Version0.8.923.Nov2002DominikSchnitzer1
ThisarticlegivesashortintroductiontotheIPv6protocol,usedforthenextgenerationInternet,andanoverviewofitssecurityfeatures.IP-Secguaran-teeingEncryptionanddataAuthenticityisarequiredpartofthenewprotocolstack.InadditiontothisintroductiontoIPv6-SecthearticlepinpointsweakanddangerousIP-Secconfigurationsandshowshowtosecurelydoittherightway.ItcloseswithaconcisehowtodescribinginthreestepshowtogetonlineinthealreadyheavilydeployedIPv6Internet,the6Bone,andstartexperimentingyourself.
1
Contents 1Introduction 2IPv6Essentials 2.1AddressNotation.........................2.2AddressTypes..........................2.3HeaderStructure..... ....................2.3.1ExtensionHeaders .................... 3IPv6Security 3.1InternetThreats..........................3.2IP-SecArchitecture........... .............3.2.1SecurityAssociations(SAs)...............3.2.2Authentication......................3.2.3Encryption........................3.2.4AuthenticationandEncryption.............3.3PuttingitTogether........................3.4CurrentImplementations.....................3.5OpenProblems..........................3.6Conclusion............................. 4GettingStarted 1 223345556679111112121313 2 1Introduction ThisdocumentfocusesonthenextgenerationInternetprotocol(IPv6)andthesecuritymechanismsitimplements.InsomeyearsIPv6willfullyreplacethecurrentIPv4basedInternetandit’ssubnetworks.SomesaythiswillhappensoonbecauseofIPaddressspacerunningout,otherssaythenewfeatures,likeIPv6’sextrememobility,simplenodeconfigurationorgoodsupportforadditionalextensionswillfinallybethedeadofIPv4andriseofIPv6.IPv6essentialsarethecontentthefirstpartofthisarticle,sketchingtheprotocolbasicsandgivingyouasneakpreviewhowthenextgenerationInternetlookslike. BesidesthecoolIPv6featureslistedabove,anIPv6networkstackalsore-quiresafullimplementationofIPSecurityfeatures.ThatmeansthateveryparticipantintheIPv6Internethasthepossibilitytoencryptandsignit’snetworktraffic,generallyandintheorymakingmakingallcurrentlydeployedinsecureInternetservicessecure!Iftherewasn’ttheproblemofanonexist-ingPublicKeyInfrastructure(PKI).IP-SecisasaprotocolalreadyavailableanddeployedforonIPv4networksanddidwellinprovidingsecurityinex-istingIPv4networksusingit.InIPv4IP-Secisjustanoptionaladdon,youcanorcannotinstallanduse.Inthesecondandmoreindepthgoingpartofthisarticle,thefunctioningofIP-Secandit’sintegrationintheIPv6stackispicturedandthedifferentwaysofusingIPv6securityfeaturestose-cureyourInternetbusinessareworkedout:authentication,typesofnetworktunneling,encryptionandchoosingtheappropriateandmostsecuresolutionfordifferenttasks.ThesecondpartalsodetailsasecurityanalysisofIP-SecespeciallycommentingonpossibledangersofthecomplexityoftheIP-Secstandard.Anoutlook,showinghowtoIPv6connectandstartexperimentingtoday,finalizesthearticle. 2IPv6Essentials Manythingsinacomputerslifechangefast,usuallyindicatingthatthingsneedimprovementorarejustoutdatedandold.Ontheotherhandotherthings,unnoticedlikethebeloved1.44MBfloppy[4]diskwhichdebuted1984,justworkforyearsandyears. TheIPv4networkprotocolisalsoamongthoseworkingthings.It’sinuseforover15yearsnowandemergedtothemostwidelyusednetworkprotocolintheworld.Weallknowhowtoconfigure,useitandfindnetworkerrorswithit.SowhywouldonewanttoreplaceandupdateIPv4? 