IPv6 Tutorial
IPv6 Tutorial
IPv6 Protocols
Slide 2
© 2003-2005 Monash CTIE
IPv6
Network layer protocol Application layer
Node-to-node information
delivery across multiple links Presentation layer
Layer 3 in the OSI Session layer
reference model Transport layer
Network layer
Link layer
Physical layer
Slide 3
© 2003-2005 Monash CTIE
IPv6 Header
Simplified header compared to IPv4
IPv4 IPv6
Header Type of Service
Version Length Class of Service Next Header
Flags Version
Destination Address
32 bits (128 bits)
Slide 4
© 2003-2005 Monash CTIE
Extension Headers
Basic header simplified for ease of
processing Next Hdr
Additional information carried in
extension headers
Basic Header
Hop-by-hop options
Routing header
Fragment header
Destination options header
Authentication header (AH) Next Hdr Length
Encrypted security payload (ESP) Extension Header
header
Next Header field says what type of Next Hdr Length
header follows Extension Header
E.g. Fragment Header, TCP, ICMP, etc.
Payload
Slide 5
© 2003-2005 Monash CTIE
ICMPv6
Same basic concept as ICMP (for IPv4)
Error messages – e.g.:
Destination unreachable
Packet too big
Time exceeded
Parameter problem
Information messages – e.g.:
Echo request/reply
Router solicitation/advertisement
Multicast Listener Discovery (like IGMP for IPv4)
Slide 6
© 2003-2005 Monash CTIE
Progress:
Basics
Addressing
Routing
Domain Name System
IPv4 to IPv6 transition
Security
State of the Art
Mobile IPv6
Slide 7
© 2003-2005 Monash CTIE
Address space
128 bit addresses
Massive address space to last for the foreseeable future
Default allocation is for all sites to receive 216=65536 subnets
Ensures that it is possible to allocate a globally unique address to
every host so that end-to-end applications are possible
Slide 8
© 2003-2005 Monash CTIE
Address types
Unicast
Anycast
Multicast
No more broadcast!
Slide 9
© 2003-2005 Monash CTIE
Representing IPv6 addresses
x:x:x:x:x:x:x:x
e.g. 1234:5678:9abc:def0:1234:5678:9abc:def0
One string of zeros may be represented by “::”
e.g. ff02:0:0:0:0:0:0:1 = ff02::1
Last 2 fields may be represented in IPv4 “dotted decimal”
form
e.g. 0:0:0:0:0:ffff:192.168.0.1 or ::ffff:192.168.0.1
“[]” are used around the address for representation in
URLs
http://[3ffe:a:b:c::1]:port/dir
Slide 10
© 2003-2005 Monash CTIE
Representing IPv6 addresses
(cont)
No more netmasks
Represented by a “/prefixlen” appended to the end of an address
where prefixlen indicates the number of bits in the address that
make up the network address
Similar to classless address representation in IPv4
e.g.3ffe:a:b:1::1/64
Network part: 3ffe:a:b:1::
Host part (interface identifier): ::1
Slide 11
© 2003-2005 Monash CTIE
Address allocation
fe80::/10 - link-local
fec0::/10 - site-local – now deprecated
fc00::/8 – ULA central
fd00::/8 – ULA local
ff00::/8 – multicast
2000::/3 - globally aggregatable unicast
3ffe::/16 - 6bone
0000::/8 is reserved and contains addresses like
Unspecified address - ::
Loopback address - ::1
IPv6 addresses with IPv4 addresses embedded in them
Slide 12
© 2003-2005 Monash CTIE
Unicast addressing
Associated with an interface rather than a node
Several types of unicast addresses
Limited scope – link-local, ULA
Globally aggregatable
Transition – IPv4 compatible, IPv4 mapped
Slide 13
© 2003-2005 Monash CTIE
Multicast addressing
ffxy:: prefix
x = flags
One flag currently defined
Indicates whether the address is one assigned by the IANA or a
transient address
y = scope
1 - host scope
2 - link scope
5 - site scope
8 - organization scope
e - global scope
Slide 14
© 2003-2005 Monash CTIE
Multicast addressing (cont.)
suffix indicates group
IANA has registered groups for particular uses
::1 - all hosts
::2 - all routers
etc...
