ron broersma dren-stavanger-22 nov2011

30
Enterprise IPv6 Deployment Experiences - and - Deployment to U.S. Government Norwegian IPv6 Conference 22 Nov, 2011 Stavanger, Norway Ron Broersma DREN Chief Engineer SPAWAR Network Security Manager Federal IPv6 Task Force [email protected]

Upload: ipv6no

Post on 13-Dec-2014

1.090 views

Category:

Technology


3 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Ron Broersma dren-stavanger-22 nov2011

Enterprise IPv6 Deployment Experiences- and -

Deployment to U.S. Government

Norwegian IPv6 Conference22 Nov, 2011

Stavanger, Norway

Ron BroersmaDREN Chief Engineer

SPAWAR Network Security ManagerFederal IPv6 Task [email protected]

Page 2: Ron Broersma dren-stavanger-22 nov2011

DREN/SPAWAR Progress

Source: http://www.mrp.net/IPv6_Survey.html22-Nov-2011 2

Page 3: Ron Broersma dren-stavanger-22 nov2011

The major issues for us• Lack of IPv6/IPv4 feature parity

– taking too long to get there• Vendors not eating own dogfood

– but starting to turn around• Rogue RAs

– set router priority to “high” as workaround• Privacy Addresses (RFC4941)

– no good solution yet• MacOSX 10.6

– but starting to get much better (10.6.8, 10.7)• Network Management over IPv6• Operational Complexity

22-Nov-2011 3

Page 4: Ron Broersma dren-stavanger-22 nov2011

Lack of “feature parity”

• “feature parity” between IPv4 and IPv6 is something we expect in all products.– If the device supports a capability in IPv4,

we want it to support that same capability in IPv6.

• Nobody delivers feature parity today.– Some vendors are working to fix this.

• Until we achieve feature parity...– IPv6 is something less than IPv4– You may need to re-engineer your network

to accommodate missing features.

22-Nov-2011 4

Page 5: Ron Broersma dren-stavanger-22 nov2011

Privacy Addresses (RFC 4941)

• Incompatible with many Enterprise environments– Need address stability for many reasons

• Logging, Forensics, DNS stability, ACLs, etc.• Enabled by default in Windows

– Breaks plug-n-play because we have to visit every Windows machine to disable this feature.

• Just added in Mac OS X “Lion”.

• Now default in latest openSuSE (12.1)

• Ubuntu thinking about making it default.

[Privacy addresses] are horrible and I hope nobody really uses them, but they're better than NAT.… Owen DeLong, Hurricane Electric

22-Nov-2011 5

Page 6: Ron Broersma dren-stavanger-22 nov2011

Living with Privacy addresses

• Where your clients support DHCPv6, use that to assign addresses– No DHCPv6 client support in Windows XP, Mac OSX before

10.7 (Lion), etc.

• If all your Windows systems are in Active Directory, use GPO to disable privacy addresses

• Options for other systems:– configure system to disable privacy addresses

• registry setting in Windows (see below)

– configure addresses statically on the hosts– keep a historical record of all MAC address to IPv6 address

mappings for every host, for correlation in IDS and forensics tools

22-Nov-2011 6

netsh interface ipv6 set privacy state=disabled store=persistentnetsh interface ipv6 set global randomizeidentifiers=disabled store=persistent

Page 7: Ron Broersma dren-stavanger-22 nov2011

Rogue Router Advertisements

See RFC 6104• Router Advertisements (RAs) inform hosts of the

default router/gateway• Windows systems with Internet Connection Sharing

(ICS) enabled, and IPv6 enabled, will announce itself as the default router using RAs (“Rogue RAs”).– VERY common problem

• Hosts then start sending all their default traffic to the Windows system

• Workaround: set router preference to “high” (RFC 4191)– Doesn’t work on JunOS

• Long term: “RA Guard” (RFC 6105) or SeND (RFC 3971)22-Nov-2011 7

Page 8: Ron Broersma dren-stavanger-22 nov2011

Network Management

• Can you do all your network management over IPv6?• Not yet, but very soon• Most products cannot be managed over IPv6-only

• Goal: IPv6-only on management LAN by January 2011• already removed all IPv4 configuration from all

layer-2 switches• changed vendors in some cases• eliminated old hardware that will never support

IPv6• awaiting software updates to resolve last

remaining issues22-Nov-2011 8

Page 9: Ron Broersma dren-stavanger-22 nov2011

9

Management over IPv6 in some products

• Previously (June)…

• Now…

22-Nov-2011

SSH HTTPS

DNS Syslog SNMP NTP RADIUS Unified MIB RFC4293

Flow export TFTP FTP

CDP LLDP

Cisco6

Brocade 1 2 3 4

Juniper

ALU 5 7

SSH HTTPS

DNS Syslog SNMP NTP RADIUS Unified MIB RFC4293

Flow export TFTP FTP

CDP LLDP

Cisco

Brocade 1 2 3 4

Juniper 5

Page 10: Ron Broersma dren-stavanger-22 nov2011

Operational Complexity

• Added complexity increases security risk

• dual-stack can be more complex than IPv4 alone

• example: firewalls– are all your policies equivalent?– how do you keep them in sync?– twice as much work?

22-Nov-2011 11

This may incentivize us to shut down IPv4 sooner than later

Page 11: Ron Broersma dren-stavanger-22 nov2011

World IPv6 day

• For DREN and SPAWAR, nothing new to turn on for the day– every day is IPv6 day for us

• What does it look like from an enterprise perspective, where ALL clients (users) are dual-stack?

22-Nov-2011 12

Page 12: Ron Broersma dren-stavanger-22 nov2011

Percentage of Internet traffic over IPv6

• 1% (2009, before Google whitelisting)• 2.5% (Google whitelisted)• 10% (late Jan 2010, Youtube added)• World IPv6 day… (peak at 68%)

22-Nov-2011 13

Page 13: Ron Broersma dren-stavanger-22 nov2011

After IPv6 day

• Percentages across a day (5 min averages):

22-Nov-2011 14

Page 14: Ron Broersma dren-stavanger-22 nov2011

After IPv6 day

• Past week (hourly averages):

• Month (daily averages):

22-Nov-2011 15

Page 15: Ron Broersma dren-stavanger-22 nov2011

Many enterprises have not started their IPv6

deployment• Reasons:

– Lack of incentives and resources– Other higher priorities (improving security)– It all seems overwhelming, and don't know where to

start.– No “business case”

• My answer:– If you haven't started, you're late and at risk– It doesn't take additional resources if you do it right.– For U.S. Federal agencies, there is a new mandate.– Don't waste time on developing a business case.

• Its a matter of business continuity.– “Don't be afraid to break some glass”

22-Nov-2011 16

Page 16: Ron Broersma dren-stavanger-22 nov2011

IPv6 Deployment to U.S. Government

Page 17: Ron Broersma dren-stavanger-22 nov2011

US Federal Agencies

• Earlier mandates didn’t work• New mandate to IPv6-enable public

facing services by Sept 2012• Transition managers assigned in each

agency• Lots of planning, with little or no

operational experience• Addressing plans have problems• Almost no progress on actually IPv6-

enabling anything• Major Carriers are not ready

– even though they claim otherwise in public

• World IPv6 Day – missed opportunities

22-Nov-2011 18

Page 18: Ron Broersma dren-stavanger-22 nov2011

US Govt Deployment Status

22-Nov-2011 19

http://usgv6-deploymon.antd.nist.gov

(or just search for “USG IPv6 Status”)

Page 19: Ron Broersma dren-stavanger-22 nov2011

20

Something is missing:IPv6 Operational Experience

• Lots of planning is underway– transition planning– address planning

• Much of this planning is done by individuals who have never touched an IPv6 packet

• Too much energy is being wasted on plans that are flawed, because they are not based on operational experience

• It is more important to turn on IPv6 now and start moving some IPv6 traffic, than it is to have a complete plan

22-Nov-2011

Page 20: Ron Broersma dren-stavanger-22 nov2011

Some Lessons Learned• Gain operational IPv6 experience before

putting too much effort into enterprise-wide planning

• Addressing Plans– everyone makes the same mistakes

• Go native (dual stack)• Start from outside, and work in

– focus now on public facing services• There will be challenges (surprises) along the

way• You can automate the DNS updates• It doesn’t require significant resources, if you

start early and leverage tech refresh22-Nov-2011 21

Page 21: Ron Broersma dren-stavanger-22 nov2011

Addressing Plans• Without sufficient operational experience with

IPv6 deployment, you WILL get it wrong at first.– usually takes the 3rd time to get it right

• Planners are hindered by IPv4-thinking– being conservative with address space– thinking “hosts” instead of “subnets”

22-Nov-2011 22

Page 22: Ron Broersma dren-stavanger-22 nov2011

Addressing Plans

• Common mistakes– Doing other than /64 for subnets

• Didn’t read RFC 4291 nor 5375– Thinking that the addressing plan has to be

perfect the first time• because you can’t afford to re-address

– Choosing allocations for sites based on size of site• because /48 for all sites is too wasteful

– Justification “upwards”, instead of pre-allocation “downwards”

– Host-centric allocation instead of subnet-centric

22-Nov-2011 23

Page 23: Ron Broersma dren-stavanger-22 nov2011

24

Making the paradigm shift

• You may be un-qualified to develop an IPv6 addressing plan if you think:– /64 for subnets is wasteful– /64 for point-to-point links is wasteful– /48 for small sites is wasteful

22-Nov-2011

Page 24: Ron Broersma dren-stavanger-22 nov2011

25

Once again…

22-Nov-2011

When doing an address plan, a major driver in IPv4was efficiency and conservation

In IPv6, efficiency and conservation is NOT a majordriver, but instead it is all about better alignmentwith network topology, accommodation of securityarchitecture, and operational simplicity throughstandardization

Page 25: Ron Broersma dren-stavanger-22 nov2011

Addressing Plans• After operational experience, you realize:

– you never have to “grow” subnets, so you don’t need to accommodate that situation

– if you don’t use /64’s for subnets, you can’t do SLAAC, DHCPv6, Multicast with Embedded-RP, etc.

– there is a huge opportunity to align addressing with security topology, to simplify ACLs

– you can better align subneting and aggregation with existing topology

– it is a bad idea to embed IPv4 addresses in IPv6– nibble (4 bit) boundaries align better with PTR records– every interface has multiple IPv6 addresses– internal aggregation is not as important as you initially

thought– you can do a lot of pre-allocation

22-Nov-2011 26

Page 26: Ron Broersma dren-stavanger-22 nov2011

Feedback received after I presented the above

• From one of the Federal Agency Engineers:– “using /64 everywhere including point-to-

point links is crazy”– “RFCs aren’t rules... There will be new

RFCs”– “wait with deploying IPv6 until these

problems are worked out”– “If everybody in the world did what the

presenter did, then we will indeed run out of IPv6 addresses”

– “I hope all agencies don’t follow his aggressive recommendations like sheep”22-Nov-2011 27

Page 27: Ron Broersma dren-stavanger-22 nov2011

Other common mistakes

• Working from inside out• Thinking that “native IPv6” means that

you have to disable IPv4• Too much use of translators• Missed opportunities

22-Nov-2011 28

Page 28: Ron Broersma dren-stavanger-22 nov2011

Final Thoughts, Summary

• Only use providers and suppliers that have a good IPv6 story

• IPv6 is ready for deployment to the Enterprise

• Most important to IPv6-enable the public Internet now

• Large bureaucracies have major challenges ahead– we need to help, and it may also require

standards cast into strong policy

22-Nov-2011 29

Page 29: Ron Broersma dren-stavanger-22 nov2011

ENDAny Questions?

Contact me at:[email protected]

Page 30: Ron Broersma dren-stavanger-22 nov2011

Benefits of IPv6 today (examples)

• Addressing– can better map subnets to reality– can align with security topology, simplifying ACLs– sparse addressing (harder to scan/map)– never have to worry about “growing” a subnet to hold

new machines– auto-configuration, plug-n-play– universal subnet size, no surprises, no operator confusion,

no bitmath– shorter addresses in some cases– at home: multiple subnets rather than single IP that you

have to NAT• Multicast is simpler

– embedded RP– no MSDP

22-Nov-2011 31