3 IPv4surviveduntiltodaymainlybecauseofit’ssimplicityandextremeex-tensibility.TokeeptrackwiththenewrequirementsfortheworldwideInter-net,IPv4wasextendedwithnewoptionalfeaturesoften,justtakelikeNAT(NameAddressTranslation)orIP-Secasanexample.ButonelimitationofIPv4couldnotbeworkedout:IPv4addressesare32Bit,andthereforehaveforthecurrentInternetaverylimitedaddressrange.FirstconcernsabouttheInternetandit’sIPaddressshortagewereraisedinamemo1992[1].TheIETFevendatedtheInternetdayofdoominMarch1994.EightyearsafterwestilluseIPv4,sincelastminutetweakslikeNATandnewroutingprotocolsapparentlyprolongedthelifeofIPv4alasttime. NowhavinglearnedfromtheproblemsoccurringwithIPv4deploymentandtryingtoforeseetheupcominggrowthoftheInternet,anewheavilyex-tendedandimprovedIPstandardwascreated:IPv6–capableofaddressing1Trillionhostsand1Billiondifferentnetworks[5],shouldmakeIPv6alongusedstandard. 2.1AddressNotation IPv6addressesare128Bit,sointhecurrentlyknownnotationanIPaddresswouldlooklike: 2.128.0.0.0.0.0.0.2.2.179.255.2.31.131.41 noteasilyrememberedbyahuman.Sothehexadecimalrepresentationwaschosen–dividingtheaddressintoeight16Bitblocks.Inadditiontothatleadingzeroesina16Bitblockcanbeskipped:FF80:0000:0000:0000:0202:B3FF:FE1E:8329FF80:0:0:0:202:B3FF:FE1E:8329 Youcanalsoreplaceasetofrepeatedzeroesbyadoublecolon,whichwouldmakeatypicalIPv6addresslooklikethis:FF80::202:B3FF:FE1E:8329 2.2AddressTypes IPv6hasthreedifferenttypesofaddresses[5],introducinganewtypeofaddressandobsoletingtheIPv4broadcastaddress: 4 1.UnicastAddressesThistypeofaddressuniquelyidentifiesaninterfaceonanIPv6node.PacketssenttoanUnicastinterfacearedeliveredtothisveryinterface.2.MulticastAddressesidentifyagroupofaddresses.Whensendingpack-etstoaMulticastaddress,everyinterfaceconfiguredwiththisMulti-castaddressreceivesthepackage.ForexamplethepredefinedMulti-castaddressFF05::101specifyallNTPtimeserversonthesamesiteasthesender.Multicastaddressesarealsousedasabroadcastaddress,knownfromIPv4.3.AnycastAddressesGroupsofhostsareconfiguredwithanAnycastad-dress.WhensendingapackagetoanAnycastaddress,onlyonehostoftheAnycastgroup,thenearestone,receivesthepackage.AnAnycastaddressalreadyinuseistheaddress::192.88.99.1,specifyingyournearestIPv6toIPv4router(basicallyanIPv4nodeactingasanentrypointtotheIPv6Internet). 2.3HeaderStructure TheexactheaderstructureinIPv6packagesisspecifiedintheRFC2460[2].TheheaderinformationofanIPv6packagehasafixedlengthof40Bytes.ToaddextendedheaderinformationtoapackageIPv6usesthesocalledextensionheaders.BesidesIPv6obsoletedmanyspecialIPv4caseslikeactivefragmentationofpackages,inthespiritofsimplicity.SinceasourceanddestinationaddressinIPv6take2x16Bytes,only8Bytesareleftforadditionalpackageheaderinformation.ThefollowingfieldscharacterizeastandardIPv6header[5]: Version,4Bits:TheVersionoftheprotocol(6) TrafficClass,1Byte:Usedtosetprioritiestothepackages,toprivilegecertaindatapackageslikevoiceorvideostreampackages. FlowLabel,20Bits:InformationforrouterstohelpingthemidentifyingIPv6packagesthatbelongtogether.Enablesfasterprocessingofdata.PayloadLength,2Bytes:SizeofdatafollowingtheIPv6headerNextHeader,1Byte:AnidentificationbyteforeventualfollowingsubheadersintheIPv6headerchain.IPv6usesheaderchains(extensionheaders)tointegrateotherIPextensionslikesecurity,authenticationorroutingheaders. 