Original URL: http://www.theregister.co.uk/2007/05/11/ipv6_flaw_scramble/

Experts scramble to quash IPv6 flaw

'Can be exploited by any greedy Estonian teenager with a $300 Linux machine'

By Robert Lemos

Posted in Security, 11th May 2007 09:46 GMT

A flawed feature that could amplify denial-of-service attacks on next-generation networks has vendors and engineers rushing to eliminate the potential security issue.

This week, experts sent two drafts to the Internet Engineering Task Force (IETF) - the technical standards-setting body for the internet - proposing different ways of fixing a problem in the way that Internet Protocol version 6 (IPv6) allows the source of network data to determine its path through the network. The drafts recommend that the IPv6 feature should either be eliminated or, at the very least, disabled by default.

The specification, known as the Type 0 Routing Header (RH0), allows computers to tell IPv6 routers to send data by a specific route. Originally envisioned as a way to let mobile users to retain a single IP for their devices, the feature has significant security implications. During a presentation at the CanSecWest conference on 18 April, researchers Philippe Biondi and Arnaud Ebalard pointed out that RH0 support allows attackers to amplify denial-of-service attacks on IPv6 infrastructure by a factor of at least 80.

"In rough terms, it makes everything we thought was bad, a thousand times worse," Paul Vixie, president of the Internet Systems Consortium, said in an email interview with SecurityFocus. "It can be exploited by any greedy Estonian teenager with a $300 Linux machine."

The security issues comes as more organisations are making the switch to IPv6 from the current internet routing standard (IPv4). The US federal government and many major corporations are transitioning to the standard by the end of the decade. The US Department of Defense and the White House's Office of Management and Budget have mandated that the military services and federal agencies move their backbone systems to IPv6 by 30 June, 2008.

However, the standard is already widely supported by routers and operating systems. Apple's Mac OS X, the Linux operating systems, and Microsoft's next-generation operating system, Vista, uses the standard as the default networking protocol. Microsoft supports wrapping IPv6 packets inside of IPv4 data, known as 6to4 tunneling, so that networks sending data using IPv6 can communicate across the Internet, but attackers could use the technique to send covert data.

The RH0 security issues has its roots in the current internet protocol implementation. The specification for IPv4 allows the sender of data to specify one or more routers through which the data must travel. Known as source routing, the technique allows up to nine other addresses to be included in an IPv4's extended header, requesting that the packet be routed through those specific addresses. While source routing can be beneficial for diagnostics, it can also be used to amplify a denial-of-service attack by a factor of 10 by alternating two target Internet addresses in the header, ping-ponging the data between two machines.

While source routing has been accepted as a bad security risk by most companies and most routers disable the feature by default, the IETF has not eliminated the option from the specification and extended it to IPv6.

"IPv6 is really neat, but I think we are going to see a number of these gotchas because it is still so new," said Jose Nazario, senior security researcher with Arbor Networks. "It will likely shake out over the next couple of years."

Under IPv6, the impact of allowing users to specify some of the addresses to which data must be sent, known as loose source routing, is more dire. Because more addresses can be included in the header, rather than magnifying an attack by 10, Biondi and Ebalard calculated that it could amplify attacks by a factor of 88. In addition, RH0 also could allow an attacker to dodge a distributed technology, known as AnyCast, for protecting the 13 DNS root servers from attack and could be used to create a backlog of packets that could spike traffic to a server at a specific time.

"It is exactly that: The reintroduction of the IPv4 loose source routing mechanism in the IPv6 world and on steroids," said a network engineer who asked not to be identified.

The IETF reaction may have set a new speed record for the standards-setting body. With engineers arguing technical merits and peer-reviewing others' work while vendors push their specific requirements, the IETF is not known for making quick decisions.

Yet, after debating the issue since the CanSecWest presentation, engineers have published two proposals: get rid of the feature or make everyone turn it off unless it's really needed.

"In practice it, it will be disabled, whether it gets left around for future usage, that's up in the air," said Robert Hinden, co-chair of the IPv6 Working Group for the IETF and a Nokia Fellow at the networking and phone giant.

Yet, companies and the engineering group responsible for a large portion of the IPv6 routing code have moved quickly to disable the feature. By late April, the Kame Project, which has created the code used in many flavors of the BSD operating system as well as routers, had disabled the Type 0 Routing Header in its own code.

"They don't just avoid walking the RH0 header, but they also now drop packets that contain it," said Theo de Raadt, project leader for OpenBSD.

Cisco has issued a security advisory on the issue. Both Cisco and Juniper declined to provide a representative to discuss the issue.

Because IPv6 has not been fully deployed in most networks, it will likely only take two or three years for almost all Internet service providers to fix the issues, de Raadt said.

ISC's Vixie agreed that the problem should be almost completely eliminated in three years.

"I'd say in three years this will be a footnote," Vixie said.

This article originally appeared in Security Focus.

Copyright © 2007, SecurityFocus