IPv6 is the sixth-generation Internet Protocol. The fourth-generation Internet Protocol, IPv4, has gone through the rapid development stage of the mobile Internet, providing services for video, gaming, and payment. However, with the development of the industrial Internet, IPv4 can no longer meet the skyrocketing network demands of the world, and IPv6 was born as a result. In simple terms, the number of IPv6 addresses can assign an IP address to every grain of sand worldwide. And an IP address is our "house number" on the Internet.
Answer: In addition to its rich address resources, precise correspondence, and traceable information, data transmission between IPv6 addresses will be encrypted, making it more difficult for information to be eavesdropped or hijacked. Therefore, overall, security is an important feature of IPv6. However, the increased complexity of IPv6 may lead to a higher number of attack vectors, allowing malicious hackers to execute various types of attacks. So, from a protocol perspective, IPv6 will face more security risks.
Answer: From the perspective of deployment security, IPv6 and IPv4 need to be compared in the following four dimensions:
Answer: Yes.
Since the end of November 2017, when the national "Action Plan for Promoting the Large-scale Deployment of the Sixth Edition of the Internet Protocol (IPv6)" was launched, various operators have been able to install native IPv6 broadband networks for users. Therefore, the network used by users is likely to have dual-stack access, capable of communicating with both IPv4 and IPv6 networks.
If an attacker enables global IPv6 connectivity on the user's network, nodes in the user's network may inadvertently use IPv6 nodes intended for local traffic for non-local traffic, providing opportunities for attackers.
Answer: Currently, IPv6 IPSec is disabled by default, and users do not need to increase the use of IPSec themselves. Previous IPv6 specifications required all nodes to support IPSec, and the expected ability of IPv6 networks to use local IPSec could lead to widespread use of IPSec and affect network transmission rates.
Answer: Users can use SI6 Networks' IPv6 Toolkit, The Hacker's Choice IPv6 Attack Toolkit, and Chiron, which are three free and open-source IPv6 toolkits.
Answer: Usually not, as standard IPv6 subnets are /64s and user-end device network addresses are randomly distributed within a vast address space, making global scanning impossible.
However, when infrastructure nodes (such as routers, servers, etc.) typically use predictable addresses and client nodes (laptops, workstations, etc.) use random addresses, "targeted" address scanning can easily discover infrastructure nodes and then use scanning tools to obtain user-end device network addresses based on specific address patterns.
Answer:
Answer: It depends.
Host tracking refers to the correlation of network activity when a host moves across networks. Traditional SLAAC addresses require nodes to embed their MAC addresses into the IPv6 interface identifier, making IPv6 host tracking very weak. Temporary addresses mitigate some issues by providing random addresses for (client-like) outbound communication, while stable privacy addresses replace traditional SLAAC addresses, eliminating the problem.
Over time, implementations have evolved towards temporary addresses and stable privacy addresses. However, you should check if your operating system supports these standards.
Answer: After analyzing the relevant trade-offs and conveniences of each network scenario, administrators can set unpredictable addresses for some important servers. By setting unpredictable addresses, attackers will have a hard time "targeting all servers within a given prefix."
Answer: You can configure DNS reverse mapping only for systems that require it, such as mail transfer agents, or configure wildcard reverse mapping so that every possible domain name in the reverse mapping contains a valid PTR record.
Answer: IPv6's Neighbor Discovery Protocol (NDP) combines protocols such as ARP, ICMP router discovery, and ICMP redirects from IPv4, and makes improvements to them. As a foundational protocol of IPv6, NDP also provides prefix discovery, neighbor unreachability detection, address resolution, duplicate address detection, and address auto-configuration functions.
Therefore, NDP and auto-configuration attacks in the IPv6 network environment are equivalent to ARP and DHCP-based attacks from IPv4. If users' IPv4 networks are threatened by ARP/DHCP attacks, they must also pay attention to the security threats brought by NDP and auto-configuration attacks in IPv6 networks.
Users can address the security risks caused by NDP and auto-configuration attacks in IPv6 networks by using RA-Guard and DHCPv6-Shield/DHCPv6-Guard methods.
Answer: When using SLAAC for address configuration, there is no centralized log of IPv6 addresses since the addresses are "auto-configured."
When DHCPv6 is applied for address configuration, the server typically maintains an IPv6 address lease log. Once a host is compromised and the maintenance of the IPv6 address lease log is detected, malicious actors can easily launch attacks through infected nodes.
At the same time, DHCPv6 does not prevent hosts from configuring addresses on their own (i.e., not requesting addresses through DHCPv6), so DHCPv6 logs should only be used when nodes cooperate with the network.
Answer: It depends.
Many implementations of these mechanisms can be easily bypassed through IPv6 extension headers. In some cases, bypassing can be reduced by discarding packets containing "hop-by-hop options."
Answer: Deployment is not recommended.
Currently, there are hardly any host operating systems that support SeND.
Answer: NCE can cause target devices to become unresponsive, crash, or restart. The goal of an NCE attack is to create an arbitrary number of entries in the neighbor cache, making it impossible to create new legitimate entries, leading to a denial of service. NCE can also be a side effect of address scanning in remote networks, where the last-hop router creates an entry for each target address, eventually exhausting the neighbor cache.
