POSTS TAGGED: ipv6
Danny McPherson | Dec 07, 2012
The capabilities IPv6 provides will enhance online security, but the shift to the new Internet address scheme may also present risks if not properly managed. Previously, Internet security was largely an after-thought for the early Internet, as its primary purpose was to facilitate open, end-to-end, any-to-any communications and information exchange for bridging and accelerating research efforts. Today, we have a much more complex online ecosystem that spans billions of users across the globe and serves not only as an engine for e-commerce, but as an engine for all commerce.
The Internet protocol suite has become the de facto standard for global Internet services and consumers, but it also serves as a near ubiquitous substrate for running critical network infrastructure and business critical applications. Transportation, financial systems, emergency services, utilities, and government applications are just a few examples of services that need absolute availability and robust security. But having robust security is only one part of the solution.
At the micro level, the migration of personally identifiable information and proprietary intellectual property online has influenced IPv6 protocol architects to bake additional security into the stack. For example, IPSec is mandatory to implement in IPv6 compliant protocol stacks, while secure neighbour discovery capabilities, privacy addresses, and unique local addresses (ULA) all provide additional security enhancements.
Burt Kaliski | Jun 15, 2012
One of my favorite data scientists of the “next web” generation is Hilary Mason, chief scientist of Bitly.
Hilary was the presenter at the Verisign Labs Distinguished Speakers Series in late May, and brought a fascinating perspective on what Bitly is learning about human behavior through its URL shortening service. The company is asking questions like: What links are users shortening so they can share them with other users? And what shortened links are they clicking on? It turns out that there’s a difference: users tend to shorten more links that make them seem intelligent – such as world news – yet click on more links that arguably would make them seem less so – like celebrity gossip. The links that are shared and clicked on more are the lowest common denominator among the ones that were initially shortened.Read more
Burt Kaliski | Jun 08, 2012
World IPv6 Launch this week was a success in terms of raising awareness and activity around Internet Protocol Version 6 (IPv6).
Now that the big day is past, what’s next?
In one of my tweets on IPv6, I observed that there are enough IPv6 addresses that usage could double every year into the start of the next century without exhausting them all. So I’m not too concerned now about what’s next after IPv6.
I am curious, however, about what’s next with IPv6.Read more
Burt Kaliski | Jun 06, 2012
In recent interviews about World IPv6 Launch I’ve been asked by several different people whether or not I think there needs to be some kind of a “Flag Day” on which the world all together switches from Internet Protocol version 4 (IPv4) to the version 6 (IPv6).
I don’t think a flag day is needed. World IPv6 Launch is just the right thing.
It’s worth looking at some previous flag-type days to get a better sense of why.Read more
Rick Howard | Jun 05, 2012
There has been a lot of discussion lately about the potential for IPv6 to create security issues. While there are definitely some security risks of IPv6 deployment, a carefully considered implementation plan can help mitigate against security risks.
As we approach World IPv6 Launch tomorrow, I thought it prudent to share the below described incident that iDefense recently observed. This incident illustrates the disruptive capability of IPv6 in action and also prompted me to think about what IT professionals need to do to help make sure their network infrastructure is ready for the impending launch of IPv6. Read more