Using an example from RFC 3513:
If the “NTP servers group” is assigned a permanent group ID of
0x101 then
ff01::101 means “all NTP servers on the same node as the sender”
ff02::101 means “all NTP servers on the same link as the sender”
ff05::101 means “all NTP servers on the same site as the sender”
ff0e::101 means “all NTP servers on the Internet”
Slide 15
© 2003-2005 Monash CTIE
Solicited Nodes Multicast Address
FF02:0:0:0:0:1:FFXX:XXXX
where XXXXXX is the low order 24 bits of the Interface Identifier
of a unicast address
Nodes MUST join the solicited nodes multicast address
group for each unicast address configured
Facilitates location of nodes
Example:
Unicast: 3ffe:0db8::fedc:ba98:7654:3210
Solicited nodes multicast: ff02::1:ff54:3210
Slide 16
© 2003-2005 Monash CTIE
Interface Identifiers
Manually configured
EUI-64
Formed from MAC address of interface
RFC-3041 temporary addresses
Randomly generated interface identifiers
Provides some level of privacy
Address
Prefix Interface Identifier
Slide 17
© 2003-2005 Monash CTIE
Address configuration
Stateful
DHCPv6 - RFC 3315
Clients use scoped multicast to reach servers and relays
May provide information in addition to addresses – e.g. DNS
address
Stateless
Routers send periodic advertisements
May also be solicited
Hosts use information in advertisements to create valid
addresses
Slide 18
© 2003-2005 Monash CTIE
Router Advertisement
RAs are sent periodically and in response to Router
Solicitations
Contains link prefix, lifetime, MTU, etc.
Hosts construct addresses by appending their interface
identifier to the prefix advertised by the router
This address then needs to be tested to ensure
uniqueness
Slide 19
© 2003-2005 Monash CTIE
Duplicate Address Detection
Multicast is used to assist in detection of conflicting
addresses
Packets are sent to the solicited nodes multicast address
The packet essentially asks if anyone is already using this
address
If another node responds, the interface either shuts down or
tries another address
The nature of the multicast address ensures that a host
that is using the tested address must be listening, but
most other hosts won't be.
Slide 20
© 2003-2005 Monash CTIE
Duplicate Address Detection
Slide 21
© 2003-2005 Monash CTIE
Link Address Resolution
Uses the same packet types as DAD
Equivalent of ARP in IPv4
Neighbour Solicitation message is sent to the solicited
nodes multicast address (rather than broadcast as in
IPv4).
Host with the destination IP address responds with a
Neighbour Advertisement that includes its link layer
address.
Slide 22
© 2003-2005 Monash CTIE
Link Address Resolution
I am.
Who’s using My Link layer
address “X”? address is “xxx”
Slide 23
© 2003-2005 Monash CTIE
Neighbour Unreachability
Detection
Hosts maintain a cache of devices they have
communicated with recently.
The table indicates the reachability state of each host.
Neighbour solicitation/advertisement messages are used
to probe devices to confirm reachability
Not done when it can be confirmed by other information
such as TCP three-way handshake
Also not initiated just because a device hasn't been heard
for some time.
Old entries removed
Slide 24
© 2003-2005 Monash CTIE
IPv6 MTU & PATH MTU
Discovery
Maximum Transmission Unit (MTU)
IPv6 MTU minimum 1280 bytes (vs. IPv4 68 bytes)
IPv6 fragmentation end-to-end
Routers don’t fragment IPv6 packets - end nodes do it.
Path MTU discovery not mandatory
Routers may reply with ICMPv6 ‘Packet too big’ and drop
if packet exceeds router/link MTU.
Slide 25
© 2003-2005 Monash CTIE
IPv6 MTU & PATH MTU
Discovery
Slide 26
© 2003-2005 Monash CTIE
Summary
Huge address space
Hosts can autoconfigure their own addresses
Scoping allows for some clever use of multicast
Neighbour Discovery replaces ARP for address resolution
Also introduces new functionality of Stateless address
autoconfiguration, DAD, NUD, PMTU discovery
Slide 27
© 2003-2005 Monash CTIE
Progress:
Basics
Addressing
Routing
Domain Name System
IPv4 to IPv6 transition
Security
State of the Art
Mobile IPv6
Slide 28
© 2003-2005 Monash CTIE
Packet switched networks
Internet is a packet switched network
Each packet contains full addressing information
Simple headers for IPv6
Routing is the process of working out how to send a
packet to its destination
Slide 29
© 2003-2005 Monash CTIE
Routing
All nodes examine the destination address of arriving packets
Hosts either accept or discard
Routers may also forward packets to another node
Packets for “on-link” destinations may be delivered directly
Other packets must be forwarded to a “next-hop” router
Packet travels hop-by-hop until it reaches its destination
Slide 30
© 2003-2005 Monash CTIE
Routing (cont)
Example (IPv6)
traceroute to munnari.oz.au (2001:388:c02:4000::1:21) from 3ffe:8001:12:fc:203:47ff:fe31:51b1,
30 hops max, 16 byte packets
1 3ffe:8001:12:fc::3 (3ffe:8001:12:fc::3) 0.396 ms 0.305 ms 0.307 ms
2 3ffe:8000:ffff:1012::100 (3ffe:8000:ffff:1012::100) 51.953 ms * 39.798 ms
3 vbns-trumpet.hay.vbns.net (3ffe:28ff:ffff:3::100) 251.758 ms 245.323 ms 251.982 ms
4 cs-v6-atm0-2.dng.vbns.net (3ffe:28ff:ffff:3::) 299.732 ms 314.289 ms *
5 iplsng-vbns.abilene.ucaid.edu (2001:468:ff:12c1::1) 404.823 ms 365.734 ms 372.79 ms
6 6plains-iplsng.abilene.ucaid.edu (2001:468:ff:121d::2) 393.285 ms 346.691 ms 359.758 ms
7 sit1.ipv6.broadway.aarnet.net.au (2001:388::1) 559.186 ms 550.964 ms 622.729 ms
8 2001:388:0:11::2 (2001:388:0:11::2) 670.786 ms 542.702 ms 542.287 ms
9 2001:388:c02:4000::1:21 (2001:388:c02:4000::1:21) 560.391 ms 530.628 ms 559.938 ms
Slide 31
© 2003-2005 Monash CTIE
Routing (cont)
A router may have many interfaces and/or neighbours
How does the router know where to send a packet?
