8 bits - Gives more specific information within each type
  • Checksum - 16 bits - Allows for detection of data corruption
  • Message Body - Content depends on Type.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What field is specific to the Packet Too Big ICMPv6 message packet?

A
  • MTU - Contains the size of the link in bytes that was not big enough for the IPv6 packet.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the body of the Packet Too Big and Parameter Problem ICMPv6 message contain?

A
  • As much of the packet that caused the ICMPv6 message as possible that doesn’t cause the ICMPv6 message to exceed the minimum IPv6 MTU (1280 bytes)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What field is specific to the Parameter Problem ICMPv6 message packet?

A
  • Pointer - Indicates in which byte of the IPv6 packet that caused the message the error has occurred
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What extra fields does the Extended Format ICMPv6 header contain?

A
  • Extension Structure - Contains more information added to the end of the ICMPv6 message after the Original Datagram bytes.
  • Length - Information about the length of the Original Datagram that caused the error.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the error codes for the ICMPv6 Destination Unreachable error message?

A

0 - No route to destination
1 - Communication with destination administratively prohibited
2 - Beyond scope of source address
3 - Address unreachable
4 - Port unreachable
5 - Source address failed ingress/egress policy
6 - Reject route to destination
7 - Error in source routing header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the error codes for the ICMPv6 Packet Too Big error message?

A

0 - Packet too big

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the error codes for the Time Exceeded error message?

A

0 - Hop limit exceeded in transit
1 - Fragment reassembly time exceeded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the error codes for the ICMPv6 Parameter Problem error message?

A

0 - Erroneous header field encountered
1 - Unrecognized next header type
2 - Unrecognized IPv6 option
3 - IPv6 first fragment has incomplete header chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Are MLD and NDP examples of ICMPv6 error messages or informational messages?

A

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is MLD?

A
  • Multicast Listener Discovery
  • Allows IPv6 routers to list multicast addresses subscribed to by IPv6 multicast listeners (nodes wishing to receive specific multicast communications) on directly attached links. Also allows discovery of the nodes themselves.
  • Helps to ensure that multicast traffic is not being sent to nodes that don’t want it.
  • Required by NDP.
  • Each time a node joins a multicast group, it sends MLD Report messages on the link specifically for Solicited Node Multicast Addresses.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False. ICMPv6 error messages are allowed in response to Multicast traffic.

A

False.

Allowing ICMPv6 error messages may allow for Host Discovery and Amplification Attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False. You shouldn’t send Echo Replies to Echo Requests when the requests come from Multicast addresses.

A

True.

This can be an indicator of smurf attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What happens if an ICMPv6 informational message of unknown type is received?

A

It is discarded. This stops ICMPv6 from being used to discover hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When should an ICMPv6 error message not be sent as a response, specifically for security?

Also under what circumstances can these be overruled?

A
  • When the initial IPv6 packet that caused the error is destined for an IPv6 multicast address.
  • When the initial IPv6 packet was sent as a link-layer multicast or link-layer broadcast
  • When the initial packet’s source address does not uniquely identify a single node. For example, if the source address is an IPv6 Unspecified Address, IPv6 multicast address, or an address known to be an IPv6 anycast address.

These can be overruled when:
- The response error is a Packet Too Big error to allow path MTU discovery for multicast.
- The response error is a Parameter Problem error reporting an unrecognised IPv6 option that has the Option Type highest-order two bits set to 10.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

True or False. IPv6 nodes that originate error messages should rate limit the error messages.

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the uses for NDP?

A
  • Discovery of routers, prefixes, and network parameters (e.g. MTU and default hop limit) on a link
  • DAD
  • MAC address resolution
  • Address autoconfiguration
  • NUD (Neighbor Unreachability Detection) which proactively checks if an already known neighbor is still reachable.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a Neighbor Cache?

A
  • A table used in IPv6 that contains information about neighbors who they have recently sent traffic too.
  • It contains the neighbor’s on-link IPv6 unicast address, the MAC address, an indication of if the neighbor is a router or not, the expiration time of the information, and other information.
  • Similar to IPv4 ARP table with more info.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is an NDP NS message?

