{"id":5158,"date":"2012-07-17T21:42:18","date_gmt":"2012-07-18T01:42:18","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=5158"},"modified":"2021-07-29T11:44:08","modified_gmt":"2021-07-29T15:44:08","slug":"ipv6-smartphones-compromise-users-privacy","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/ipv6-smartphones-compromise-users-privacy\/","title":{"rendered":"IPv6 Compromise Smartphones Users&#8217; Privacy"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-115498 size-full\" title=\"IPv6 Compromise Smartphones Users' Privacy\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ipv6.jpg?resize=110%2C75&#038;ssl=1\" alt=\"IPv6 Compromise Smartphones Users' Privacy\" width=\"110\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ipv6.jpg?w=110&amp;ssl=1 110w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ipv6.jpg?resize=75%2C51&amp;ssl=1 75w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/>Now that the <a class=\"zem_slink\" title=\"IPv4\" href=\"http:\/\/en.wikipedia.org\/wiki\/IPv4\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">IPv4 address<\/a> pool is depleted and the\u00a0IPocalypse is at hand, wrinkles are emerging in <a class=\"zem_slink\" title=\"IPv6\" href=\"http:\/\/en.wikipedia.org\/wiki\/IPv6\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">IPv6<\/a>.\u00a0 One of the wrinkles is with mobile devices. Most of the cool mobiles devices have been able to handle IPv6 for a while.\u00a0<a title=\"Apple Computers\" href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple&#8217;s<\/a> (<a title=\"NASDAQ : AAPL\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AAPL\/\" target=\"_blank\" rel=\"noopener noreferrer\">AAPL<\/a>) <a class=\"zem_slink\" title=\"iPhone\" href=\"http:\/\/www.apple.com\/iphone\" target=\"_blank\" rel=\"homepage noopener noreferrer\">iPhones<\/a>, <a class=\"zem_slink\" title=\"iPad\" href=\"http:\/\/www.apple.com\/ipad\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">iPads<\/a>, and <a class=\"zem_slink\" title=\"IPod\" href=\"http:\/\/en.wikipedia.org\/wiki\/IPod\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">iPods<\/a> have been capable of handling IPv6 Since version 4 of the <a class=\"zem_slink\" title=\"IOS\" href=\"http:\/\/www.apple.com\/ios\" target=\"_blank\" rel=\"homepage noopener noreferrer\">iOS<\/a> operating system and most <a title=\"Google\" href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> (<a title=\"NASDAQ : GOOG\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a>) <a title=\"Android\" href=\"http:\/\/www.android.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Android<\/a> devices have been capable since version 2.1. <a href=\"http:\/\/www.h-online.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>H\u00a0 Security<\/em><\/a> is <a title=\"IPv6: Smartphones compromise users' privacy\" href=\"http:\/\/www.h-online.com\/security\/news\/item\/IPv6-Smartphones-compromise-users-privacy-1169708.html\" target=\"_blank\" rel=\"noopener noreferrer\">reporting<\/a> that these mobile operating systems send information about their users to the network.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20120615193814\/http:\/\/www.gizbot.com:80\/mobile\/five-ways-through-which-your-smartphone-can-be-hacked\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" style=\"border: 0pt none;\" title=\"Smartphone risks\" src=\"https:\/\/i0.wp.com\/www.gizbot.com\/files\/2012\/03\/smartphone-hacking.jpg?resize=117%2C70&#038;ssl=1\" alt=\"Smartphone risks\" width=\"117\" height=\"70\" \/><\/a>A device on an IPv6 network usually determines half of their address (the &#8220;interface identifier&#8221;) themselves, but <em>H Security<\/em> says that smartphones are sloppy with this task. According to the article, smartphones simply add the same two bytes to their globally unique <a class=\"zem_slink\" title=\"MAC address\" href=\"http:\/\/en.wikipedia.org\/wiki\/MAC_address\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">MAC address<\/a> and use it as their identifier. As a result, they transfer a unique hardware ID whenever they communicate with an IPv6-enabled server.<\/p>\n<p>The basic problem isn&#8217;t an <a title=\"IPv6\" href=\"http:\/\/technet.microsoft.com\/en-us\/network\/bb530961\" target=\"_blank\" rel=\"noopener noreferrer\">IPv6<\/a> issue because there are other methods for generating the address. The article says that a device can generate a random interface identifier and replace it on a regular basis. This is called the Privacy Extensions method and is the factory-set option in Windows; it can also be enabled in other operating systems. The article points out that devices running Apple&#8217;s iOS or Android offer neither the option to enable Privacy Extensions nor the option to disable IPv6, anyone who uses an affected device on an IPv6-enabled wireless network will send their ID.