[VoiceOps] IPv6 security defaults
Alex Balashov
abalashov at evaristesys.com
Wed May 11 23:27:43 EDT 2016
This isn't overtly related to voice, but thought I would pose it here
anyway in the context of SIP exploits:
Lots of dedicated servers and cloud servers from major providers are now
spun up with IPv6 enabled by default, but I have yet to see an instance
where firewall rules for IPv6 were enabled by default.
So, while it is typical for major Linux distributions (e.g. CentOS) to
ship with a conservative-ish 'iptables' ruleset applied by default, I
normally see:
--
root at server:~# ip6tables -L -n
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
--
And yes, the canonical default services listen on the 6-net, too:
--
root at server:~# ss -6tln | awk '{print $4}'
Local
::1:53
:::22
::1:953
--
With something like ~10% (?) of Internet traffic passing over IPv6 now
(right?), my expectation would be that script kiddie tools, dictionary
scanners, and the likes of SIPvicious would have evolved to exploit the
fact that IPv6 is often enabled but, in my experience, seldom firewalled.
Does this accord with your experience? Anecdotes welcome.
-- Alex
--
Alex Balashov | Principal | Evariste Systems LLC
1447 Peachtree Street NE, Suite 700
Atlanta, GA 30309
United States
Tel: +1-800-250-5920 (toll-free) / +1-678-954-0671 (direct)
Web: http://www.evaristesys.com/, http://www.csrpswitch.com/
More information about the VoiceOps
mailing list