{"id":17245,"date":"2012-06-12T22:10:46","date_gmt":"2012-06-13T02:10:46","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2021-07-29T16:07:15","modified_gmt":"2021-07-29T20:07:15","slug":"security-considerations-for-ipv6","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/security-considerations-for-ipv6\/","title":{"rendered":"Security Considerations for IPv6"},"content":{"rendered":"<p><a href=\"http:\/\/www.worldipv6launch.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-103676 size-thumbnail\" title=\"Security Considerations for IPv6\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/World_IPv6_launch_logo.png?resize=75%2C75&#038;ssl=1\" alt=\"Security Considerations for IPv6\" width=\"75\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/World_IPv6_launch_logo.png?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/World_IPv6_launch_logo.png?w=128&amp;ssl=1 128w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>For those who missed\u00a0the <a title=\"Internet Society\" href=\"https:\/\/www.isoc.org\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Internet Society<\/a> (ISOC) announcement that World IPv6 Launch day arrived on June 6. (<em>I <a title=\"Flip the Switch on IPv6\" href=\"https:\/\/wp.me\/p2wgaW-3uY\" target=\"_blank\" rel=\"noopener\">blogged<\/a> about <a title=\"World IPv6 Day x IPv6World: Asia (Part 3 of 4)\" href=\"http:\/\/www.youtube.com\/watch?v=YOUFcinQGS8\" target=\"_blank\" rel=\"noopener youtube noreferrer\">World IPv6 day<\/a>, back in March)<\/em> Carl Herberger, VP of Security at <a title=\"Radware\" href=\"http:\/\/www.radware.com\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Radware<\/a> (<a title=\"NASDAQ : RDWR\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-RDWR\/\" target=\"_blank\" rel=\"nofollow noopener\">RDWR<\/a>) recently <a title=\"Security considerations for IPv6 launch day \" href=\"https:\/\/web.archive.org\/web\/20120725235108\/http:\/\/www.net-security.org:80\/article.php?id=1715\" target=\"_blank\" rel=\"noopener noreferrer\">wrote<\/a> at <em>Help Net Security<\/em> that he sees\u00a0World IPv6 Launch day as much more hype than an operational change.<\/p>\n<p><a href=\"http:\/\/www.internetsociety.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-103679\" title=\"Internet Society logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/isoc_logo-2.gif?resize=100%2C40&#038;ssl=1\" alt=\"Internet Society logo\" width=\"100\" height=\"40\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/isoc_logo-2.gif?resize=75%2C30&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/isoc_logo-2.gif?resize=150%2C60&amp;ssl=1 150w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a>Many high-profile organizations have hooked their plans on change over to the ISOC launch date. Supporters include <a href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a>), <a title=\"Facebook\" href=\"https:\/\/www.facebook.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a> (<a title=\"NASDAQ : FB\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-FB\/\" target=\"_blank\" rel=\"noopener noreferrer\">FB<\/a>),\u00a0<a href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a> <a title=\"Microsoft Live Search\" href=\"http:\/\/www.live.com\" target=\"_blank\" rel=\"homepage noopener noreferrer\">(<\/a><a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-MSFT\/\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a><a title=\"www.bing.com\" href=\"http:\/\/www.bing.com\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">)<\/a>\u00a0<a title=\"www.bing.com\" href=\"http:\/\/www.bing.com\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Bing<\/a>, <a href=\"http:\/\/www.yahoo.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Yahoo<\/a> (<a href=\"https:\/\/wp.me\/p2wgaW-umn\" target=\"_blank\" rel=\"noopener\">YHOO<\/a>), and <a href=\"https:\/\/www.akamai.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Akamai<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AKAM\/\" target=\"_blank\" rel=\"noopener noreferrer\">AKAM<\/a>).\u00a0 Mr. Herberger points out that many companies have already leveraged IPv6 <a title=\"Wide area network\" href=\"http:\/\/en.wikipedia.org\/wiki\/Wide_area_network\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">WAN<\/a> connectivity. Most mobile providers who have adopted <a title=\"4G LTE Advanced Tutorial\" href=\"http:\/\/www.radio-electronics.com\/info\/cellulartelecomms\/lte-long-term-evolution\/3gpp-4g-imt-lte-advanced-tutorial.php\" target=\"_blank\" rel=\"noopener noreferrer\">LTE 4G<\/a> infrastructures have built them for mobile devices, Mobile devices will connect to the Internet with IPv6 addresses by default. He argues that since a 4G phone must also be <a title=\"3G (third generation of mobile telephony)\" href=\"https:\/\/web.archive.org\/web\/20180321072336\/http:\/\/searchtelecom.techtarget.com:80\/definition\/3G\" target=\"_blank\" rel=\"noopener noreferrer\">3G<\/a> and IPv4 compatible, the 5G providers have not done much. The service providers have woven IPv6 into the existing <a title=\"IPv4\" href=\"http:\/\/en.wikipedia.org\/wiki\/IPv4\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">IPv4 Internet<\/a> much to the chagrin of the initial IPv6 designers.