Perimeter
6/8/2011
01:30 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

IPv6 Graduation Day

Big Bird, Google, and Facebook participate in first high-profile test flight of new IP protocol amid DDoS threat backdrop

My first IPv6 story warning of the eventual saturation of the IPv4 address space was published a long time ago. My daughter -- who graduates from high school this weekend -- was a toddler back then. So here we are today, on World IPv6 Day, finally running a global real-world test of the next-generation IP protocol, just a couple of months before I send my firstborn off to college.

The good news about IPv6 is that unlike its predecessor -- or much of the Internet for that matter -- it was built with security in mind. IPv6 includes IPSec encryption and address space with a lot of headroom that could help prevent things like worm propagation. But the irony is that the more secure IPv6 also introduces some security issues of its own, with an architecture that's inviting to distributed denial-of-service (DDoS) attacks due to its larger headers, which require more processing by network devices, as well as the likelihood of all-new vulnerabilities in the protocol and misconfigured implementations that expose security holes.

As I write this post, there are rumblings of concern that hackers might also do a little test-drive themselves today of IPv6 to see just how easily it can be DDoS'ed. Google, Facebook, Yahoo, Cisco, and more than 400 other organizations (even Sesame Street!) are using IPv6 on their sites today in the 24-hour test flight of the 128-bit protocol, which could provide some 670 quadrillion IP addresses, experts say.

But the good news is that more people are talking about security issues surrounding the transition to IPv6. Translated: I received a lot of PR pitches over the past couple of weeks about IPv6 security implications.

Dark Reading contributing editor and blogger John Sawyer has pointed out the challenges it will bring for vulnerability scanning and penetration testing. He talks here about how new host-discovery methods will be put in place to better target vulnerability scans, for example, as well as other methods of finding IPs.

Perhaps one of the biggest problems will be its "newness." IPv6 might be nearly two decades in the making, but once users start really running it in their networks, it's sure to expose previously unknown security flaws in IPv6-based products.

The likely missteps in implementation include not allocating sufficient memory for the longer IPv6 addresses, says Rob Rachwald, which could lead to remote code execution, for example. Human error is also highly likely when handling IPv6's new configuration rules and management, he says, leaving areas of the network exposed to attackers. All it would take is one request to a server that exploits a buffer overflow flaw in an IPv6-based system, according to Rachwald, who blogged on this today. Attackers could exploit mistakes in the Internet address translation process and pose as someone within the company, or sneak past a firewall that isn't properly configured for IPv6.

But we won't know until about 8 p.m. ET tonight, when World IPv6 Day's test concludes, how IPv6 security fared in its test-entry into the real world.

-- Kelly Jackson Higgins, Senior Editor, Dark Reading Follow Kelly (@kjhiggins) here on Twitter.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Companies Blindly Believe They've Locked Down Users' Mobile Use
Dawn Kawamoto, Associate Editor, Dark Reading,  11/14/2017
Microsoft Word Vuln Went Unnoticed for 17 Years: Report
Kelly Sheridan, Associate Editor, Dark Reading,  11/14/2017
121 Pieces of Malware Flagged on NSA Employee's Home Computer
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/16/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Managing Cyber-Risk
An online breach could have a huge impact on your organization. Here are some strategies for measuring and managing that risk.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.