CIRA’s experience in deploying IPv6 Canadian Internet Registration Authority (CIRA) Jacques Latour Director, Information Technology Ottawa, April 29, 2011.

Slides:



Advertisements
Similar presentations
Future Directions For IP Architectures Ipv6 Cs686 Sadik Gokhan Caglar.
Advertisements

IPv4 - IPv6 Integration and Coexistence Strategies Warakorn Sae-Tang Network Specialist Professional Service Department A Subsidiary.
IPv6 Introduction What is IPv6 Purpose of IPv6 (Why we need it)Purpose of IPv6 IPv6 Addressing Architecture IPv6 Header ICMP v6 Neighbor Discovery (ND)
TCP/IP Protocol Suite 1 Chapter 27 Upon completion you will be able to: Next Generation: IPv6 and ICMPv6 Understand the shortcomings of IPv4 Know the IPv6.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
1 IPv6. 2 Problem: 32-bit address space will be completely allocated by Solution: Design a new IP with a larger address space, called the IP version.
IPv6 Victor T. Norman.
© 2006 Cisco Systems, Inc. All rights reserved.IP6FD v2.0—2-1 IPv6 Operations Defining and Configuring Neighbor Discovery.
Prof. Dr. Sureswaran Ramadass Director National Advanced IPv6 Centre (NAv6) Universiti Sains Malaysia Prof. Dr. Sureswaran Ramadass Director National Advanced.
Implementing IPv6 Module B 8: Implementing IPv6
IPv6 The Next Generation Presented by Anna La Mura Jens Waldecker.
© 2007 Cisco Systems, Inc. All rights reserved.ICND2 v1.0—7-1 Address Space Management Transitioning to IPv6.
1 Teredo - Tunneling IPv6 through NATs Date: Speaker: Quincy Wu National Chiao Tung University.
IPv4 & IPv6 Coexistence & Migration Joe Zhao SW2 Great China R&D Center ZyXEL Communications, Inc.
Enabling IPv6 in Corporate Intranet Networks
Limited address space The most visible and urgent problem with using IPv4 on the modern Internet is the rapid depletion of public addresses. Due to the.
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
IPv6 Network Security.
2: Comparing IPv4 and IPv6 Rick Graziani Cabrillo College
Understanding Internet Protocol
Transition Mechanisms for Ipv6 Hosts and Routers RFC2893 By Michael Pfeiffer.
Lecture Week 7 Implementing IP Addressing Services.
Introduction to IPv6 © J. Liebeherr, 2012, All rights reserved.
IPv6 With thanks to Rick Grazianni of Cabrillo College.
بسم الله الرحمن الرحیم. Why ip V6 ip V4 Addressing Ip v4 :: 32-bits :: :: written in dotted decimal :: :: ::
資 管 Lee Lesson 11 Coexistence and Migration. 資 管 Lee Lesson Objectives Coexistence and migration overview Coexistence mechanisms ◦ Dual Stack ◦ Tunneling.
CSIS 4823 Data Communications Networking – IPv6
IP Version 6 COMT 222. © 2005 Hans Kruse & Shawn Ostermann, Ohio University 2 Why change IP Number of addresses Routing Table Size Client configuration.
Summary of Certification Process (part 1). IPv6 Client IPv6 packets inside IPv4 packets.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Introduction to IPv6 Introduction to Networks.
Coexistence and Migration
May 17, 2009 McAfee Security and IPv6 David LePage Enterprise Solutions Architect – Network Security Business Unit, McAfee.
Chapter 8: IP Addressing
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IPv6 Introduction to Networks & Routing and Switching Essentials.
Basic Transition Mechanisms for IPv6 Hosts and Routers -RFC 4213 Kai-Po Yang
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
IPv6 – What You Need To Know Tom Hollingsworth CCNP,CCVP,CCSP, MCSE.
Chapter 22 Next Generation IP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IPv6. Content  History  IPv4 Downfall  IPv6 Features  IPv6 Addresses  Changes from IPv4  IPv6 Headers/Frames/Packets  Autoconfiguration  Commands.
IPv6 Routing Milo Liu SW2 R&D ZyXEL Communications, Inc.
Ch 6: IPv6 Deployment Last modified Topics 6.3 Transition Mechanisms 6.4 Dual Stack IPv4/IPv6 Environments 6.5 Tunneling.
IP Version 6 ITL. © 2003 Hans Kruse & Shawn Ostermann, Ohio University 2 Information Sources Christian Huitema, “IPv6, The New Internet Protocol”,
RFC 3964 Security Considerations for 6to4 Speaker: Chungyi Wang Adviser: Quincy Wu Date:
Security fundamentals Topic 10 Securing the network perimeter.
W&L Page 1 CCNA CCNA Training 3.4 Describe the technological requirements for running IPv6 in conjunction with IPv4 Jose Luis Flores /
Deploying IPv6, Now Christian Huitema Architect Windows Networking & Communications Microsoft Corporation.
1 Objectives Identify the basic components of a network Describe the features of Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6)
IPv6 (Internet Protocol V. 6)
+ Lecture#4 IPV6 Addressing Asma AlOsaimi. + Topics IPv4 Issues IPv6 Address Representation IPv6 Types.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
IPv6 Transition Mechanisms - 6DISS Workshop - 5 March 2006 IPv6 Transition Mechanisms, their Security and Management Georgios Koutepas National Technical.
IPv6. Network Layer4-2 IPv6 Initial motivation:  32-bit address space soon to be completely allocated. Additional motivation:  Simpler header format.
Chapter 5d.  Upon completion of this chapter, you should be able to:  Explain the need for IPv6 addressing.  Describe the representation of an IPv6.
IPv6 University of Leeds 2001:630:62::/48 Internet Protocol Version 6 Jim Jackson Network Consultant ISS University of Leeds.
Security fundamentals
Instructor Materials Chapter 7: IP Addressing
IPv6 Overview 1. Introducing IPv6 2. IPv6 Routing
Internet ProtoCOL Version 6 I/II
IPv6 Overview Address space Address types IPv6 and Tunneling.
IPv6 101 pre-GDB - IPv6 workshop 7th of June 2016 edoardo
Ipv6 addressing Chapter 5d.
CIS 116 IPv6 Fundamentals 2 – Primer Rick Graziani Cabrillo College
Chapter 6 Exploring IPv6.
What Could Possibly Go Wrong? Jen Linkova,
Lecture#5 IPV6 Addressing
An Introduction to IPv6 By Jim Johnston.
Lecture#5 :IPV6 Adressing
IPv4 Issues The Need for IPv6 IPv6 is designed to be the successor.
Presentation transcript:

CIRA’s experience in deploying IPv6 Canadian Internet Registration Authority (CIRA) Jacques Latour Director, Information Technology Ottawa, April 29, IPv6 Summit.ca

About CIRA The Registry that operates the Country Code Top-Level Domain for Canada The “.CA ccTLD” – A Thick Registry with over 1.6 million domain names – Staff of 50 FTE – Has about 150 Certified Registrars CIRA processes: – 700,000,000 DNS queries per day – 5,000 registration requests per day – 300 TBR requests per week – 250,000 WHOIS queries per day 2011 IPv6 Summit.ca2

About CIRA We have 2 DNS Secondary IPv6 Enabled (Anycast providers) Registry supports IPv6 glue records 2011 IPv6 Summit.ca3

IPv6 New protocol (~15 year old) Not an extension of IPv4 Not backward compatible New learning curve IPv6 coexists with IPv4 (Like DECnet, Banyan) – Not a transition – Not a migration – It’s a journey! 2011 IPv6 Summit.ca4

IPv6 Adoption Strategy IPv6 Discovery & Research Perform an IPv6 Readiness Assessment Define IPv6 Objectives (can’t do everything) Develop a Project Plan Develop a detailed IPv6 Architecture & Design Development, testing and pilot mode Implement in production 2011 IPv6 Summit.ca5

