Implementation and analysis of a threat model for IPv6 host autoconfiguration
IPv6, the successor of IPv4, introduces the stateless autoconfiguration feature as a convenient alternative to the Dynamic Host Configuration Protocol (DHCP). However, the security implications of this new approach have only been discussed at the conceptual level. This thesis research develops softw...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Published: |
Monterey, California. Naval Postgraduate School
2012
|
Subjects: | |
Online Access: | http://hdl.handle.net/10945/2547 |
Summary: | IPv6, the successor of IPv4, introduces the stateless autoconfiguration feature as a convenient alternative to the Dynamic Host Configuration Protocol (DHCP). However, the security implications of this new approach have only been discussed at the conceptual level. This thesis research develops software based on the open-source packet capture library Jpcap to capture and build appropriate ICMPv6 autoconfiguration messages. The developed Java software is used to implement two DoS threats to the IPv6 autoconfiguration procedure in a laboratory IPv6 network. The results indicate that these threats are real and further studies are required to identify suitable countermeasures. During this work compliance defects are also identified for the Linux Operating System's IPv6 implementation. |
---|