International Journal of Research In Science & Engineering Volume: 1 Special Issue: 2 e-ISSN: 2394-8299 p-ISSN: 2394-8280 A Review on Various Fragmentation attacks due to Manipulating IPv6 Extension Headers Deepthi M R 1 , Mrs. Srividya B V 2 1 Department of Telecommunication Dayananda Sagar College of Engineering Bangalore [email protected] 2 Department of Telecommunication Dayananda Sagar College of Engineering Bangalore [email protected] ABSTRACT The lack of address space in IPv4 protocol has increased the usage of IPv6 protocol .IPv6, along with increased address space also provides simplified header and the additional functionalities are added in the form of exten sion headers which is the main cause for certain threats in the network, if misused. Operating systems and Network devices are not at the matured stage to handle attacks against IPv6 protocol. Reason for this is not all network devices and operating system are RFC complaints and experience with IPv6 protocol is less. Hence, there are possibilities of many unknown threats .Most of the OS which are popular now such as Windows, Linux and open BS D are susceptible to attacks and it would be rather disastrous in the rise of the IPv6 era if significant security incidents would take place due to its implementations. Various threats due to misusing IPv6 fragmentation and destination extension headers are addressed here. Keywords - IPv6, Extension Header, Tiny fragments, overlapped fragments, flooding, S capy, Wireshark. ----------------------------------------------------------------------------------------------------------------------------1. INTRODUCT ION Internet Protocol version 6 is the recent revision of the Internet Protocol (IP).IPv6 was later developed by the Internet Engineering Task Force (IETF) [1].IPv6 is not made compatible with IPv4 which complicates the transition from IPv4 to IPv6.IPv6 is also prone to certain threats that are present in IPv4 networks and certain new threats are feasible due to IPv6 features. The usage of the new IP version, IPv6, has made the pen testers and attackers to potentially exploit the new fields leading to many attacks. Here, a review of several fragmentation attacks is presented and their impact is also examined. It will be also shown that most of the operating systems which are popular now such as Windows, Linux and OpenBSD are prone to such attacks. Such attacks, under specific instances can result in OS fingerprinting, firewalls evasion and IDS insertion/evasion. These tests will also show which OS is most vulnerable to IPv6 fragmentation attacks [2]. As of the end of 2011, 2012 vulnerabilities related with the IPv6 in various OS implementations have been recorded, one of which are related specifically with the IPv6 fragmentation. Definitely, one of the key issues that should be examined is the support of fragmentation, how it is handled and if it can be exploited by attackers for several reasons, such as OS fingerprinting, IDS (Intrusion Detection Systems) insertion/evasion, or even remote code execution. This work investigates certain threats due to misusing of IPv6 extension headers like fragmentation and destination extension headers. IPv6 Extension Headers: In IPv6 packets, the control information is further divided into a fixed header which is mandatory and optional extension headers. The first 40 octets (320 bits) belong to the IPv6 fixed header. IPv6 options are present in separate extension headers that are located between the IPv6 header and the transport-layer header in a packet. RFC2460 [3] specifies extension headers and the order in which they should be chained in an IPv6 packet is as follows: IPv6 main header, Hop by Hop Extension header, Destination Options header, Routing header, Fragment header , Authentication header, Encapsulating Security Payload header ,Destination Options header, Upper-layer header. The Hop by Hop Extension Header is the only extension header that should be fully processed by all network devices. Hop-by-hop extension header and destination options headers have three fields – Next header, header extension length and options. Options field has the form of Type-Length-value (TLV).Highest-order two bits of TLV field specify the action which must be undertaken if the processing IPv6 node is not able to recognize the option type”10” value states which discard the packet whether or not the packet‟s destination address was a multicast address, send an ICMP IJRISE| www.ijrise.org|[email protected][291-295] International Journal of Research In Science & Engineering Volume: 1 Special Issue: 2 