Perimeter
6/8/2011
01:30 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

IPv6 Graduation Day

Big Bird, Google, and Facebook participate in first high-profile test flight of new IP protocol amid DDoS threat backdrop

My first IPv6 story warning of the eventual saturation of the IPv4 address space was published a long time ago. My daughter -- who graduates from high school this weekend -- was a toddler back then. So here we are today, on World IPv6 Day, finally running a global real-world test of the next-generation IP protocol, just a couple of months before I send my firstborn off to college.

The good news about IPv6 is that unlike its predecessor -- or much of the Internet for that matter -- it was built with security in mind. IPv6 includes IPSec encryption and address space with a lot of headroom that could help prevent things like worm propagation. But the irony is that the more secure IPv6 also introduces some security issues of its own, with an architecture that's inviting to distributed denial-of-service (DDoS) attacks due to its larger headers, which require more processing by network devices, as well as the likelihood of all-new vulnerabilities in the protocol and misconfigured implementations that expose security holes.

As I write this post, there are rumblings of concern that hackers might also do a little test-drive themselves today of IPv6 to see just how easily it can be DDoS'ed. Google, Facebook, Yahoo, Cisco, and more than 400 other organizations (even Sesame Street!) are using IPv6 on their sites today in the 24-hour test flight of the 128-bit protocol, which could provide some 670 quadrillion IP addresses, experts say.

But the good news is that more people are talking about security issues surrounding the transition to IPv6. Translated: I received a lot of PR pitches over the past couple of weeks about IPv6 security implications.

Dark Reading contributing editor and blogger John Sawyer has pointed out the challenges it will bring for vulnerability scanning and penetration testing. He talks here about how new host-discovery methods will be put in place to better target vulnerability scans, for example, as well as other methods of finding IPs.

Perhaps one of the biggest problems will be its "newness." IPv6 might be nearly two decades in the making, but once users start really running it in their networks, it's sure to expose previously unknown security flaws in IPv6-based products.

The likely missteps in implementation include not allocating sufficient memory for the longer IPv6 addresses, says Rob Rachwald, which could lead to remote code execution, for example. Human error is also highly likely when handling IPv6's new configuration rules and management, he says, leaving areas of the network exposed to attackers. All it would take is one request to a server that exploits a buffer overflow flaw in an IPv6-based system, according to Rachwald, who blogged on this today. Attackers could exploit mistakes in the Internet address translation process and pose as someone within the company, or sneak past a firewall that isn't properly configured for IPv6.

But we won't know until about 8 p.m. ET tonight, when World IPv6 Day's test concludes, how IPv6 security fared in its test-entry into the real world.

-- Kelly Jackson Higgins, Senior Editor, Dark Reading Follow Kelly (@kjhiggins) here on Twitter.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-6651
Published: 2014-07-31
Multiple directory traversal vulnerabilities in the Vitamin plugin before 1.1.0 for WordPress allow remote attackers to access arbitrary files via a .. (dot dot) in the path parameter to (1) add_headers.php or (2) minify.php.

CVE-2014-2970
Published: 2014-07-31
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5139. Reason: This candidate is a duplicate of CVE-2014-5139, and has also been used to refer to an unrelated topic that is currently outside the scope of CVE. This unrelated topic is a LibreSSL code change adding functionality ...

CVE-2014-3488
Published: 2014-07-31
The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message.

CVE-2014-3554
Published: 2014-07-31
Buffer overflow in the ndp_msg_opt_dnssl_domain function in libndp allows remote routers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS Search List (DNSSL) in an IPv6 router advertisement.

CVE-2014-5171
Published: 2014-07-31
SAP HANA Extend Application Services (XS) does not encrypt transmissions for applications that enable form based authentication using SSL, which allows remote attackers to obtain credentials and other sensitive information by sniffing the network.

Best of the Web
Dark Reading Radio