{"id":4168,"date":"2010-11-19T15:34:32","date_gmt":"2010-11-19T20:34:32","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2022-12-30T15:46:13","modified_gmt":"2022-12-30T20:46:13","slug":"do-you-know-where-your-ipv6-is","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/do-you-know-where-your-ipv6-is\/","title":{"rendered":"Do You Know Where Your IPv6 Is?"},"content":{"rendered":"<p><a href=\"https:\/\/www.silicon.co.uk\/workspace\/ipv6-6uk-uk-governmen-101413\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-110521 size-full\" title=\"Do You Know Where Your IPv6 Is?\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ipv6_logo-15.jpg?resize=117%2C69&#038;ssl=1\" alt=\"Do You Know Where Your IPv6 Is?\" width=\"117\" height=\"69\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ipv6_logo-15.jpg?w=117&amp;ssl=1 117w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ipv6_logo-15.jpg?resize=75%2C44&amp;ssl=1 75w\" sizes=\"auto, (max-width: 117px) 100vw, 117px\" \/><\/a>Earlier, I <a href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/5-billion\/\" target=\"_blank\" rel=\"noopener noreferrer\">covered <\/a>the <a href=\"https:\/\/www.reuters.com\/article\/ihs\/update-1-ihs-to-buy-tech-research-firm-isuppli-ups-fy11-outlook-idUKSGE6A10I320101102\" target=\"_blank\" rel=\"noopener noreferrer\">iSuppli<\/a> announcement that nearly 3 out of every 4 people on Earth will soon own a mobile phone. Now, this factoid has some consequences. <a href=\"https:\/\/www.sans.org\/profiles\/dr-johannes-ullrich\/\" target=\"_blank\" rel=\"nofollow noopener\">Johannes Ullrich<\/a>, PhD, chief research officer for the <a href=\"http:\/\/www.sans.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">SANS Institute<\/a> is predicting that the arrival of new and upgraded IPv6-enabled operating systems, can open new and unrecognized security weaknesses in otherwise secure environments.<\/p>\n<p><a href=\"https:\/\/www.sans.org\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-110523 size-thumbnail\" title=\"SANS Institute logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/SANS_logo.jpg?resize=75%2C45&#038;ssl=1\" alt=\"SANS Institute logo\" width=\"75\" height=\"45\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/SANS_logo.jpg?resize=75%2C45&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/SANS_logo.jpg?resize=150%2C89&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/SANS_logo.jpg?w=291&amp;ssl=1 291w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a><\/p>\n<p>Dr. Ullrich told <em><a href=\"https:\/\/www.helpnetsecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Net Security<\/a><\/em>, \u201cOne of the problems is the accidental implementation of IPv6. You may already have IPv6 on your network without knowing about or configuring it.&#8221; He continues, \u201c<a href=\"http:\/\/www.microsoft.com\/windows\/windows-7\/\" target=\"_blank\" rel=\"noopener noreferrer\">Windows 7<\/a>, <a href=\"http:\/\/www.apple.com\/macosx\/\" target=\"_blank\" rel=\"noopener noreferrer\">OS X<\/a>, and <a href=\"https:\/\/www.linux.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Linux<\/a> enable it by default. In the last round of operating system updates, it has tended to be turned on by default.\u201d Dr. Ullrich, who is currently responsible for the SANS Internet Storm Center (<a href=\"http:\/\/isc.sans.edu\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">ISC<\/a>), also <a href=\"http:\/\/www.prlog.org\/11072258-security-preparations-for-ipv6-migration-must-start-now.html\" target=\"_blank\" rel=\"noopener noreferrer\">highlights<\/a> devices running <a href=\"http:\/\/www.apple.com\/iphone\/ios4\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple\u2019s IOS<\/a> such as iPhone as well as some <a href=\"http:\/\/www.google.com\/mobile\/android\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google Android<\/a> devices come with IPv6 enabled by default.<\/p>\n<p>Dr. Ullrich says that the growth of mixed IPv4 and IPv6 networks, sometimes without the knowledge of IT security teams, can introduce a variety of potential security risks. Attacks designed to exploit IPv6-enabled devices could also be missed by security teams not looking for\u00a0 IPv6 traffic, &#8220;Many organizations will look at their own networks and not see a big problem staying on IPv4,\u201d he explains.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20200913142959\/https:\/\/www.makeuseof.com\/tag\/how-to-get-rid-of-a-trojan-horse-virus-that-wont-go-away\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-110525\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-21.jpg?resize=116%2C116&#038;ssl=1\" alt=\"\" width=\"116\" height=\"116\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-21.jpg?w=116&amp;ssl=1 116w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-21.jpg?resize=75%2C75&amp;ssl=1 75w\" sizes=\"auto, (max-width: 116px) 100vw, 116px\" \/><\/a>According to <em>Net Security<\/em>, Ullrich believes that organizations have failed to grasp the full impact of a move to IPv6 or the amount of time needed to plan, test, and secure any migration strategy. Ullrich believes that it will take at least about a year for larger organizations to move over to IPv6. Although most modern routers and switches are capable, supporting SIEM, IDS, IPS, and monitoring tools will need reconfiguration. The application layer is more problematic <a href=\"http:\/\/www.prlog.org\/11072258-security-preparations-for-ipv6-migration-must-start-now.html\" target=\"_blank\" rel=\"noopener noreferrer\">according<\/a> to the SANS Institute expert\u00a0 \u201cIt is comparable to the Y2K problem, and there may well be many complex or custom applications that are affected by switching over that need to be tested.\u201d<\/p>\n<p><script type=\"text\/javascript\" language=\"javascript\" src=\"https:\/\/inetcore.com\/project\/ipv4ec\/en-us\/wolf_c.js\"><\/script><\/p>\n<p style=\"text-align: center;\">This gadget has been developed by Takashi Arano, <a href=\"http:\/\/inetcore.com\/project\/ipv4ec\/\" target=\"_blank\" rel=\"noopener noreferrer\">Intec NetCore<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IPv6-enabled operating systems, smartphones, and tablets open new and unrecognized security weaknesses in otherwise secure environments.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[3240,403,33,23,15,282],"class_list":["post-4168","post","type-post","status-publish","format-standard","hentry","category-networking","tag-3240","tag-ipv4","tag-ipv6","tag-malware","tag-networking","tag-sans-institute"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/4168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=4168"}],"version-history":[{"count":12,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/4168\/revisions"}],"predecessor-version":[{"id":131353,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/4168\/revisions\/131353"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=4168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=4168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=4168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}