Mitigating NCE can limit the number of neighbor cache entries in an incomplete state. Or, when facing an NCE attack from point-to-point connected nodes, using long prefixes (e.g., /127s) for point-to-point links to artificially limit the maximum number of entries in the neighbor cache.
Answer: No.
The security model of IPv4 networks is not entirely "network-centric" either, but rather based on both host-based firewalls and network-based firewalls. Future IPv6 networks are likely to follow the previous hybrid model.
Answer: Not necessarily.
Although almost all IPv6 networks may use global address space, this does not mean any-to-any global reachability. For example, IPv6 firewalls may be deployed at the same points in the network topology as NAT devices currently used in IPv4 networks. Such IPv6 firewalls may implement "outbound communication only" filtering policies, resulting in host exposure similar to that in IPv4 networks.
Answer: Yes.
Since IPv6 hosts can typically configure any number of IPv6 addresses within their /64 local subnet, users should blacklist at least the /64 address detected with malicious activity when a malicious event occurs.
Depending on the specific upstream ISP, an attacker can control prefixes of any length between /48 and /64 (e.g., if the attacker obtains a delegated prefix through DHCPv6-PD). Therefore, within the possible range, if malicious activity persists after the customer blacklists the offending /64, you may want to block shorter prefixes (larger address blocks) - for example, start by blocking a /64, then block a /56 or /48 if necessary.
Answer: It depends on the situation because discarding IPv6 fragments is only safe when two conditions are met:
UDP-based protocols may rely on data fragmentation, so traffic-blocking data fragments are generally not recommended when using such protocols. Other protocols (such as TCP) can completely avoid using data fragments through mechanisms like Path-MTU discovery.
When ICMPv6 "PTB" error messages declare an MTU smaller than 1280 bytes, fragmentation may be triggered. Therefore, if IPv6 fragments are discarded but ICMPv6 "PTB" error messages resulting in an MTU smaller than 1280 bytes are not discarded, attackers may exploit such ICMPv6 error messages to trigger data fragmentation, causing resulting fragments to be discarded and leading to a denial of service (DoS) condition.
In the revised IPv6 specification [RFC8200], IPv6 fragments that generate responsive ICMPv6 PTB messages are no longer supported, so eventually, all implementations will eliminate this feature and related vulnerabilities. However, you might be using legacy facilities that still exhibit vulnerable behavior.
Answer: Users are advised to flexibly set filtering policies for packets containing IPv6 extension headers based on the enforcement location within the network.
If the filtering policy is enforced on transit routers, use a blacklist approach for filtering within the possible range, avoiding packet removal as much as possible; if the filtering policy is enforced on enterprise networks, users would want to allow only the desired traffic, so a whitelist approach should be used.
[IPv6-EHS-f] contains recommendations for filtering IPv6 packets, including extension headers on transit routers. Additionally, it includes security assessments of all standardized IPv6 extension headers and options, as well as an analysis of any potential interoperability issues arising from filtering such packets.
Answer: Most IPv6 security toolkits provide support for arbitrary IPv6 extension header attack packets. For example, [SI6-RA6] explains the use of extension headers and router advertisement packets.
Answer: IPv6 protocol security policies should match IPv4 protocol security policies, but due to the current lack of experience in setting IPv6 protocol policies, there are many vulnerabilities when enterprises set IPv6 protocol security policies.
Answer: Configuration should allow connections to be initiated from any address but only allow incoming connections from stable addresses. Thus, addresses exposed due to client-like activities (such as web browsing) will not be usable for external systems to connect back to internal nodes or for address scanning to internal nodes.
Answer: Temporary addresses change over time, so specifying nodes using temporary addresses as a single IPv6 address or a set of addresses will usually fail.
To implement these ACLs, you can choose the following:
Answer: In the IPv6 network environment, the IP address space is almost infinite, and the pool of IP resources available to attackers will also expand indefinitely, with a surge in network data. At the same time, with attackers' widespread use of large-scale proxy IP pools, especially per-second dialing IPs, IP addresses are no longer trustworthy, leading to a rapid increase in false positives and missed detections for many traditional security solutions. Traditional security policies based on the IP address dimension can no longer meet the protection needs under the new trend.
In Tencent EdgeOne you can configure IPv6 settings for individual domains through Domain Management. Here, you'll find three configuration options, with the default being the Follow site configuration.
Let's explore how to implement global domain acceleration configurations in Tencent EdgeOne. Navigate to the Site Acceleration's Network Optimization module, where you'll discover a wide range of powerful acceleration features. By using the IPv6 Access Switch, you can enable acceleration for all domains under the site with the Follow site configuration. IPv6 configuration with just one click. Additionally, you're encouraged to utilize the Rule Engines and Security Protection to configure more robust and feature-rich functionalities and security protections for your domains.
You can also learn more about the usage and features of the Tencent EdgeOne Rule Engine by reading this article. If you are interested in experiencing these benefits firsthand, feel free to contact us to learn more about Tencent EdgeOne and its features. You can also click here to get started free and experience its benefits firsthand.