<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>6lab.cz | RSS Feed</title>
	<atom:link href="http://6lab.cz/author/libor-polcak/feed/" rel="self" type="application/rss+xml" />
	<link>http://6lab.cz</link>
	<description>Networking, IPv6, Security</description>
	<lastBuildDate>Tue, 24 Oct 2017 08:54:46 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.1</generator>
	<item>
		<title>Hiding TCP Traffic: Threats and Counter-measures</title>
		<link>http://6lab.cz/hiding-tcp-traffic-threats-and-counter-measures/</link>
		<comments>http://6lab.cz/hiding-tcp-traffic-threats-and-counter-measures/#comments</comments>
		<pubDate>Tue, 16 Jul 2013 13:51:38 +0000</pubDate>
		<dc:creator><![CDATA[Libor Polčák]]></dc:creator>
				<category><![CDATA[IPv6]]></category>
		<category><![CDATA[Monitoring]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://6lab.cz/?p=1735</guid>
		<description><![CDATA[Computer networks were designed to be simple and routers do not validate the integrity of the processed traffic. Consequently, an attacker can modify his or her traffic with the aim of confusing any analyser that intercepts the traffic, e.g. monitoring and security software or lawful interception. This paper studies the ... <a href="http://6lab.cz/hiding-tcp-traffic-threats-and-counter-measures/" class="more-link">Read More</a>]]></description>
				<content:encoded><![CDATA[<p>Computer networks were designed to be simple and routers do not validate the integrity of the processed traffic. Consequently, an attacker can modify his or her traffic with the aim of confusing any analyser that intercepts the traffic, e.g. monitoring and security software or lawful interception. This paper studies the attack that is based on sending additional colliding TCP segments with the same sequential number but different content. The segments with the correct message are delivered to the other communicating party of the TCP connection while the fake segments are dropped en route. The goal of the fake segments is to confuse analysers into decoding a different message to the one that is received by the other communicating party. The other communicating party does not need to be aware of the attack and therefore does not need any specific software. Although this paper discuss the advantages and disadvantages of the attack for an attacker, our ultimate goal was to find counter-measures against the attack. Our contribution can be divided into four following parts. 1) We converted the attack to IPv6 and searched for possibilities that may force a middle box to drop fake packets. 2) We developed a tool called LDP, which behaves as a TCP proxy server that masks outbound TCP traffic of a whole network. 3) We identified several counter-measures. In addition, we implemented LNC, a tool that identifies the attack in pcap files and removes the fake segments. Since LNC is a stand-alone tool, it also deals with traces generated by other software than LDP as long as it is based on the same attack vector. 4) LDP and LNC were tested in both laboratory environment and on the Internet. The experiments validated that the attack is applicable for a communication with a server that is not under the control of an attacker. Several parameters of the attack were evaluated during the experiments; mainly the number and the length of fake packets and their influence on the performance of the attack and counter-measures.</p>
<p><a href="http://6lab.cz/wordpress/wp-content/uploads/2013/07/article.pdf">Full paper</a></p>