Routing table
Slide 32
© 2003-2005 Monash CTIE
Routing tables
Contains information about how to get a packet “closer”
to its destination
Destination prefix
Next hop router
Outgoing interface
Metric
Routing table is consulted for longest matching prefix
Packet is forwarded using the information in the routing table
entry with the longest matching prefix
Slide 33
© 2003-2005 Monash CTIE
Prefix matching
Example
Slide 34
© 2003-2005 Monash CTIE
Static vs. Dynamic
How is the routing table constructed?
Routing table entries may be made by hand
Static routes
Not scalable
Most routing table entries calculated automatically
Dynamic routes
Routers exchange information with one another
Routing protocols
Slide 35
© 2003-2005 Monash CTIE
The Internet
“Network of networks”
Not practical for every host (or even router) to have a routing
table entry for every other host/router in the Internet
To make routing tables practical, we need entries that refer to
multiple hosts
E.g. Default route: 0::/0 3ffe:0db8:1000::2 eth0
“0::/0” will always match and will always be the shortest match
This single entry covers every host that we don’t already have
another entry for
Slide 36
© 2003-2005 Monash CTIE
Aggregation
As a network of networks, the
Internet is divided into AS Internet
administrative regions called
AS
“Autonomous Systems” (AS)
Generally all of the routing
information from within an AS can
be summarized into a single routing
table entry
E.g. Acme Computers have many AS
networks: 3ffe:0db8:1001: AS
(a,b,c,etc.)::/64
Devices outside the Acme
Computer AS only need to know
how to reach: 3ffe:0db8:1001::/48
Slide 37
© 2003-2005 Monash CTIE
Aggregation (cont)
3ffe:0db8:1001::/48
Internet AS via route Z
Acme
3ffe:0db8:1001:b::/64
3ffe:0db8:1001:d::/64
3ffe:0db8:1001:a::/64
AS
3ffe:0db8:1001:c::/64
Devices outside of AS
Acme have a
single routing
entry for all Acme 3ffe:0db8:1001::/48
Slide 38
© 2003-2005 Monash CTIE
Aggregation (cont)
So far same as IPv4
IPv6 takes aggregation Large provider
further 3ffe:0db8::/32
Strict hierarchy for address
allocation
Small providers
IP address allocation is 3ffe:0db8:2500:/40
always a subset of providers 3ffe:0db8:2600:/40
address space
Slide 39
© 2003-2005 Monash CTIE
Threats to Aggregation
Provider independent addressing
Multihoming
Connecting to the Internet through multiple providers
Not yet standardized
One of the big hurdles in the way of IPv6 deployment
Slide 40
© 2003-2005 Monash CTIE
Routing Protocols
Two types of routing protocols
Interior, Exterior
Exterior routing protocols are used to exchange
information between ASs
BGP-4+
Interior routing protocols exchange information with
other routers under the same administrative control
RIPng, OSPFv3
Slide 41
© 2003-2005 Monash CTIE
Exterior Protocols
Communicate with other systems
Control routing table sizes
Manage policy
Use bandwidth efficiently
Slide 42
© 2003-2005 Monash CTIE
Interior Protocols
Independent of protocols used in other ASs
Convey complete routing information with an AS
Some protocols allow summarization within an AS
OSPF areas
Propagate change rapidly
Slide 43
© 2003-2005 Monash CTIE
Routing Information Protocol
– Next Generation (RIPng)
Interior gateway protocol
Based on RIP (IPv4)
Distance vector algorithm
Limited to networks with no more than 15 hops
Routing decisions take into account fixed metrics (usually 1)
Slide 44
© 2003-2005 Monash CTIE
Route table
Each router maintains a route table
