Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
Big Bird, Google, and Facebook participate in first high-profile test flight of new IP protocol amid DDoS threat backdrop
3 Min Read
My first IPv6 story warning of the eventual saturation of the IPv4 address space was published a long time ago. My daughter -- who graduates from high school this weekend -- was a toddler back then. So here we are today, on World IPv6 Day, finally running a global real-world test of the next-generation IP protocol, just a couple of months before I send my firstborn off to college.
The good news about IPv6 is that unlike its predecessor -- or much of the Internet for that matter -- it was built with security in mind. IPv6 includes IPSec encryption and address space with a lot of headroom that could help prevent things like worm propagation. But the irony is that the more secure IPv6 also introduces some security issues of its own, with an architecture that's inviting to distributed denial-of-service (DDoS) attacks due to its larger headers, which require more processing by network devices, as well as the likelihood of all-new vulnerabilities in the protocol and misconfigured implementations that expose security holes.
As I write this post, there are rumblings of concern that hackers might also do a little test-drive themselves today of IPv6 to see just how easily it can be DDoS'ed. Google, Facebook, Yahoo, Cisco, and more than 400 other organizations (even Sesame Street!) are using IPv6 on their sites today in the 24-hour test flight of the 128-bit protocol, which could provide some 670 quadrillion IP addresses, experts say.
But the good news is that more people are talking about security issues surrounding the transition to IPv6. Translated: I received a lot of PR pitches over the past couple of weeks about IPv6 security implications.
Dark Reading contributing editor and blogger John Sawyer has pointed out the challenges it will bring for vulnerability scanning and penetration testing. He talks here about how new host-discovery methods will be put in place to better target vulnerability scans, for example, as well as other methods of finding IPs.
Perhaps one of the biggest problems will be its "newness." IPv6 might be nearly two decades in the making, but once users start really running it in their networks, it's sure to expose previously unknown security flaws in IPv6-based products.
The likely missteps in implementation include not allocating sufficient memory for the longer IPv6 addresses, says Rob Rachwald, which could lead to remote code execution, for example. Human error is also highly likely when handling IPv6's new configuration rules and management, he says, leaving areas of the network exposed to attackers. All it would take is one request to a server that exploits a buffer overflow flaw in an IPv6-based system, according to Rachwald, who blogged on this today. Attackers could exploit mistakes in the Internet address translation process and pose as someone within the company, or sneak past a firewall that isn't properly configured for IPv6.
But we won't know until about 8 p.m. ET tonight, when World IPv6 Day's test concludes, how IPv6 security fared in its test-entry into the real world.
-- Kelly Jackson Higgins, Senior Editor, Dark Reading Follow Kelly (@kjhiggins) here on Twitter.
About the Author(s)
Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties. Jackson Higgins was recently selected as one of the Top 10 Cybersecurity Journalists in the US, and named as one of Folio's 2019 Top Women in Media. She began her career as a sports writer in the Washington, DC metropolitan area, and earned her BA at William & Mary. Follow her on Twitter @kjhiggins.
You May Also Like
A screen displaying many different types of charts and graphs to show what data is being analyzed.Cybersecurity Analytics