{"id":7536,"date":"2022-05-16T16:10:00","date_gmt":"2022-05-16T13:10:00","guid":{"rendered":"https:\/\/vasexperts.com\/?p=7536"},"modified":"2025-08-11T14:13:52","modified_gmt":"2025-08-11T11:13:52","slug":"how-ipv6-can-compromise-networks","status":"publish","type":"post","link":"https:\/\/vasexperts.com\/fr\/blog\/ipv6\/how-ipv6-can-compromise-networks\/","title":{"rendered":"\u201cD&rsquo;o\u00f9 on n&rsquo;a pas attendu\u201d: comment IPv6 peut compromettre les r\u00e9seaux"},"content":{"rendered":"<h2>Fosses sur le chemin<\/h2>\r\nComme vous le savez, la mise en \u0153uvre d\u2019IPv6 est assez lente \u2014 <a href=\"https:\/\/w3techs.com\/technologies\/details\/ce-ipv6\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">environ 21 % des sites<\/a> prennent en charge son utilisation. Les experts s\u2019attendent \u00e0 ce que la migration de masse vers le protocole de nouvelle g\u00e9n\u00e9ration se produise au plus t\u00f4t dans dix ans. Pour plusieurs raisons \u2014 il y a des difficult\u00e9s techniques et financi\u00e8res, ainsi que la pr\u00e9sence de NAT, qui \u00ab att\u00e9nue \u00bb le manque d\u2019adresses IPv4.\r\n\r\n   [important]  Cependant, le processus est entrav\u00e9 par des aspects li\u00e9s \u00e0 la s\u00e9curit\u00e9 de l\u2019information.   [\/important]  \r\n\r\nLe lancement officiel d\u2019IPv6 a eu lieu il y a pr\u00e8s de dix ans, mais les ing\u00e9nieurs trouvent toujours des vuln\u00e9rabilit\u00e9s de la pile technique. Ainsi, en 2020, un bug li\u00e9 \u00e0 ICMPv6 a \u00e9t\u00e9 d\u00e9couvert, qui utilise le m\u00e9canisme d\u2019annonce de routeur (<a href=\"https:\/\/vasexperts.ru\/blog\/seti\/otkuda-ne-zhdali-kak-ipv6-mozhet-skomprometirovat-seti\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2020-16898<\/a>). Cette vuln\u00e9rabilit\u00e9 permettait aux attaquants d\u2019ex\u00e9cuter du code malveillant sur une machine compromise.\r\n\r\nL\u2019un des probl\u00e8mes <a href=\"https:\/\/vasexperts.ru\/blog\/seti\/otkuda-ne-zhdali-kak-ipv6-mozhet-skomprometirovat-seti\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">les plus r\u00e9cents<\/a> a \u00e9t\u00e9 identifi\u00e9 fin mars par des sp\u00e9cialistes de l\u2019Institut d\u2019informatique de la soci\u00e9t\u00e9 Max Planck. Selon leur rapport, les appareils qui utilisent le m\u00e9canisme EUI-64 pour g\u00e9n\u00e9rer un identifiant d\u2019interface (la deuxi\u00e8me partie d\u2019une adresse IPv6) compromettent le r\u00e9seau sur lequel ils se trouvent.\r\n<h2>Comment \u00e7a se fait<\/h2>\r\nIl existe un m\u00e9canisme SLAAC qui permet \u00e0 un appareil d\u2019obtenir des informations de pr\u00e9fixe d\u2019un routeur sans l\u2019aide du protocole de configuration des n\u0153uds <a href=\"https:\/\/en.wikipedia.org\/wiki\/DHCPv6\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DHCPv6<\/a>. Ces informations et l\u2019identificateur d\u2019interface 64 bits (IID) sont n\u00e9cessaires pour obtenir une adresse r\u00e9seau IPv6 unique.\r\n\r\nUne fa\u00e7on de g\u00e9n\u00e9rer un IID unique est de le g\u00e9n\u00e9rer sur la base de l\u2019adresse MAC de l\u2019appareil (m\u00e9canisme <a href=\"https:\/\/standards.ieee.org\/wp-content\/uploads\/import\/documents\/tutorials\/eui.pdfhttps:\/\/standards.ieee.org\/wp-content\/uploads\/import\/documents\/tutorials\/eui.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">EUI-64<\/a>). Mais cette approche est aujourd\u2019hui consid\u00e9r\u00e9e non seulement comme peu fiable, mais m\u00eame dangereuse, car <a href=\"https:\/\/arxiv.org\/pdf\/1902.08968.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">elle r\u00e9v\u00e8le<\/a> un identifiant mat\u00e9riel au niveau du r\u00e9seau. Par cons\u00e9quent, la communaut\u00e9 a d\u00e9velopp\u00e9 des extensions sp\u00e9ciales \u00e0 la pile IPv6, par exemple, qui sont d\u00e9crites dans <a href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc4941\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC4941<\/a> et qui \u00ab randomisent \u00bb la partie de l\u2019adresse choisie par l\u2019h\u00f4te. Dans le m\u00eame temps, les fournisseurs de services Internet substituent les pr\u00e9fixes d\u2019adresse pour une protection suppl\u00e9mentaire.