<p><a href="http://6lab.cz/wordpress/wp-content/uploads/2013/07/presentation.pdf">Presentation used at the conference</a></p>
<p>Citation: Polčák, L., Hranický, R., Matoušek, P.: Hiding TCP Traffic: Threats and Counter-measures, In: Security and Protection of Information 2013, Brno, CZ, UNOB, 2013, s. 83-96, ISBN 978-80-7231-922-0</p>
<div  class="x-author-box cf" ><h6 class="h-about-the-author">About the main author</h6><div class="x-author-info"><h4 class="h-author mtn">Libor Polčák</h4><a href="http://www.fit.vutbr.cz/~polcak" class="x-author-social" title="Visit the website for Libor Polčák" target="_blank"><i class="x-icon-globe"></i> http://www.fit.vutbr.cz/~polcak</a><span class="x-author-social"><i class="x-icon-envelope"></i> polcak@fit.vutbr.cz</span><p class="p-author mbn">Libor Polčák is a researcher at BUT, FIT.</p></div></div>
]]></content:encoded>
			<wfw:commentRss>http://6lab.cz/hiding-tcp-traffic-threats-and-counter-measures/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Behaviour of various operating systems during SLAAC, DAD, and ND</title>
		<link>http://6lab.cz/behaviour-of-various-operating-systems-during-slaac-dad-and-nd/</link>
		<comments>http://6lab.cz/behaviour-of-various-operating-systems-during-slaac-dad-and-nd/#comments</comments>
		<pubDate>Wed, 29 May 2013 08:27:53 +0000</pubDate>
		<dc:creator><![CDATA[Libor Polčák]]></dc:creator>
				<category><![CDATA[IPv6]]></category>
		<category><![CDATA[Monitoring]]></category>
		<category><![CDATA[Networking]]></category>

		<guid isPermaLink="false">http://6lab.cz/?p=1691</guid>
		<description><![CDATA[This post contains the report from the study phase of the behaviour of various operating systems during SLAAC and DAD analysis for our paper called &#8220;A New Approach for Detection of Host Identity in IPv6 Networks&#8221;, which will be presented at DCNET 2013. This post also contains PCAP files that ... <a href="http://6lab.cz/behaviour-of-various-operating-systems-during-slaac-dad-and-nd/" class="more-link">Read More</a>]]></description>
				<content:encoded><![CDATA[<p>This post contains the report from the study phase of the behaviour of various operating systems during SLAAC and DAD analysis for our paper called &#8220;A New Approach for Detection of Host Identity in IPv6 Networks&#8221;, which will be presented at <a href="http://www.dcnet.icete.org">DCNET 2013</a>. This post also contains PCAP files that we believe may be useful for other researchers or engineers. In this post, we call RFC4941 as PE addresses and addresses used by windows with randomly generated interface identifier (IID) are called random addresses, even though the random part of the address is generated just once. The credit for most of the work goes to Martin Holkovič.</p>
<h2>Monitoring network</h2>
<p>We tested the operating systems on virtual machines in VMware Workstation 7.1., the network cards of the virtual machines were operating in Host-Only mode. You can see the topology on the following image: <a href="http://6lab.cz/wordpress/wp-content/uploads/2013/05/Network_server.8.6.1.png"><img class="aligncenter wp-image-1694 size-medium" src="http://6lab.cz/wordpress/wp-content/uploads/2013/05/Network_server.8.6.1-300x162.png" alt="Testing topology" width="300" height="162" /></a> Additionally, Cisco 3725 router was connected to the topology: <a href="http://6lab.cz/new/wp-content/uploads/2013/05/Router_in_the_topology.png"><img class="aligncenter wp-image-1700 size-medium" src="http://6lab.cz/wordpress/wp-content/uploads/2013/05/Router_in_the_topology-300x97.png" alt="Router connected to the tested network" width="300" height="97" /></a></p>
