[colug-432] tunnelled IPv6 -- was: Looking for info on Columbus

R P Herrold herrold at owlriver.com
Wed Mar 9 11:49:10 EST 2011


On Wed, 9 Mar 2011, Richard Troth wrote:

> I HAVE NOT gotten external V6 routing, but am sending this report now
> for the sake of discussion.  Discuss!

The first thing, which seems obvious but should be said, is 
that once external routing is in place, with no nat, is that 
all services which are network reachible, are now reachible to 
anyone able to set up an IPv6 tunnel themselves.

That includes blackhats, and although the size of the IP space 
in v6 is beyond mind-boggling, there is no security in that 
obscurity.  Red Hat derived distributions support iptables in 
a configuration file:
 	/etc/sysconfig/ip6tables    (notice the '6')
which is sourced before a network connection is brought up.

It is not at all clear to me if or how one sets up traditional 
'tcp wrappers' in v6

The sponsors of sixxs all seem to have fine credentials and 
employers, but that tunnel broker and its services [some of 
which are not under the direct comtrol of the project 
sponsors] are subject to take-over just like anything else on 
the internet.  [cue: D Rumsfeld 'unknown unknowns' quip as to 
how it is done], and if compromised, the routing tables offer 
a roadmap as to what subnets to probe, and potentially to do 
traffic pattern analysis

> I need to resume my olde v6 DNS experiments.  (a subdomain with just
> quad A records, also add usable quad A records to the parent domain)

We set our DNS interface up to handle maintenance, and to 
answer queries for such records.  I need to do some testing 
here

> Open questions:  Can I use the tunnel space for hosts?  (64 bits of
> addressing.  Why throw it away?)

Once routing is in place, subject to your decisions on 
security policy, you can finally set up that 'I want a pink 
pony' tribute website that the internet has longed for ;)

> What security concerns are there with the absence of NAT?

as above

> ... I mean, for
> example, Steve VanSlyck just got SSH presence.  Guessing he is like me
> and that box fronts a number of other machines.  With a V6 tunnel, I
> can supposedly not have to worry about TWC or SWB changing my wired V4
> address.  Can I also route to/from the other machines?

Yes -- I forget if we have had the discussion, but remote 
support, and particularly Apple's remote desktop are using 
IPv6 through such tunnelling mediated by certificate based 
authentication behind the scenes, to my understanding

> ... Is that safe?

Security is about probabilities, and is a process.  An 
absolute without qualification like: 'safe' makes for an 
unanswerable question.  But the quick answer is: no, not 
without doing hardening, keeping up with software updates, and 
all 'the usual suspects' better practices to manage the attack 
surfaces

Thanks for the narrative, Richard !

-- Russ herrold


More information about the colug-432 mailing list