5 HopLimit,1Byte:Numberofmaximumhops.Everytimethepackagepassesarouter,therouterhastodecrementthisvalue.IfHopLimitgetszero,thepackageisdiscardedandanICMPerrormessageissentbacktothesender. SourceandDestinationAddress,32Bytes2.3.1 ExtensionHeaders Atthetimeofthiswriting,IPv6definessixdifferentextensionheaders[6]:Hop-by-Hopoptionsheader,Routingheader,Fragmentheader,Destina-tionOptionsheader,AuthenticationheaderandEncryptedSecurityPayloadheader.Asyoumayhavenoticed,thelasttwoextensionheadersalreadyindicatewhereencryptionandsecuritymechanismsinIPv6havebeenim-plemented. 3IPv6Security Duringthelastyearsitbecameclear,thatgoodandstandardizedsecuritymechanismswillbetherequirementforthefurthersuccessoftheInternet.ForthenetworkingexpertsitwasverysurprisingthattheInternetwithallit’sinheritedinsecuritiesbecameasubstantialandanimportantfactorinrealworld/realmoneybusiness.Manysecuritymechanismshadtobeim-plementedtoensuresecurityforimportantdatatransfersviatheInternet.SSLonbaseoftheHTTPprotocolorSSHasareplacementfortheinsecuretelnetservicearethemostfamousexamplesofsecurityaddonswhichwereinventedtomakeinsecureservicesusableagain.Allofthesesecuritymech-anismshaveonethingincommon,theyareimplementedontheApplicationLayer–writtenforaspecialkindofapplication,usingaspecialmoreorlesssecureencryptionorauthenticationmethod. IP-Sectakesadifferentapproachinimplementingsecurity.Itimplementssecurityontopofthenetworklayer,thusenablingallservicesworkingontopofIPtoautomaticallyuseit’ssecuritymechanisms. 3.1InternetThreats Hereisalist[5]ofthethreedifferentarchetypesofattacksonnetworkedservices.ItwouldbeniceiftheuseofIP-Seccouldpreventallofthem.Thefollowingchapterswillcomebacktothesethreatsandre-analyzethemregardingIP-SecandIPv6. 6 DisruptionofServiceorDenialofServiceattacks.Thiskindofat-tackstopsservicesfromrunningnormalbystopping,overloadingorsimplydestroyingthem.Theyareeasilydetectedcausetheyhaveanimmediateandnoticeableimpact. Fabrication,ModificationorDeletionofInformationTheseattacksarenoteasilydetectedandarecharacterizedbyinfiltratingfalseinforma-tioninpaymentsystems,emailoranyothertrustedcommunication.ElectronicEavesdroppingPassiveattackslikethisareusuallyimpos-sibletodetectandinahugenetworkliketheInternetimpossibletoprevent.AttackslikeSniffingIPtraffic,ortogiveamoreobviousexam-ple,simplysilentlyduplicatingandstoringallpagessenttoaprinter,fallinthiscategoryofattacks. HowcanIP-Secbeusedtopreventorcomplicateattackslikethis?Canitpreventthoseattacksatall? 3.2IP-SecArchitecture TheIPSecurityframeworkhasbeenstandardizedbytheIETFinalargeeffort.Thewholestandardisstillunderdevelopment,andcitingtheofficialprogressdocument,theIP-SecstandardwillbereadyinDecember2002.Theprogressdocumentisopenlyavailableathttp://www.ietf.org/html.charters/ipsec-charter.html.3.2.1 SecurityAssociations(SAs) TheSecurityAssociationistheinternalbaseconstructofIP-Sec[6].ForeachconnectionaSAspecifiesthecommunicationmodetobeused.Forexample,let’sassumeanIP-Secdatapackagecomesin,nowtherecipientofthispack-ageuses¡protocol,source-IP,sourceport,destination-IP,destinationport¿asakeytolookupthematchingSAassociatedwiththisveryconnection.Se-curityAssociationsarestoredinthesocalledSecurityAssociationDatabase(SADB).Staticsystemwidesecuritypolicies,explicitlytellingasystemtousecertainSAwhenaconnectionoccursarestoredintheSecurityPolicyDatabase(SPD)andcanbeadoptedbythesystemadministrator.Forin-stanceinMicrosoftWindowstheservicemanagingallthesesecurityrulesetsiscalled”IP-SecPolicyAgent”.IntheLinuxIP-SecFree/SWANpackageSAsaremanagedbythespicommand. 