<h2>Performed tests</h2>
<h4>Selection of a new address</h4>
<ol>
<li>The router is connected to the network and the tested interface is down on the tested OS</li>
<li>The tested interface is enabled and consequently, the OS generates a new address</li>
</ol>
<h4>Does the tested computer reply to DAD-NS (EUI-64, static, random, PE address)?</h4>
<ol>
<li>The router, the tested computer and a virtual PC with Ubuntu are present in the tested network.</li>
<li>The tested address (EUI-64, static, random, PE) is set on the Ubuntu computer, consequently Ubuntu issues DAD and the tested OS should reply with the NA.</li>
</ol>
<h4>Does the tested computer use duplicate EUI-64 address?</h4>
<ol>
<li>The router, the tested computer and a virtual PC with Ubuntu are present in the tested network. The tested interface is down.</li>
<li>The tested system is configured to generate EUI-64 if necessary.</li>
<li>Ubuntu is set up to use the same MAC address as the tested computer has.</li>
<li>The tested interface is enabled, the OS generates the same address as the Ubuntu computer already has. Ubuntu replies with NA.</li>
</ol>
<h4>Does the tested computer use duplicate global EUI-64 address?</h4>
<ol>
<li>Only the systems with EUI-64 addresses enabled by default were tested</li>
<li>The router, the tested computer and a virtual PC with Ubuntu are present in the tested network. The tested interface is down.</li>
<li>Ubuntu is set up to use the same IPv6 address as the tested computer would use as EUI-64 address.</li>
<li>The tested interface is enabled, the OS generates the same address as the Ubuntu computer already has. Ubuntu replies with NA.</li>
</ol>
<h4>Does the tested computer use duplicate random address?</h4>
<ol>
<li>Only the systems with random addresses enabled by default were tested (newer Windows).</li>
<li>The router, the tested computer and a virtual PC with Ubuntu are present in the tested network. The tested interface is down.</li>
<li>Ubuntu is set up to use the same IPv6 address as the tested computer would use as random address (the IID is generated once and then it stays constant).</li>
<li>The tested interface is enabled, the OS generates the same address as the Ubuntu computer already has. Ubuntu replies with NA.</li>
</ol>
<h4>Does the tested computer use duplicate PE address?</h4>
<ol>
<li>PE addresses are enabled on the tested OS.</li>
<li>The router, the tested computer and a virtual PC with Ubuntu are present in the tested network. The tested interface is down.</li>
<li>A script that replies with NA to all PE addresses is started on the computer with Ubuntu. The script does not reply to EUI-64 (link-local, global) a random addresses used by the tested Windows computers.</li>
<li>The tested interface is enabled, the OS generates PE address and the script replies with NA.</li>
</ol>
<h2 id="captured_pcaps">Captured PCAP files</h2>
<p>During the test, we captured various PCAP files that can be <a href="http://6lab.cz/wordpress/wp-content/uploads/2015/10/ns.zip">downloaded</a> used for your analysis. We have also analysed the PCAP files, see the following section and the publications below.</p>
<ul>
<li>POLČÁK Libor, HOLKOVIČ Martin a MATOUŠEK Petr. <a href="https://www.fit.vutbr.cz/~ipolcak/pubs.php?id=10362">A New Approach for Detection of Host Identity in IPv6 Networks</a>. In: Proceedings of the 4th International Conference on Data Communication Networking, 10th International Conference on e-Business and 4th International Conference on Optical Communication Systems. Reykjavík: SciTePress &#8211; Science and Technology Publications, 2013, pp. 57-63. ISBN 978-989-8565-72-3.</li>
