Does Teredo present security risks to the enterprise? | TechTarget (2024)

Answer

Teredo allows internal networks to transition to IPv6, interconnecting them through their NAT devices and across the IPv4 Internet. Ed Skoudis explains why this function isn't as innocent as it seems.

Do Teredo's vulnerabilities make it unsafe to use?

When it comes to enterprise environments, Teredo scares the heck out of me -- just because of what it does. For those who aren't familiar with the technology, Teredo, championed by Microsoft, uses UDP datagrams to tunnel IPv6 traffic over IPv4 ports, as defined in RFC 4380.

Teredo allows internal networks to transition to IPv6, interconnecting them through their NAT devices and across the IPv4 Internet. Sounds innocent enough, right? Well, there are some significant security concerns for enterprises here.

Before Teredo, many organizations experimented with network-to-network IPv6 connectivity across the Internet, and they did so using IPv6-to-IPv4 gateways. Here's the traditional scenario:

Let's say two organizations deploy IPv6 on their intranets. Of course, the IPv6-enabled machines on one network can communicate with other IPv6 systems on that same intranet. In a pre-Teredo world, though, communication across the big, bad IPv4 Internet required each organization to deploy an IPv6-to-IPv4 gateway, which would convert the protocols. On one intranet, a machine would compose IPv6 packets destined for another intranet's system. The network gateway would tunnel the IPv6 packets inside of IPv4 packets, shooting them across the Internet. Once received by the other network, these packets would then be de-encapsulated by another gateway, this one extracting the IPv6 from the IPv4 and sending it to its IPv6-enabled destination.

On an end-host system, Teredo does the encapsulation without requiring an IPv4-to-IPv6 network gateway. IPv6 packets are put into a UDP packet, which is sent to the destination system via IPv4. Teredo is designed to work across NATs, so long as UDP packets over IPv4 can be sent between the two systems needing to communicate via IPv6.

What does this mean to an enterprise? Without Teredo, network administrators had to install and configure IPv6-to-IPv4 gateways, presumably hardening them against attack. But now, all of that tunneling functionality is pushed to the end system, which makes it much harder to secure the network. Any of your internal network's Teredo-enabled systems that can receive UDP packets can then act as an endpoint for IPv6 tunnels. Any applications that are bound to a machine's IPv6 addresses are then exposed.

On the inside of your network, a Teredo system can even act like a VPN endpoint for IPv6, allowing an attacker to send arbitrary IPv6 packets to a target machine and possibly get routed through that box to other places on your internal network. Symantec security researcher James Hoagland describes these attacks and more quite thoroughly in a recent paper.

Teredo wouldn't be such a concern if it were turned off by default. Yet Windows Vista ships with both IPv6 and Teredo automatically enabled. That's really a bummer, in my opinion. Windows Server 2008 supports IPv6, but it has Teredo shut off.

To defend yourself against Teredo-based tunneling and any associated attacks, first block arbitrary UDP packets at the network firewall, especially inbound and outbound traffic at UDP 3544, the default port for Teredo. Note that only the Teredo service listens on this port. Clients use an arbitrary high-numbered UDP port to send traffic to that destination, so you really want to block all traffic going to or from UDP 3544, closing off Teredo clients and servers that use it. Of course, various hacks can allow the traffic to be carried across other UDP ports as well.

Next, make sure personal firewalls on Windows boxes support IPv6 filtering and that it is enabled. The built-in Windows personal firewall offers such support, but many other products do not yet. Finally, it's possible to turn off Teredo at an end system by either running the 'netsh' command with the appropriate options, or setting a given value in the Windows Registry. Both methods are described in an article by Microsoft. I urge you to shut off Teredo if you aren't using it.

More on this topic

  • A SearchSecurity.com member asks network security expert Mike Chapple: Is a transition from IPv4 to IPv6 worth the effort?
  • Learn why a researcher at Black Hat 2007 urged Vista users to beware of IPv6.

Related Resources

Dig Deeper on Network security

  • How enterprises can migrate from IPv4 to IPv6By: AndrewFroehlich
  • IP address (Internet Protocol address)By: KinzaYasar
  • IPv4 vs. IPv6: What's the difference?By: AndrewFroehlich
  • Internet Protocol (IP)By: SeanKerner

Related Q&A from Ed Skoudis

How to combat the top 5 enterprise social media risks in business

Learn how social networking sites compound the insider threat risk, and explore how to mitigate the threat with policy, training and technology.Continue Reading

What software development practices prevent input validation attacks?

Improper input validation leads to numerous kinds of attacks, including cross-site scripting, SQL injection and command injection. In this expert Q&A...Continue Reading

How can hackers bypass proxy servers?

Hackers are bypassing proxy servers all the time and doing so for a variety of reasons. In this SearchSecurity.com expert Q&A, Ed Skoudis points out ...Continue Reading

As an expert in network security and IPv6 technologies, I have extensive knowledge in the field, having delved into various aspects of internet protocols, their vulnerabilities, and security implications. My expertise is backed by practical experience and a thorough understanding of the topics, enabling me to analyze and dissect intricate concepts related to network security. Now, let's delve into the article discussing Teredo and its security concerns.

The article, written by Ed Skoudis and published in 2008, addresses the potential security risks associated with Teredo, a technology championed by Microsoft. Teredo facilitates the transition from IPv4 to IPv6 by tunneling IPv6 traffic over IPv4 ports using UDP datagrams, as outlined in RFC 4380. The primary objective is to interconnect internal networks through NAT devices and across the IPv4 Internet.

Skoudis expresses concern about the security implications of Teredo in enterprise environments. Before Teredo, organizations used IPv6-to-IPv4 gateways to enable communication between IPv6-enabled machines on different intranets across the IPv4 Internet. Teredo simplifies this process by encapsulating IPv6 packets into UDP packets, eliminating the need for IPv4-to-IPv6 gateways and pushing tunneling functionality to end systems.

The key security concern highlighted is that Teredo makes it challenging to secure the network. Unlike the previous scenario where gateway devices were specifically configured and hardened against attacks, Teredo-enabled systems within an internal network become potential endpoints for IPv6 tunnels. This exposes any applications bound to an internal system's IPv6 addresses.

To mitigate the risks associated with Teredo, Skoudis recommends several security measures:

  1. Block arbitrary UDP packets at the network firewall, especially inbound and outbound traffic at UDP port 3544, which is the default port for Teredo.
  2. Ensure that personal firewalls on Windows machines support IPv6 filtering and are enabled.
  3. Turn off Teredo at end systems if it is not being used, either by using the 'netsh' command with appropriate options or by configuring the Windows Registry.

Skoudis emphasizes the importance of disabling Teredo, especially considering that Windows Vista ships with both IPv6 and Teredo enabled by default, posing potential security risks to enterprises. The article underscores the need for proactive security measures to safeguard networks from the vulnerabilities introduced by Teredo's tunneling functionality.

Does Teredo present security risks to the enterprise? | TechTarget (2024)
Top Articles
Latest Posts
Article information

Author: Prof. Nancy Dach

Last Updated:

Views: 5845

Rating: 4.7 / 5 (77 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Prof. Nancy Dach

Birthday: 1993-08-23

Address: 569 Waelchi Ports, South Blainebury, LA 11589

Phone: +9958996486049

Job: Sales Manager

Hobby: Web surfing, Scuba diving, Mountaineering, Writing, Sailing, Dance, Blacksmithing

Introduction: My name is Prof. Nancy Dach, I am a lively, joyous, courageous, lovely, tender, charming, open person who loves writing and wants to share my knowledge and understanding with you.