A New Model for Testing IPv6 Fragment Handling

09/07/2023
by   Edoardo Di Paolo, et al.
0

Since the origins of the Internet, various vulnerabilities exploiting the IP fragmentation process have plagued IPv4 protocol, many leading to a wide range of attacks. IPv6 modified the handling of fragmentations and introduced a specific extension header, not solving the related problems, as proved by extensive literature. One of the primary sources of problems has been the overlapping fragments, which result in unexpected or malicious packets when reassembled. To overcome the problem related to fragmentation, the authors of RFC 5722 decided that IPv6 hosts MUST silently drop overlapping fragments. Since then, several studies have proposed methodologies to check if IPv6 hosts accept overlapping fragments and are still vulnerable to related attacks. However, some of the above methodologies have not been proven complete or need to be more accurate. In this paper we propose a novel model to check IPv6 fragmentation handling specifically suited for the reassembling strategies of modern operating systems. Previous models, indeed, considered OS reassembly policy as byte-based. However, nowadays, reassembly policies are fragment-based, making previous models inadequate. Our model leverages the commutative property of the checksum, simplifying the whole assessing process. Starting with this new model, we were able to better evaluate the RFC-5722 and RFC-9099 compliance of modern operating systems against fragmentation handling. Our results suggest that IPv6 fragmentation can still be considered a threat and that more effort is needed to solve related security issues.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/29/2017

Tug-of-War: Observations on Unified Content Handling

Modern applications and Operating Systems vary greatly with respect to h...
research
04/29/2021

Integrating 6LoWPAN Security with RPL Using The Chained Secure Mode Framework

The IPv6 over Low-powered Wireless Personal Area Network (6LoWPAN) proto...
research
12/08/2019

Security of Deep Learning Methodologies: Challenges and Opportunities

Despite the plethora of studies about security vulnerabilities and defen...
research
04/17/2015

Feasibility Preserving Constraint-Handling Strategies for Real Parameter Evolutionary Optimization

Evolutionary Algorithms (EAs) are being routinely applied for a variety ...
research
05/26/2020

Deepzzle: Solving Visual Jigsaw Puzzles with Deep Learning andShortest Path Optimization

We tackle the image reassembly problem with wide space between the fragm...
research
05/20/2019

Safety vs. Security: Attacking Avionic Systems with Humans in the Loop

Many wireless communications systems found in aircraft lack standard sec...
research
11/30/2022

Unsafe at Any Copy: Name Collisions from Mixing Case Sensitivities

File name confusion attacks, such as malicious symbolic links and file s...

Please sign up or login with your details

Forgot password? Click here to reset