Fwd: Re: [suse-security] ipv6 insecure?

---------- Forwarded Message ---------- Subject: Re: [suse-security] ipv6 insecure? Date: Sat, 20 Apr 2002 11:02:29 +0200 From: Peter Bieringer <pb@bieringer.de> To: jsa@pen.homeip.net, jfweber@bellsouth.net, Suse Security <suse-security@suse.com> Hi, the author speaks ;-) --On Friday, April 19, 2002 05:37:36 PM -0800 John Andersen <jsa@pen.homeip.net> wrote:
IPv6 has no mechanism like masquerading or PAT/NAT/PNAT per design, because it breaks the mandatory feature end-to-end security. This results in an end-to-end connection through anything inbetween. This leads to some issues: 1) basic firewalling can be done using simple portfilters like in earlier IPv4 days or advanced (dynamic) portfilters like today some commercial and open source firewalls do. Currently known for IPv6: * Cisco routers with static portfilters * BSD ipfiter (don't know about state support) * Linux netfilter (state support experimental) 2) if no firewalling is done, but IPv6 access is established, in fact a client is complete "IPv6-open" to the Internet, even if protected by IPv4 firewalls. 3) A short screening of popular commercial firewall vendors results mostly in "no IPv6 support today" 4) IPv4 people also have to rethink "We are secure because we use private IPv4 addresses and a dynamic portfilter FW or simple transparent proxy FW", because of: - you are able to tunnel most of the traffic over HTTPS, HTTP (think about SOAP), ICMP, DNS a.s.o. or other valid encrypted traffic. Only very few firewalls (try to) do full payload checking and rewriting (last one is important). For IPv6, such transparent check&rewrite proxies are needed. Result: * For a partially protection: establish gateway security as much as you can * For total protection: forget gateway security for IPv6 (for IPv4 also...), you can block some ports, but what happen if end-to-end security is established (mandatory feature) - gateway sees nothing anymore * Establish central managed client security (problem here: buggy clients, unsupported OS...). Some antivirus software vendors already on the way to do that, because what's about an virus in a PGP or S/MIME e-mail or coming over HTTPS? Gateway scanners see nothing here, too!
The article was in the May/02 Linux Magazine (USA edition ).
It's already available? Oh...have to wait for the issue here (they send me some). Peter ------------------------------------------------------- -- _________________________________________________ No I Don't Yahoo! And I'm getting pretty sick of being asked if I do. _________________________________________________ John Andersen / Juneau Alaska

Hi
This probably isn't within the scope of this list but what about Open BSD and ipv6 ? The developers make a great deal of words about it's firewalling capabilites. Personally I prefer Linux but I suppose that we have to accept that some things can't be done ? Thank you -- Richard

Date: Sat, 20 Apr 2002 11:02:29 +0200 From: Peter Bieringer <pb@bieringer.de>
As the SuSE kernel and some SuSE server packages have IPv6 enabled by default, I want to be sure that my SuSEfirewall2 is protecting these running servers. What rules/chains should I look for? Do I need to add custom rules? (In my case I don't want to expose any of them to the dial-up interface. I use sshd over v6 on internal ethernet but only for convenience of configuration, I could switch to ipv4 if I need) I guess I also need to explore nessus or nmap docs to see if I can set up a laptop to test the ppp interface of my little home gateway/server/workstation for ipv6 connectivity. dproc

Hi
This probably isn't within the scope of this list but what about Open BSD and ipv6 ? The developers make a great deal of words about it's firewalling capabilites. Personally I prefer Linux but I suppose that we have to accept that some things can't be done ? Thank you -- Richard

Date: Sat, 20 Apr 2002 11:02:29 +0200 From: Peter Bieringer <pb@bieringer.de>
As the SuSE kernel and some SuSE server packages have IPv6 enabled by default, I want to be sure that my SuSEfirewall2 is protecting these running servers. What rules/chains should I look for? Do I need to add custom rules? (In my case I don't want to expose any of them to the dial-up interface. I use sshd over v6 on internal ethernet but only for convenience of configuration, I could switch to ipv4 if I need) I guess I also need to explore nessus or nmap docs to see if I can set up a laptop to test the ppp interface of my little home gateway/server/workstation for ipv6 connectivity. dproc
participants (3)
-
dproc@dol.net
-
John Andersen
-
Richard Ibbotson