论文标题

IPVSEEYOU:利用IPv6中泄漏的标识符进行街道级地理位置

IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation

论文作者

Rye, Erik, Beverly, Robert

论文摘要

我们提出了IPVSeeyou,这是一种隐私攻击,允许远程无私的对手可以物理地将许多住宅IPv6宿主和网络与街道级别的精度分配。我们方法的关键涉及:1)从家用路由器中远程发现大区域(WAN)硬件MAC地址; 2)将这些MAC地址与已知位置的WiFi BSSID对应物相关联; 3)通过将连接到通用倒数第二提供商路由器连接的设备扩展覆盖范围。 我们首先通过高速网络探测获得了IPv6地址中嵌入的大型MAC。这些MAC地址有效地泄漏了协议堆栈,并在很大程度上代表了住宅路由器的WAN接口,其中许多是也提供WiFi的多合一设备。我们开发了一种技术,可以从统计上推断路由器的WAN和WiFi MAC之间的映射跨制造商和设备,并安装了大规模的数据融合攻击,该攻击将WAN MAC与Wifi BSSID相关联(GEOLAIVE)(geoLocation)数据库。使用这些相关性,我们将146个国家和地区的野外路由器的IPv6前缀分配给了$> 1200万美元的路由器。选定的验证确认中位数地理位置误差为39米。然后,我们利用技术和部署约束,将攻击扩展到较大的IPv6住宅路由器,并通过将设备与共同的倒数第二提供商路由器联系起来。尽管我们负责任地向几家制造商和提供商透露了结果,但部署的住宅电缆和DSL路由器的僵化生态系统表明,我们的攻击将在可预见的未来仍然是隐私​​威胁。

We present IPvSeeYou, a privacy attack that permits a remote and unprivileged adversary to physically geolocate many residential IPv6 hosts and networks with street-level precision. The crux of our method involves: 1) remotely discovering wide area (WAN) hardware MAC addresses from home routers; 2) correlating these MAC addresses with their WiFi BSSID counterparts of known location; and 3) extending coverage by associating devices connected to a common penultimate provider router. We first obtain a large corpus of MACs embedded in IPv6 addresses via high-speed network probing. These MAC addresses are effectively leaked up the protocol stack and largely represent WAN interfaces of residential routers, many of which are all-in-one devices that also provide WiFi. We develop a technique to statistically infer the mapping between a router's WAN and WiFi MAC addresses across manufacturers and devices, and mount a large-scale data fusion attack that correlates WAN MACs with WiFi BSSIDs available in wardriving (geolocation) databases. Using these correlations, we geolocate the IPv6 prefixes of $>$12M routers in the wild across 146 countries and territories. Selected validation confirms a median geolocation error of 39 meters. We then exploit technology and deployment constraints to extend the attack to a larger set of IPv6 residential routers by clustering and associating devices with a common penultimate provider router. While we responsibly disclosed our results to several manufacturers and providers, the ossified ecosystem of deployed residential cable and DSL routers suggests that our attack will remain a privacy threat into the foreseeable future.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源