Back to the Future: Revisiting IPv6 Privacy Extensions

We identify issues in current IPv6 privacy extensions and propose improvements that significantly enhance both the flexibility and functionality, to protect a client from being tracked as it moves between different IPv6 networks. This is achieved by generating a new interface identifier for each visited network. We discuss a preliminary Linux implementation of the proposal.

[1]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[2]  Karine Perset Internet Addressing: Measuring Deployment of IPV6 , 2010 .

[3]  George Neville-Neil,et al.  Deprecation of Type 0 Routing Headers in IPv6 , 2007, RFC.

[4]  Saikat Guha,et al.  Identity Trail: Covert Surveillance Using DNS , 2007, Privacy Enhancing Technologies.

[5]  Bart Preneel,et al.  On the Security of Iterated Message Authentication Codes , 1999, IEEE Trans. Inf. Theory.

[6]  Charles E. Perkins,et al.  Mobility support in IPv6 , 1996, MobiCom '96.

[7]  David M. Kristol,et al.  HTTP State Management Mechanism , 2000, RFC.

[8]  Suresh Krishnan,et al.  Handling of Overlapping IPv6 Fragments , 2009, RFC.

[9]  T. Narten,et al.  Privacy Extensions for Stateless Address Autoconfiguration , 2001 .

[10]  Bruce S. Davie,et al.  Computer Networks: A Systems Approach , 1996 .

[11]  Jon Postel,et al.  Internet Protocol , 1981, RFC.

[12]  Thomas Narten,et al.  IPv6 Stateless Address Autoconfiguration , 1996, RFC.

[13]  Thomas Narten,et al.  Privacy Extensions for Stateless Address Autoconfiguration in IPv6 , 2001, RFC.

[14]  Tuomas Aura,et al.  Cryptographically Generated Addresses (CGA) , 2005, ISC.

[15]  Stephen Deering,et al.  Internet Protocol Version 6(IPv6) , 1998 .

[16]  Jari Arkko,et al.  Enhanced Route Optimization for Mobile IPv6 , 2007, RFC.

[17]  Steven M. Bellovin,et al.  ROFL: routing as the firewall layer , 2009, NSPW '08.

[18]  Bill Cheswick,et al.  Worm Propagation Strategies in an IPv6 Internet , 2006, login Usenix Mag..

[19]  Jürgen Falb,et al.  The Internet Protocol , 2005, The Industrial Information Technology Handbook.

[20]  Paul C. van Oorschot,et al.  Internet geolocation: Evasion and counterevasion , 2009, CSUR.

[21]  Stephen E. Deering,et al.  Internet Protocol, Version 6 (IPv6) Specification , 1995, RFC.

[22]  Hugo Krawczyk,et al.  Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier , 1999, CRYPTO.

[23]  Vern Paxson,et al.  How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.

[24]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .