Security
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Plusnet Community
- :
- Forum
- :
- Trials
- :
- IPv6 Trial
- :
- Security
Security
04-06-2011 12:17 PM
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Highlight
- Report to Moderator
Oddly I put my IPV6 address into Chrome and it did show up a webpage just saying "Hello!" and I have no idea where that came from, unless there is a html document on my router which just says Hello!
/edit - I found the Hello! file, it is on my webserver.
/edit2 - I turned on PlusNets firewall (which should block 80) and it had no effect (port 80 still open) so it looks like PN's firewall needs to be upgraded to support IPV6 too?
Re: Security
05-06-2011 6:03 PM
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Highlight
- Report to Moderator
Hi. It's my firewall tester that you've used/mentioned above. Apologies for not knowing how Plusnet are running their trial (despite being a Plusnet customer) - hence all the questions that follow. What OS are you running? Are you running a software firewall on your end machine(s) or are you just reliant on your router/modem (or Plusnet's) capabilities? Do you definitely have an IPv6 firewall configured - are there other services on your server that are supporting IPv6 -i.e. apart from your webserver? Does the firewall provide any traffic logs/statistics? An IPv4 firewall won't impact IPv6 traffic unless the IPv6 traffic is tunneled/encapsulated in IPv4 - and that will generally mean that the tunneled traffic is either allowed or disallowed via the IPv4 firewall - it won't impact individual IPv6 services/ports.
Best wishes,
Tim.
Re: Security
06-06-2011 5:59 AM
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Highlight
- Report to Moderator
It reported closed on the listed ports on all three Operating Systems.
PB
Re: Security
06-06-2011 8:41 AM
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Highlight
- Report to Moderator
http://ipv6.chappell-family.com/ipv6tcptest/index.php
Thanks,
Tim.
Re: Security
06-06-2011 11:34 AM
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Highlight
- Report to Moderator
access-list 1 remark INSIDE_IF=Vlan1
access-list 1 remark CCP_ACL Category=2
access-list 1 permit 192.168.0.0 0.0.0.255
access-list 23 permit 192.168.0.0 0.0.0.255
access-list 100 remark CCP_ACL Category=128
access-list 100 permit ip host 255.255.255.255 any
access-list 100 permit ip 127.0.0.0 0.255.255.255 any
access-list 101 remark CCP_ACL Category=128
access-list 101 permit ip host 255.255.255.255 any
access-list 101 permit ip 127.0.0.0 0.255.255.255 any
access-list 102 permit ip host 66.220.2.74 any
access-list 102 permit ip host 216.66.80.26 any
access-list 103 remark auto generated by CCP firewall configuration
access-list 103 remark CCP_ACL Category=1
access-list 103 deny ip host 255.255.255.255 any
access-list 103 deny ip 127.0.0.0 0.255.255.255 any
access-list 103 permit ip any any
access-list 104 remark auto generated by CCP firewall configuration
access-list 104 remark CCP_ACL Category=1
access-list 104 remark HE-Tunnel-Tunnel
access-list 104 permit ip host 216.66.80.26 any
access-list 104 remark HE-Tunnel-Ping
access-list 104 permit ip host 66.220.2.74 any
access-list 104 remark Auto generated by CCP for NTP (123) 212.159.13.50
access-list 104 permit udp host 212.159.13.50 eq ntp any eq ntp
access-list 104 deny ip 192.168.0.0 0.0.0.255 any
access-list 104 permit icmp any any echo-reply
access-list 104 permit icmp any any time-exceeded
access-list 104 permit icmp any any unreachable
access-list 104 deny ip 10.0.0.0 0.255.255.255 any
access-list 104 deny ip 172.16.0.0 0.15.255.255 any
access-list 104 deny ip 192.168.0.0 0.0.255.255 any
access-list 104 deny ip 127.0.0.0 0.255.255.255 any
access-list 104 deny ip host 255.255.255.255 any
access-list 104 deny ip host 0.0.0.0 any
access-list 104 deny ip any any log
dialer-list 1 protocol ip permit
There is nothing there that I can see would allow port 80 traffic through the firewall so there is a combination of PN's firewall and my Cisco firewall not picking it up and dropping it.
/edit
Found a sample config to modify so will give it a whirl:
ipv6 inspect name traffic tcp
ipv6 inspect name traffic udp
ipv6 inspect name traffic ftp
ipv6 inspect name traffic icmp
!
interface tunnel1
ipv6 traffic-filter tu1-in in
ipv6 traffic-filter tu1-out out
!
ipv6 access-list tu1-in
permit icmp any any echo-request
permit icmp any any echo-reply
permit tcp 2001:4fff::/32 any eq 22
evaluate reflectout
deny ipv6 any any log-input
!
ipv6 access-list tu1-out
permit icmp any any echo-reply
permit icmp any any echo-request
permit tcp any any reflect reflectout
permit udp any any reflect reflectout
deny ipv6 any any log-input
!