Each entry in the table contains:
prefix of destination
metric
equal to sum of metrics along each hop to the destination network
IPv6 address of next hop
a flag to indicate recent changes have taken place
various timers associated with route
Slide 45
© 2003-2005 Monash CTIE
Request/response packets
UDP used to carry messages
Packet format
route tag used to separate RIPng routes for network being
managed, from those of an external RIPng process that have
been imported into the network
Responses may be in response to a request packet or
may be sent periodically without solicitation
Responses contain lists of route table entries for the
sender
May contain complete or partial tables
Slide 46
© 2003-2005 Monash CTIE
Split horizon
Don't advertise routes learned from an interface out that
interface
Poisoned-reverse
Do advertise routes learned from an interface out that interface, but
set metric to infinity so that they appear to be unreachable
Slide 47
© 2003-2005 Monash CTIE
Major Differences from RIP
RIP includes a "next hop" entry in each routing table entry (RTE)
Due to the length of IPv6 addresses, RIPng defines a special RTE
that contains a next-hop address that applies to all following
RTEs until another next-hop RTE is included
Slide 48
© 2003-2005 Monash CTIE
Open Shortest Path First
(OSPF)
Another interior gateway protocol
Link state algorithm
Version 3 supports IPv6
Slide 49
© 2003-2005 Monash CTIE
Areas
Large ASs may be broken up into “Areas”
Helps control the amount of traffic used to propagate
information
Slide 50
© 2003-2005 Monash CTIE
Designated routers
Uses an election process to pick one router on each link
to be “in charge”
Slide 51
© 2003-2005 Monash CTIE
Flooding
Link state information is propagated by flooding the
entire network
Contrast with RIP where information about entire network is
passed only to neighbours
Link State Advertisements (LSAs) are stored by routers in
a “link-state database”
Dijkstra’s algorithm used on this database to calculate
the shortest path tree and populate the routing table
Slide 52
© 2003-2005 Monash CTIE
Differences from OSPFv2 (IPv4)
Protocol processing done per-link rather than per-subnet
Single links may have multiple IPv6 subnets and devices on the
same link that don't share a subnet may still communicate
directly
IP addresses are no longer used in OSPF packets
packets carry topology information in the form of router IDs
(which are 32-bit values like IPv4 addresses and are sometimes
represented that way)
Flooding scope added to LSAs
Link, Area and AS scope
Slide 53
© 2003-2005 Monash CTIE
Differences from OSPFv2
(IPv4) (cont)
Support for multiple instances of OSPF per link
Link-local addresses used for communication between
routers where possible
Special multicast addresses
AllSPFRouters: ff02::5
AllDRouters: ff02::6
Authentication removed from protocol specification
OSPF now relies on the IP Authentication Header and IP
Encapsulating Security Payload features of IPv6 to secure the
integrity of routing exchanges
Slide 54
© 2003-2005 Monash CTIE
Border Gateway Protocol
(BGP)
Exterior gateway protocol that allows routing information
to be exchanged between autonomous systems (ASs)
sufficient to determine reachability and eliminate routing
loops.
Slide 55
© 2003-2005 Monash CTIE
BGP Peers
Information is exchanged between pairs of routers called
BGP peers
Information carried using TCP
Small “keep alive” packets keep the TCP session from
timing out.