<li>POLČÁK Libor, HOLKOVIČ Martin and MATOUŠEK Petr. <a href="https://www.fit.vutbr.cz/~ipolcak/pubs.php?id=10467">Host Identity Detection in IPv6 Networks</a>. In: E-Business and Telecommunications. Berlin: <a href="https://link.springer.com/chapter/10.1007/978-3-662-44788-8_5">Springer Verlag</a>, 2014, pp. 74-89. ISBN 978-3-662-44787-1. ISSN 1865-0929. (This is an extended version of the previous paper.)</li>
<li>POLČÁK, Libor. <a href="http://www.fit.vutbr.cz/study/DP/PD.php?id=679">Lawful Interception: Identity Detection</a>. Brno, 2017. PhD. Thesis. Brno University of Technology, Faculty of Information Technology. 2017-10-13. Supervisor Švéda Miroslav.</li>
</ul>
<h2>Test results</h2>
<p>The tests result are presented in the following table</p>
<table style="width: 100%;border: 1px solid black;padding: 4px">
<tbody>
<tr>
<th>Name</th>
<th>Version</th>
<th>Kernel</th>
<th>Uses PE addresses by default</th>
<th>Does the tested computer reply to DAD-NS (static address)?</th>
<th>The tested computer does not use duplicate static address</th>
<th>EUI-64 replies to DAD / does not use duplicate address</th>
<th>Does not use duplicate EUI-64 global address in case of PE are turned on</th>
<th>Random addresses replies to DAD / does not use duplicate address</th>
<th>privacy extension adresy replies to DAD / does not use duplicate address / Number of attempts</th>
</tr>
<tr>
<td>CentOS</td>
<td>6.2</td>
<td>2.6.32</td>
<td>No</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes / Yes</td>
<td>Yes</td>
<td>-<sup>1</sup></td>
<td>Yes / Yes / 5</td>
</tr>
<tr>
<td>Debian</td>
<td>3.1</td>
<td>2.4.27</td>
<td>No</td>
<td>Yes</td>
<td>was not tested</td>
<td>Yes / Yes</td>
<td>-<sup>2</sup></td>
<td>-</td>
<td>-<sup>2</sup></td>
</tr>
<tr>
<td>Debian</td>
<td>6.0.4</td>
<td>2.6.32</td>
<td>No</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes / Yes</td>
<td>Yes</td>
<td>-<sup>1</sup></td>
<td>Yes / Yes / 5</td>
</tr>
<tr>
<td>Fedora</td>
<td>16</td>
<td>3.1.0</td>
<td>No</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes / Yes</td>
<td>Yes</td>
<td>-<sup>1</sup></td>
<td>Yes / Yes / 5</td>
</tr>
<tr>
<td>FreeBSD</td>
<td>9.0</td>
<td>-</td>
<td>No</td>
<td>Yes</td>
<td>Yes, tested on 9.1</td>
<td>Yes<sup>5</sup> / Yes</td>
<td>Yes <sup>3</sup></td>
<td>-<sup>1</sup></td>
<td>Yes / Yes / 1 <sup>4</sup></td>
</tr>
<tr>
<td>Linux Mint</td>
<td>12</td>
<td>3.0.0</td>
<td>No</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes / Yes</td>
<td>Yes</td>
<td>-<sup>1</sup></td>
<td>Yes / Yes / 5</td>
</tr>
<tr>
<td>Mac OS X</td>
<td>10.6.2</td>
<td>10.2</td>
<td>No</td>
<td>Yes</td>
<td>-</td>
<td>Yes / Yes</td>
<td>Yes <sup>3</sup></td>
<td>-<sup>1</sup></td>
<td>Yes / Yes / 1 <sup>4</sup></td>
</tr>
<tr>
<td>Mandriva</td>
<td>One 2011</td>
<td>2.6.38</td>
<td>No</td>
<td>Yes</td>
<td>was not tested</td>
<td>Yes / Yes</td>
<td>Yes</td>
<td>-<sup>1</sup></td>
<td>Yes / Yes / 5</td>
</tr>
<tr>
<td>OpenBSD</td>
<td>5.0</td>
<td>-</td>
<td>No</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes / Yes</td>
<td>Yes <sup>3</sup></td>
<td>-<sup>1</sup></td>
<td>Yes / Yes / 1 <sup>4</sup></td>
</tr>
<tr>
<td>Red Hat</td>
<td>5</td>
<td>2.6.18</td>
<td>No</td>
<td>Yes</td>
<td>was not tested</td>
<td>Yes / Yes</td>
<td>Yes</td>
<td>-<sup>1</sup></td>
<td>Yes / Yes / 5</td>
</tr>
<tr>
<td>Solaris</td>
<td>5.11</td>
<td>-</td>
<td>No</td>
<td><sup>6</sup></td>
<td>Yes</td>
