MEDIUM: Open IP-Tunnel Report

DESCRIPTION LAST UPDATED: 2025-01-14

DEFAULT SECURITY LEVEL: MEDIUM

This report contains information about a vulnerability that allows new Denial-of-Service (DoS) vulnerabilities. This vulnerability originates from hosts that accept tunnelling packets such as IPIP, GRE, 6in4 and 4in6 without authenticating the source IPv4 or IPv6 address. Attackers can exploit these hosts as proxies to conceal their identity when conducting attacks and spoof the source IP address of packets.

If you receive this report for your network or experience abuse of such hosts, visit the TunnelTester GitHub repository for more information, including advise on how to mitigate the resulting attacks.

These vulnerabilities were discovered by Angelos Beitis and Mathy Vanhoef of the DistriNet Reseach Unit at KU Leuven University in Belgium.

As an illustration, assume a vulnerable tunnelling host that decapsulates and forwards tunnelling packets without authenticating the sender, i.e., it accepts packets from any source. The attacker can send a tunnelled packet where the outer header is sourced from the attacker and destined towards the vulnerable host. Subsequently, the inner header will have the vulnerable host as the source and the victim as the destination. The vulnerable host will receive this packet, decapsulate the outer header and forward the inner packet to the victim. As a result, the victim will believe the packet originated from the vulnerable host.

IP tunnel attack overview

Severity levels are described here.

For more information on our scanning efforts, check out our Internet scanning summary page.

This report has an IPv4 and IPv6 version.

Filename(s): scan_ip_tunnel, scan6_ip_tunnel

Fields

  • timestamp
    Time that the IP was probed in UTC+0
  • severity
    Severity level
  • ip
    The IP address of the device in question
  • protocol
    Protocol (ipip, ip6ip6, gre, gre6 ... )
  • port
    Port that the response came from
  • hostname
    Reverse DNS name of the device in question
  • tag
    Can be ipip, ip6ip6, gre, gre6
  • asn
    ASN of where the device in question resides
  • geo
    Country where the device in question resides
  • region
    State / Province / Administrative region where the device in question resides
  • city
    City in which the device in question reside
  • naics
    North American Industry Classification System Code
  • hostname_source
    Hostname source
  • sector
    Sector information of the IP in question, e.g. "Retail Trade", "Communications, Service Provider, and Hosting Service"
  • response
    ICMP response ("echoreply")

Sample

"timestamp","severity","ip","protocol","port","hostname","tag","asn","geo","region","city","naics","hostname_source","sector","response"
"2010-02-10 00:00:00",medium,192.168.0.1,ipip,,node01.example.com,ipip,64512,ZZ,Region,City,0,ptr,,echoreply
"2010-02-10 00:00:01",medium,192.168.0.2,ipip,,node02.example.com,ipip,64512,ZZ,Region,City,0,ptr,,echoreply
"2010-02-10 00:00:02",medium,192.168.0.3,ipip,,node03.example.com,ipip,64512,ZZ,Region,City,0,ptr,,echoreply

Our 133 Report Types