<\/p>\n<p><a title=\"IPocalypse\" href=\"https:\/\/www.zazzle.com\/ipocalypse_now_tshirt-235986421230134268\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" style=\"border: 0px none; margin-left: 3px; margin-right: 3px;\" title=\"IPocalypse\" src=\"https:\/\/i0.wp.com\/rlv.zcache.com\/ipocalypse_now_tshirt-ra266b8f9c51a4cd6ad8344bdf6dbbded_f0ce3_512.jpg?resize=119%2C119\" alt=\"IPocalypse\" width=\"119\" height=\"119\" \/><\/a>The only thing the smartphones are lacking is a control option in the user interface, as the Privacy Extensions do come as part of their kernel. For instance, on a (jailbroken) iOS 4 device with root access, they can be enabled with the same command that enables them on a desktop device running <a class=\"zem_slink\" title=\"Mac OS X\" href=\"http:\/\/www.apple.com\/macosx\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Mac OS X<\/a>:<\/p>\n<p>sysctl -w net.inet6.ip6.use_tempaddr=1<\/p>\n<p>The blog claims the problem is only affecting a small number of users because IPv6 is not yet in widespread use. However, more <a class=\"zem_slink\" title=\"Internet service provider\" href=\"http:\/\/en.wikipedia.org\/wiki\/Internet_service_provider\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">ISPs<\/a> plan to offer <a title=\"IPv6\" href=\"http:\/\/arstechnica.com\/hardware\/news\/2007\/03\/IPv6.ars\" target=\"_blank\" rel=\"noopener noreferrer\">IPv6<\/a> in addition to the old IPv4 in the future. In addition, there are routers like the\u00a0<a title=\"Cisco Systems\" href=\"http:\/\/www.cisco.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cisco<\/a> (<a title=\"NASDAQ | CSCO\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-CSCO\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSCO<\/a>) <a title=\"Cisco Linksys E3000\" href=\"https:\/\/web.archive.org\/web\/20130109203032\/http:\/\/homestore.cisco.com:80\/en-us\/Routers\/Linksys-E3000-HighPerformance-Wirelessn-router_stcVVproductId97826163VVcatId551966VVviewprod.htm\" target=\"_blank\" rel=\"noopener noreferrer\">Linksys E3000<\/a>, which will automatically set up an IPv6 connection via a <a title=\"6to4 - How Bad is it Really? \" href=\"https:\/\/labs.ripe.net\/Members\/emileaben\/6to4-how-bad-is-it-really\" target=\"_blank\" rel=\"noopener noreferrer\">6to4 conversion<\/a> when their internet access is purely IPv4.<\/p>\n<p>The author concludes that the issue is particularly sensitive because such devices tend to be used by one specific person. As a result, the MAC address, which is accessible to any server operator and network monitor, allows this user to be identified.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>If this sounds familiar, it is I wrote about mobile apps uploading\u00a0 UDID&#8217;s <a title=\"rbach.net\" href=\"https:\/\/wp.me\/p2wgaW-1df\" target=\"_blank\" rel=\"noopener\">here<\/a><\/em>.<\/p>\n<h6 class=\"zemanta-related-title\">Related articles<\/h6>\n<ul class=\"zemanta-article-ul\">\n<li class=\"zemanta-article-ul-li\">IPv6 and click fraud (net-security.org)<\/li>\n<li class=\"zemanta-article-ul-li\"><a href=\"http:\/\/www.zdnet.com\/windows-8-moves-to-ipv6-internet-7000000991\/\" target=\"_blank\" rel=\"noopener noreferrer\">Windows 8 moves to IPv6 Internet<\/a> (zdnet.com)<\/li>\n<\/ul>\n<p><em><a href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Carriers can easily tract you via your IPv6 capable smartphone since it uses a fixed MAC address which tends to be used by one specific person.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33],"tags":[420,202,101,536,92,296,304,321,353,33,15],"class_list":["post-5158","post","type-post","status-publish","format-standard","hentry","category-ipv6","tag-aapl","tag-android","tag-apple","tag-goog","tag-google","tag-ipad","tag-iphone","tag-ipocalypse","tag-ipod","tag-ipv6","tag-networking"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/5158","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=5158"}],"version-history":[{"count":13,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/5158\/revisions"}],"predecessor-version":[{"id":115497,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/5158\/revisions\/115497"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=5158"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=5158"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=5158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}