Security Features Of Ipv6 And Its Implementations Information Technology Essay

Published: November 30, 2015 Words: 3210

Study and report on the security provisions within the IP version 6 protocol and compare these to IP version 4. Study the relevant RFC standards and the current state of IPV6 implementation. Which security problems of IPV4 is IPV6 likely to resolve ? Report on your technical investigation and on the impact of any security issues on the likelyhood of IPV6 adoption. Suitable for 2 students willing to collaborate on condition they are willing to experiment with use of IPV6 between 2 different operating systems.

The current internet protocol which is IPV4, is beginning to reduce in address space and unable to support additional nodes and requirement of other applications. IPv4 is a protocol type that support about 2.000.000.000 addresses. Internet protocol version 6 (IPV6) is a new type of version that is used to replaced internet protocol version 4 (IPV6). This new protocol has some new features which includes

Compared to IPV6, IPV4 is not as powerfully and sophisticated as the new internet protocol IPV6 which as well is not compatible with IPV4

IPV4 is the first type of internet protocol that came into existence before the IPV6. The protocol has been into existence since the year 1981,

Internet protocol version 6 (IPV6) is a new type of version that is used to replaced internet protocol version 4 (IPV6)

HISTORY OF INTERNET PROTOCOL

The operation of IPV4 begins in 1970s which is approximately 30 years ago. When the protocol began its operation, initially it was not govern by any standard until 1981 when the RFC 791 that runs the protocol standard starts to issue the functionality of IPV4.

http://ipv6.com/articles/general/timeline-of-ipv6.htm

SECURITY CONCERN WITH INTERNET PROTOCOL 4 (IPV4)

IPv4 needs to be considered before the full explanation of IPV6, reason been that there are some security issues which IPv4 is having at the moment. Version 4 protocols is a system type of address used to identify end to end devices on the internet network.IPv4 has been into existence since for about thirty years now and it is the most common widely type of protocol used at present. Due to the fact that Many network uses IPV4 it has begun to provide problems in so many area like the shortage of the addressing in IPV4is growing fast which brings the introduction of IPV6. IPv6 was introduced to solve most of the issues that IPV4 has. The internet has widely used by millions of people continues to be visible making it not easy to provide any security support with IPV4 in certain areas like;

Denial of service

Distribution of malicious code

Man in the middle man

Shortage of address space

Fragmentation

Internet protocol spoofing

Connection hijacking

With the following reasons above, there have been ways in which IPV6 is designed to combat the security issues facing IPV4, which one of them is the introduction of IPSec that has helped the use of data encryption for easy communication also network translation address (NAT) and network address port translation (NAPT) were brought in to help the falling shortage of IPV4 address space

IPV6

Internet protocol version 6 (IPV6) is a new version of protocol which is gradually replacing IPV4. IPV6 does not create a connection before a section is been form, thereby making it difficult for the delivery of packet to be unreliable. Before any packet could be acknowledge it has to be done by a protocol called TCP, and this TCP is also responsible for the recovery of any packet which is been loss. TCP/IP as known is internet communication protocol which provides a reliable connection between two connected devices when the protocol facilities are in place. When IPV6 was introduced, the protocol came with a specification which was defined in RFC 2460. The define specification consist of different header format and an extension header together with the ways in which their rules are been processed. The packets in IPV6 consist of the following;

IP6 header -the header itself consist of the destination address, source address, and the hop limit

IPV6 payload

Below is a brief definition of the components of the header

The destination address is the final destination where the packet is going to

The source address is the initial starting point of the packet, while

The hop limit is the total number of segmented network through which the IPV6 packet is allowed to travel before a device will discard the packet, and the device used to discard the packet is the router.

The header in this protocol contains a least type of information which allows interaction between two different nodes on a network, while the extension header which is the second header type consist of extra decision making for either the host or a router which are used in receiving a packets. From a point of view it should be noted that IPV6packet can have one or more extension header when needed for any processing of packets which are like the extension header.