<td>Yes / Yes</td>
<td>Yes <sup>3</sup></td>
<td>-<sup>1</sup></td>
<td>Yes / Yes / 5</td>
</tr>
<tr>
<td>Ubuntu</td>
<td>10.04 LTS</td>
<td>2.6.32</td>
<td>No</td>
<td>Yes</td>
<td>was not tested</td>
<td>Yes / Yes</td>
<td>Yes</td>
<td>-<sup>1</sup></td>
<td>Yes / Yes / 5</td>
</tr>
<tr>
<td>Ubuntu</td>
<td>11.10</td>
<td>3.0.0</td>
<td>No</td>
<td>Yes</td>
<td>was not tested</td>
<td>Yes / Yes</td>
<td>Yes</td>
<td>-<sup>1</sup></td>
<td>Yes / Yes / 5</td>
</tr>
<tr>
<td>Windows 7</td>
<td>-</td>
<td>6.1</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes<sup>5</sup> / Yes</td>
<td>Yes</td>
<td>Yes / Yes</td>
<td>Yes / Yes / 7</td>
</tr>
<tr>
<td>Windows 7</td>
<td>SP1</td>
<td>6.1</td>
<td>Yes</td>
<td>Yes</td>
<td>was not tested</td>
<td>Yes<sup>5</sup> / Yes</td>
<td>Yes</td>
<td>Yes / Yes</td>
<td>Yes / Yes / 7</td>
</tr>
<tr>
<td>Windows 8</td>
<td>consumer preview</td>
<td>6.2</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes<sup>5</sup> / Yes</td>
<td>Yes</td>
<td>Yes / Yes</td>
<td>Yes / Yes / 7</td>
</tr>
<tr>
<td>Windows Server 2008 R2</td>
<td>SP1</td>
<td>6.1</td>
<td>No</td>
<td>Yes</td>
<td>was not tested</td>
<td>Yes<sup>5</sup> / Yes</td>
<td>Yes</td>
<td>Yes / Yes</td>
<td>Yes / Yes / 7</td>
</tr>
<tr>
<td>Windows Vista</td>
<td>-</td>
<td>6.0</td>
<td>Yes</td>
<td>Yes</td>
<td>was not tested</td>
<td>Yes<sup>5</sup> / Yes</td>
<td>Yes</td>
<td>Yes / Yes</td>
<td>Yes / Yes / 7</td>
</tr>
<tr>
<td>Windows Vista</td>
<td>SP2</td>
<td>6.0</td>
<td>Yes</td>
<td>Yes</td>
<td>was not tested</td>
<td>Yes<sup>5</sup> / Yes</td>
<td>Yes</td>
<td>Yes / Yes</td>
<td>Yes / Yes / 7</td>
</tr>
<tr>
<td>Windows XP</td>
<td>SP3</td>
<td>5.1</td>
<td>No</td>
<td>Yes</td>
<td>Yes</td>
<td>Yes / Yes</td>
<td>Yes</td>
<td>-<sup>1</sup></td>
<td>Yes / Yes / 7</td>
</tr>
</tbody>
</table>
<p>Notes to the tests</p>
<ul>
<li><strong>1.</strong><strong>Random addresses:</strong>
<ul>
<li>They are only supported on Windows Vista and newer.</li>
</ul>
</li>
<li><strong>2. Privacy extension addresses</strong>:
<ul>
<li>PE was not configured</li>
</ul>
</li>
<li><strong>3. EUI-64 global addresses &#8211; reaction to duplicate address:</strong>
<ul>
<li>Tested OS keeps the address but it is marked as duplicate and it is not used by the OS (e.g. DAD, ping)</li>
</ul>
</li>
<li><strong>4. Privacy extension addresses &#8211; </strong><strong>reaction to duplicate address</strong>:
<ul>
<li>Only one PE is tried, it is kept after DAD but it is marked as duplicate and it is not used by the OS (e.g. DAD, ping)</li>
</ul>
</li>
<li><strong>5. EUI-64 &#8211; reaction to DAD</strong>:
<ul>
<li>Marked systems ignore DAD from the same MAC address as is used by the system.</li>
</ul>
</li>
<li><strong>6. Solaris &#8211; static address</strong>:
<ul>
<li>Static address was not tested because it was not used by the system.</li>
</ul>
</li>
</ul>
<div  class="x-author-box cf" ><h6 class="h-about-the-author">About the main author</h6><div class="x-author-info"><h4 class="h-author mtn">Libor Polčák</h4><a href="http://www.fit.vutbr.cz/~polcak" class="x-author-social" title="Visit the website for Libor Polčák" target="_blank"><i class="x-icon-globe"></i> http://www.fit.vutbr.cz/~polcak</a><span class="x-author-social"><i class="x-icon-envelope"></i> polcak@fit.vutbr.cz</span><p class="p-author mbn">Libor Polčák is a researcher at BUT, FIT.</p></div></div>
]]></content:encoded>
			<wfw:commentRss>http://6lab.cz/behaviour-of-various-operating-systems-during-slaac-dad-and-nd/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
