Security & compliance
How individual sites and networks become compliant depends on how much IPv6 affects them and how much planning they do. Security compliance may seem relatively easy because the IPSec standard is embedded into IPv6 rather than bolted on, as it is with IPv4. That can be reassuring, but there is a good deal of confusion surrounding IPv6 security and it's important to understand the details.
An IPv6 transition shouldn't even begin until an enterprise verifies its security devices comply with IPv6. All firewalls and intrusion detection and prevention must support IPv6, and the enterprise must ensure all access control list rules are migrated from IPv4-compliant devices to IPv6-compliant devices.
In addition, compliance and governance monitoring tools have to be able to accommodate IPv6, probably sooner than other management tools, in order to provide accurate compliance auditing and reporting. Migrating compliance to an IPv6 environment also requires a clear understanding of what kinds of application and user traffic are traversing the network.
Once you've verified and prepared your devices, take the following frequently misunderstood points into consideration:
1. IPv6 security defenses must apply to IPv4 networks
Organizations with IPv4 networks may think that they aren't susceptible to IPv6-based attacks, but experts say that's not the case. Most new operating systems and mobile devices -- including Windows, Mac OS X, Ubuntu Linux, iOS and Android -- ship with IPv6 automatically enabled, so if you run or audit an IPv4 network, there are systems on it just waiting to communicate over IPv6. This creates an opportunity for exploitation by hackers and malware.
The Windows HomeGroup feature, for example, uses TCP over IPv6 for local network management. Every system with IPv6 enabled has a link-local address that other machines on the local network can communicate with. This allows an intruder with access to the local network -- directly or through a compromised IPv4 system -- to access and attack the IPv6 interfaces of other local devices.
2. Mandatory IPSec is no guarantee
A widely assumed benefit of IPv6 is IPSec support, but the reality is more nuanced. While IPv6 supports IPSec for transport encryption, actually using IPSec is not mandatory and it is not configured by default. IPSec requires extensive configuration to be properly secured, even when it has been enabled. Details vary depending on your hardware and OS, so contact your vendors for implementation specifics.
3. Man-in-the-middle attacks are possible
Since IPv6 doesn't use Address Resolution Protocol (ARP), it's sometimes assumed to prevent man-in-the-middle-attacks. In fact, IPv6 uses ICMPv6 to implement the Neighbor Discovery Protocol, which replaces ARP for local address resolution. The Neighbor Discovery Protocol is just as vulnerable to man-in-the-middle attacks as ARP -- if not more so. A single compromised internal node can expose all local assets to the global IPv6 network through a simple route advertisement.
4. The problem with NAT
While some IPv6 misconceptions revolve around its perceived security, some believe it's less secure than IPv4 due to a lack of NAT. Network Address Translation (RFC 1918) allows organizations to assign private, un-routable IPv4 addresses to many devices, which are then provided connectivity to the Internet via a limited number of public IPv4 addresses.
The private addressing of NAT can be mistaken as a security feature, and its omission is frequently cited as a reason not to deploy IPv6. But IPv6s expanded address space solves the original problem that NAT addressed. The real security of NAT was provided by the accompanying usage of stateful inspection of inbound traffic. An organization should not be any more or less secure with IPv6 as opposed to NAT, as long as it is combined with appropriate access controls and inspection tools.