Objectives Not everything needs to be IPv6 on day 1 – World IPv6 Day, June 8, 2011 Internet Perimeter & DMZ ( IT Organization Permanent Presence Support 2011 IPv6 Summit.ca6

Critical Path Training [ √ ] ongoing Develop an IPv6 security policy [ √ ] - draft Order IPv6 Transit [ √ ] – New circuits… IPv6 inside Corporate & DMZ [ ] IPv6 on web server [ ] IPv6 for IT Operations [ ] 2011 IPv6 Summit.ca7

IPv6 Internet Transit Architecture guideline: – Internet transit providers must support IPv4 & IPv6 We need to push ISPs for IPv6 enabled transits – For the enterprise – If not, cancel/discontinue IPv4 only Internet transit – Order new IPv4/IPv6 Internet transits 2011 IPv6 Summit.ca8

Architecture & Design Need to define architecture guidelines & security policies for developing & implementing our IPv6 solution Address the results from our “Readiness Assessment” report – Some of our load balancers do not support IPv6 – Some of our Internet transits do not support IPv6 – Need to test our custom/in house application for IPv6 compliance – Overall, we’re in good shape to coexist with IPv IPv6 Summit.ca9

Architecture Guidelines Keep IPv4 as-is Dual Stack – All systems participating in the IPv6 implementation must support a concurrent IPv4 and IPv6 stack No IPv6 Tunnelling – Usage of IPv6 tunnelling mechanisms such as ISATAP, Teredo, 6to4, 6rd are not permitted Native IPv6 Transit – IPv6 transit must support IPv6 natively without the use of tunnelling (avoid MTU problems) 2011 IPv6 Summit.ca10 “Rules of engagement”

Architecture Guidelines One host, one IP – All IPv6 hosts/interface will use one Global address – Unique Local Addresses (ULA) must not be used No Network Address Translation (NAT) – NAT66, NAT64 & NAT46 technologies not permitted IPv6 Address Assignment - Privacy – The interface identifier (64 bit) part must be randomly/manually generated (Manual, RFC-3041) – MAC addresses of internal device must be kept confidential – Internet accessible Global Addresses must not use EUI-64 (MAC + FFFE) 2011 IPv6 Summit.ca11

Architecture Guidelines IP Addressing Plan – Based on most efficient algorithm (RFC 3531) – Leftmost bits (48, 49, 50,...) are assigned to segment the site – The rightmost bits (63, 62, 61, 60...) are assigned to number the links. Question: IPv6 Address Allocation – DHCPv6 will be used where possible – SLAAC enable for non DHCPv6 devices (Mac) with privacy Question: IPv6 Address Lifecycle (Life/Timeout) – Need to assess impact on logging, correlation, & applications of having temporary IP addresses (Windows 7) Address Obfuscation technique 2011 IPv6 Summit.ca 12

More Guidelines DNS Address Mapping – All static IPv6 address entry must have AAAA and PTR reverse mapping records – Naming convention required (interface level) Routing – Native IPv6 Peering, BGPv4 – Native IPv6 Routing, OSPFv3 – Router redundancy, HSRPv6 – OSPFv3 & BGPv4 secure routing adjacencies using filtering, passwords and hashes. NetFlow data collection – Use NetFlow 9 for IPv6 flow exports 2011 IPv6 Summit.ca13 “Can’t remember all those IPv6 addresses”

Security Guidelines Firewall – Excellent change & configuration management processes – “No NAT, check permit ANY/ANY, wide open Internet” Network Perimeter – IPv6 enabled firewalls – IPv6 deep packet inspection IDS/IPS Desktop, Hosts & Device Hardening – IPv6 host enabled firewalls – IPv6 HIPS (host based IPS) Security Management – SIEM alerts, regular review of logs for all IPv6 enabled devices. – Log & monitor all IPv6 traffic Corporate & DMZ 2011 IPv6 Summit.ca14 “because we don’t NAT IPv6”