A
  • Neighbor Solicitation
  • Resolves a neighbor’s MAC address as part of Address Resolution and DAD.
  • Destination is unicast
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is an NDP NA message?

A
  • Neighbor Advertisement
  • Answers an NS message, apart from in an unsolicited NA when new information needs to be quickly propagated
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is an NDP RS message?

A
  • Router Solicitation
  • Used to discover if there is a router on the link.
  • Destination is ff02:2. The multicast defined for all-routers on a link.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is an NDP RA message?

A
  • Router Advertisement
  • Can be sent unsolicited to inform the hosts in the network periodically about network information and parameters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is an NDP Redirect message?

A
  • Change routing entries on hosts to send all or part of the traffic to another gateway.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
List NDP security considerations
- NDP messages should have a Hop Limit of 255. If the value is different then the message should be discarded. - All NDP based attacks need local access to the network by the attacker. - NDP specification mentions IPsec as a possible security solution, but in practice it is not used. This is because of its complexity and the need of a PKI (Public Key Infrastructure), which is not widely used. - SEND (Secure Neighbor Discovery) was implemented in order to provide a solution to NDP security vulnerabilities. It has been standardised but is not widely used.
26
What is NA/NS spoofing?
- A form of attack in which the attacker would send either: --- A NS with a changed/wrong source link-layer option (the option that contains the sender's MAC address). --- A changed/wrong target link-layer option (the option that contains the target's MAC address) - Can be used for redirection and DoS attacks. - Limited duration since once the neighbor cache expires, the bad information will be discarded so the attacker needs to continuously reply with the bad information - Requires local network access - If the attacker sends a MAC not present on the network, all traffic sent to that MAC will be blackholled, causing a DoS.
27
What is NUD failure?
- Neighbor Unreachability Detection failure. - An attacker waits for an NS sent for NUD purposes and responds with an NA with its own MAC address or an incorrect MAC address. - Like NA/NS spoofing, this requires local network access and NAs need to be continuously sent to keep the bad record in the legitimate user's neighbor cache.
28
What is a DAD DoS attack?
- An attacker listens for NSs sent for DAD purposes and responds that the address is already in use, even when it isn't, legitimately. If the attacker does this for every address the legitimate user attempts to configure, it will cause a DoS since the legitimate user won't be able to configure any address.
29
List examples of FHS (First Hop Securiy)
- RA-Guard - DHCPv6 Guard/DHCPv6 Shield - IPv6 Snooping (ND inspection and DHCPv6 Snooping) - IPv6 Source/Prefix guard - IPv6 Destination guard (or ND resolution rate limiting) - MLD Snooping
30
What is IPv6 Snooping?
- Analyses control and data traffic going through the switch. - Inspects NDP, DHCPv6, and other IPv6 messages - Uses IP and MAC addresses seen on each interface to create a binding table that contains a record of MAC and IP addresses per switch port. Any NA/NS messages that don't match an already trusted binding are dropped. - Can be used to defend against IP spoofing such as spoofed NA messages
31
What is IPv6 Source/Prefix Guard?
- Uses the binding table created by IPv6 Snooping to validate the source address of IPv6 traffic source from a particular link. - Can be used to defend against IP spoofing.
32
List NDP RS/RA threats
- Malicious Last Hop Router - Bogus On-Link Prefix - Bogus Address Configuration Prefix - Parameter Spoofing These are all examples of Rogue Router Advertisement vulnerabilities
33
What is a Malicious Last Hop Router attack?
- Uses rogue RA messages to achieve redirection or DoS - An attacker on the link masqeurades as a router and attempts to become the default gateway of the network. - If accepted, the attacker can send Redirect messages and make it appear to hosts as if the traffic is still flowing. - This attack can be improved upon by spoofing RA messages that a legitimate router may be sending and giving them a lifetime of 0. This indicates that the router is disconnecting from the link and hosts should no longer use it. - Attacker must send RAs periodically and respond to all RS messages.
