By Michael Kassner September 17, 2014
Unknown and unmanaged IPv6-enabled devices on IPv4 networks are always going to cause trouble eventually.
http://tr1.cbsistatic.com/hub/i/r/2014/09/17/0e618ebf-4ae1-480e-b3d3-da67db94e00d/resize/620x485/647f9fe1ed5a48d591761ed956f03fab/rogue.png
In 2009, TechRepublic, in this article, advised that most if not all computing devices are IPv6-enabled. And not paying attention to that fact could lead to lots of trouble.
Today, five years later, Frank Herberg in this Switch Security paper raised the warning once again. Herberg mentioned IPv6 being enabled turned on autoconfiguration functionalities. More to the point, Herberg wrote, "Network operators and security people who have neither basic IPv6 experience nor measures in place to detect IPv6-related attacks run a real risk."
Herberg then brought up a point I've heard from other IPv6 experts. Bad actors are early adopters, and using IPv6 is no exception. So they have the knowledge and the experience to manipulate IPv6 to their advantage.
Full Article
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.