To start with, it should be noted that a router processes the header part of IPV6 by making sure that the network performance is excellent in terms of security and traffic control, for this to occur there is a mechanism which will be used to allow the processing of the header to perform is brilliant work, and this mechanism is in a mobility form. The mobility process that was employ is used to allow any mobile nodes to exchange their current address location by not losing any of their current location from where the nodes have linked up communication. Below are diagrams that illustrate the header of IPV6 and IPV4 for basic comparison purpose.

version

Traffic Class

Flow label

Payload length

Next header type

Hop limit

Source address

Destination address

IPV6 HEADER

IPV4 HEADER

IPV6 header size is doubled compared to the IPV4 header size, but the size of the address is four times (Blanchet. Pg. 46)

HEADER FIELDS IN IPV6 AND IPV4

Field

Size (in bits)

IPV4

IPV6

Version

4

IPV4 uses 4 bits

IPV6 uses 6

Length of header

4

Available in IPV4

Removed from IPV6

Type of service

8

Available in IPV4

Renamed to "traffic class"

Total length

16

Length of datagram

Payload length

Identification

16

Fragment ID

Extension header used in fragment

Flags

3

Fragmentation flags

Extension header used in fragment

Fragment offset

13

Pointer

Extension header used in fragment

Time to live

8

Each hop is decreased by one

Renamed to "hop limit"

Protocol

8

Transport protocol identification

Renamed to "next header"

Check sum

16

Header checksum

Removed in IPV6

Source address

32

IPV4 address

128 bits of IPV6 address

Destination address

32

IPV4 address

128 bits of IPV6 address

Source: Marc. B. (2004). Migrating to IPV6: a practical guide for mobile and fixed networks. New York. John Wiley & sons, page 45.

IPV6 FEATURES

Being a new version of IPV4, some of the functions which is functioning to requirements in IPV4 has been kept in IPV6, and the functions that has not been working properly has been replaced by IPV6. In RFC 1752 (Blanchet M, Pg.30) a new feature has been added to the new protocol (IPV6) to boost the functionality of the internet protocol. Below are some of the features of IPV6.

LARGE ADDRESS SPACE

It has a benefit of 128 bits address space, in which IPV4 only has 32 bit address space, and all computer nodes can easily be reached and addressed by eliminating any need for translating a network address.

With the increased IP address size of 128 bits, various IP addresses can be defined, which provides 655,570,793,348,866,943,898,599 (6x10^23) "addresses for every square meter of the earth's surfaces" (Davies, Pg. 9).

EXTENTION HEADER

The implementation option of IPV6 is referred to as extension headers and is marked with processing options. This is so because; routers do not have to look at most extension headers which increases their performance. New header can be added without any impact on the implementation of IPV6. (Marc Blanchet, Pg. 31.)

QUALITY OF SERVICE (QOS)

This is a feature that makes sure that priority will be given to some packet which gets to a destination at the normal or right time. For such situation to occur, the flow label field of the header in IPV6 was implemented. For example, streaming video and text will have different time of processing before it gets to the destination.

COMPULSORY IP SECURITY

Internet protocol security is a set of security protocol which is mandatory in IPV6. It makes sure that all traffic passing through a node is been secure from end to end nodes if the required information is kept in place. Although for the fact that security is important in IPV4, the support in IPV4 was made optional. This in turns makes IPV6 more suitable when it comes to security issues.

AUTOMATIC CONFIGURATION

Based on advertisement of a link address which a router is sent, the node part of a device will sent its media access control address to the host part of this new protocol version called IPV6 address. This can happen with or without the presence of the dynamic host configuration protocol (DHCP) server, which makes it easier for any device present on a network to be configured automatically, by communicating with other devices without any manual intervention.

PRIVACY ADDRESES

It provides privacy to end users in a way that the internet protocol address cannot be used to track how many traffic that has been used.

IPSEC

This is a new security context which is define by RFC 2401 standard of the IPV6 and it is used in the application of virtual private network (VPN). It uses the encryption and authentication header also known as the encapsulation payload security (ESP) to provide a standard security. IPv6 function on the network layer of the OSI model to provide maximum security for applications like, browsing the internet, downloading of files etc. both the authentication and the encapsulation security payload can be used alone or together to give the require security needed. These two headers in IPsec can be used in two different modes namely;

Transport mode

Tunnel mode

http://ipv6.com/articles/general/timeline-of-ipv6.htm

IPV6 SECURITY

The introduction of IPV6 came with a specification which was defined in RFC 2460. The define specification was used to launched the security feature called IPSEC and are divided into two headers which are name below;

AUTHENTICATION HEADER (AH)

ENCRYPTED SECURITY PAYLOAD (ESP)

Some other function which exist in security version of IPV6 are

Security association

Key management

AUTHENTICATION HEADER (AH) (http://docs.hp.com/en/J4255-90011/ch04s03.html)

The authentication header was specially design to provide the integrity and authentication of internet protocol packet and as well to provide protection against any replays. When this is in use, it protects any packet spoofing and any unwanted modification of any fix field. The header in IPV6 contains a minimal type of information that will allow interaction between two different nodes on a network.