Slide 56
© 2003-2005 Monash CTIE
BGP routes
Contains “Network Layer Reachability Information”
(NLRI) plus “path attributes”
Next Hop
AS path
Routing decisions may be based on the attributes
Policies are used to determine which routes are sent to a
peer and which routes will be accepted
Slide 57
© 2003-2005 Monash CTIE
Updates
Entire routing table exchanged when peering first
established
Because TCP is used, only changes need to be
transmitted after that
Efficient use of bandwidth (compared to IGPs)
Routes may added, deleted or modified
Routing loops are avoided by examining the AS path
Slide 58
© 2003-2005 Monash CTIE
Supporting IPv6
BGP-4+ contains extensions for supporting network
protocols other than IPv4
Very little required in order to support IPv6
BGP Identifier is still an IPv4 address
IPv6-only routers still need an IPv4 address to run BGP
New attribute defined that carries both the IPv6 NLRI as
well as the next hop
Next hop attribute is not used (v4 only)
Slide 59
© 2003-2005 Monash CTIE
Progress:
Basics
Addressing
Routing
Domain Name System
IPv4 to IPv6 transition
Security
State of the Art
Mobile IPv6
Slide 60
© 2003-2005 Monash CTIE
DNS - Domain Name System
DNS translates “fully qualified domain names” like:
www.ctie.monash.edu.au
Into IP addresses like:
130.194.137.141 or 2001:388:608c:fc:205:5dff:fe00:9e3a
DNS servers hold records associating names to IP numbers
Applications use DNS Client (resolver) to access the records
Each DNS entry contains multiple record types (RR) and information
No modification required to support IPv6 addresses in the
DNS system
Newer DNS software supports both IPv4 and IPv6 access
Slide 61
© 2003-2005 Monash CTIE
DNS: Resource Records (RR)
RR:
A records for IPv4 address
address record
Example DNS record lookup:
dig helen.ctie.monash.edu.au any
;; QUERY SECTION: helen.ctie.monash.edu.au, type = ANY, class
= IN
;; ANSWER SECTION:
helen.ctie.monash.edu.au. 12H IN A 130.194.252.35
helen.ctie.monash.edu.au. 12H IN AAAA
2001:388:608c:fc:205:5dff:fe00:9d30
;; AUTHORITY SECTION:
monash.edu.au. 12H IN NS
netslave1.cc.monash.edu.au.
Slide 62
© 2003-2005 Monash CTIE
DNS: IPv6 & Software
Support
DNS name server software
IPv4 queries can get IPv6 addresses from existing name
servers
BIND v9 (on unix/linux/MacOSX) has native IPv6 access
MS Windows DNS (winNT,2K,XP) - IPv4 query only!
Client (resolver) apps:
Nslookup (MS Windows, Unix, MacOSX) - IPv4 queries
DIG - IPv4 and IPv6 versions
Proxy software exists for native IPv6 DNS lookup to IPv4 name
servers
Slide 63
© 2003-2005 Monash CTIE
DNS: Reverse lookup
NOT all DNS name servers support reverse lookup
of IPv6 addresses
Dig -x <IP address>
Automatically checks in_addr.arpa or ip6.arpa
Examples
Dig -x 10.1.1.10 looks up 10.1.1.10.in-addr.arpa.
Dig -x 3ffe:4567:12:fc:205:5dff:defd:abc looks up \
[x3FFE4567001200FC02055DFFDEFD0ABC/128].ip6.arpa.
Slide 64
© 2003-2005 Monash CTIE
Progress:
Basics
Addressing
Routing
Domain Name System
IPv4 to IPv6 transition
Security
State of the Art
Mobile IPv6
Slide 65
© 2003-2005 Monash CTIE
IPv4 to IPv6 Transition
Strategies and mechanisms:
The problem:
The solutions:
Tunnels
Slide 66
© 2003-2005 Monash CTIE
Dual Stack
Application
TCP,UDP
IPv4 (type
IPv6
0x0800) Ethernet (type
0x86DD)
Slide 67
© 2003-2005 Monash CTIE
Dual Stack (cont)
Slide 68
© 2003-2005 Monash CTIE
IPv4-mapped addresses
IPv4 Mapped addresses --> IPv6 node to IPv4 node
Used by IPv6 applications for internal representation of
IPv4 addresses
IPv6 node communicates directly (via dual stack) to IPv4
address
80 bits 0, 16 bits 1, 32 bits of IPv4 address on the end
0:0:0:0:0:FFFF:192.17.1.42
::FFFF:192.17.1.42
::FFFF:c0a7:abcd
Slide 69
© 2003-2005 Monash CTIE
IPv4 compatible addresses
IPv4 compatible addresses represent an IPv6 node
without having a real IPv6 address
IPv6 node communicates directly (via dual stack) to IPv4
addresses
96 bits 0, 32 bits of IPv4 address on the end
0:0:0:0:0:0:192.17.1.42
::192.17.1.42
::c0a7:abcd
Used by tunneling protocols like 6to4
Can’t use IPv6 stateless address autoconfiguration –
requires preconfigured IPv4 address for node.