<\/p>\n<h3>IPv6 Pandora\u2019s Box<\/h3>\n<p>Bottom line: Because IPv4 is not going away any time soon, we will essentially live in perpetuity with both designs. A new dawn? Or the beginning of the end? The Radware VP thinks it\u2019s neither, he calls the interoperability issues between IPv4 and IPv6, a Pandora\u2019s Box of opportunity for those of the nefarious persuasion.<\/p>\n<p>So, what are the three main takeaways from World IPv6 Launch day?<\/p>\n<h3>Take away #1<\/h3>\n<p><strong><a href=\"http:\/\/web.archive.org\/web\/20101201233347\/http:\/\/mychinaconnection.com:80\/english-idiom\/strange-bedfellows\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-103682 size-medium\" title=\"Dog and cat\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/StrangeBedfellows.jpg?resize=150%2C125&#038;ssl=1\" alt=\"Dog and cat\" width=\"150\" height=\"125\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/StrangeBedfellows.jpg?resize=150%2C125&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/StrangeBedfellows.jpg?resize=75%2C62&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/StrangeBedfellows.jpg?w=255&amp;ssl=1 255w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>IPv6 will first be implemented on the WAN, IPv4 will continue to stay in the <a title=\"Local area network\" href=\"http:\/\/en.wikipedia.org\/wiki\/Local_area_network\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">LAN<\/a> for years to come &#8211; <\/strong><a title=\"Google\" href=\"http:\/\/www.investopedia.com\/markets\/stocks\/GOOG\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a>, <a title=\"Facebook\" href=\"http:\/\/www.investopedia.com\/markets\/stocks\/FB#axzz1xcwXsppd\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>, DNS, CDN providers, and many, if not most ISP\u2019s are all moving to default IPv6 WAN connectivity. However, nearly no one has made the transition to IPv6 on the LAN. Mr. Herberger adds that rapid IPv6 deployment on the Internet WAN operations side and the very slow rollout of IPv6 on the LAN side will wreak havoc on perimeter security. He believes that there are huge problems associated with IPv4 and IPv6 cohabitating.<\/p>\n<div>\n<h3>Take away #2<\/h3>\n<p><strong>IPv6 &amp; IPv4 don\u2019t cohabitate well<\/strong> &#8211; IPv6 and IPv4 make insecure bedfellows. There are no predefined standards in the way to handle the cohabitation of IPv4 with IPv6.\u00a0 The transition mechanisms to ease the transitioning of the Internet from its first IPv4 infrastructure to IPv6 have not been standardized yet. The <a title=\"Internet Engineering Task Force\" href=\"http:\/\/ietf.org\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Internet Engineering Task Force (IETF)<\/a> has working groups and discussions through the IETF Internet-Drafts and <a href=\"http:\/\/en.wikipedia.org\/wiki\/Request_for_Comments\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Requests for Comments <\/a>processes to develop these methods. Some basic IPv6 transition mechanisms have been defined; however, nothing has yet emerged as a proposed uniform standard. As such, the article states, the world is awash with a plethora of IPv4 to IPv6 (and vice versa) Transition Mechanisms such as:<\/p>\n<ul>\n<li>Encapsulating IPv4 in IPv6 (or <a title=\"4in6\" href=\"https:\/\/web.archive.org\/web\/20131008135230\/http:\/\/infoweapons.com\/ipv6-mechanism\" target=\"_blank\" rel=\"noopener noreferrer\">4in6<\/a>)<\/li>\n<li>Encapsulating IPv6 in IPv4 (or 6in4)<a href=\"https:\/\/web.archive.org\/web\/20190613121619\/https:\/\/resources.infosecinstitute.com\/security-vulnerabilities-ipv6-tunnels\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-103685\" title=\"IPv6 tunnel\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ipv6_SecurityVul2.png?resize=237%2C98&#038;ssl=1\" alt=\"IPv6 tunnel\" width=\"237\" height=\"98\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ipv6_SecurityVul2.png?resize=150%2C62&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ipv6_SecurityVul2.png?resize=75%2C31&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ipv6_SecurityVul2.png?w=576&amp;ssl=1 576w\" sizes=\"auto, (max-width: 237px) 100vw, 237px\" \/><\/a><\/li>\n<li>IPv6 over IPv4 (6over4)<\/li>\n<li><a title=\"IPv6 transition mechanisms\" href=\"http:\/\/en.wikipedia.org\/wiki\/IPv6_transition_mechanisms\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">DS-Lite<\/a><\/li>\n<li>6rd<\/li>\n<li>6to4<\/li>\n<li><a title=\"ISATAP\" href=\"http:\/\/en.wikipedia.org\/wiki\/ISATAP\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">ISATAP<\/a><\/li>\n<li>NAT64 \/ DNS64<\/li>\n<li>Teredo<\/li>\n<li>SIIT.