7 ThesearethemostimportantparameterswhichspecifyaSecurityAssocia-tion[5]: TheSecurityParameterIndex(SPI)ThedesiredIP-Secservice(AHorESP)Thetransmissionmode(Tunnel/Transport)SourceandDestinationaddressUsedauthentication/encryptionmethodUsedKeys EstablishingSAswithanotherhostisdonebyusingtheIKE(InternetKeyExchange)protocoldiscussedlater.3.2.2 Authentication KnowinghowsecurityismanagedinIP-Secwenowrequestauthenticityforourpackages,meaningwewanttobecertainthatwereceiveadatapackageunmodifiedandfromtheverycomputerwerequestedit.ToensureauthenticityIP-Secaddsanewextensionheadertotheheaderchain:theAuthenticationHeader(AH).Thisheaderaddscryptographicinformationtothedatapackage,sothesenderofthedatapackagecanclearlybeverified.TheAuthenticationExtensionheaderincludesthefollowinginformationalfieldsinthedatapackage[5]: NextHeader,1Byte:Likeeveryextensionheaderthisparameterspec-ifiesthenextIPv6headertocomeaftertheAH. LengthofPayload,1Byte:Describeshowmany32BitfieldsfollowtheSPIfield,necessarybecausedifferentauthenticationalgorithmsareallowed. Reserved,2Bytes:notusedyet,zeroeddata SecurityParameterIndex(SPI),4Bytes:Indicatesthechecksumalgo-rithmused.Currentlytwodifferentchecksumalgorithmsarerequiredtobeimplemented:HMAC-MD5-96andHMAC-SHA-1-96.HMACisaamechanismformessageauthenticationusingcryptographichashfunc-tions.ItisusedincombinationwithMD5andSHA-1orotheriterativecryptographichashfunction. 8 SequenceNumber,4Bytes:Thesequencenumberistheretopreventreplayattacks.Theknownlimitationofthisreplayattackpreventionnumberisthatconnectionsusingmorethan232packetscantheoreti-callybecompromised. AuthenticationData,VariableByteLength:acryptographicallysecurechecksumoverthepayloadandsomeheaderfieldsoftheIPandexten-sionheaders. BasicallythereexisttwomodesofAuthenticatingadatapackage: 1.PayloadAuthentication:InthisModeonlythecarrieddataplussomeIPheadersaresignedandtherebyauthenticated.ThisusuallyhappensinthesocalledTransportMode.Figure1illustratesthisbehavior.Allsignedheaderinformationisfilledwithdarkgraycolor. Figure1:TransportModeAuthenticationheader(darkgray=authenticateddata) 2.HeaderandPayloadAuthentication:ThisauthenticationmodesignsthewholeIPpacket.Toachievethis,thewholeoriginaldatapackagehastobesignedandencapsulatedinanewIPpackage.ThismodeiscalledtheTunnelMode,comingfromthefact,thattheoriginalIPpackageistransferredtunneledinanewpackage.Figure2showstheauthenticateddatainthismode.ByusingIPauthenticatedtraffic,onecanpreventthatanattackercanin-filtratehisspoofedpackagesinthecommunication.Moreoverevenreplayattackscanbeprevented,renderingovertakingofsessionsbyalisteningattackerimpossible.AuthenticatedIPtrafficisforexamplesufficientforex-changingpublic,wellknowninformationlikeroutingtraffic.Butit’stotallyinsufficientfortransmittingimportantdata,sinceitstillcanbereadbyaneavesdropper. 