Slide 70
© 2003-2005 Monash CTIE
Tunnels
Tunnels - Encapsulation of IPv6 over IPv4
Manual point-to-point rfc2893
Auto - 6to4,Teredo, ISATAP addresses rfc2893
let IPv6 hosts or networks communicate over IPv4 without explicit
tunnel setup
6bone - tunnel connected network - Brokers provide temporary links
IPv4
192.168.1.10 192.168.10.2
IPv6 in IPv4
3ffe:0db8::1/64 3ffe:0db8::2/64
Slide 71
© 2003-2005 Monash CTIE
Tunnels - IPv6 in IPv4
IPv6 packet is encapsulated in an IPv4 packet
Slide 72
© 2003-2005 Monash CTIE
Tunnels - IPv6 in IPv4
IPv4 tunnel appears as a single hop to the IPv6 nodes
The MTU decreases by the IPv4 header size (20 bytes)
Tunnel types:
Router-Router
Node-Node
Node-Router
Slide 73
© 2003-2005 Monash CTIE
Automatic configuration of
tunnels
Automatic Tunnel configuration - compatible addresses
A dual stack host connected to an IPv4 network may use an
IPv4 compatible address to talk to IPv6 hosts through a
gateway IPv6 hosts
This technique is no longer favoured
Dual
Dual stack host stack
IPv4 network router
::192.168.1.1
Slide 74
© 2003-2005 Monash CTIE
Automatic configuration of
Tunnels - 6to4
Tunnel configuration 6to4
RFC3056 Connection of IPv6 domains via IPv4 clouds (6to4)
supported by Microsoft implementation with a Microsoft provided
6to4 endpoint.
2002:v4addr::/48
Made up of 6to4 prefix 2002::/16 (IANA assigned) and IPv4
address of interface
E.g. 192.1.2.3 = c001:0203
Results in the 6t04 prefix: 2002:c001:203::/48
6to4 relay routers such as that provided by Microsoft provide transit
capability between 6to4 domains and the native IPv6 internet
Slide 75
© 2003-2005 Monash CTIE
Automatic configuration of
Tunnels - 6to4
192.168.1.1 192.168.100.1
2002:c0a8:0101::/48 2002:c0a8:6401::/48
Slide 76
© 2003-2005 Monash CTIE
IPv4 to IPv6 Transition-
Protocol Translation
NAT updated for IPv6
NAT-PT Protocol Translation additions for IPv6 variations
Header field changes, meaning of fields change.
Application specific gateways
SIIT
DNS
FTP protocol has addresses embedded in the messages - need
translation at the gateway device [NAT-PT specifies this].
Slide 77
© 2003-2005 Monash CTIE
NAT-PT and ALG’s
NAT-PT and NAPT-PT . Network Address Translation
updated for IPv6
NAT-PT, NAPT-PT translate protocols (e.g.: ICMP) as well
as addresses
They define Application Layer Gateways as well (nat-pt
specifies FTP, DNS ALG’s as well as protocol translations)
E.g.: NAT-PT translates ICMPv6 ‘path too big’ message into IPv4
ICMP equivalent
Introduces single point of failure device in the network.
May not be possible for all ICMPv6 packets
Slide 78
© 2003-2005 Monash CTIE
NAT-PT and ALG’s
NAT-PT
IPv6 Host IPv4 Host
Router
IPv4 Internet
Slide 79
© 2003-2005 Monash CTIE
NAT-PT and NAPT-PT
NAT-PT Network Address Translation – Protocol
Translation
NAPT-PT Network Address Port Translation-protocol
translation
NAT-PT uses a pool of IPv4 addresses – allocates one
per IPv6 address.
NAPT translates ports as well as addresses.
This allows single IPv4 address to represent multiple
IPv6 addresses
Stateful address/header translations as per SIIT
Slide 80
© 2003-2005 Monash CTIE
SIIT
RFC:2765 Stateless IP/ICMP Translation Algorithm (SIIT)
Allows IPv6 only nodes to communicate to IPv4 nodes
Uses boxes on network to do stateless translation of
IP/ICMP
Translates packet headers from IPv4 to IPv6 mapped or
translated addresses
Must generate appropriate header entries (e.g.:
checksums) for protocol
Rewrites ICMP error message as they contain IP
addresses embedded
Requires IPv4 allocation mechanism for the IPv6 node
and also tunnel/routing configuration
Slide 81
© 2003-2005 Monash CTIE
Progress:
Basics
Addressing
Routing
Domain Name System
IPv4 to IPv6 transition
Security
State of the Art
Mobile IPv6
Slide 82
© 2003-2005 Monash CTIE
Contents
IPv4 and IPv6 Security
Attacks against Internetworks
IPv6 Security Issues.
IPv6 Security features.
Slide 83
© 2003-2005 Monash CTIE
IPv4 and IPv6 Security
Weaknesses of IPv4 security
Trust of received packet information (spoofing)
Host-to-host security not widely available
IPv6 Security Inherits from IPv4
Packet service, can insert packets
Ingress filtering will be incomplete
Many of the IPv4 applications will be in IPv6 (email, web)
IPv6 Built with security in mind
IPv6 aims to be 'no worse than IPv4'
IP Security Protocols (All hosts support IPSec)
New Internet applications specified with security in mind
Slide 84
© 2003-2005 Monash CTIE
Attacks against Internetworks
DoS attacks
Attacks against resources (Server, Link, QoS)
Hijack Attacks
Theft of service/QoS .