34
What is a Bogus On-Link Prefix attack?
- Uses rogue RA messages to achieve DoS - Every IPv6 enabled device has a list of prefixes, for each interface, used on the link it is connected to. This list is used to determine the next hop when sending a packet. If the destination is part of any of the listed prefixes, the device determines it does not need a router to send the traffic as it's on the same link. - An attacker can cause a DoS by using an RA to advertise that there is a prefix on link that isn't actually on the link.
35
What is a Bogus Address Configuration Prefix attack?
- Uses rogue RA messages to achieve DoS - An on-link attacker sends an RA including a prefix, that does not exist on the link, for address autoconfiguration and all necessary flags. - A host can use SLAAC to configure an address with this prefix and as the address is not advertised as part of that link, return packets could never reach the host.
36
What is a Parameter Spoofing attack?
- Uses rogue RA messages to achieve DoS - An attacker sends RAs that are duplicates of a legitimate router's RAs except with different parameters meant to disrupt traffic. - An example of this is a false low default hop limit which can stop a device from sending traffic to its destination due to not being able to go far enough - Another example would be setting the M and O flags to 1. This would trigger the host to use DHCPv6 to obtain its IP configuration which can be used in conjuction with a bogus DHCP server/relay.
37
List solutions to rogue RA attacks
- Link Monitoring - SEND (Secure Neighbor Discovery) - Manual Configuration - Host-Based Packet Filters - Router Preference Option - ACLs on Managed Switches - RA Snooping on Switches
38
How is Link Monitoring used to protect against rogue RAs?
- A link monitoring tool can know what a legitimate router's link local/MAC address are and verify that RAs coming from those addresses are legitimate. - Some link monitoring tools will notify of rogue RAs being detected but some tools can actively stop these attacks. For example by resending the rogue RA to affected devices with a lifetime of 0.
39
Examples of Link Monitoring tools used to avoid rogue RAs
- 6MoNPlus - NDPmon - 6GUARD - RAMOND
40
What is SEND
- Secure Neighbor Discovery - Designed to be used on the local link to secure NS/NA/RS/RA messages - Generally not used due to lack of availability and requires a more complex setup
41
How does Default Router Preference solve the issue of Rogue RAs?
- A router sending RAs with a higher preference will be preferred by hosts. - Malicious RAs would have to be using lower preference for this to work
42
What is RA-Guard?
- Used as a solution to rogue RAs - Specifies ports that rogue RAs should be received on. - Stateless RA-Guard means that decisions are based on examination of received RAs or switch configuration - Stateful RA-Guard means that the switch dynamically learns what port(s) the legitimate router(s) is connected to and allows RAs to be received from these authorised sources
43
True or False. RA-Guard can be circumvented
True. Extension Headers (particularly Fragement Headers) can be used if this particular implementation of RA Guard does not check the entire header chain to identify the RA message and instead only checks the 'Next Header' field.
44
What is a Spoofed Redirect Message attack?
- Requires access to the link. - The goal is to introduce a malicious route into a host's routing table. - Could be used as for a DoS attack or a redirect attack - Attacker needs to consistently respond to the NUD checks from the legitimate host. - The attacker sends ICMPv6 Redirect packets to the host advising that traffic to an already known destination (e.g. the host's default gateway) should actually be sent to the attacker. The attacker could then perform a redirect attack (inspect and forward the traffic to the correct destination) or a DoS attack - Can be avoided by not allowing ICMPv6 Redirects on your network.
45
True or False. It is ok to accept ICMPv6 Redirect messages
True. However, it is recommended to not accept them.
46
What is a Neighbor Discovery DoS Attack?
- Can be made from outside the local network - The goal is to block legitimate traffic on the target network by filling up the target router's Router Neighbor Cache in order to perform a DoS. - Can be avoided with IPv6 Destination Guard or by limiting the amount of neighbors that can be cached for each interface
47
What is IPv6 Destination Guard?
- Also known as ND Resolution Rate Limiter - Validates the destination address of the IPv6 traffic reaching the link. If the destination address belongs to a directly connected link but doesn't exist in the neighbor cache then address resolutions are rate limited