e-ISSN: 2394-8299 p-ISSN: 2394-8280 Parameter Problem, Code 2 [4], message to the packet‟s source address, pointing to the unrecognized option type. Fragment header consists of next header, reserved, fragment offset, reserved, more bit and fragment identification value. The Un Fragment able part of the packet consists of the IPv6 header in addition any extension headers that must be processed by nodes through route to the destination. The Fragment able Part consis ts of any extension headers which need to be processed only by the final destination node, plus the upper-layer header data. This paper reviews various threats due to misusing certain fields of destination option header and fragmentation header. 2. LITERATURE REVIEW Gont [5] has also addressed the issue of tiny fragments on his ongoing work. Due to tiny fragments and over-sized IPv6 header chain first fragment of a packet may fail to include the entire IPv6 header chain. He has proposed dropping of the packet if the first fragment of the packet doesn't contains the entire IPv6 header chain within the first 1280 bytes. He has proposed this solution as working Internet draft. If approved it updates RFC2460. Gont [6] has worked on threat due to atomic fragments on his ongoing work. Some of the IPv6 implementation treats atomic fragments as normal fragments and try to perform fragment reassembly. This may lead to dropping of the packet if some fragment with the same ID from same source waiting for other fragments to arrive. So th is causes fragment overlapping and if Ipv6 implementation is RFC 5722 compliant then overlapping fragment will be dropped. He has proposed that atomic fragments should be reassemble from the contents of the sole fragment and should not be consider as overlapping fragments in the case when credential matches with other fragments. He has proposed this solution as working Internet draft. If approved it updates RFC 2460. Gont [7] has worked on Security Implications of Predictable Fragment Identification Values .IPv6 specifies the Fragment Header, which is employed for the fragmentation and reassembly mechanisms. The Fragment Header contains an "Identification" field which, together with the IPv6 Source Address and the IPv6 Destination Address of the packet, identifies fragments that correspond to the same original datagram, such that they can be reassembled together at the receiving host. The only requirement for setting the "Identification" value is that it must be different than that of any other fragmented packet sent recently with the same Source Address and Destination Address. Some implementations simply use a global counter for setting the Fragment Identification field, thus leading to predictable values. Gent, in his paper has analyzed the security implications of predictable Identification values, and updates RFC 2460 specifying additional requirements for setting the Fragment Identification, such that the aforementioned security implications are mitigated. Atlasis [8] has addressed the issue of security impacts of misusing IPv6 extension headers. He has shown with the experiments that security vulnerabilities due to abuse of extension headers can lead to significant security impacts. He has shown the behaviour of most popular Operating Systems on hand ling various malformed IPv6 packets. He has shown that this vulnerability can result in to evasion of IDS or creation of covert channels .He has also shown effectiveness of two IDS –Snort and Suricata against IPv6 threats and found in certain cases Snort raises the alarm but Suricata doesn‟t raise a single alarm. Atlasis [9] has shown in his research, attacks due to misuse of fragmentation header and highlighted fragmentation related attacks in IPv6 networks. In his paper the behaviour of some of the OS when fragmentation header is misused and their potential compliance with the corresponding RFCs is shown. The operating system under study is Ubuntu 10.04.3, Ubuntu 11.10, and Windows 7 i386, FreeBSD 8.2, FreeBSD 9, OpenBSD 5.0. He found that that none of the tested OS is fully RFC compliant. Windows 7 seem to have the fewer issues. Ali et al. [10] have created attack scenarios test bed for attacks based on Bad ACK-Reset and fragmentation attack. They have used Scapy for packet crafting, Dynamist for router emulation and Wireshark for capturing data and GNS3 for test bed simulation. Their proposed solution is modification of Ipv6 tables and Access Control List (ACL) of host firewall. So for tested attack scenarios they had proposed prototype security policy model. Manuel [11] has researched