CertCities.com -- The Ultimate Site for Certified IT Professionals
Visit CertCities.com Forums and Ost Your Mind Share share | bookmark | e-mail
  Microsoft®
  Cisco®
  Security
  Oracle®
  A+/Network+"
  Linux/Unix
  More Certs
  Newsletters
  Salary Surveys
  Forums
  News
  Exam Reviews
  Tips
  Columns
  Features
  PopQuiz
  RSS Feeds
  Press Releases
  Contributors
  About Us
  Search
 

Advanced Search
  Free Newsletter
  Sign-up for the #1 Weekly IT
Certification News
and Advice.
Subscribe to CertCities.com Free Weekly E-mail Newsletter
CertCities.com

See What's New on
Redmondmag.com!

Cover Story: IE8: Behind the 8 Ball

Tech-Ed: Let's (Third) Party!

A Secure Leap into the Cloud

Windows Mobile's New Moves

SQL Speed Secrets


CertCities.com
Let us know what you
think! E-mail us at:



 
 
...Home ... Editorial ... News ..News Story Monday: December 27, 2010


Security Will Not Come Naturally with IPv6


9/17/2009 -- The next generation of Internet protocols has some security features built into it, but IPv6 is not inherently more secure than the current IPv4 now in use, said Brett Thorson, network and security architect at Excivity and a security adviser to the North American IPv6 Task Force.

IPv6 can be used to block, shield and hide data on your network, and the hackers already are learning to take advantage of this.

"This is what black hats are doing right now: They are planning their attacks for IPv6," Thorson said Thursday at the Next Generation Internet Conference in Washington hosted by the Digital Government Institute.

Although IPSec security is included in all IPv6 products, it is not enabled by most users, Thorson said. And when it is used, its effectiveness can vary because there are multiple ways to implement it.

However, the transition to IPv6 also offers opportunities for improving security. Greenfield installations can allow planners to design secure architectures, and features such as longer IP addresses can provide unique identifiers that can help identify every individual, device and process on a network, said Dale Geesey, principal with Auspex Technologies.

However, Geesey added, "there are a lot of challenges associated with the transition."

IT administrators and network architects have several years to plan before IPv6 traffic and applications become a reality on networks. Some organizations have enabled their network backbones to handle IPv6 traffic, but little if any use is being made of the new protocols.

But as the existing pool of IPv4 address space is depleted over the next two years, growth in the public side of the Internet will increasingly come with new IPv6 addresses, said John Curran, president of the American Registry for Internet Numbers, one of five regional Internet registries. Three-quarters of the available IPv4 address space has been allocated, and less than 11 percent remains available, he added. (Another 14 percent is unavailable for a variety of reasons.)

IT administrators will not necessarily have to transition their internal networks to IPv6 because they can continue to use IPv4 addresses, but public-facing servers will need to be enabled to use the new protocols as outside traffic increasingly uses IPv6, Curran said.

Many operating systems and other software now are enabled to accept IPv6 traffic by default, which can create problems if administrators are not aware of this. Ignoring the protocols because a network is not yet using IPv6 can be dangerous, Thorson said: "IPv6 is eventually going into your network whether you know it or not."

Security has traditionally been added after the fact in networks, devices and applications, and this has proved to be inefficient, ineffective and expensive. The increasing complexity, size and speed of development for networks, applications and services will make it more important than ever that security be built-in from the beginning, Geesey said.

Standards for IPv6 compliance are just now being completed, and products conforming to the government's IPv6 profile are not expected to begin arriving until July 2010. How and how well many security products -- such as logs, firewalls, anti-virus, intrusion detection and other monitoring, blocking and filtering devices -- will handle IPv6 packets is unknown. One vendor's approach to handling IPv6 was to simply drop the packets, Geesey said.

Some features in IPv6 can make security management easier in theory, but how well any one feature on any single device will work and play with other applications in a network is not easy to guess.

"You need a person to sit there and turn one thing on at a time and see what happens," Thorson said.

Organizations need to use the next two years to make it clear what they need and expect in IPv6 conformance and security, Geesey said.

"You have an opportunity to come to vendors and service providers and say, 'This is what I need,'" he added. "Vendors will respond." --William Jackson



Current CertCities.com user Comments for “Security Will Not Come Naturally with IPv6

There are no comments yet. Post one now.

Your comment about: “Security Will Not Come Naturally with IPv6”
Name: (optional)
Location: (optional)
E-mail Address: (optional)
Comment:
   

-- advertisement (story continued below) --

top