IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation

08/14/2022
by   Erik Rye, et al.
0

We present IPvSeeYou, a privacy attack that permits a remote and unprivileged adversary to physically geolocate many residential IPv6 hosts and networks with street-level precision. The crux of our method involves: 1) remotely discovering wide area (WAN) hardware MAC addresses from home routers; 2) correlating these MAC addresses with their WiFi BSSID counterparts of known location; and 3) extending coverage by associating devices connected to a common penultimate provider router. We first obtain a large corpus of MACs embedded in IPv6 addresses via high-speed network probing. These MAC addresses are effectively leaked up the protocol stack and largely represent WAN interfaces of residential routers, many of which are all-in-one devices that also provide WiFi. We develop a technique to statistically infer the mapping between a router's WAN and WiFi MAC addresses across manufacturers and devices, and mount a large-scale data fusion attack that correlates WAN MACs with WiFi BSSIDs available in wardriving (geolocation) databases. Using these correlations, we geolocate the IPv6 prefixes of >12M routers in the wild across 146 countries and territories. Selected validation confirms a median geolocation error of 39 meters. We then exploit technology and deployment constraints to extend the attack to a larger set of IPv6 residential routers by clustering and associating devices with a common penultimate provider router. While we responsibly disclosed our results to several manufacturers and providers, the ossified ecosystem of deployed residential cable and DSL routers suggests that our attack will remain a privacy threat into the foreseeable future.

READ FULL TEXT

page 1

page 9

page 11

research
03/14/2022

Building Embedded Systems Like It's 1996

Embedded devices are ubiquitous. However, preliminary evidence shows tha...
research
02/24/2019

EUI-64 Considered Harmful

This position paper considers the privacy and security implications of E...
research
04/17/2022

BLEWhisperer: Exploiting BLE Advertisements for Data Exfiltration

Bluetooth technology has enabled short-range wireless communication for ...
research
09/14/2023

Visualizing MAC and IPv6 Address Allocations

In this work, I describe a method for visualizing two types of network a...
research
08/21/2022

Inferring Sensitive Attributes from Model Explanations

Model explanations provide transparency into a trained machine learning ...
research
10/23/2018

Adversarial WiFi Sensing

Wireless devices are everywhere, at home, at the office, and on the stre...
research
09/30/2021

Third Time's Not a Charm: Exploiting SNMPv3 for Router Fingerprinting

In this paper, we show that adoption of the SNMPv3 network management pr...

Please sign up or login with your details

Forgot password? Click here to reset