various ipv6 security risks. He addressed threats due t o covert channel creation by manipulating parts of the ipv6 headers using PadN options, DOS attacks using router alert option, tiny fragment attack, overlapping fragment attack, router exhaustion due to considerable amount of error messages of unknown extension headers. He also demonstrated use of Cisco‟s virtual fragment reassembly (VFR) available on Cisco routers IJRISE| www.ijrise.org|[email protected][291-295] International Journal of Research In Science & Engineering Volume: 1 Special Issue: 2 e-ISSN: 2394-8299 p-ISSN: 2394-8280 which when enabled performs fragment reassembly and inspection to find out any problems. He suggested set of best practices for IPv6 Security that could be used by IT staff and network administrators. Kim et al. [13] have proposed mitigation techniques against the vulnerabilities caused by routing header and fragmentation header. They suggested dropping of the packet with routing header of type 0 to prevent attack due to routing header vulnerability. In fragmenting IPv6 packet due to many extension headers present upper layer header is not present in the first fragment. This can be used to bypass firewall rule based on upper layer protocol. They suggested limited number of fragments per packets and also limiting their arrival rate. They have shown in their experiment that if the segment left field of the routing header is above 1, an attacker is able to send an attack packet to a forbidden address through publically accessible address bypassing firewall rules. 3. PROBLEM FORMULATION A. Problem statement IPv6 implementations are relatively new to the market and software created for these systems is not fully tested. For these reasons, it is important to raise awareness of security issues related to IPv6 and provide methods to secure the network organizations. Network devices are not always RFC compliant. Even in certain scenarios, there are not clear recommendations in RFC‟s [15] for operating systems and network devices that can lead to ambiguities and create attack vectors. Here, threats due to fragmentation header, Destination option header are addressed. Three types of threats are identified which happens due to manipulating extension headers previously mentioned. Attacks addressed are: Tiny Fragmentation Attack Overlapping Fragmentation Attack Flooding Attack due to unknown destination options B. Addressed threats This section describes various threats in detail whose solution is proposed and implemented. 1. Tiny fragmentation attack: IPv6 header chain is long and packets are fragmented, the first fragment of a packet may fail to include the entire IPv6 header chain. Due to this attacker can evade network security devices like firewalls when firewall makes blocking or allowing decision only based on first fragment and does not have capability of fragment reassembly before applying rules. If firewall makes blocking decision then legitimate packets will be dropped resulting in to denial service attack. If it allows the packet then attacker‟s malicious fragmented packets can enter the network. Fig 1. Attack Scenario where TCP Header is not present in the first Fragment IJRISE| www.ijrise.org|[email protected][291-295] International Journal of Research In Science & Engineering Volume: 1 Special Issue: 2 e-ISSN: 2394-8299 p-ISSN: 2394-8280 As shown in figure 1 second packet can have TCP connection request to protected port/service. In IPv6 this is very common to happen as IPv6 packet can contain long chain of headers. Due to this upper layer protocol can go to the subsequent fragments. So attacker can send packet with many extension headers causing fragmentation to occur and pushing upper layer protocol in some later fragment so that it can bypass firewall without detected. This attack in turn leads to „Tear drop attack‟ which results in rebooting or sometimes crashing of the OS. This attack is verified against Ubuntu 14.04 and results are present in result section. 