Impersonation
Packet forgery
Man In the Middle
Snooping
Data Insertion/Deletion
Host Intrusion
Worms and Viruses (Application Issue!)
This may not get better under IPv6.
Slide 85
© 2003-2005 Monash CTIE
Attacks: Denial of Service
Attacker causes congestion
on victim’s
computer/network
Attacker
Local
Network
Internet
Victim
Slide 86
© 2003-2005 Monash CTIE
Attacks: Service Theft
Attacker gains
unauthorized access to
network
Attacker
Victim
Local
Network
Internet
Slide 87
© 2003-2005 Monash CTIE
Attacks: Impersonation
Attacker disguises itself as
another host to gain
unauthorized access to
services
Attacker
Local Victim
Network
Internet
Victim
Slide 88
© 2003-2005 Monash CTIE
Attacks: Man-in-the-Middle
Man-in-the-middle attacker can block,
modify, replay or otherwise make use
of intercepted packets
Local Victim
Network
Internet
Victim
Attacker
Slide 89
© 2003-2005 Monash CTIE
Attacks: Host Intrusion
Attacker gains
unauthorized access to a
remote host
Attacker
Local
Network
Internet
Victim
Slide 90
© 2003-2005 Monash CTIE
IPv6 Security Issues
IPv6 Security issues.
Data Confidentiality/Integrity
Neighbour Discovery/ Autoconfiguration
Network Access Control
Mobile IPv6
Key Distribution
Transition Mechanisms
Slide 91
© 2003-2005 Monash CTIE
IPv6 Security Features
IPv6 Security features.
IPSec
SEND (SEcuring Neighbour Discovery)
AAAv6
Mobile IPv6 Return Routability
Slide 92
© 2003-2005 Monash CTIE
Security Features: IPSec(v6)
IPSec
End-to-End Security
Authentication
Encryption
Available in some IPv4 nodes, required in ALL IPv6 nodes.
Slide 93
© 2003-2005 Monash CTIE
Security Features: SEND
SEcuring Neighbor Discovery:
Provides a method for applying IPSec to Neighbor
Discovery
Works in situations where IPSec typically wouldn't
(Chicken and Egg)
Protects autoconfiguration messages from attackers on
the same link.
Proves address ownership locally (Using CGA, ABK).
In early stages of development
Key Technology
Slide 94
© 2003-2005 Monash CTIE
Security Features: AAAv6
AAAv6 Protocols:
Provide Authentication, Authorization and Accounting
Used on access networks
Works with NAS, Wireless LAN (EAP), PANA, PPP, Mobile
IPv6
DIAMETER protocol (supercedes RADIUS)
Can specify Authorization policy through
Attribute-Value-Pairs.
Slide 95
© 2003-2005 Monash CTIE
Security Features: AAAv6
PANA PPP
AAA Foreign
802.11b Access
Access Point Router
Local AAA Home
Network
Internet
802.1X
Slide 96
© 2003-2005 Monash CTIE
Security Issues: Key
Distribution
The Public Key Infrastructure (PKI) has been around for a long
time.
Not many nodes have public keys (poor adoption).
Many Key Exchange systems rely upon Public Key availability.
Shared keys don't work for generic peer-to-peer communication.
SEND relies upon Delegation Chains which establish trust
between peers using digital signatures.
Cryptographically generated addresses take pessimistic approach
(no widely adopted PKI)
If Keys are distributed, still need to replace/update securely.
Slide 97
© 2003-2005 Monash CTIE
Security Issues: Transition
Mechanisms
Most IPv6 hosts will be 'dual stack'
IPv4 systems will not have same security feature set as
IPv6
Double Handling of security policy (Mistakes easier).
Small chance of attacks through protocol translation
systems
(IPSec may not work well, though).
Slide 98
© 2003-2005 Monash CTIE
Progress:
Basics
Addressing
Routing
Domain Name System
IPv4 to IPv6 transition
Security
State of the Art
Mobile IPv6
Slide 99
© 2003-2005 Monash CTIE
Advocacy and Forums
More info: http://www.ipv6-taskforce.org/ )
International Task Forces (in the EC, Korea, India, North
America, Taiwan) have been set up to run summits and
seminars promoting adoption and understanding of IPv6
The IETF (Internet Engineering Task Force) is finalizing
standards for IPv6 extensions such as Mobility and
Secure Neighbour Discovery.
The IPv6 Forum has released the "IPv6 Ready" logo,
which can be used to indicate a product's compliance
with IPv6 standards.
Slide 100
© 2003-2005 Monash CTIE
World-wide connectivity
Advocacy won't help if the packets don't get through!