9 Figure2:TunnelModeAuthenticationheader(darkgray=authenticateddata)3.2.3 Encryption AnotherextensionheaderinIPv6,namelytheEncryptionSecurityPayload(ESP)extensionheader,finallyaddsencryptiontothetransmittedpackage.TypicalapplicationswhichthencouldusethisencryptionareFTP,telnetormailsending/retrievingsessions.Makingallthenamedservicessecurewithouttheneedofchangingtheprotocol.TheESPextensionheaderhasthefollowingrequiredfields[6]: SecurityParameterIndex(SPI),4Bytes:Theencryptionalgorithmused SequenceNumber,4Bytes:PreventsattacksrelyingonreplayingtrafficPayloadData,VariableByteLength:Theencrypteddata. IPv6IP-Secrequiresoneencryptionalgorithmtobeavailableoneverysys-temimplementingIPv6:DES-CBC(DataEncryptionStandardinCypherBlockChainingmode).DESoperateswithakeylengthof56Bitandisnotrecommendedtobeusedanymore.Onthe19thJanuary1999forexamplea56DESkeywascrackedinabout22hoursbydistributed.net,adistributedcomputingproject.Theencryptedmessagestated:SeeyouinRome(sec-ondAESConference,March22-23,1999)[7].AESisthenextgenerationencryptionstandardandis,since26thofMay2002,theofficialencryptionstandardoftheUSA[8].AESwillbeavailableforIP-Sectoo.Howeverto-dayyoushouldinanycaseuseTriple-DESinyourIP-Secconnectionswhichisthebestencryptionalgorithm,requiredtobeimplementedinacurrentIPv6-Secprotocolstack. Likeauthenticateddata,encrypteddatacanbesentintwodifferentways: 10 1.PayloadEncryption:Thisisthesocalledtransportmode,whichjustencryptsthepayload(includingTCPinformationlikethedestinationport).Figure3showstheencryptedpartsofapackagesentintransportmode. Figure3:TransportModeEncryption(darkgray=encrypteddata)2.HeaderandPayloadEncryption:IfitisrequiredtoencryptthewholeIPpackage,theencryptedIPpackagehastobewrappedwithanouterIPpackage(tunneled),enablingrouterstoreadtheimportantouterIPheaderinformation. Figure4:TunnelModeEncryption(darkgray=encrypteddata) Byusingencryptionit’spossibletohidesensitivedatafromanattacker,makingitimpossiblefortheattackertoreadtheinformationsent.Butbyjustusingencryptionforourdata,asyoucanseeinFigure4,theattackercanagainchangeorspoofimportantheaderinformation,causethepacketisnotauthenticated.It’snotrecommendedtosolelyrelyonencryptionwhentransmittingdatawithIP-Sec. 11 3.2.4 AuthenticationandEncryption Usingthemechanismsshownaboveit’spossibletofirstencryptandthenauthenticatetheencryptedpackage.ThisisdonebyprecedinganAHheaderbeforeanESPheader.Becauseintegrity,authenticityandconfidentialityiswantedinthemostcases,it’spossibletoappendanAHtrailer(seeFigure4)totheESPtrailerwhichresultsinsmallerIPpackets.Thiscombinationisthemostsecurewayofensuringpacketintegrityandsecurityandshouldbeusedwheneverencryptioniswanted. 3.3PuttingitTogether ToestablishaSecurityAssociationbetweentwohostsforfurthermoreusingauthenticationand/orencryptionincommunication,thetwohostsmustfirstagreeuponthecommonsecuritypolicyandusedcryptographicalgorithms.ThereforetheIKE(InternetKeyExchange[3])protocolwasdefined.IKEisimplementedonapplicationlayer,workingonUDPport500andgenerallyisanadaptionofbasicallythreemoregeneralprotocols[5]and[6]:1.ISAKMP:TheInternetSecurityAssociationandKeyManagementProtocol(definedinRFC2408)managestheinitializationofconnec-tionsanddefinestheirSAsbydescribingthenegotiatedconnectionproperties.2.IP-SecDOIforISAKMP:Atightspecificationwhichtellshowtoin-terprettheratherabstractISAKMPspecificationinregardtoIP-Sec3.Oakleykeydeterminationprotocol:IsdefinedinRFC2412andbasesontheDiffie/Hellmankeyexchange.IKEcanbasicallybedescribedasanegationprotocol,thatusesISAKMPtoexchangekeyandSAinformation.BesidesIKEthereexistotherproposalsnegotiationlikePhoturis(experimentalRFC2522,2523)andSKIP. IKEworksintwophases.InthefirstphaseThetwomachinesinvolvedsetupasecureauthenticatedchannel.ForinstancethischannelcouldbesetupbyencryptingthedatawithanRSAkey.AfterobtainingtheISAKMPSA,thecommunicatingpartnersusethesecurechannelinthesecondphasetoexchangeIP-SecSAsnecessaryfortheupcomingIP-Sectraffic.IKEisdefinedasaveryflexibleprotocol,allowingfurtherextensiontoallowfetchingeventuallyneededpublickeysfromaPKI(PublicKeyInfrastructure)intheInternet,whichdoesnotexistyet. 12 3.4CurrentImplementations TodaytherealreadyexistmanymoreorlessstableIPv6implementations.NotallofthemimplementIP-Secyet.Thefollowingtableisasummaryofthecapabilitiesofthe4mainIPv6stacksbeingimplemented. GNU/LinuxVanillaKernel(2.4)doesnotsupportIP-Secoutofthebox. AnIPv6-SecstackisbeingdevelopedbytheUSAGIproject.AHintransportmodeisfullyworking,ESPandAHtunnelmodeareinde-velopment.Seehttp://www.linux-ipv6.org/WindowsXPdoessupportIPv6andIP-SecoutoftheboxwithAHtunnel andtransportmodeworking.ESPmodeworkstoo,butironicallydoesnotencryptanydatasent.HasnoIKEsupport,currentlySAshavetobesetmanually.Seehttp://www.microsoft.com/windowsxp/pro/techinfo/administration/ipv6/default.asp*BSDMostcompleteandbestfreelyavailableimplementationofanIPv6 andIP-Secstack.TheKAMEprojectisworkingonit’simplementa-tion.TheirworkwasalreadymergedintoFreeBSD4.0,OpenBSD2.7,NetBSD1.5andBSD/OS4.2.Seehttp://www.kame.net/CiscoLatestCiscoIOsreleases(startingwithversion12.2)havefullIPv6 andIP-Secsupport.TherearestillmissingsomespecialRFCs(likeIP-SecoveraNAT-edconnection)butbasicallytheirstackisreadyforuseinproductionenvironment.Seehttp://www.cisco.com/warp/public/732/Tech/ 3.5OpenProblems Ithasalreadybeenmentioned,thatNATisproblematicwhenusedincon-junctionwithIP-Sec.NATisactivelyrewritingpacketheaders,changingsourceanddestinationaddressinthepacketheader.Thismakesauthentica-tionimpossible.Anotherpointnotyetaddressed100%istheIKEprocess,whereforinstanceproblemsarisewhenthemobilityfeaturesorQualityofServicecomeintoplay. ¨CriticsofIP-Sec[9]alsostatethatIP-Secistoocomplextobesecure:The simplestsolutionisthebest¨.TheIP-Secstandardisacollectionofmorethan35RFCdocuments,introducingagreatlevelofinterpretationrangeandcomplexity.ThemanydifferentwaysofreachingthesamegoalwithIP-Secarealsoapointofcriticism.Addingfurtherfunctionalitysuchasthe 13 variousmodesoftunnelingwillcertainlyaddcomplexityandthusendangertheoriginalideaifprovidingasimplebutsecuresecuritymechanismforIPv6. 3.6Conclusion DespiteallcriticismIP-Secisthebestnetworksecuritysolutioncurrentlyavailable.ItallowstwonetworkstosecurelyconnectovertheInternet,orjustenablingsecuredatatransmissionfornetworkservicesoperatingincleartext.Itshouldbenoted,however,thatIP-Secdoesnotautomaticallysecureeverything,it’sassecureasthecomputer,operatingsystemorapplicationitisworkingon.IP-SecdoesattempttostandardizesecuritymechanismsintheInternetandisagreatsteptowardamoresecureInternet. 