Detection of IPv6 Neighbor Discovery and Host Redirection Spoofing
draft-pashby-ipv6-detecting-spoofing-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Author | Ronald Pashby | ||
Last updated | 2005-07-14 | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
The purpose of this draft is to provide a method to detect exploitation of inherent vulnerabilities in the Neighbor Discovery processes. There are two well documented vulnerabilities in the basic IPv6 architecture: Neighbor Discover spoofing and Host Redirection. There already exists the SeND RFC [send] that addresses authenticating these interactions. Certain networks may choose not to uses (or cannot use) SeND, for instance, networks that use DHCP or statically assigned addresses. There is an underlying security principle that says, "If you can block a attack do it. If you cannot block it, detect it. Even if you can block it, detect it." This proposal outlines simple modifications to the basic protocols to allow for easily detecting these attacks. Through proactive systems, once an attack is detected it could easily provide blocking by isolating the attacking host via Access Control Lists (ACLs) or disabling ports. The basic method proposed is to force packets used in these attacks to be multicast to the attacked nodes Solicited Node Multicast group, thus allowing a security device to detect when it is occurring.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)