Dual-stack host discovery method based on SSDP and DNS-SD protocol

With the exhaustion of the IPv4 addresses, the promotion and deployment of IPv6 has been accelerating.Dual-stack technology allows devices to enable both IPv4 and IPv6 protocols, which means that users are facing more security risks.Although the existing work can realize the identification and measu...

Full description

Saved in:
Bibliographic Details
Main Authors: Fan SHI, Yao ZHONG, Pengfei XUE, Chengxi XU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2023-02-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023003
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529683432177664
author Fan SHI
Yao ZHONG
Pengfei XUE
Chengxi XU
author_facet Fan SHI
Yao ZHONG
Pengfei XUE
Chengxi XU
author_sort Fan SHI
collection DOAJ
description With the exhaustion of the IPv4 addresses, the promotion and deployment of IPv6 has been accelerating.Dual-stack technology allows devices to enable both IPv4 and IPv6 protocols, which means that users are facing more security risks.Although the existing work can realize the identification and measurement of some dual-stack servers, the following problems still exist.Dual-stack host identification requires deep protocol identification of host services, but this method consumes too much scanning resources.Besides, network service providers may provide consistent services on distributed hosts, making it difficult to guarantee the accuracy of dual-stack host identification through service fingerprints.To solve these problems, the LAN service discovery protocol was used to bind host services to IP addresses, and a dual-stack host discovery method based on SSDP and DNS-SD protocols was proposed.In IPv4 network environment, the target host was induced to actively send a request to the constructed IPv6 server through SSDP protocol, and then the IPv6 address was extracted from the server’s log.Or the service list of the target host and its corresponding AAAA record was enumerated through the DNS-SD protocol and the IPv6 address of the target host was obtained, in order to realize the discovery of the dual stack address pairs.With this method, IPv6 addresses was obtained directly from the IPv4 host, which ensured the accuracy of the discovered dual-stack host.At the same time, only request packets for specific protocols were needed during the discovery process, which greatly saved scanning resources.Based on this method, the SSDP hosts and DNS-SD hosts accidentally exposed to the global IPv4 network were measured.A total number of 158k unique IPv6 addresses were collected, of which 55k were dual-stack host address pairs with globally reachable IPv6 addresses.Unlike existing work that focused on dual-stack servers, this method mainly targeted end-users and client devices, and built a unique set of active IPv6 devices and dual-stack host address pairs that have not been explored so far.Through the analysis of the obtained IPv6 address addressing type, it shows that IPv6 address is mainly generated in a random manner, which greatly reduces the possibility of IPv6 hosts being discovered by scanning.In particular, by measuring the ports and services of dual-stack hosts, we found that the security policy differences of dual-stack hosts on different protocol stacks.Especially, IPv6 protocol stack exposes more high-risk services, expanding the attack surface of hosts.The research results also show that the infeasibility of IPv6 address space traversal scanning mitigates the security risks of IPv6, but incorrect network configuration greatly increases the possibility of these high-risk IPv6 hosts being discovered and users should revisit IPv6 security strategy on dual-stack hosts.
format Article
id doaj-art-30e74a9cce1e42c481d8228a7bc10d74
institution Kabale University
issn 2096-109X
language English
publishDate 2023-02-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-30e74a9cce1e42c481d8228a7bc10d742025-01-15T03:16:25ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2023-02-019566659576866Dual-stack host discovery method based on SSDP and DNS-SD protocolFan SHIYao ZHONGPengfei XUEChengxi XUWith the exhaustion of the IPv4 addresses, the promotion and deployment of IPv6 has been accelerating.Dual-stack technology allows devices to enable both IPv4 and IPv6 protocols, which means that users are facing more security risks.Although the existing work can realize the identification and measurement of some dual-stack servers, the following problems still exist.Dual-stack host identification requires deep protocol identification of host services, but this method consumes too much scanning resources.Besides, network service providers may provide consistent services on distributed hosts, making it difficult to guarantee the accuracy of dual-stack host identification through service fingerprints.To solve these problems, the LAN service discovery protocol was used to bind host services to IP addresses, and a dual-stack host discovery method based on SSDP and DNS-SD protocols was proposed.In IPv4 network environment, the target host was induced to actively send a request to the constructed IPv6 server through SSDP protocol, and then the IPv6 address was extracted from the server’s log.Or the service list of the target host and its corresponding AAAA record was enumerated through the DNS-SD protocol and the IPv6 address of the target host was obtained, in order to realize the discovery of the dual stack address pairs.With this method, IPv6 addresses was obtained directly from the IPv4 host, which ensured the accuracy of the discovered dual-stack host.At the same time, only request packets for specific protocols were needed during the discovery process, which greatly saved scanning resources.Based on this method, the SSDP hosts and DNS-SD hosts accidentally exposed to the global IPv4 network were measured.A total number of 158k unique IPv6 addresses were collected, of which 55k were dual-stack host address pairs with globally reachable IPv6 addresses.Unlike existing work that focused on dual-stack servers, this method mainly targeted end-users and client devices, and built a unique set of active IPv6 devices and dual-stack host address pairs that have not been explored so far.Through the analysis of the obtained IPv6 address addressing type, it shows that IPv6 address is mainly generated in a random manner, which greatly reduces the possibility of IPv6 hosts being discovered by scanning.In particular, by measuring the ports and services of dual-stack hosts, we found that the security policy differences of dual-stack hosts on different protocol stacks.Especially, IPv6 protocol stack exposes more high-risk services, expanding the attack surface of hosts.The research results also show that the infeasibility of IPv6 address space traversal scanning mitigates the security risks of IPv6, but incorrect network configuration greatly increases the possibility of these high-risk IPv6 hosts being discovered and users should revisit IPv6 security strategy on dual-stack hosts.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023003dual-stack hostSSDPDNS-SDnetwork measurement
spellingShingle Fan SHI
Yao ZHONG
Pengfei XUE
Chengxi XU
Dual-stack host discovery method based on SSDP and DNS-SD protocol
网络与信息安全学报
dual-stack host
SSDP
DNS-SD
network measurement
title Dual-stack host discovery method based on SSDP and DNS-SD protocol
title_full Dual-stack host discovery method based on SSDP and DNS-SD protocol
title_fullStr Dual-stack host discovery method based on SSDP and DNS-SD protocol
title_full_unstemmed Dual-stack host discovery method based on SSDP and DNS-SD protocol
title_short Dual-stack host discovery method based on SSDP and DNS-SD protocol
title_sort dual stack host discovery method based on ssdp and dns sd protocol
topic dual-stack host
SSDP
DNS-SD
network measurement
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023003
work_keys_str_mv AT fanshi dualstackhostdiscoverymethodbasedonssdpanddnssdprotocol
AT yaozhong dualstackhostdiscoverymethodbasedonssdpanddnssdprotocol
AT pengfeixue dualstackhostdiscoverymethodbasedonssdpanddnssdprotocol
AT chengxixu dualstackhostdiscoverymethodbasedonssdpanddnssdprotocol