Academic Networks: Internet2 (US), GrangeNet (AU),
6NET (EU), CERNET2 (China), etc.
Commercial Networks:
NTT in Japan and elsewhere
Slide 101
© 2003-2005 Monash CTIE
IPv6 Implementations
(more info: http://www.ipv6.org/impl/ )
Looking at three Classes of implementations:
Host Implementations
MobileIPv6
Router Implementations
Slide 102
© 2003-2005 Monash CTIE
Host Implementations
Most vendor Unix: Solaris 8 +, AIX 4.3 +, etc.
Linux - kernels 2.2 + include IPv6 (2.5+ full IPSecv6)
FreeBSD - includes KAME from 4.0
OpenBSD - includes KAME from 2.7
MS Windows - supported from XP onwards (some API
issues)
Mac OS X (10.2 Jaguar onwards, some API issues)
Embedded Implementations from Wind River, Elmic,
etc.
Slide 103
© 2003-2005 Monash CTIE
Router Implementations
Slide 104
© 2003-2005 Monash CTIE
Network Applications
Server Applications
Apache web server supports IPv6
approach.
Desktop Applications
Microsoft Internet Explorer
FTP, Telnet
Slide 105
© 2003-2005 Monash CTIE
Progress:
Basics
Addressing
Routing
Domain Name System
IPv4 to IPv6 transition
Security
State of the Art
Mobile IPv6
Slide 106
© 2003-2005 Monash CTIE
Contents
IP Mobility
Problem Statement
Simple solutions
Mobile IPv4
Limitations
Mobile IPv6
Motivation
Mobile IPv6
Handovers
Slide 107
© 2003-2005 Monash CTIE
Mobile Packets the Future?
Trends towards packetisation of everything
Easier to incorporate different data streams
User control of usage models
We don't know what the applications will be
(but we can take some guesses).
Once we have IP connectivity, anything goes...
Slide 108
© 2003-2005 Monash CTIE
The Internet Mobility
Challenge
IP address is not only a unique address, but tied to
Network Topology
Movement of an IP device between networks relies on
Layer 2 or Layer 3 context transfer.
When Layer 3 transfer occurs, IP address changes.
Higher layer protocols cannot handle IP address
changes (e.g. TCP)
IP Mobility must hide or prevent IP address changes
for higher protocol layers
Slide 109
© 2003-2005 Monash CTIE
Layer 2 mobility limitations
Single Layer 3 broadcast domain
All broadcasts go over wireless medium
Handovers between networks problematic
Service Provider to Enterprise/Service Provider
Heterogeneous handovers
Need to re-implement mobility for every Layer 2
Slide 110
© 2003-2005 Monash CTIE
Using DHCP for roaming
Dynamic Host Configuration Protocol
Allows devices to get an address when visiting a
network.
Available for IPv4 and IPv6.
Existing sessions do not survive movement across link
boundaries
Address management not required in IPv6 (Stateless
Address Autoconfiguration)
Provides additional information (DNS &etc)
Slide 111
© 2003-2005 Monash CTIE
Mobile IP
No geographic limitations
No physical connection
No modifications to other hosts or routers
No modifications to IP addressing
Secure
Transparent to transport layer
Assumptions
<1 change per second
routing based only on destination address
Slide 112
© 2003-2005 Monash CTIE
Mobile IPv4
Data
Correspondent
Node
Internet
Home Address
Home
Network Tunnel Mobile
Node
Foreign
Address Registration Network
Home Agent Foreign Agent
Slide 113
© 2003-2005 Monash CTIE
Mobile IPv6
Address Autoconfiguration
No Foreign Agents
Optional Headers
Routing Header - replaces tunneling
Home Address – overcomes ingress filtering
Binding update and request
Host Binding Caches
Route optimisation
IPSec
Separate Security Specification
Supports privacy
Slide 114
© 2003-2005 Monash CTIE
Mobile IPv6 System
Correspondent
Data Node
Address
Internet Binding
Data
Router
Home Address Advertisement
Slide 115
© 2003-2005 Monash CTIE
Mobile IPv6 Handover
Correspondent Mobile
Node Node
Care-of Test
Foreign
Correspondent
Network 1
Binding Update Care-of
Internet Address 1
Router
Home Address Advertisement
Home
Home Test Foreign
Network Network 2 Care-of
Address 2
Duplicate Address Mobile
Home Binding Detection
Update/Acknowledgment Node
Home Agent
Slide 116
© 2003-2005 Monash CTIE
Mobile IPv6
Benefits: Complexities:
1. Uses IPv6 Router 1. Movement detection
Discovery to detect granularity is low
movement 2. Dead time related to
Slide 117
© 2003-2005 Monash CTIE
Thank you