IPV6 authentication header

Next header (8 bits)

Length of payloads (8 bits)

Reserved

(16 bits)

Security parameter index

(32 bits)

Sequence number

(32 bits)

Authentication data (32 bits)

IPV6 authentication header consists of some parameters which are;

8 bits next header: this header spot the header will be instantly follow the basic IPV6 header.

Length of payload is used to show the length of the internet protocol packet of the payloads in bytes

Reserved

Security parameter index

Sequence number

Authentication data

Authentication header is a header that is fixed between the upper level payload and the IPV6 header. This header comprises of 64 bits fix parts along with a 32 bits block which is can be varied, and the fix part is enclosed with the following;

The next header (8 bits)

The length of the payloads also (8 bits)

Reserved (16 bits)

Security parameter index (32 bits)

ENCAPSULATION SECURITY PAYLOAD (ESP) HEADER

http://www.networksorcery.com/enp/protocol/esp.htm

As already explained, encapsulation security payload can either function alone or probably combine with authentication header, and can be used to provide the following security features;

Confidentiality

Data integrity

Authentication of data

Flow of traffic

Anti-replay traffic

It should be noted that the process of authenticated can only be applied to the data that is being encrypted when authenticating encapsulation security payload, which will in turn make it impossible for the field in the Internet protocol header not to be protected by the process of authentication. For this protection to occur, the fields in internet protocol header will have to be encapsulated in the tunnel mode.

Below are some basic explanations of the fields in ESP;

Security parameter index is a parameter used to identify the security association, and it has a 32 bits .

Sequence number is described in authentication header, and its main function is to provide anti-replay guard.

Payload data is an IP packet used in tunnel mode which is protected by encryption

Padding: it is required in block cipher that plaintext should be padded in a block size of multiple sizes, which when a padding is needed it should be just after the padding in the padding field.

Pad length specifies the total number of pad bytes which is directly above padding field.

Next header this header field describe the data types that pay load data field is contain, by finding the first header in the payload. For example, the extension header present in IPV6 and transport control protocol (TCP) which is just above the network layer.

Authentication data is an adjustable field length which contains the integrity checked value (ICV) calculated over encapsulation security payload (ESP) subtracted from the data field of the authentication.

SECURITY ASSOCIATION

Security association is a relationship which occurred in one way communication between a sender and a receiver which in away accepts a security services to a traffic agreed on through the relationship. It is an important concept which occurs in the authentication and confidentiality of the internet protocol tools. For a two way relationship to occur, then there will be a two way secure exchange which will then require two security associations. Security association can be classify by the parameters below

Security parameter index

IP destination address: Only support the unicast addresses

Security protocol identifier: this is used to show whether an association is authentication header or encapsulation security payload header.

http://www.securitydocs.com/library/2757

KEYMANAGEMENT

APPLICATION OF IPV6

http://www.cu.ipv6tf.org/literatura/chap8.pdf

Authentication header and encapsulation security payload are strong internet protocol security tools that can be used for the protection of a secure communication that exist across a local area network, private and public. The next focus will be on how authentication header and encapsulation payload are used in VPN for secure communication will be explain below.

VIRTUAL PRIVATE NETWORKS (VPN)

Most companies have decided to connect their networks together through the internet which is a good idea compare to those days when most organisation use to separate there networks from each other. Most organisations base their business on using the internet to communicate from one network to another due to the fact that the internet is an inexpensive and efficient way of communication. Securing the network has become a very big challenge to every individual and organisations using the internet because not all part of the packets traveling through the internet is secure. Due to this fact, most organisations and individuals begin to have interest to a means in which data can travel through the internet without letting anyone who is not authorised have access to the data been transported from a genuine source to a genuine destination.

For a network to be secure and standard a VPN will have to be created. VPN (Virtual private network) is a way of connecting two different private networks through a public network which can be an internet. It provides a secure links in a cost efficient way so that anyone that wishes to provide information through a secure link can be more guaranteed and genuine. Creating VPN in IPV6 has become a very recognised standard and easy with the help of the authentication header and the encapsulation security payload which when compare with IPV4 is not as easy as IPV6.