48
What is MLD Snooping?
- A First Hop Security technology - Allows Multicast traffic to only be allowed on certain interfaces
49
MLDv1 vs MLDv2
- MLDv2 is mandatory, MLDv1 is not. Although if a device on a link is using MLDv1, all other devices on that link must use MLDv1. - MLDv2 has 2 messages whereas MLDv1 has 3. - MLDv2 allows source specific multicast addresses. MLDv1 does not. - MLDv2 allows multicast address filtering, MLDv1 does not.
50
What is MLDv1?
- Not mandatory. - Has 3 message types and some subtypes: - Multicast Listener Query (ICMPv6 Type 130) - General Query - Used by a router to learn which multicast addresses have listeners on an attached link. Sent to FF02::1. - Multicast Address Specific Query - Used by a router to learn if a specific multicast address has any listeners attached on a link. Sent to the specific multicast address. - Report Message (ICMPv6 Type 131) - Sent to a specific multicast address two or more times to be sure of delivery by all IPv6 nodes when joining a multicast address group, specifically for Solicited Node Multicast addresses. Listeners report themselves either as an answer to a Query or as a result of joining a Multicast address group. - Done Message (ICMPv6 Type 132) - Sent by listeners when they want to leave a multicast address group to FF02::2.
51
What is MLDv2?
- Mandatory for all IPv6 nodes as opposed to MLDv1. However MLDv1 and MLDv2 can coexist because the prescence of an MLDv1 node on a link causes all other devices to operate in MLDv1 mode. - Extends MLDv1 by allowing Source-Specific Multicast which allows listeners to report interest on specific sources of multicast traffic. - Has two types of filters: - Include Filter - A node indicates a multicast group and a list of senders for the group from which it wishes to receive traffic. - Exclude Filter - A node indicaste a multicast group and a list of senders from which it wishes to exclude multicast traffic. This filter is used rarely and there is a version of MLDv2 called 'Lightweight MLDv2' that omits this filter completely. - Has 2 types of messages and some subtypes: - Multicast Listener Query (ICMPv6 Type 130) - General Query - Router periodically queries all multicast addresses that have listeners on a link. Sent to FF02::1. - Multicast Address Specific Query - Used by a router to learn if a specific multicast address has any listeners attached on a link. Sent to the specific multicast address. Sent in response to State Change Reports and not Current State Reports. - Multicast Address and Source Specific Query - Sent to find out if any of the sources from the specified list of a particular multicast address has any listeners on the link or not. Sent in response to State Change Reports and not Current State Reports. - V2 Multicast Listener Report (ICMPv6 Type 143) - Sent to FF02::16 (Link-scope all MLDv2 capable routers) twice or more times to be sure of delivery by all MLDv2 IPv6 nodes when joining a multicast address group specifically for the Solicited Node Multicast addresses (State Change Report), or as an answer to a Query message (Current State Report). Another MLDv2 Report is also sent by all IPv6 nodes when they cease to listen to a multicast address on an interface.
52
What makes MLD useful to an attacker?
- All queries must be responded to received on any unicast or multicast addresses. - To use MLDv2, all nodes must use MLDv2. A single MLDv1 node on the link causes all nodes to use MLDv1. - Some Operating Systems join specific multicast addresses that can be used as identifiers. For example Windows uses FF02::1:3 for LLMNR (Link-Local Multicast Name Resolution) so attackers can use this to identify a Windows device.
53
List threats associated with MLD
- Flooding of MLD messages - Traffic amplification - Network scanning
54
What is the threat of flooding MLD messages?
- RAM and CPU overconsumption causing a DoS
55
How can you mitigate the effects of attacks caused by flooding MLD messages?
- Limit the amount of memory available to process MLD messages in the router. Also known as limiting the number of MLD states. - Limit the rate of processed MLD messages in hardware - You can also disable MLD altogether but this is not advised. Even limiting the above can cause issues since it can limit the number of multicast joins.
56
What is the threat of MLD Traffic Amplification?
- An attacker can send generic query messages with the router's address spoofed as the source address to all hosts in the network. Report messages will then be sent back for each multicast address they have configured to the legitimate router.