Re: Security
06-06-2011 11:50 AM
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Highlight
- Report to Moderator
Quote from: David /edit2 - I turned on PlusNets firewall (which should block 80) and it had no effect (port 80 still open) so it looks like PN's firewall needs to be upgraded to support IPV6 too?
There are many parts of the platform that have not been touched for this IPv6 trial, the Plusnet firewall is one of those
Carl
Re: Security
06-06-2011 11:59 AM
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Highlight
- Report to Moderator
Test reports all closed on my setup using Cisco 877W
My firewall config
ipv6 inspect name myfw6 ftp
ipv6 inspect name myfw6 icmp
ipv6 inspect name myfw6 udp
ipv6 inspect name myfw6 tcp
ipv6 access-list in-acl6
permit icmp any any
permit tcp any any established
permit udp any any eq 546
permit udp any eq domain any
deny ipv6 any any log
interface Dialer1
ipv6 traffic-filter in-acl6 in
ipv6 inspect myfw6 out
The logs showing the scan
Jun 6 11:53:39: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(22963) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(21), 1 packet
Jun 6 11:53:39: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(18331) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(22), 1 packet
Jun 6 11:53:39: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(27710) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(23), 1 packet
Jun 6 11:53:39: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(5429) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(25), 1 packet
Jun 6 11:53:39: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(19946) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(53), 1 packet
Jun 6 11:53:39: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(29261) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(79), 1 packet
Jun 6 11:53:39: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(12198) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(80), 1 packet
Jun 6 11:53:40: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(24158) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(110), 1 packet
Jun 6 11:53:40: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(7895) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(111), 1 packet
Jun 6 11:53:40: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(5758) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(113), 1 packet
Jun 6 11:53:40: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(19683) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(119), 1 packet
Jun 6 11:53:40: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(15637) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(135), 1 packet
Jun 6 11:53:40: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(4721) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(139), 1 packet
Jun 6 11:53:40: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(19006) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(143), 1 packet
Jun 6 11:53:40: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(4301) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(389), 1 packet
Jun 6 11:53:41: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(29049) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(427), 1 packet
Jun 6 11:53:41: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(20105) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(443), 1 packet
Jun 6 11:53:41: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(16043) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(445), 1 packet
Jun 6 11:53:41: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(2025) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(631), 1 packet
Jun 6 11:53:41: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(9981) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(873), 1 packet
Jun 6 11:53:41: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(18106) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(993), 1 packet
Jun 6 11:53:41: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(8710) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(1025), 1 packet
Jun 6 11:53:41: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(20647) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(1026), 1 packet
Jun 6 11:53:41: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(3058) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(1029), 1 packet
Jun 6 11:53:41: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(21502) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(1030), 1 packet
Jun 6 11:53:41: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(22303) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(1080), 1 packet
Jun 6 11:53:42: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(6856) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(1720), 1 packet
Jun 6 11:53:42: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(8466) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(3128), 1 packet
Jun 6 11:53:42: %IPV6_ACL-6-ACCESSLOGP: list in-acl6/60 denied tcp 2001:470:1F08:185C::2(25300) -> 2A02:16C8:6080:304:D69A:20FF:FE79:1A40(5000), 1 packet
HTH
Re: Security
06-06-2011 12:10 PM
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Highlight
- Report to Moderator
Re: Security
06-06-2011 12:48 PM
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Highlight
- Report to Moderator
Quote from: David access-list 1 remark INSIDE_IF=Vlan1
access-list 1 remark CCP_ACL Category=2
access-list 1 permit 192.168.0.0 0.0.0.255
access-list 23 permit 192.168.0.0 0.0.0.255
access-list 100 remark CCP_ACL Category=128
access-list 100 permit ip host 255.255.255.255 any
access-list 100 permit ip 127.0.0.0 0.255.255.255 any
<snip>
There is nothing there that I can see would allow port 80 traffic through the firewall so there is a combination of PN's firewall and my Cisco firewall not picking it up and dropping it.
I know you're sorted but it's probably worth mentioning for anyone else reading: the access list above is, in Cisco terms, an 'ip' access list i.e. it is IPv4 only. Given that IPv4 and IPv6 are two separate network stacks and are implemented independently by the IOS then, as you now have, you also need an IPv6 access list applied to an interface in order to control IPv6 traffic through it. Thus, two access lists would be applied - one for IPv4 and one for IPv6.
Incidentally there is, amongst other IPv6-related tools, a good port scanner at www.subnetonline.com/pages/ipv6-network-tools/online-ipv6-port-scanner.php which you may find useful as you can specify the target address i.e. you are not limited to only testing from your own machine (the understandable restriction being you can only check for one port at a time but this is often all that's required).
Mathew
Re: Security
14-08-2011 10:14 PM
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Highlight
- Report to Moderator
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page