28/04/2003 1
Intrusion Detection and IPv6
Arrigo Triulzi
arrigo@northsea.sevenseas.org
Intrusion Detection and IPv6 Arrigo Triulzi - - PDF document
28/04/2003 Intrusion Detection and IPv6 Arrigo Triulzi arrigo@northsea.sevenseas.org The SANS Institute 28 th April 2003 The author can be contacted at: Arrigo Triulzi 25, Rue de Livron 1217 Meyrin Switzerland Telephone: +44 7956 963 288
arrigo@northsea.sevenseas.org
28/04/2003 2
28/04/2003 3
! Todd Heberlein at UC Davis and LLNL
! Evolution of NSM ! Widespread use in US Military
! Northcutt et al.
! ISS, Snort, NFR, Dragon, etc.
28/04/2003 4
! IPng: IP “New Generation”
! Now called IPv6
! Japan (WIDE initiative) ! Others experimentally world-wide (6Bone)
! Example: DNS (A6 vs. AAAA records)
28/04/2003 5
! Simplified header ! Dramatically larger address space ! Authentication and encryption support ! Simplified routing (a lesson learned…) ! No checksum in the header ! No fragment information in the header
28/04/2003 6
14:39:29.071038 195.82.120.105 > 195.82.120.99: icmp: echo request (ttl 255, id 63432, len 84) 0x0000 4500 0054 f7c8 0000 ff01 4c6e c352 7869 E..T......Ln.Rxi 0x0010 c352 7863 0800 1c31 3678 0000 3e5f 6691 .Rxc...16x..>_f. 0x0020 0001 1562 0809 0a0b 0c0d 0e0f 1011 1213 ...b............ 0x0030 1415 1617 1819 1a1b 1c1d 1e1f 2021 2223 .............!"# 0x0040 2425 2627 2829 2a2b 2c2d 2e2f 3031 3233 $%&'()*+,-./0123 0x0050 3435 3637 4567 14:40:04.096138 3ffe:8171:10:7::1 > 3ffe:8171:10:7::99: icmp6: echo request (len 16, hlim 64) 0x0000 6000 0000 0010 3a40 3ffe 8171 0010 0007 `.....:@?..q.... 0x0010 0000 0000 0000 0001 3ffe 8171 0010 0007 ........?..q.... 0x0020 0000 0000 0000 0099 8000 60fe 4efb 0000 ..........`.N... 0x0030 bc5e 5f3e 2f77 0100 .^_>/w..
28/04/2003 7
! In simpler terms: a lot
! “where in the world is this address?”
! Structure, at last!
28/04/2003 8
! Done via “extension headers” (AH) ! Reference: RFC2402
! Anything after ESP header is encrypted ! Need not be the first extension header ! Reference: RFC2406
28/04/2003 9
! Classless routing from day zero ! “Top-Level Aggregators” (TLAs)
! Already available in other layers ! “Real” checksum available via AH
! Fragmentation via extension headers
28/04/2003 10
28/04/2003 11
! “Badness” is an infinite concept ! How do you catch zero-day attacks?
! You should know your network ! The number of authorised flows is smaller
28/04/2003 12
! It takes time to describe normality ! It is a boring job!
! You no longer play “catch-up” with rules ! Zero-day attacks become visible
28/04/2003 13
! Monitor all subnets ! Validate firewall flows
! Trained security analysts are not
! Bad guys rarely take the front door
28/04/2003 14
! Surge on port 80 inbound: web DDoS? ! Surge on port 25 outbound: Outlook virus?
! Isolated incidents are no longer “isolated” ! Patterns appear
28/04/2003 15
! Nobody really looks at it… ! Slow & low attacks are invisible
! Why have 40000 identical alarms? ! A little knowledge is dangerous knowledge
28/04/2003 16
! Why look at ten sensors individually? ! Data becomes knowledge in context
! Historical analysis ! Sophisticated pattern matching
28/04/2003 17
! IIS attack against Apache should not alert ! * nix attacks against * nix should escalate
! * nix attacks to Windows staff is a waste of
! Play your best analyst on tough calls
28/04/2003 18
! 1000 “red alerts” lose their meaning ! A 24x7 “High alert” becomes “normality”
! Don’t wait for the network to be flooded ! Find internal sources
28/04/2003 19
! Cheap: use Linux or * BSD ! Simple: native on OpenBSD ! Painless: mistakes remain internal
! Don’t play with telnet only ! Try at least a webserver and mailserver
28/04/2003 20
! IPv4 NIDS don’t detect IPv6 attacks ! Make sure you have an IPv6 router ! Learn tcpdump!
! focus-ids @ SecurityFocus ! Snort CVS head
28/04/2003 21
! Simple structure means better performance ! Be prepared for lots of data
! Less research in esoteric protocols ! More attention to user interfaces at the
28/04/2003 22
28/04/2003 23