57
How can you mitigate the effects of attacks caused by flooding MLD messages?
- Rate limiting MLD messages on the router. - Disable MLD query functionality so the router does not need to process the Report messages. This functionality is only required if Multicast routing is being used.
58
What is the threat of MLD Network Scanning?
- Passive network scanning means to sniff MLD messages on the link and try to identify hosts, routers, and specific operating systems for example. - Active network scanning means to send Query messages and listen to the Report messages.
59
List built-in MLD security features
- All messages should be sent with a hop limit of 1 so MLD messages cannot go out of the link - Link-local addresses should be used as source addresses, protecting against MLD messages sent from outside the link - MLD messages should include a 'Router Alert' option in a Hop-by-Hop extension header. This is necessary for the routers to examine MLD messages sent to multicast addresses in which the routers themselves have no interest. - Messages that don't comply with the above should be discarded
60
What is MLD Snooping?
- A mechanism implemented on switches that restricts multicast traffic to the switch ports that have listeners. These are hosts that have sent a Report stating that they want to receive multicast traffic to a specific multicast address. - Technically breaks the conceptual OSI model since layer 2 devices investigate layers 3 and 4 for information. - Does not protect against threats, just optimises the amount of multicast traffic seen on the network.
61
How can you make MLD secure at the switch?
- Configure the switch using ACLs to only accept MLD Query messages in a port connected to a router.
62
How can you make MLD secure at the router?
- Rate limiting the amount of Report messages accepted from hosts. Protects against resource exhaustion. - Disabling MLD on a router that is not used for multicast routing
63
True or False. IPv4 and IPv6 DNS have the same vulnerabilities and security solutions.
True.
64
List methods of attack using DNS in IPv6
- Becoming the victim's DNS server
65
How can an attacker become the victim's DNS server?
- NDP Threats - If the legitimate DNS server is on the link, the attacker can poision the victim's neighbor cache to make it appear as if it is the legitimate DNS server. If the legitimate DNS server is outside of the link, DNS queries will be sent to the default gateway first. The attacker could perform a MITM attack on traffic to or from the gateway. - Autoconfiguration - Using SLAAC the attacker can send RA messages with the RDNSS (Recursive DNS Server) option containing the IPv6 of the attacker's DNS server. Using DHCPv6 the attacker can send DHCPv6 messages with their DNS listed as the attacker's DNS server.
66
What issues can an attacker cause by becoming the host's DNS server?
- DoS - Answering DNS queries falsely and sending the customer to the wrong potentially malicious destination - Forwarding DNS queries to the legitimate DNS server to perform a MITM attack.
67
What is a Service Hijack?
- An attacker initially answers DNS queries with fake answers after making themself the host's DNS server. Based on the destinations the host attempts to get to, the attacker can then respond to other services. E.g. it can respond to HTTP and HTTPS requests based on the website the host is attempting to reach.
68
What is a Service DoS Attack?
- An attacker becomes a host's DNS server and answers DNS queries with addresses that will not answer the host's requests for services.
69
List name resolution protocols other than DNS
- DNS-SD - DNS Service Discovery - mDNS - Multicast DNS - LLMNR - Link Local Multicast Name Resolution
70
What is DNS-SD
- DNS Service Discovery - A mechanism that hosts can use to automatically discover instances of services available on a network. Attackers can use it to impersonate real services, for traffic amplification and find devices and services.
71
What is mDNS?
- Multicast DNS - Using multicast allows DNS-like name resolution on the local link. It’s based on DNS with some differences. The attacker can be waiting for queries and try to answer and give its own IP address (MITM) or a wrong one (DoS).
72
What is LLMNR
- Link Local Multicast Name Resolution - Is a protocol used to resolve domain names, in the scope of a link, when no DNS resolution is available. Based on DNS, it uses multicast addresses. An attacker can answer queries with wrong information to produce a DoS or MITM attack. - Microsoft proprietary mDNS
73
