[ipv6hackers] the end is near (or for IPv6: the beginning)
Edward Lopez
elopez at fortinet.com
Wed Jan 15 19:35:24 CET 2014
This is my personal opinion and not necessarily one shared with my company.
IPv4 stateful firewalls have a heavy reliance on NAT functionality as a means of resolving asymmetric routing issues that would otherwise be problematic in otherwise multipath routing environments. Proxy devices resolve asymmetry as a natural result of explicit proxy functions. As IPv6 migration accelerates, and the adoption of native IPv6 addressing down to endpoints becomes predominant, we will begin to see interesting issues arise:
- A sharp rise in asymmetry issues with stateful firewalls in multipath environments
- An increase in direct attacks against IPv6 endpoints, due to the removal of the NAT boundary
- A strong effort to deploy NAT66 (RFC 6296) for use in FW/CGN boundaries
- A resurgence of proxy-based security
- The need to resolve asymmetry will be is exacerbated by the deployment of IPv6 anycast services
With the recent allegations that the NSA TAO has compromised a number of commercial stateful firewall systems, I would think that more intelligent organizations will be reconsidering their network security strategies in their migration plans to IPv6
Ed
On Jan 4, 2014, at 12:29 PM, Jens Link <lists at quux.de<mailto:lists at quux.de>> wrote:
Marc Heuse <mh at mh-sec.de<mailto:mh at mh-sec.de>> writes:
Expect everyone in the USA to be totally surprised when this happens
(like every year in Chicago in Winter when it starts snowing) ;-)
Or Windows XP support running out. ;-)
Jens
--
----------------------------------------------------------------------------
| Foelderichstr. 40 | 13595 Berlin, Germany | +49-151-18721264 |
| http://blog.quux.de | jabber: jenslink at jabber.quux.de<mailto:jenslink at jabber.quux.de> | --------------- |
----------------------------------------------------------------------------
_______________________________________________
Ipv6hackers mailing list
Ipv6hackers at lists.si6networks.com<mailto:Ipv6hackers at lists.si6networks.com>
http://lists.si6networks.com/listinfo/ipv6hackers
*** Please note that this message and any attachments may contain confidential
and proprietary material and information and are intended only for the use of
the intended recipient(s). If you are not the intended recipient, you are hereby
notified that any review, use, disclosure, dissemination, distribution or copying
of this message and any attachments is strictly prohibited. If you have received
this email in error, please immediately notify the sender and destroy this e-mail
and any attachments and all copies, whether electronic or printed.
Please also note that any views, opinions, conclusions or commitments expressed
in this message are those of the individual sender and do not necessarily reflect
the views of Fortinet, Inc., its affiliates, and emails are not binding on
Fortinet and only a writing manually signed by Fortinet's General Counsel can be
a binding commitment of Fortinet to Fortinet's customers or partners. Thank you. ***
More information about the Ipv6hackers
mailing list