Author: Benjamin D. Thomas
pdftohtml, libpaperl, xpdf, gpdf, and apache2. The distributors include Gentoo
and Mandriva.IPv6 approach for TCP SYN Flood attack over VoIP, Part IV
By: Suhas Desai
6. IPv6 Approaches
Service Providers are scrambling to offer voice, video, data and innovative
services such as gaming, interactive TV and messaging, on a single pipe. At
the same time, network equipment is being upgraded to IPV6.But some Real-Time
IPV6 Security overwhelms performance due to the application intelligence which
is the rapid inspection of VoIP signaling SIP, H.323 and audio packets, and
the prompt opening and shutting of “pinholes” to allow the passage of valid
voice traffic over wireless networks.
A firewall enabled for application filtering and IPv6 can drop application
performance by a staggering 90 % or more compared to best case IPV4 results.
Given methods are used to IPv6 Application performance:
- Emulate real application traffic -data, voice, video over tens of thousands
of clients and/or servers. - Measure performance and Quality of Experience with Web pages/s, VoIP call
set-up time, FTP file transfer rate and instant message passing with TCP SYN
handshaking signals.
Multiply services over IPv4/v6 must address three additional challenges that
will impact network performance must be handled following DoS attacks. IPv6
approaches can handle these with Network tester configurations.
6.2 DoS Attacks
- Must be filtered, including traditional layer 3-4 attacks such as TCP SYN
Flood which is ported to IPv6. - ICMPv6 attacks
- Application layer attacks (such as SIP setup/teardown flood and RTP stream
Insertion). - Application attacks are particularly effective because they degrade the
CPU performance.
6.3 VoIP Attack Vulnerability
VoIP attack vulnerability simulates DoS attacks to measure impact on VoIP
with:
- Traditional DoS attacks (TCP SYN flood, ping of Death)
- VoIP voice insertion-simulate rogue RTP streams.
- VoIP DoS simulates bursts of call setups and teardowns on the same addresses
6.4 Performance Challenges
6.4.1
Longer IPv6 addresses:
Firewall rule sets and ACL must work IPv6 addresses. It can degrade performance.
6.4.2
IPv6 variable-length headers:
Parsing more complex encryption and authentication header sections must be
parsed and filtered and it may also need to perform encryption/decryption or
calculation of message authentication codes to be filter on application-layer
headers and content.
6.4.3
IPv6 DoS attacks
IPv6/v4 and IPv4/v6 tunneling can hide application-layer attacks within complex
handcrafted TCP SYN packets.
6.5 Triple-Play Methodology
It is a new approach needed to ensure that application aware devices do not
become bottlenecks:
6.5.1
Real-Time Application Performance.
6.5.2
Add DoS attacks over IPv6 including SIP setup-teardown attacks. Quantify the
reduction in application performance.
Read Article:
http://www.linuxsecurity.com/content/view/121205/49/
Gentoo | ||
Gentoo: HylaFAX Multiple vulnerabilities | ||
6th, January, 2006
|
||
Mandriva | ||
Mandriva: Updated HAL packages fixes card reader bug |
||
5th, January, 2006
|
||
Mandriva: Updated poppler packages fix several vulnerabilities |
||
5th, January, 2006
|
||
Mandriva: Updated pdftohtml packages fix several vulnerabilities |
||
5th, January, 2006
|
||
Mandriva: New libpaper1 packages provide libpaper1 to x86_64 platform |
||
5th, January, 2006
|
||
Mandriva: Updated xpdf packages fix several vulnerabilities |
||
5th, January, 2006
|
||
Mandriva: Updated gpdf packages fix several vulnerabilities |
||
5th, January, 2006
|
||
Mandriva: Updated apache2 packages fix vulnerabilities |
||
5th, January, 2006
|
||