Page 1 of 1

IPv6 flood_router6 attack - Router advertisement Guard

Posted: Tue Sep 11, 2012 12:41 pm
by k.untner
Hi there!
Do you have IPv6 running?
I´m running my Routerboard RB751G-2HnD now in "OS / Bridge / Firewall - mode" so i´m able to filter attacks between the
LAN, WLAN and VPN Interfaces.
/interface bridge settings set use-ip-firewall=yes use-ip-firewall-for-pppoe=yes use-ip-firewall-for-vlan=no
created a filter:
/ipv6 firewall filter
add action=drop chain=input comment="Block flood_routers6 attack" disabled=no dst-address=ff02::1/128 icmp-options=\
134:0 protocol=icmpv6 src-address=fe80::218:0:0:0/80
From the attacker backtrack type "flood_router6 eth0" to run the attack. - keep it running eg. for 30 sec.
CPU=100%, Memory decreasing
Stop attack. CPU=hanging ~ 25% Memory = - 6 MB
restart attack, after ~25 sec. Winbox disconnected

Anyone an Idea how to build a working "Router advertisement Guard"

Have a fine day, Kletool

Re: IPv6 flood_router6 attack - Router advertisement Guard

Posted: Mon Oct 08, 2012 9:57 am
by NetworkPro
Nice one. What did support say? Do you have the "Submit this post as a bug report to MikroTik Technical Support:" checkbox at the top of a Newpost ?

Re: IPv6 flood_router6 attack - Router advertisement Guard

Posted: Mon Oct 08, 2012 11:03 am
by janisk
try our testing build:
http://www.mikrotik.com/download/share/ ... e-5.21.npk

i had 100% usage, but no memory problems.

Re: IPv6 flood_router6 attack - Router advertisement Guard

Posted: Thu Dec 13, 2012 11:07 am
by Basiley
generally its why and what for SEND are creating as NDP replacement.
hardly possible to fix/protect "insecure by design" things.