Similarities between DHCPv4 and DHCPv6
- Use a client-server model - Use UDP - Can use a relay between a client and a server if there is no DHCP server in the same broadcast domain as the host.
74
Differences between DHCPv6 and DHCPv4
- DHCPv6 doesn't provide a default gateway - DHCPv6 uses port 546 for clients and 547 for servers/relays. DHCPv4 uses port 68 for clients and 67 for servers. - DHCPv6 uses DUID (DHCP Unique ID) instead of MAC address to identify servers and clients. - DHCPv4 message names are different compared to DHCPv6 - DHCPv6 can delegate IPv6 prefixes (DHCPv6-PD)
75
What are the DHCPv6 messages and what are their DHCPv4 equivalents?
- Discovery (v4) - Solicit (v6) - A client attempts to locate DHCP servers - Offer (v4) - Advertise (v6) - A server indicates that it is providing DHCP services in response to a Solicit. - Request (v4) - Request (v6) - A client requests configuration parameters - Acknowledge (v4) - Reply (v6) - Sent by a server in response to a Solicit, Request, Renew, Information, or Rebind message with configuration parameters, or in response to a Confirm message either confirming or denying that the address(es) assigned to the client are appropriate for the link the client is on, or to acknowledge receipt of a Release or Decline message.
76
List all DHCPv6 message names
- Confirm - Renew - Rebind - Release - Decline - Reconfigure - Relay-Forward - Relay-Reply
77
List DHCPv6 multicast addresses
- FF02::1:2 - All DHCP Relay Agents and Servers - Servers and relays listen on this link-local scope multicast address, it is used by the client to reach a server or relay. - FF05::1:3 - Servers listen on this site-local scope multicast address, it is used by relays to reach servers within the site, but the relay will use the server's unicast address if it doesn't use this multicast address.
78
How can an attacker trigger host's to use DHCPv6 on a network?
- The first option is to send an RA with the M flag set to 1 (which overrides the value of the O flag). This indicates to hosts that they can get DHCPv6 information and other parameters such as DNS from the attacker. The attacker will then respond to these queries. - The second option is to send an RA with the O flag set to 1 so that the host attempts to use the attacker to autoconfigure its DNS server and/or other parameters. The attacker will respond as a stateless DHCPv6 server.
79
What do the IPv6 M and O flags indicate?
- If the M flag is 1 then the O flag is redundant and can be ignored. - M = 0 and O = 0 - No information is available via DHCPv6 - M = 0 and O = 1 - Information other than addressing is available via DHCPv6, for example DNS - M = 1 and O = 1 - Addressing information is available via DHCPv6
80
How does DHCPv6 work when a relay is involved?
- The relay will commonly use unicast source and destination addresses for communication with the server - The relay will send an R-F (Relay-Forwarding) message to the server with the client's original request encapsulated in an option inside. - The server will respond to the relay with an R-R (Relay-Reply) message with its response encapsulated in an option inside. The relay extracts this and sends it to the client.
81
True or False. It is just as safe to use multicast for Solicit and Request messages as it is to use Unicast.
False. Using Multicast destination addresses makes the Solicit and Request messages visible to all hosts on a link.
82
What messages are required for stateles DHCPv6?
- Information-Request - Sent by the client - Reply - Sent by the relay/server
83
Explain DHCPv6 address allocation strategies
- Iterative Allocation - Addresses are allocated sequentially one by one. This is faster and easier but makes addresses easier to guess since once you know once address you can easily guess the other ones. - Identifier-Based Allocation - Addresses are allocated based on a fixed identifier for each client, usually resulting in the same client getting the same address anytime it uses the same server. This makes it easier to track the activity of that client - Hash Allocation - An extension of Identifier-Based Allocation but instead of using the identifier directly it is hashed first. If implemented correctly this stops the identifier being disclosed which reduces the impact of address scanning and OS/Vendor discovery. Not fully bulletproof. - Random Allocation - The server picks an address pseudorandomly out of a pool. Also stops returning clients from getting the same address or prefix again. This is useful from a privacy perspective since addresses and prefixes generated this way are not susceptible to correlation attacks, OS/Vendor discovery, or identity discovery.