\r\n\r\n<noscript><img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/05\/server-details-1024x625.jpg\" alt=\"server details\" width=\"100%\" height=\"auto\" class=\"alignnone size-full wp-image-7415\"><\/noscript><img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/05\/server-details-1024x625.jpg\" alt=\"server details\" width=\"100%\" height=\"auto\" class=\"alignnone size-full wp-image-7415 lazyload\" data-src=\"\/wp-content\/uploads\/2022\/05\/server-details-1024x625.jpg\">\r\n\r\nMais, malheureusement, un certain nombre de d\u00e9veloppeurs du mat\u00e9riel, g\u00e9n\u00e9ralement des appareils d\u2019Internet des objets, utilisent toujours \u00ab EUI-64 pur \u00bb pour g\u00e9n\u00e9rer des IID. Il permet aux attaquants d\u2019identifier le Fabricant du p\u00e9riph\u00e9rique r\u00e9seau (et, par cons\u00e9quent, les vuln\u00e9rabilit\u00e9s potentielles), ainsi que de surveiller d\u2019autres p\u00e9riph\u00e9riques sur le r\u00e9seau qui utilisent un IID similaire.\r\n\r\n   [important]  Selon les ing\u00e9nieurs de recherche, environ 19% de tous les pr\u00e9fixes des r\u00e9seaux des principaux fournisseurs mondiaux d\u2019acc\u00e8s \u00e0 Internet sont affect\u00e9s par cette vuln\u00e9rabilit\u00e9.   [\/important]  \r\n<h2>Quoi faire<\/h2>\r\nEn g\u00e9n\u00e9ral, la solution au probl\u00e8me <a href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc8981\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">repose<\/a> sur les \u00e9paules des d\u00e9veloppeurs de mat\u00e9riel et de logiciels : ils doivent faire attention \u00e0 la s\u00e9curit\u00e9 des informations des appareils et activer les m\u00e9canismes de protection disponibles par d\u00e9faut.\r\n\r\nSelon les experts, il est possible de r\u00e9soudre le probl\u00e8me au niveau gouvernemental si les r\u00e9gulateurs exigent que les fournisseurs certifient les produits pour se conformer aux normes permettant de fermer les vuln\u00e9rabilit\u00e9s EUI-64. Dans le m\u00eame temps, les FAI peuvent v\u00e9rifier les routeurs avant de les transmettre \u00e0 leurs clients.\r\n\r\n[subscription id=\u00a0\u00bb11987\u2033]<span>Abonnez-vous \u00e0 notre newsletter et restez inform\u00e9 des derniers d\u00e9veloppements et offres sp\u00e9ciales.<\/span>[\/subscription]","protected":false},"excerpt":{"rendered":"<p>Tout cela \u00e0 cause de la norme EUI-64. Il est pass\u00e9 \u00e0 la cat\u00e9gorie legacy, mais est toujours utilis\u00e9 par les d\u00e9veloppeurs d&rsquo;appareils IoT (et non seulement par ceux-ci). Parlons de ce qui se passe ici.<\/p>\n","protected":false},"author":7,"featured_media":7538,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[],"class_list":["post-7536","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ipv6"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>(English) VASExperts<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/\",\"url\":\"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/\",\"name\":\"[:en]How IPv6 can compromise networks?[:es]\u00bfC\u00f3mo puede el IPv6 comprometer las redes?[:fr]Comment IPv6 peut compromettre les r\u00e9seaux?[:br]Como o IPv6 pode comprometer redes?\",\"isPartOf\":{\"@id\":\"https:\/\/vasexperts.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/#primaryimage\"},\"thumbnailUrl\":\"\/wp-content\/uploads\/2022\/05\/article_cover_danger-1140x749-1.jpg\",\"datePublished\":\"2022-05-16T13:10:00+00:00\",\"dateModified\":\"2025-08-11T11:13:52+00:00\",\"author\":{\"@id\":\"https:\/\/vasexperts.com\/#\/schema\/person\/f4edcaef26fe49b6b59baf8ac5b62170\"},\"description\":\"[:en]The EUI-64 standard is to be blamed. It became a legacy category, but is still used by IoT-device developers (but not limited to). We explain what the matter is here.[:es]Todo se debe al est\u00e1ndar EUI-64. Ha pasado a la categor\u00eda de legado, pero todav\u00eda lo usan los desarrolladores de dispositivos IoT (y no solo). Hablemos de lo que est\u00e1 pasando aqu\u00ed.[:fr]Tout cela \u00e0 cause de la norme EUI-64. Il est pass\u00e9 \u00e0 la cat\u00e9gorie legacy, mais est toujours utilis\u00e9 par les d\u00e9veloppeurs d'appareils IoT (et non seulement par ceux-ci). Parlons de ce qui se passe ici.[:br]O padr\u00e3o EUI-64 \u00e9 o culpado. Tornou-se uma categoria legada, mas ainda \u00e9 usado por desenvolvedores de dispositivos de IoT (mas n\u00e3o se limita a eles). Explicamos o problema aqui.