Provided by: ipv6toolkit_2.0-1_amd64 

NAME
ns6 - A security assessment tool for attack vectors based on ICMPv6 Neighbor Solicitation messages
SYNOPSIS
ns6 [-i INTERFACE] [-s SRC_ADDR[/LEN]] [-d DST_ADDR] [-y FRAG_SIZE] [-u DST_OPT_HDR_SIZE] [-U
DST_OPT_U_HDR_SIZE] [-H HBH_OPT_HDR_SIZE] [-S LINK_SRC_ADDR] [-D LINK-DST-ADDR] [-E LINK_ADDR] [-e] [-t
TARGET_ADDR[/LEN]] [-F N_SOURCES] [-T N_TARGETS] [-z SECONDS] [-l] [-v] [-h]
DESCRIPTION
ns6 allows the assessment of IPv6 implementations with respect to a variety of attacks based on ICMPv6
Neighbor Solicitation messages. This tool is part of the SI6 Networks' IPv6 Toolkit: a security
assessment suite for the IPv6 protocols.
OPTIONS
ns6 The ns6 tool takes its parameters by means of command-line options. Each of the options can be
specified with a short name (one character preceded with the hyphen character, as e.g. "-i") or with a
long name (a string preceded with two hyphen characters, as e.g. "--interface").
Depending on the amount of information (i.e., options) to be conveyed into the Neighbor Solicitations, it
may be necessary for the ns6 tool to split that information into more than one Neighbor Solicitation
message. Also, when the ns6 tool is instructed to flood the victim with Neighbor Solicitations from
different sources ("--flood-sources" option), multiple packets may need to be sent. ns6 supports IPv6
fragmentation, which may be of use if a large amount of information needs to be conveyed within a single
Neighbor Solicitation message. IPv6 fragmentation is not enabled by default, and must be explicitly
enabled with the "-y" option.
-i INTERFACE, --interface INTERFACE
This option specifies the network interface that the tool will use. If the destination address
("-d" option) is a link-local address, the interface must be explicitly specified. The interface
may also be specified along with a destination address, with the "-d" option.
-s SRC_ADDR, --src-address SRC_ADDR
This option is meant to specify the IPv6 Source Address to be used for the Neighbor Solicitation
messages. If left unspecified, a randomized link-local (fe80::/64) address is selected.
-d DST_ADDR, --dst-address DST_ADDR
This option specifies the IPv6 Destination Address of the Neighbor Solicitation messages. If this
option is left unspecified, but the Ethernet Destination Address is specified, the "all-nodes
link-local multicast" address (ff02::1) is selected as the IPv6 Destination Address.
--hop-limit, -A
This option specifies the IPv6 Hop Limit to be used for the Neighbor Solicitation messages. It
defaults to 255. Note that IPv6 nodes are required to check that the Hop Limit of incoming
Neighbor Solicitation messages is 255. Therefore, this option is only useful to assess whether an
IPv6 implementation fails to enforce the aforementioned check.
-y SIZE, --frag-hdr SIZE
This option specifies that the resulting packet must be fragmented. The fragment size must be
specified as an argument to this option.
-u HDR_SIZE, --dst-opt-hdr HDR_SIZE
This option specifies that a Destination Options header is to be included in the resulting packet.
The extension header size must be specified as an argument to this option (the header is filled
with padding options). Multiple Destination Options headers may be specified by means of multiple
"-u" options.
-U HDR_SIZE, --dst-opt-u-hdr HDR_SIZE
This option specifies a Destination Options header to be included in the "unfragmentable part" of
the resulting packet. The header size must be specified as an argument to this option (the header
is filled with padding options). Multiple Destination Options headers may be specified by means of
multiple "-U" options. This option is only valid if the "-y" option is specified (as the concept
of "unfragmentable part" only makes sense when fragmentation is employed).
-H HDR_SIZE, --hbh-opt-hdr HDR_SIZE
This option specifies that a Hop-by-Hop Options header is to be included in the resulting packet.
The header size must be specified as an argument to this option (the header is filled with padding
options). Multiple Hop-by-Hop Options headers may be specified by means of multiple "-H" options.
-S SRC_LINK_ADDR, --src-link-address SRC_LINK_ADDR
This option specifies the link-layer Source Address of the Neighbor Solicitation messages
(currently, only Ethernet is supported). If left unspecified, the link-layer Source Address is
randomized.
-D DST_LINK_ADDR, --dst-link-address DST_LINK_ADDR
This option specifies the link-layer Destination Address of the Neighbor Solicitation messages
(currently, only Ethernet is supported). If left unspecified, it is set to the address
"33:33:00:00:00:01" (the Ethernet address corresponding to the "all-nodes link-local multicast"
IPv6 address (ff02::1).
