;login - Worm Propogation and IPv6

Colm MacCarthaigh colm at stdlib.net
Wed Jan 24 19:37:35 CET 2007


On Wed, Jan 24, 2007 at 02:20:38AM -0800, Roland Dobbins wrote:
> I'll also point out that, despite the baseless claims of those who've  
> asserted that IPv6 somehow provided a 'defense' against worms due to  
> the large address space, those of us who think about these things  
> have known about every single one of the techniques discussed in this  
> paper and talked about them at length.  Messrs. Bellovin, Cheswick,  
> and Keromytis simply wrote them down; no research was required in  
> order to write this article, it's simply a useful compilation of  
> 'hints' which worm writers may use; also note that none except ND are  
> IPv6-specific (and ARP can be used in similar fashion in the IPv4  
> world).  They seem to've not discussed Link-Local, but add it to the  
> list.

I think it's missing some powerful ones too. Default EUI-64 behaviour
means we an attacker can grep a webserver log and get a convenient list
addresses of NICs from a particular manufacturer/type to go and attack
with vulnerabilities similar to the Wifi explotable stacks announced
last summer. And once there, it can act as a device-specific worm
by just poking the all-nodes address to get some more, and so on.

That's way more efficient than just trying all of IPv4 space for
device-specific exploits. Now that sounds like fun :-)

-- 
Colm MacCárthaigh                        Public Key: colm+pgp at stdlib.net



More information about the ipv6-ops mailing list