Главная
Study mode:
on
1
Intro
2
IPv4 Address Exhaustion
3
IPv6 - History and Adoption
4
IPv6 Address Size
5
IPv6 Temporary Addresses
6
IPv6 - Flow Classification and the Flow Label
7
Windows - Flow Label Generation Algorithm (TCP & UDP) • The algorithm is based on hashing the destination address, source address, destination port and the source port
8
Linux/Android - Flow Label Generation Algorithm (stateless protocols)
9
Attack Concept - Summary
10
Active Attacker - Windows (1) UDP Case
11
Active Attacker - Windows (3)
12
Attacker Models
13
Conclusions
Description:
Explore the security implications of the IPv6 flow label field in this 15-minute IEEE conference talk. Delve into a detailed analysis of how remote servers can exploit the flow label generation logic in Windows 10, Linux, and Android devices to assign unique identifiers and track user activity across networks and browsers. Learn about the reverse-engineering process of Windows and Linux kernel flow label generation code, and discover practical techniques for extracting encryption keys used in these algorithms. Examine both active and passive attack variants, their effectiveness across different network configurations, and the potential impact on user privacy. Gain insights into IPv6 protocol design, address exhaustion issues, and the challenges of maintaining anonymity in modern network environments.

Exploiting IPv6 Flow Label

IEEE
Add to list