YoVDO

Exploiting IPv6 Flow Label

Offered By: IEEE via YouTube

Tags

IPv6 Courses Network Security Courses Reverse Engineering Courses Cryptanalysis Courses

Course Description

Overview

Explore the security implications of the IPv6 flow label field in this 15-minute IEEE conference talk. Delve into a detailed analysis of how remote servers can exploit the flow label generation logic in Windows 10, Linux, and Android devices to assign unique identifiers and track user activity across networks and browsers. Learn about the reverse-engineering process of Windows and Linux kernel flow label generation code, and discover practical techniques for extracting encryption keys used in these algorithms. Examine both active and passive attack variants, their effectiveness across different network configurations, and the potential impact on user privacy. Gain insights into IPv6 protocol design, address exhaustion issues, and the challenges of maintaining anonymity in modern network environments.

Syllabus

Intro
IPv4 Address Exhaustion
IPv6 - History and Adoption
IPv6 Address Size
IPv6 Temporary Addresses
IPv6 - Flow Classification and the Flow Label
Windows - Flow Label Generation Algorithm (TCP & UDP) • The algorithm is based on hashing the destination address, source address, destination port and the source port
Linux/Android - Flow Label Generation Algorithm (stateless protocols)
Attack Concept - Summary
Active Attacker - Windows (1) UDP Case
Active Attacker - Windows (3)
Attacker Models
Conclusions


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam
Classical Cryptosystems and Core Concepts
University of Colorado System via Coursera
Cryptography and Information Theory
University of Colorado System via Coursera
Cryptography And Network Security
Indian Institute of Technology, Kharagpur via Swayam
An Introduction to Cryptography
Coventry University via FutureLearn