Monitoring Ipv6 Transition Techniques: Matěj Grégr
Monitoring Ipv6 Transition Techniques: Matěj Grégr
Monitoring Ipv6 Transition Techniques: Matěj Grégr
techniques
Matěj Grégr
Brno University of Technology, Faculty of Information Technology
[email protected]
Motivation
2
Insight into tunneled traffic
3
Transition techniques and security
4
Topology ①
Netflow probe
5
Topology ②
6
Transition techniques
• Simple encapsulation:
• 6to4
• 6rd
• ISATAP
7
Simple encapsulation
• Used by:
• 6to4, 6rd, ISATAP
• 6to4
• Detection is based on
• IPv6 prefix 2002::/16
• Anycast IPv4 address – 192.88.99.1
• ISATAP
• 64-bit link-local or global unicast prefix + 0000:5EFE + <IPv4 of
ISATAP link>
• 6rd
• Does not use anycast relay, ISP IPv6 prefix
8
More complex encapsulation – AYIYA
9
The most complex encapsulation – Teredo ①
• How to proccess?
10
The most complex encapsulation – Teredo ②
• Difficult to detect
• Every UDP packet must be processed - UDP video
stream (multicast, DNS)
• Firewall issues?
11
Flowmon probe
12
Flowmon probe
13
Flowmon probe – plugin
14
Plugin + tunneled traffic detection ①
15
Plugin + tunneled traffic detection ②
16
Packet processing
17
IPv6 native, Teredo
18
6to4, ISATAP
19
Compare to IPv4 traffic
20
Native traffic
21
Teredo, 6to4, ISATAP traffic
22
Future work
23
???
Záhlaví (99.99.9999) 24