Microsoft Vista's IPv6 raises new security concerns
- — 10 December, 2007 07:33
Members of the Internet engineering community have raised several new security concerns about Teredo, a mechanism for sending IPv6 traffic over IPv4 networks that comes turned on by default in Microsoft's Vista software.
Symantec and Ericsson security experts who called attention to the issue say they are concerned that Teredo bypasses network security through such devices as firewalls. Microsoft officials could not be reached for comment.
IPv6 is a long-anticipated upgrade to IPv4, the Internet's primary communications protocol.
IPv6 fixes the lack of IP addresses found in IPv4. IPv6 has a virtually unlimited number of IP addresses, while IPv4 has 4.3 billion IP addresses, the majority of which have been handed out.
Teredo is a tunneling technique used to send IPv6 traffic through IPv4 network address translators (NAT). Because of the lack of IPv4 addresses, NATs are commonly used in enterprise networks to mask many private IPv4 addresses behind a single public IPv4 address.
With Teredo, IPv6 packets are sent as IPv4-based User Datagram Protocol messages to go through IPv4 NATs. Teredo provides IPv6 traffic with address assignment and host-to-host automatic tunneling. A network using Teredo requires Teredo clients, Teredo host-specific relays, Teredo servers and Teredo relays.
Teredo is enabled by default in Windows Vista, but it won't be enabled by default in Windows Server Code Name 2008, according to Microsoft.
In a 20-page document titled "Teredo Security Concerns," James Hoagland of Symantec and Suresh Krishnan of Ericsson, outline several new security concerns about running Teredo in managed, corporate network environments. The document is the result of an independent analysis of Teredo's security implications that was conducted by Symantec.
"Teredo is not recommended as a solution for managed networks," the document states. "Administrators of such networks may wish to filter all Teredo traffic at the boundaries of their networks. . . . The easiest mechanism for this would be to filter out incoming traffic with Source Port 3544 and outgoing traffic with Destination Port 3544."
The Hoagland/Krishnan document was discussed at a meeting of the IETF's IPv6 Operations Working Group held here this week. It is in draft form and has not been approved yet by the group.
Because of the new security concerns about Teredo, the authors recommend that network managers turn off Teredo. "Security administrators should disable Teredo functionality unless their network-based security controls adequately recognize the tunneled traffic," the document says. The IETF previously cited security concerns about Teredo in the original Teredo RFC 4380, which was published by the IETF in February 2006.
The Symantec and Ericsson engineers now write: "IPv6 traffic tunneled with Teredo will not receive the intended level of inspection or policy application by network-based security devices, unless the devices are specifically Teredo-aware and capable.This reduces defense in depth and may cause some security gaps. This applies to all network-located devices and to end-host based firewalls whose hooking mechanisms would not show them the IP packet stream after the Teredo client does decapsulation."
The authors say that vendors of firewalls, intrusion-detection systems, intrusion-prevention systems and routers must add support for the Teredo protocol to ensure they can inspect Teredo packets. A network device that's unaware of Teredo will inspect only the IPv4 layer of a Teredo packet but won't recognize there is an IPv6 packet hidden inside to inspect or to apply a security policy.
Another concern of the authors is that the Teredo tunnel is open-ended and supports bidirectional traffic. To make sure networks are secure when sending IPv6 traffic via Teredo, network managers need to bolster the security of client hosts sending Teredo traffic. "One implication of the security control bypass is that defense-in-depth has been reduced, perhaps down to zero unless a local firewall is in use," the authors say. "However, even if there are host-based security controls that recognize Teredo, security administrators may not have configured them with full security-control parity even if all the controls that were maintained by the network are available on the host. Thus there may be some gaps in desired coverage."