| ▲ | ghshephard 4 hours ago | |||||||||||||||||||||||||
This is the first thing that as a Network Engineer I was taught - and every formal security class I've taken (typically from Cisco - they have awesome course) - repeats the same thing. I believe the common knowledge is somewhat more nuanced than people would have you believe I present to you two separate high-value targets whose IP address has leaked:
Target #1 has an additional level of security in that you need to figure out how to route to that IP address, and heck - who it even belongs to.Target #2 gives aways 90% of the game at attacking it (we even leak some device specific information, so you know precisely where it's weak points are) Also - while IPv6 lacks NAT, it certainly has a very effective Prefix-translation mechanism which is the best of both worlds: Here is a real world target:
You are going to have a tough time routing to it - but it can transparently access anything on the internet - either natively or through a Prefix-translation target should you wish to go that direction. | ||||||||||||||||||||||||||
| ▲ | anyfoo 3 hours ago | parent | next [-] | |||||||||||||||||||||||||
For your example, shouldn't you either present two "private" IP addresses, in which case you'd replace the IPv6 address in your example with what is likely to be an autoconfigured link-local address (though any ULA address would be valid as well), OR present the two IP addresses that the targets would be visible as from the outside, in which case you'd replace the IPv4 address with the "public" address that 192.168.0.1 NATs to, going outbound? Then, the stated difference is much less stark: In the first case, you'd have a local IPv6 address that's about as useless as the local IPv4 address (except that it's much more likely to be unique, but you still wouldn't know how to reach it). In the second case, unless your target is behind some massive IPv4 NAT (carrier-grade NAT probably), you'd immediately know how to route to them as well. But presenting a local IP for IPv4, and a global one for IPv6, strikes me as a bit unfair. It would be equally bogus to present the public IPv4 address and the autoconfigured link-local address for IPv6 and asking the same question. I do concede that carrier-grade NAT shifts the outcome again here. But it comes with all the disadvantages that carrier-grade NAT comes with, i.e. the complete inability to receive any inbound connections without NAT piercing, and you could achieve the same by just doing carrier-grade NAT for IPv6 as well (only that I don't think we want that, just how we only want IPv4 CGNAT because we don't have many other options any more). | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
| ▲ | zamadatix 3 hours ago | parent | prev | next [-] | |||||||||||||||||||||||||
I'm not sure I buy the "you get a leak of the address of a high value target you believe can be routed to over the internet in some fashion, but it's the internal address which leaked and you have no idea who could own said high value target either" story. I agree if it's an actual concern then you can use NAT66 to hide the prefix, I just don't see how this achieves security when the only publicly accessible attack point is supposed to be the internet attached FW doing the translation of the public addresses in the first place. Additionally, if that really is the leaked IPv6 address then it's formatted as a temporary one which would have expired. If you mean static services which were supposed to be inbound allowed then we're back at the "the attack point is however the internet edge exposes inbound in both cases, not the internal address". | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
| ▲ | freeopinion 3 hours ago | parent | prev | next [-] | |||||||||||||||||||||||||
It took me less than 1 second to access that 192.168.0.1 address! It wasn't that hard to find. (;-) | ||||||||||||||||||||||||||
| ▲ | tptacek 4 hours ago | parent | prev | next [-] | |||||||||||||||||||||||||
Deeply ironic that Cisco would teach this, because it's the opposite of what they said when they introduced NAT. | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
| ▲ | ablob 3 hours ago | parent | prev | next [-] | |||||||||||||||||||||||||
If the IP address was leaked, wouldn't it be the address of the unit doing the NAT translation instead of the standard-gateway? | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
| ▲ | 3 hours ago | parent | prev | next [-] | |||||||||||||||||||||||||
| [deleted] | ||||||||||||||||||||||||||
| ▲ | Asmod4n 3 hours ago | parent | prev [-] | |||||||||||||||||||||||||
Yup, by default a Linux based router won’t forward any traffic to a IPv6 host unless you explicitly have a program running which keeps on telling the kernel you want that. | ||||||||||||||||||||||||||