Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

2/28/2012
10:42 AM
50%
50%

3 Ways For SMBs To Plug IPv6 Security Holes

Small and midsize businesses need not fret over the newest internet protocol. An expert explains what you need to know.

Securing The Super Bowls Of Sports
Securing The Super Bowls Of Sports
(click image for larger view and for slideshow)

Taking a see-no-evil, hear-no-evil approach to internet protocol version 6 (IPv6)? You might be leaving a door to your network wide open as a result.

IPv6 already exists and will eventually become the standard-bearer for internet traffic. Chief among the reasons: Its predecessor, IPv4, will eventually run out of virtual real estate because it uses 32-bit IP addresses. IPv6 implements 128-bit addresses. SMBs don't necessarily need to pump a lot of time or money into a robust IPv6 transition plan, according James Gudeli, VP of business development at Kerio Technologies. But they should take care to minimize the related security risks that could already be affecting their networks.

"I don't think small businesses are ready--there's no recommendation to start deploying," Gudeli said in an interview. "This is strictly about understanding the protocol and protecting yourself."

[ For more background on the security implications of IPv6, see Will IPv6 Make Us Unsafe?. ]

Gudeli doesn't think SMBs need to overthink IPv6 and what it might mean to their business, with one major exception: Security. Companies that unknowingly enable IPv6 traffic on their networks might invite significant threats inside the corporate perimeter. Here are the three basic risk-mitigation steps Gudeli advises; just about any SMB can put these in place with a reasonable amount of effort.

1. Call your ISP. Gudeli notes that plenty of smaller firms go online with wireless routers or other equipment provided by their internet service provider (ISP). At the smallest of companies, that could even mean a DSL or cable modem. If that's the case for you, call the ISP and start asking questions. First and foremost: Is the provider's equipment allowing IPv6 traffic? "If that [connection] is enabling access to IPv6, there might be a potential threat to your network," Gudeli said. "Start at the pipeline."

2. Audit your hardware. If your internet connection does enable IPv6 traffic, the next step is to address the various devices that access your network. The goal, according to Gudeli, is to understand which workstations, mobile devices, or any other hardware accessing the network is actively enabled for IPv6. Those machines could create security risks and you should disable the setting, at least for now, to minimize problems at the endpoints. The instructions for doing so would vary by operating system, but Gudeli said any IT pro that can set up an antivirus program can modify IPv6 settings.

3. Check your firewall or UTM device. Of course, step two might make some owners and managers cringe, especially as you move up the SMB scale. Another approach: Block IPv6 traffic through your firewall or unified threat management (UTM) device. That can seal up a leaky security perimeter; it could also help solve a related management headache: Employees spending time on non-work-related websites. In addition to IPv6-related attacks, "there are also a fair number of websites using IPv6 specifically to bypass filter rules found in front of UTMs so that people can access their content," Gudeli said.

Failing to address the devices on your network and your firewall or UTM could lead to an employee inadvertently hanging a neon sign out there advertising a weakness. "If there's a system that's looking for an IP address and it goes out through your firewall, which for whatever reason isn't IPv6-aware, and it hits the internet and is assigned an address, there's no filtering for that individual computer," Gudeli said. "People that are looking to get into to your network will have an open channel. There's no network translation happening--it's basically a public IP address that's shared with the rest of the world." Someone in China, say--where IPv6 is more widely deployed at this point--could use a simple sniffing program to find open access to networks via the protocol, according to Gudeli.

Once you've taken basic steps to secure your network from IPv6-related threats, then you can consider the ways in which it might impact your business in a positive way. Gudeli notes you can set up a test environment to better familiarize yourself with the protocol, for example. The more likely effect for the typical SMB: They'll see a trickle-down effect as IPv6 becomes standard for their cloud and virtualization providers.

"Once SMBs protect themselves, they'll know everything they need to know when it's ready," Gudeli said.

Security professionals often view compliance as a burden, but it doesn't have to be that way. In this report, we show the security team how to partner with the compliance pros. Download the report here. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Sabrina
50%
50%
Sabrina,
User Rank: Apprentice
3/1/2012 | 7:02:17 AM
re: 3 Ways For SMBs To Plug IPv6 Security Holes
Good to know about it :)
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-16632
PUBLISHED: 2021-05-15
A XSS Vulnerability in /uploads/dede/action_search.php in DedeCMS V5.7 SP2 allows an authenticated user to execute remote arbitrary code via the keyword parameter.
CVE-2021-32073
PUBLISHED: 2021-05-15
DedeCMS V5.7 SP2 contains a CSRF vulnerability that allows a remote attacker to send a malicious request to to the web manager allowing remote code execution.
CVE-2021-33033
PUBLISHED: 2021-05-14
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
CVE-2021-33034
PUBLISHED: 2021-05-14
In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
CVE-2019-25044
PUBLISHED: 2021-05-14
The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.