2014
DOI: 10.17487/rfc7123
|View full text |Cite
|
Sign up to set email alerts
|

Security Implications of IPv6 on IPv4 Networks

Abstract: This document discusses the security implications of native IPv6 support and IPv6 transition/coexistence technologies on "IPv4-only" networks and describes possible mitigations for the aforementioned issues.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0
1

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 11 publications
0
6
0
1
Order By: Relevance
“…Standards and deployment guides (e.g., [14], [23], [26], [32]) have been urging operators to apply firewall rules and access control lists for IPv6 in parity with IPv4 as part of their deployment of IPv6. Unfortunately, security researchers as well as RFC authors have lamented that in practice: "networks tend to overlook IPv6 security controls: [often] there is no parity in the security controls [between] IPv6 and IPv4" [5], and "in new IPv6 deployments it has been common to see IPv6 traffic enabled but none of the typical access control mechanisms enabled for IPv6" [15].…”
Section: Related Workmentioning
confidence: 99%
“…Standards and deployment guides (e.g., [14], [23], [26], [32]) have been urging operators to apply firewall rules and access control lists for IPv6 in parity with IPv4 as part of their deployment of IPv6. Unfortunately, security researchers as well as RFC authors have lamented that in practice: "networks tend to overlook IPv6 security controls: [often] there is no parity in the security controls [between] IPv6 and IPv4" [5], and "in new IPv6 deployments it has been common to see IPv6 traffic enabled but none of the typical access control mechanisms enabled for IPv6" [15].…”
Section: Related Workmentioning
confidence: 99%
“…Fazal et al [59] describe an attack that allows a rogue client to penetrate a VPN, exploiting VPN clients with a dual-NIC (i.e., a WiFi and an Ethernet adapter) in a WiFi LAN. Gont et al [60] describe a number of practices to prevent security exposures in IPv4 enterprise networks resulting from the native IPv6-support of general purpose operating systems. Among them, they show how a rogue client can impersonate an IPv6 router through Router Advertisement messages, and they discuss the potential of VPN traffic leakage on IPv6 [19].…”
Section: Related Workmentioning
confidence: 99%
“…El segundo servicio que busca la implementación hacia IPV6 es el protocolo Secure Shell (SSH), desarrollado por Tatu Ylonen [14] en la Universidad Tecnológica de Helsinki en Finlandia, y OpenSSH [7]- [15] nace del proyecto de un sistema operativo orientado a la seguridad que permite realizar la comunicación y transferencia de información en forma cifrada, proporcionando una fuerte autenticación sobre un medio inseguro. Permite la ejecución de procesos, el inicio de sesiones a servidores, la ejecución de comandos y la copia de archivos remotamente, brindando comunicaciones cifradas entre el cliente y el servidor, evitando así, el robo de información y manteniendo la integridad de los datos que viajan a través de la red [16], como se explica en el RFC de Secure Shell [17]- [18]. Asimismo, proporciona una exhaustiva autenticación y comunicaciones seguras en redes no seguras.…”
Section: Introductionunclassified