\",\"breadcrumb\":{\"@id\":\"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/#primaryimage\",\"url\":\"\/wp-content\/uploads\/2022\/05\/article_cover_danger-1140x749-1.jpg\",\"contentUrl\":\"\/wp-content\/uploads\/2022\/05\/article_cover_danger-1140x749-1.jpg\",\"width\":1140,\"height\":749},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u0413\u043b\u0430\u0432\u043d\u0430\u044f \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0430\",\"item\":\"https:\/\/vasexperts.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u201cFrom where you didn&#8217;t expect\u201d: how IPv6 can compromise networks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/vasexperts.com\/#website\",\"url\":\"https:\/\/vasexperts.com\/\",\"name\":\"ITGLOBAL.COM\",\"description\":\"(English) VASExperts\",\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/vasexperts.com\/#\/schema\/person\/f4edcaef26fe49b6b59baf8ac5b62170\",\"name\":\"Elena Rudich\",\"url\":\"https:\/\/vasexperts.com\/fr\/blog\/author\/elena-rudich\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"(English) VASExperts","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/","url":"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/","name":"[:en]How IPv6 can compromise networks?[:es]\u00bfC\u00f3mo puede el IPv6 comprometer las redes?[:fr]Comment IPv6 peut compromettre les r\u00e9seaux?[:br]Como o IPv6 pode comprometer redes?","isPartOf":{"@id":"https:\/\/vasexperts.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/#primaryimage"},"image":{"@id":"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2022\/05\/article_cover_danger-1140x749-1.jpg","datePublished":"2022-05-16T13:10:00+00:00","dateModified":"2025-08-11T11:13:52+00:00","author":{"@id":"https:\/\/vasexperts.com\/#\/schema\/person\/f4edcaef26fe49b6b59baf8ac5b62170"},"description":"[:en]The EUI-64 standard is to be blamed. It became a legacy category, but is still used by IoT-device developers (but not limited to). We explain what the matter is here.[:es]Todo se debe al est\u00e1ndar EUI-64. Ha pasado a la categor\u00eda de legado, pero todav\u00eda lo usan los desarrolladores de dispositivos IoT (y no solo). Hablemos de lo que est\u00e1 pasando aqu\u00ed.[:fr]Tout cela \u00e0 cause de la norme EUI-64. Il est pass\u00e9 \u00e0 la cat\u00e9gorie legacy, mais est toujours utilis\u00e9 par les d\u00e9veloppeurs d'appareils IoT (et non seulement par ceux-ci). Parlons de ce qui se passe ici.[:br]O padr\u00e3o EUI-64 \u00e9 o culpado. Tornou-se uma categoria legada, mas ainda \u00e9 usado por desenvolvedores de dispositivos de IoT (mas n\u00e3o se limita a eles). Explicamos o problema aqui.","breadcrumb":{"@id":"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/#primaryimage","url":"\/wp-content\/uploads\/2022\/05\/article_cover_danger-1140x749-1.jpg","contentUrl":"\/wp-content\/uploads\/2022\/05\/article_cover_danger-1140x749-1.jpg","width":1140,"height":749},{"@type":"BreadcrumbList","@id":"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0413\u043b\u0430\u0432\u043d\u0430\u044f \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0430","item":"https:\/\/vasexperts.com\/"},{"@type":"ListItem","position":2,"name":"\u201cFrom where you didn&#8217;t expect\u201d: how IPv6 can compromise networks"}]},{"@type":"WebSite","@id":"https:\/\/vasexperts.com\/#website","url":"https:\/\/vasexperts.com\/","name":"ITGLOBAL.COM","description":"(English) VASExperts","inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/vasexperts.com\/#\/schema\/person\/f4edcaef26fe49b6b59baf8ac5b62170","name":"Elena Rudich","url":"https:\/\/vasexperts.com\/fr\/blog\/author\/elena-rudich\/"}]}},"_links":{"self":[{"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/posts\/7536"}],"collection":[{"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/comments?post=7536"}],"version-history":[{"count":10,"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/posts\/7536\/revisions"}],"predecessor-version":[{"id":12855,"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/posts\/7536\/revisions\/12855"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/media\/7538"}],"wp:attachment":[{"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/media?parent=7536"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/categories?post=7536"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vasexperts.com\/fr\/wp-json\/wp\/v2\/tags?post=7536"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}