Security Policy Default deny ANY/ANY of IPv6 addresses and services on perimeter devices such as firewalls, VPN appliances and routers. – Log all denied traffic Block 6to4, ISATAP (rfc5214) and TEREDO (rfc4380) and other IPv6 to IPv4 tunneling protocols on perimeter firewalls, routers and VPN devices as this can bypass security controls. – Block TEREDO server UDP port 3544 – Ingress and egress filtering of IPv4 protocol 41, ISATAP and TEREDO use this IPv4 protocol field Filter internal-use IPv6 addresses at border routers and firewalls to prevent the all nodes multicast address (FF01:0:0:0:0:0:0:1, FF02:0:0:0:0:0:0:1) from being exposed to the Internet. Filter unneeded IPv6 services at the firewall just like IPv4. Filtering inbound and outbound RH0 & RH2 headers on perimeter firewalls routers and VPN appliances IPv6 Summit.ca15 Based on best practise & RFC Recommendations

Security Policy ICMPv6 messages to allow RFC4890. Echo request (Type 128) Echo Reply (Type 129) – Multicast Listener Messages to allow Listener Query (Type 130) Listener Report (Type 131) Listener Done (Type 132)Listener Report v2 (Type 143) Destination Unreachable (Type 1) – All codes Packet Too Big (Type 2 message) Time Exceeded (Type 3) – Code 0 only Parameter Problem (Type 4 message) – SEND Certificate Path Notification messages: Certificate Path Solicitation (Type 148) Certificate Path Advertisement (Type 149) – Multicast Router Discovery messages: Multicast Router Advertisement (Type 151) Multicast Router Solicitation (Type 152) Multicast Router Termination (Type 153) 2011 IPv6 Summit.ca16 Security Policy available soon at

Security Policy Deny IPv6 fragments destined to an internetworking device. Drop all fragments with less than 1280 octets (except on the last one) Filter ingress packets with IPv6 multicast (FF05::2 all routers, FF05::1:3 all DHCP) as the destination address. Filter ingress packets with IPv6 multicast (FF00::/8) as the source. Use IPv6 hop limits to protect network devices to drop hop count greater than 255. Configure “no ipv6 source-route” and “no ipv6 unreachable” on external facing perimeter devices. Drop all Bogon addresses on perimeter firewalls, routers and VPN appliances IPv6 Summit.ca17 Learning curve…

Security Policy 2011 IPv6 Summit.ca18 The following addresses should be blocked as they should not appear on the Internet, based on rfc5156 – Unspecified address: :: – Loopback address: ::1 – IPv4-compatible addresses: ::/96 – IPv4-mapped addresses: ::FFFF: /96 ::/8 – Automatically tunneled packets using compatible addresses : :: /96 – Other compatible addresses: 2002:E000::/ :7F00::/ :0000::/ :FF00::/ :0A00::/ :AC10::/ :C0A8::/32 – Deny false 6to4 packets: 2002:E000::/ :7F00::/ :0000::/ :FF00::/ :0A00::/ :AC10:;/ :C0A8::/32 – Deny link-local addresses: FE80::/10 – Deny site-local addresses: FEC0::/10 – Deny unique-local packets: FC00::/10 – Deny multicast packets (only as a source address): FF00::/8 – Deny documentation address: 2001:DB8::/32 – Deny 6Bone addresses: 3FFE::/16 15 years of legacy?

Testing & Lab Developing an IPv6 lab – Test applications web, cookies, application logging – Test load balancers, routers, firewall – Log analysis – Security - IDS/IPS/SIEM – Packet capture – Network connectivity, routing protocols 2011 IPv6 Summit.ca19

Conclusion Dual Stack Limited deployment Planning Technical team trained to support IPv6 Security policy Lab testing Pilot project Production implementation June 8 th – Try on IPv6www.cira.ca 2011 IPv6 Summit.ca20