84
What is a Rogue DHCPv6 Server?
- An attacker listens for DHCP requests on a link and answers as if it were a legitimate server. The attacker succeeds if it's replies reach the host before the legitimate server's. - Can bse used for DNS Spoofing, giving the host a fake IPv6 address that will likely cause a DoS, or any other potential attack with DHCPv6 options like an incorrect NTP server address
85
True or False. Rogue DHCPv6 can be used to send a false default gateway.
False. DHCPv6 is not used to configure the default gateway.
86
What is a DHCPv6 Exhaustion attack?
- Can be used to make it more likely that Rogue DHCPv6 server attack succeeds by ensure the legitimate DHCPv6 server has no addresses to give. - The attacker will send lots of requests to a legitimate DHCPv6 server for different IP addresses. - This attack makes more sense in IPv4 since in IPv6 there are significantly more addresses to exhaust.
87
What methods can an attacker use to become a Rogue DHCPv6 server?
- Simple Attack - The basic attack in which the attacker sends Advertise messages and answers Solicit requests from clients. The first Advertise message to arrive at a client determines what DHCPv6 server the client will use. - DHCP Reply Injection - The rogue DHCPv6 server listens for DHCPv6 message exchanges and before the legitimate server can send a Reply, the attacker sends it with its own parameters.
88
True or False. It is recommended to enable IPSec ESP in Transport Mode for relay-to-relay and relay-to-server communication for DHCPv6.
True. This means the messages can be authenticated and encrypted, protecting from hijacking, tampering, or eavesdropping. This won't protect from attacks on the link.
89
What is Secure DHCPv6?
- A mechanism that uses public key cryptography to protect end-to-end communication between DHCPv6 clients and servers. - Provides encryption in all cases and can be used for authentication provided certificates are shared between authenticating devices. - Authenticates between client and server to defend against active attacks such as spoofing - Encrypts between client and server in order to protect DHCP communication from monitoring.
90
What is DHCPv6-Shield?
- Protects hosts connected to a switch against rogue DHCPv6 servers - Equivalent to DHCP Snooping in IPv4; based on packet filtering at the switch. - Does not protect servers, only clients - Before being deployed, the port(s) which DHCPv6 server messages are allowed in on are specified. Only ports connected to relays/servers should be specified. Messages will not be allowed in on any other port(s). - DHCPv6-Shield can be considered a vendor specific implementation from some vendors.
91
Methods of securing IPv6 routing protocols
- Authenticating neighbors/peers - Securing routing updates - Using route filtering - Router hardening
92
List IPv6 routing protocols
- RIPng - OSPFv3 - IS-IS - MBGP
93
True or False. RIPng supports authentication by default.
False. RIPv2 supports MD5 but this is not available in RIPng. Further to this, IPSec is recommended but not mandated so the protocol is not secure by default.
94
What methods can you use to authenticate neighbors in RIPng?
- There is no authentication method. The only security measure that would even remotely help is IPSec.
95
What methods can you use to authenticate neighbors in OSPFv3?
- IPSec - ESP or AH manual keys - Authentication Trailer - Hash of OSPFv3 values. Authenticated between neighbors using a shared key.
96
What is Authentication Trailer in OSPFv3?
- A method of authentication for the routing protocol - Allows a router to confirm that a received packet has been issued by a router knowing the shared authentication key - Avoids needing to configure IPSec and protects against reply attacks - It is a hash of OSPFv3 values
97
What is required in order to implement IPSec for OSPFv3 security?
- ESP must be supported and AH may be supported - Manual keying is required with current implementations
98
What methods can you use to authenticate neighbors in IS-IS?
- HMAC - Can be used with MD5 (not recommended) or SHA.
99
What methods can you use to authenticate neighbors in MBGP?
- TCP MD5 Signature Option - The first security meeasure available for securing BGP sessions. Obsolete due to using MD5. - TCP Authentication Option - Preferred over MD5.
100
True or False. OSPFv3 is the only routing protocol that offers a method of securing routing updates.
True. IPSec can be used, although this isn't universally supported so not always feasible. OSPFv3 also being one-to-many can make key management difficult since keys need to be generated and shared manually.