Table 2: IPv6 preprocessor alerts.
SID Message
1 RA from new router
2 RA from non-router MAC address
3 RA prefix changed
4 RA flags changed
5 RA for non-local net prefix
6 RA with lifetime 0
7 new DAD started
8 new host in network
9 new host with non-allowed MAC addr.
10 DAD with collision
11 DAD with spoofed collision
12 mismatch in MAC/NDP src ll addr.
13 extension header has only padding
14 option lengths 6= ext length
15 padding option data 6= zero
16 consecutive padding options
the preprocessor against denial of service attacks. In
case of a simple flooding attack, where the attacker
sends bogus neighbor announcements to our network,
the number of tentative address entries will exceed
the limit and further addresses are simply ignored. A
more sophisticated attack may keep state to fill the ac-
tive host list as well, thus causing a limited denial of
service, but even then the plugin will only use a fixed
amount of memory and is not susceptible to memory
exhaustion attacks.
The preprocessor is configurable and can be sup-
plied with additional information about the monitored
network; among these are the used IP address prefix,
router MAC addresses, and host MAC addresses. If
these options are configured, then all IPv6 packets are
checked against them and an alarm is raised if e.g. an
unexpected address prefix is announced. A list of all
implemented alerts is given in Table 2.
5 CONCLUSIONS
The IPv6 protocol has several weaknesses in its
neighbor discovery and autoconfiguration services.
Most of these problems arise from the unsolved early
authentication problem and the implicit assumption
that all link-local nodes are trustworthy. Thus, an at-
tacker with physical network access and control over
a connected node is usually able to assume a man-
in-the-middle position and also to perform various
denial-of-service attacks against particular hosts or
the router.
A new IPv6 plugin was developed to extend the
Snort IDS with integrated IPv6-specific detection rou-
tines. It includes neighbor discovery tracking to alert
when new hosts and routers appear on-link. It also
provides additional rule options that expose IPv6 spe-
cific header fields to the Snort detection module. The
rule options facilitate the writing of new detection sig-
natures using the flexibility of Snort’s rule language,
for example to detect attacks from the THC toolkit.
The integration into the Snort infrastructure facili-
tates an easy deployment and integration into existing
IDS setups. A number of test cases verify the plu-
gin’s functionality and demonstrate that known flood-
ing and neighbor discovery attacks can be detected.
The plugin may become part of future Snort re-
leases; its current development repository is available
at https://github.com/mschuett/spp ipv6.
ACKNOWLEDGEMENTS
This work was carried out as part of the IDSv6 re-
search project (http://ipv6-ids.de), funded by the Ger-
man Federal Ministry of Education and Research
(BMBF).
REFERENCES
Beck, F., Cholez, T., Festor, O., and Chrisment, I. (2007).
Monitoring the Neighbor Discovery Protocol. In The
Second International Workshop on IPv6 Today - Tech-
nology and Deployment - IPv6TD 2007, Guadeloupe.
Era˜na, E. I. and Scheffler, T. (2010). IPv6 Intrusion De-
tection mit Snort. In Forschungsbericht der Beuth
Hochschule f¨ur Technik Berlin. Beuth Verlag GmbH
Berlin-Wien-Z¨urich.
Heuse, M. (nd). THC IPv6 attack tool kit.
Hogg, S. and Vyncke, E. (2009). IPv6 Security. Cisco
Press, Indianapolis, IN 46240 USA.
Levy-Abegnoli, E., de Velde, G. V., Popoviciu, C., and Mo-
hacsi, J. (2011). IPv6 Router Advertisement Guard.
RFC 6105, Internet Engineering Task Force.
Nikander, P. (2002). Denial-of-Service, Address Owner-
ship, and Early Authentication in the IPv6 World.
In Christianson, B., Malcolm, J., Crispo, B., and
Roe, M., editors, Security Protocols, volume 2467
of Lecture Notes in Computer Science, pages 12–21.
Springer, Berlin/Heidelberg.
Nikander, P., Kempf, J., and Nordmark, E. (2004). IPv6
Neighbor Discovery (ND) Trust Models and Threats.
RFC 3756, Internet Engineering Task Force.
Roesch, M. (1999). Snort: Lightweight Intrusion Detection
for Networks. In Proceedings of the 13th USENIX
conference on System administration, pages 229–238.
Wheeler, J. S. (nd). IPv6 NDP Table Exhaustion Attack.
SECRYPT2012-InternationalConferenceonSecurityandCryptography
402