--target, -t
This option specifies the IPv6 Target Address of the Neighbor Solicitation messages.
If the "-T" ("--flood-targets") option is specified, this option specifies an IPv6 prefix in the
form "-t prefix/prefixlen". See the description of the "-T" option for further information on how
the "-t" option is processed in that specific case.
--source-lla-opt, -E
This option specifies the contents of a source link-layer address option to be included in the
Neighbor Solicitation messages. If more than one source link-layer address is specified (by means
of multiple "-E" options), and all the resulting options cannot be conveyed into a single Neighbor
Solicitation, multiple Neighbor Solicitations will be sent as needed.
--add-slla-opt, -e
This option instructs the ns6 tool to include a source link-layer address option in the Neighbor
Solicitation messages that it sends. The link-layer address included in the option is the same as
the Ethernet Source Address used for the outgoing Neighbor Solicitation messages.
--flood-sources, -F
This option instructs the ns6 tool to send Neighbor Solicitations from multiple (and random) IPv6
Source Addresses. The number of different sources is specified as "-F number". The IPv6 Source
Address of the packets are randomly selected from the prefix specified by the "-s" option (which
defaults to fe80::/64).
--flood-targets, -T
This option instructs the ns6 tool to send Neighbor Solicitation messages for multiple Target
Addresses. The number of different Target Addresses is specified as "-T number". The Target
Address of each packet is randomly selected from the prefix ::/64, unless a different prefix has
been specified by means of the "-t" option.
--loop, -l
This option instructs the ns6 tool to send periodic Neighbor Solicitations to the victim. The
amount of time to pause between sending Neighbor Solicitations can be specified by means of the
"-z" option, and defaults to 1 second.
--sleep, -z
This option instructs the ns6 tool to the amount of time to pause between sending Neighbor
Solicitations. If left unspecified, it defaults to 1 second.
--verbose, -v
This option instructs the ns6 tool to be verbose.
--help, -h
Print help information for the ns6 tool.
EXAMPLES
The following sections illustrate typical use cases of the ns6 tool.
Example #1
# ns6 -i eth0 -d fe80::01 -t 2001:db8::1 -e
Use the network interface "eth0" to send a Neighbor Solicitation message using a random link-local
unicast IPv6 Source Address and a random Ethernet Source Address, to the IPv6 Destination address fe80::1
and the Ethernet Destination Address 33:33:00:00:00:01 (selected by default). The target of the Neighbor
Advertisement is 2001:db8::1. The Neighbor Solicitation also includes a source link-layer address option,
that contains the same Ethernet address as that used for the Ethernet Source Address of the packet.
Example #2
# ns6 -i eth0 -s 2001:db8::/32 -t 2001:db8::1 -F 10 -l -z 10 -e -v
Send 10 Neighbor Solicitation messages using random Ethernet Source Addresses and random IPv6 Source
Addresses from the prefix 2001:db8::/32, to the Ethernet Destination Address 33:33:00:00:00:01 (default)
and the IPv6 Destination Address ff02::1 (default). The IPv6 Target Address of the Neighbor Solicitation
is 2001:db8::1, and each message includes a source link-layer address option that contains the same
address as that used for the Ethernet Source Address of the packet. Repeat this operation every ten
seconds. Be verbose.
Example #3
# ns6 -i eth0 -s 2001:db8::/32 -t 2001:db8::1 -F 10 -l -z 10 -E ff:ff:ff:ff:ff:ff -v
Send 10 Neighbor Solicitation messages using random Ethernet Source Addresses and random IPv6 Source
Addresses from the prefix fe80::/64 (default, link-local unicast), to the Ethernet Destination Address
33:33:00:00:00:01 (default) and the IPv6 Destination Address ff02:1 (default). The IPv6 Target Address of
the Neighbor Solicitation is 2001:db8::1, and each message includes a source link-layer address option
that contains the Ethernet address ff:ff:ff:ff:ff:ff. Repeat this operation every ten seconds. Be
verbose.
SEE ALSO
"Security/Robustness Assessment of IPv6 Neighbor Discovery Implementations" (available at:
<http://www.si6networks.com/tools/ipv6toolkit/si6networks-ipv6-nd-assessment.pdf>) for a discussion of
Neighbor Discovery vulnerabilities, and additional examples of how to use the na6 tool to exploit them.
AUTHOR
The ns6 tool and the corresponding manual pages were produced by Fernando Gont <fgont@si6networks.com>
for SI6 Networks <http://www.si6networks.com>.
COPYRIGHT
Copyright (c) 2011-2013 Fernando Gont.
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free
Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with
no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is available
at <http://www.gnu.org/licenses/fdl.html>.
NS6(1)