<\/li>\n<\/ul>\n<p>If you are familiar with network perimeter security devices, one of the things they do well is deep packet inspection and Stateful aware analysis. However, one of the dirty little secrets is that nearly none of today\u2019s technologies have the capability to inspect encrypted traffic such as SSL\u00a0 or the ability to inspect tunneling protocols such as L2TP, <a title=\"Point-to-Point Tunneling Protocol\" href=\"http:\/\/en.wikipedia.org\/wiki\/Point-to-Point_Tunneling_Protocol\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">PPTP<\/a>, etc. What IPv4 and IPv6 transition does is effectively exacerbate these \u201cAchilles heels\u201d in security detection capabilities by introducing a whole new class of nearly undetectable transmissions. The author warns Don\u2019t be fooled by a vendor\u2019s claim that they inspect a v4 packet in v6 or vice versa, because even if true for one or two methodologies, the ways to carry out this task are almost immeasurable today. This is really a true community-wide problem and one that must be addressed.<\/p>\n<h3>Take away #3<\/h3>\n<p><strong> <a href=\"https:\/\/phillbarron.wordpress.com\/2012\/01\/21\/mystery-vs-confusion\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"Confused\" src=\"https:\/\/phillbarron.files.wordpress.com\/2012\/01\/confused.jpg?w=254&#038;h=300&#038;fit=254%2C300&#038;resize=102%2C120\" alt=\"Confused\" width=\"102\" height=\"120\" \/><\/a>Meet your old vulnerability \u2013 Same as the new vulnerability! <\/strong>Much of our defense is single-threaded, and should an adversary be able to pass through your perimeter defenses, many of the \u2018older\u2019 vulnerabilities would find a receptive home having passed through the \u2018corporate scrubbers.\u2019Moreover, just think of the new opportunities available to more nefarious organizations that don\u2019t have your interests in mind. This \u2018<a title=\"IPv6\" href=\"http:\/\/en.wikipedia.org\/wiki\/IPv6\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">transition mechanism<\/a>\u2019 essentially becomes an effective \u2018unscrubbed\u2019 gateway or tunnel for all newly developed organized crime-designed, state-sponsored, and Hacktivist-motivated attacks.<\/p>\n<p>Moreover, most of us will be largely blind to these realities unless we are acting now to make certain that our gateways are designed with all encapsulated traffic being detected and mitigated. Anomaly detection takes center stage here and signature tools will leave you wanting.<\/p>\n<p>The Radware VP concludes that this problem requires action on behalf of security professionals to solve; you HAVE to do something different because the inertia path will leave you vulnerable.<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/www.tomshardware.com\/news\/IPv6-IPv4-Google-Facebook-Internet-Society,15910.html\" target=\"_blank\" rel=\"noopener noreferrer\">It&#8217;s World IPv6 Launch Day: Welcome to The Wider Web<\/a> (tomshardware.com)<\/li>\n<\/ul>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Radware VP calls interoperability issues between IPv4 and IPv6 a Pandoras Box of opportunity for hackers and introduces new undetectable transmissions<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33],"tags":[2197,310,2571,104,92,1277,308,403,33,82,1292,596,525],"class_list":["post-17245","post","type-post","status-publish","format-standard","hentry","category-ipv6","tag-2197","tag-4g","tag-5g","tag-facebook","tag-google","tag-internet-engineering-task-force","tag-internet-society","tag-ipv4","tag-ipv6","tag-microsoft","tag-radware","tag-world-ipv6-day","tag-yahoo"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/17245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=17245"}],"version-history":[{"count":12,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/17245\/revisions"}],"predecessor-version":[{"id":132803,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/17245\/revisions\/132803"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=17245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=17245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=17245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}