2. Overlapping Fragmentation Attack: Overlapping fragmentation attack occurs when two fragments contained within the same IP datagram have offsets that overlap each other in the datagram. For example, fragment 1 is being completely or partially overwritten by fragment 2.Some operating systems do not properly handle overlapping fragments and behave in undesirable ways. As shown in figure 2 first fragment contains TCP header with SYN flag set=0 and ACK flag set =1.It passes through firewall as this is legitimate fragment. Second fragment contains overlapped TCP header with SYN=1 and ACK=0.This second overlapped fragment will pass through firewall as firewall makes blocking decision only based on first fragment unless it is configured to perform deep packet inspection and fragment reassembly. Now depending upon destination operating system‟s fragment reassembly policy fragments are reassembled. If OS favors second fragment then TCP connection request is made and which goes undetected. Fig 2. Overlapping Fragmentation attack Fig.3 Flooding Attack 3. Flooding Attack by creating Spoofed packets with unknown Destination Option Header: Attacker can cause flooding attack by creating many spoofed packets with destination option header in which higher two bits of TVL field are “10”.If TLV field starts with leading “10” then it means discard the packet and regardless of whether or not the packet‟s destination address is a multicast address, send an ICMP Parameter IJRISE| www.ijrise.org|[email protected][291-295] International Journal of Research In Science & Engineering Volume: 1 Special Issue: 2 e-ISSN: 2394-8299 p-ISSN: 2394-8280 Problem, Code 2 message to the packet‟s Source Address, pointing to the unrecognized option type [3].By many such packets by spoofing source address of victim node attacker can make any node to send many ICMP messages to the victim causing flooding effect. In IPv6 certain ICMPv6 messages are integral part of the IPv6 operation so these messages are not filtered by firewalls generally which otherwise the case with IPv4. 4. CONCLUSION AND FUTURE WORK IPv6 capable infrastructures are not fully RFC complaint. This leads to IPv6 networks prone to threats. Due to new features introduced in IPv6 specifications which creates new and/or unknown attack vectors and network becomes vulnerable to these new threats. IDS and firewall are at immature stage to handle IPv6 related threats. Even if devices have capability to handle IPv6 threats, there is a lack of knowledge in network administrators. This review paper addresses how misusing some of the fields of IPv6 extension headers affect the IPv6 protocol and creates new attack vectors systems. So goal of this review is to find the vulnerabilities due to manipulating and misusing IPv6 extension headers and find solution which can work in existing infrastructure. The extension headers under study are Destination extension header and fragmentation extension header. We can summarize the main contribution of this research as follows: • To study various attacks due to manipulating IPv6 headers • To test certain attacks in real test network setup in future Future work would be to devise detection logic for various attacks and also propose prevention logic for the addressed threats. REFERENCES [1] http://www.ietf.org [2] http://www.secdev.org/projects/scapy [3] http://www.ietf.org/rfc/rfc2460.t xt [4] http://www.iana.org/assignments/ipv6-parameters/ipv6parameters.xml [5] F. Gont,” Security and Interoperability Implications of Oversized IPv6 Header chains”, draft -ietf-6manoversizedheader-chain-02, 2013, work in progress. [6] F. Gont ,” Processing of IPv6 "atomic" fragments “, draftietf-6man-ipv6-atomic-fragments-04 ,2013, work in progress. [7] F. Gont,” Security Implications of Predictable Fragment Identification Values “, draft -gont-6manpredictablefragment-id-03, 2013, work in progress. [8] Antonios Atlasis. “Security impacts of abusing ipv6 extension headers “, Black Hat security conference, pages 110, 2012. [9] Antonios Atlasis. “Attacking ipv6 implementation using fragmentation “, Black Hat security conference, pages 110, 2012. [10] W.N.A.W. Ali , A.H.M.taib , N.M.Hussin ,J.Othman,” IPv6 attack scenarios testbed”, IEEE Symposium on Humanities, Science and Engineering Research , 2012 , pp 927-932. [11] Vitor Manuel Carujo Leitao. "Ipv6 a new security challenges", Department of Computer Science, University of Lisbon, 2011, pp 1-149. [12] Youngseok Lee, Seongho Shin, Soonbyoung Choi, Hyeongu Son,” IPv6 Anomaly Traffic Monitoring with IPFIX “, Second International Conference on Internet Monitoring and Protection, 2007, pp 1-10. [13] Jeong-Wook Kim, Hyug-Hyun Cho, Gil-Jong Mun, JaeHyun Seo ,Bong-Nam Noh, Yong-Min Kim ,”Experiments and Countermeasures of Security Vulnerabilities on Next Generation Netwo rk “,Future Generation Communication and Networking , 2007 ,pp 559 – 564. [14] Haipeng Qu, China, Purui Su, Dengguo Feng,”A typical noisy covert channel in the IP protocol,” International Carnahan Conference on, security technology, 2004, pp 89-192. [15] http://www.ietf.org/rfc/rfc5722.t xt IJRISE| www.ijrise.org|[email protected][291-295]
© Copyright 2026 Paperzz