• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

计算机工程与科学 ›› 2025, Vol. 47 ›› Issue (8): 1391-1398.

• 计算机网络与信息安全 • 上一篇    下一篇

大规模IPv6网络IP-ID类型测量

黄峰元,杨轶帆,喻波,杨振中,蔡志平,侯冰楠   

  1. (国防科技大学计算机学院,湖南 长沙 410073)

  • 收稿日期:2024-10-18 修回日期:2024-11-01 出版日期:2025-08-25 发布日期:2025-08-27
  • 基金资助:
    国家自然科学基金(62472434)

A large-scale scan of IPv6 IP-ID

HUANG Fengyuan,YANG Yifan,YU Bo,YANG Zhenzhong,CAI Zhiping,HOU Bingnan    

  1. (College of Computer Science and Technology,National University of Defense Technology,Changsha 410073,China)

  • Received:2024-10-18 Revised:2024-11-01 Online:2025-08-25 Published:2025-08-27

摘要: IPv6网络中,用于为网络层数据报提供分片和重组支持的IP-ID字段不再作为固定字段出现,而是被放入扩展头部中,以供灵活使用。近年来有利用IPv6分片机制引发IPv6目标主机生成IP-ID,并进行别名前缀解析等的工作,说明在IPv6网络中IP-ID字段仍然存在信息泄露等问题,存在一定的安全风险。由于现有的IP-ID利用方法都是使用简单、可预测的IP-ID类型,因此探测互联网IPv6设备的IP-ID类型是否可预测,对IPv6网络安全和资产评估有重大意义。因此提出一种方法对互联网的IPv6设备进行探测,并且根据探测得到的结果对该设备生成IP-ID的方式进行分类。在得到的近500万个IPv6地址返回的IP-ID结果中,仍然有41.1%的地址使用可预测的IP-ID类型。探测结果表明IPv6网络并非免疫于基于分片和IP-ID的攻击,IPv6网络中仍然有相当多的设备使用存在高安全风险的可预测IP-ID类型。

关键词: IPv6协议, IP-ID字段, 网络测量, 网络安全

Abstract: In IPv6 networks,the Internet protocol identification (IP-ID) fields,which are used to support fragmentation and reassembly of network-layer datagrams,no longer appear as fixed fields but are instead placed in the extension header for flexible use.In recent years,researchers have exploited the IPv6 fragmentation mechanism to induce IPv6 target hosts to generate IP-IDs and perform tasks such as alias prefix resolution,demonstrating that the IP-ID field in IPv6 networks can still leak information and pose certain security risks.Since existing IP-ID exploitation methods rely on simple,predictable IP-ID types,probing whether the IP-ID types of IPv6 devices on the internet are predictable hold significant importance for IPv6 network security and asset assessment.This paper proposes a method to detect IPv6 devices on the Internet,and classifies them into different types.Among the nearly 5 million IPv6 addresses returned,41.1% of the addresses still used  predictable IP-ID,indicating that IPv6 networks are not immune to fragment and IP-ID based attacks.There are still a considerable number of devices in IPv6 network using predictable IP-ID which are of high security risk.

Key words: IPv6 protocol, IP identification(IP-ID) field, network measurement, network security