The official launch date for IPv6 is right around the corner, making June 6 famous for even more than the historic WW II invasion of Normandy. It might make the invasion of your customers’ networks more possible than ever before.
The higher threat level, according to Carl Herberger, vice president of security at Radware, lies in the fact that while IPv6 will be the new standard at the wide area, the local area will continue to be the near exclusive domain of IPv4. And since the two versions were not designed to co-exist, there are some gaping holes in security.
“You basically need to translate Version 6 to Version 4 and we can do that by encapsulation,” Herberger told CRN.
“The encapsulation standards are all over the map. This situation causes problems with security inspections because if I can send an attack that exploits Version 4 vulnerabilities through a Version 6 inspection module, I’ve got a pretty high chance of success because the Version 6 inspection module will not be able to read it. And we haven't been able to resolve this problem yet."
To further complicate matters, Herberger says Version 4 could easily remain widely deployed at the local area for 10 years or beyond, due to the absence of compelling business drivers to force local migrations anytime soon.
“This opens up pretty much the full range of exploits because once you pass through the physical inspection module, you are through the perimeter and you have a new opportunity to deliver any payloads the malware producer wants.”
Despite these obvious threats, Herberger still sees IPv6 as a practical necessity given the shortage of IP addresses, as well as the new version's more granular capabilities around queries, enhanced security in non-hybrid environments such as encrypted headers, and additional DNS capabilities.
What it means for the channel
Herberger said migrations and consulting services around security offer great opportunities for the channel.
“They also need to really push the vendors towards building solutions around this encapsulation issues,” he said. “There are some partial solutions out there, but nobody has really figured out how to solve the security risks overall.”
Herberger also believes before the problem is resolved, the industry will come to the realisation that full-scale migration to IPv6, at all levels of the network, should have been mandated.
“I believe that history will show that we should have basically migrated over a short period of time entirely to one standard. In that case, you would not allow Version 4 to even be routable in the future.”
The June 6 deadline imposed by the Internet Society (ISOC) is also a bit of a formality. A number of the large-scale service providers, DNS and CDN providers, and other key players, have already made the switch.
Most mobile providers who have adopted LTE 4G infrastructures have built around this networking principle already with mobile devices, by default, connecting to the Internet via IPv6 assignments.
This article originally appeared at crn.com
Copyright © 2014 The Channel Company, LLC. All rights reserved.
Issue: 338 | May 2015
Access CRN's extensive online resources including; email bulletins, community discussions and unique online news.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can log on to the CRN website or start posting comments on articles.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain '@crn.com.au' to your white-listed senders.