Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones.
Speaker/Bio
Jonathan is a rising third year Master's student in Systems
Engineering with interests in network systems and network security. He
is currently working with Professor Starobinski on developing simulators
for Advanced Reservation queuing games.
Abstract
(taken from the paper, referenced below)
Security research has made extensive use of exhaustive
Internet-wide scans over the recent years, as they can provide
significant insights into the overall state of security of the Internet,
and ZMap made scanning the entire IPv4 address space practical. However,
the IPv4 address space is exhausted, and a switch to IPv6, the only
accepted long-term solution, is inevitable. In turn, to better
understand the security of devices connected to the Internet, including
in particular Internet of Things devices, it is imperative to include
IPv6 addresses in security evaluations and scans. Unfortunately, it is
practically infeasible to iterate through the entire IPv6 address space,
as it is 2^96 times larger than the IPv4 address space. Therefore,
enumeration of active hosts prior to scanning is necessary. Without it,
we will be unable to investigate the overall security of
Internet-connected devices in the future. In this paper, we introduce a
novel technique to enumerate an active part of the IPv6 address space by
walking DNSSEC-signed IPv6 reverse zones. Subsequently, by scanning the
enumerated addresses, we uncover significant security problems: the
exposure of sensitive data, and incorrectly controlled access to hosts,
such as access to routing infrastructure via administrative interfaces,
all of which were accessible via IPv6. Furthermore, from our analysis of
the differences between accessing dual-stack hosts via IPv6 and IPv4, we
hypothesize that the root cause is that machines automatically and by
default take on globally routable IPv6 addresses. This is a practice
that the affected system administrators appear unaware of, as the
respective services are almost always properly protected from
unauthorized access via IPv4. Our findings indicate (i) that enumerating
active IPv6 hosts is practical without a preferential network position
contrary to common belief, (ii) that the security of active IPv6 hosts
is currently still lagging behind the security state of IPv4 hosts, and
(iii) that unintended IPv6 connectivity is a major security issue for
unaware system administrators.
Reference
- Borgolte, Kevin, et al. "Enumerating active IPv6 hosts for large-scale security scans via DNSSEC-signed reverse zones." Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones. IEEE, 2018. Available here.