4GettingStarted ThissectionintroducesyouhowtostartyourownexperimentswithIPv6andIP-Sec.ThestepsaresketchedinageneralwayassumingthatyouhaveastaticIPv4address,noexistingIPv6infrastructure.Besidestheheredescribed6Bonemanyother(mostlycommercial)testingnetworkslikethe6net(Cisco)exist. Toconnecttothe6Bone,yougenerallyhavetofollowthosethreestepsdescribedhere: 1.EnablingtheIPv6stackThefirststepbeforeexperimentingwiththethingsdescribedabove,youhavetodownloaddownloadyourlatestIPv6vendorstackandenableit.ForinstanceInGNU/Linux,IPv6supporthastobecompiledintothekernel,inWindowsXPIPv6andIP-Secsupportjusthastobeactivatedwithaspecialcommandlinetool.2.Gettingonthe6BoneAfterenablingtheIPv6protocol,yourEthernetcardsalreadyautomaticallyhaveanIP-addressassigned:thesocalledlinklocaladdress.AnuniqueIPaddresscomputedusingyourMACaddress.Togetonthe6Bone,you’llneedaglobalIPv6IP.Youcannowcomputeyourpersonal6to4IPv6-address: 2002:hhhh:hhhh::1 14 hhhh:hhhhisthehexadecimalequivalentofyourglobalIPv4address.Younowhaveanaddressspaceof280(globallyvalid)differentIPv6IPs,whichgivesyoumoreIPsthanthecurrentIPv4Internethasforexperiments.AftersettingthecalculatedIPonyoursystem,justadd:::192.88.99.1 asyourdefaultgatewaytothe6Bone.::192.88.99.1isaspecialnotationforoldIPv4addressesinIPv6.192.88.99.1isanAnycastaddress(asdescribedinthefirstSection)whichalwayspointstothenext4to6router.Yourclosestentrypointinthe6BonecouldberightatyourISP,ifyouarelucky. 3.StartingExperimentsUsingtheping6command,youcannowtrytopingmeonthe6BoneorvisitanIPv6-onlywebsite:http://zoidberg.ipv6.chello.at/usinganIPv6enabledbrowserlikeMozilla.aeneas@blackhole:~$ping6-c2-natlantis.relax.ath.cx PINGatlantis.relax.ath.cx(2002:3eb2:51cf::1)56databytes bytesfrom2002:3eb2:51cf::1:icmp_seq=1ttl=time=0.35msbytesfrom2002:3eb2:51cf::1:icmp_seq=2ttl=time=0.31msWelcometothenextgenerationInternet! 15 References [1]P.GrossandP.Almquist,1992.IESGDeliberationsonRoutingand Addressing,IETF,http://www.ietf.org/rfc/rfc1380.txt.[2]S.DeeringandR.Hinden,December1998.InternetProtocol,Version6 (IPv6)Specification,IETF,http://www.ietf.org/rfc/rfc2460.txt.[3]D.HarkinsandD.Carrel,November1998.TheInternetKeyExchange (IKE),IETF,http://www.ietf.org/rfc/rfc2409.txt.[4]Computerhope,2002.ComputerHardware-Informationaboutcom-puterfloppydrives,computerhope.com,http://www.computerhope.com/help/floppy.htm[5]S.Hagen,July2002.IPv6Essentials-IntegratingIPv6intoyourIPv4 Network,O’Reilly,p1-4,12-16,77-104.[6]W.Stallings,1998.CryptographyandNetworkSecurity:Principlesand Practice,PrenticeHall,p399-432.[7]D.McNett,Janurary1999.Pressrelease-USgovernment’sencryp-tionstandardbrokeninlessthanaday,distributed.net,http://www.distributed.net/des/release-desiii.txt[8]USComputerSecurityDevision,January2002.AdvancedEncryp-tionStandard(AES)-QuestionsandAnswers,NationalInstituteofStandardsandTechnology,http://csrc.nist.gov/encryption/aes/aesfact.html[9]N.FergusonandB.Schneier,2002.ACryptographicEvaluationofIP-sec,CounterpaneLabs,http://www.counterpane.com/ipsec.html 因篇幅问题不能全部显示,请点此查看更多更全内容
Copyright © 2019- sceh.cn 版权所有 湘ICP备2023017654号-4
违法及侵权请联系:TEL:199 1889 7713 E-MAIL:2724546146@qq.com
本站由北京市万商天勤律师事务所王兴未律师提供法律服务