Let's take TPC as an example, assuming that a TCP channel between two host name host 1 and host 2 are to be protected just for manipulation of data in network 1 of host 1 and network 2 of host 2 while the privacy of data is not been put into consideration in this same networks. It can be seen from the diagram above that there exist two routers which are named R1 and R2 this two routers serves as a firewall to the network. In cases like this, the authentication header can be misused by unauthorised individual. To start with, when R1 gets a packet the packet will be changed by including the authentication header before been sent to R2. When the packets are been receive in R2, R2 check if the integrity of the packet and as well checks for authentication through the data that exist in the authentication header. If the data check through authentication is successful then the internet protocol and the authentication header that exist in the data will be detached allowing the original packet to be sent to the destination.

The above example is simply emphasising on when only the authentication header (AH) is used to implement VPN it will be easy for an attacker to modify a packet been transmitted purposely and include a false packet in the TCP channel. In a way, the contents of the packet can still be read bythe attackers.

http://www.amaranten.com/support/user%20guide/VPN/VPN_Overview/Overview.htm

http://ipv6.com/articles/security/Virtual-Private-Network.htm

http://my.safaribooksonline.com/book/networking/security/9781587058387/ipsec-and-ssl-virtual-private-networks/ch08lev1sec5#X2ludGVybmFsX0ZsYXNoUmVhZGVyP3htbGlkPTk3ODE1ODcwNTgzODcvMjYy

REQUEST FOR COMMENTS (RFC) IPV6 STANDARDS

There are standard governing the communication and authentication of IPV6, which are RFC standards. Below are some of the important standards;

RFC2460

This standard is a specification of IPV6 which covers some of the new features of IPV6, and the features it covers range from the following;

Large address spaces of 128 bits which is scalable, and in a way extending the available space of both multicast, and unicast addresses.

Quality of service improvement

Extension of headers which allows some more extra internet protocols to be included to IPV6, so that it will be easy to add IPsec and mobile IPV6 to the header present in IPV6.

RFC 2460, 4301, 4302, 4303 and more

This standard was implemented to specifically increase the support for security features through internet protocol security ("IPSEC"), e.g. Encapsulation security payload

RFC 2461, 2462, and more

Standards in this range is use to support automatic configuration by using addresses which are linked.

RFC 2463

Above standard is used for internet control message protocol present in IPV6

RFC 3041, 3972

Used for securing addresses for protecting privacy and cryptographically addresses used to sign and authenticate messages.

http://ipv6.com/articles/general/timeline-of-ipv6.htm

Below are some other important of IPV6

RFC 2401: this is standard used for the overview of security architecture

RFC 2402: used to describe the authentication extension of both IPV4 and IPV6 of a packet

RFC 2403: A standard used to describe the capabilities of key management

RFC 4294: node requirement standard which was pronounced in 2006

Ref: 1. Ahmad Rivkin IPV6 security (2007)http://e-articles.info/e/a/title/IPv6-Security/

2. Ahmad Rivkin IPV6 security (2007) http://e-articles.info/e/a/title/General-IPv6-Security-Concepts/

3. Microsoft security features for IPV6 http://technet.microsoft.com/en-us/library/cc775898(WS.10).aspx

(http://www.6net.org/events/workshop-2003/marin.pdf)

Samuel Sotillo (http://www.infosecwriters.com/text_resources/pdf/IPv6_SSotillo.pdf)

Security features of IPV6 (http://www.cu.ipv6tf.org/literatura/chap8.pdf)

(http://en.wikipedia.org/wiki/IPv6)

http://tools.ietf.org/html/rfc2460

http://www.answers.com/topic/list-of-ipv4-protocol-numbers

(http://www.isoc.org/briefings/004/isocbriefing04.pdf)

http://www.networkdictionary.com/networking/IPv6vsIPv4.php

http://mirrors.bieringer.de/www.deepspace6.net/docs/overview.html

http://www.networksorcery.com/enp/protocol/ah.htm

http://www.broadband-forum.org/technical/download/TR-187.pdf

http://media.techtarget.com/searchNetworking/downloads/IPv4_or_IPv6.pdf

http://www.cs.princeton.edu/~mef/research/napt/reports/usenix98/index.html

http://mirrors.bieringer.de/www.deepspace6.net/docs/overview.html#id2865600

http://technet.microsoft.com/en-us/library/bb726956.aspx#EGAA

http://technet.microsoft.com/en-us/network/bb530961

http://www.sans.org/reading_room/whitepapers/protocols/security-features-ipv6_380

http://www.securitydocs.com/library/2757