This week's myth is interesting because if we weren't talking security it wouldn't be a myth. Say what? The phrase "96 more bits, no magic" is basically a way of saying that IPv6 is just like IPv4, with longer addresses. From a pure routing and switching perspective, this is quite accurate. OSPF, IS-IS, and BGP all work pretty much the same, regardless of address family. Nothing about finding best paths and forwarding packets changes all that much from IPv4 to IPv6.
It has been observed that the most profound technologies are those that disappear (Mark Weiser, 1991). They weave themselves into the fabric of everyday life until they are indistinguishable from it, and are notable only by their absence. The feat of reticulating clean potable water into every house, so that it is constantly accessible at the turn of a tap, is a great example of the outcome of large scale civil engineering projects, combining with metallurgy, hydrology, chemistry and physics. But we never notice it until it is no longer there.
Here we are, half-way through this list of the top 10 IPv6 security myths! Welcome to myth #6. Since IPv6 is just now being deployed at any real scale on true production networks, some may think that the attackers have yet to catch up. As we learned in Myth #2, IPv6 was actually designed starting 15-20 years ago. While it didn't see widespread commercial adoption until the last several years, there has been plenty of time to develop at least a couple suites of test/attack tools.
Policies such as network neutrality and minimum speeds for broadband seek to limit the ability of carriers to favor some applications over others. Well-intended though these initiatives are, they still leave users negotiating for passage while confined to the carriers' "pipes". In this scenario, end users remain limited by how the incumbents choose to build their broadband content delivery networks.
My Twitter feed has exploded with the release of the Kaspersky report on the "Equation Group", an entity behind a very advanced family of malware. (Naturally, everyone is blaming the NSA. I don't know who wrote that code, so I'll just say it was beings from the Andromeda galaxy.) The Equation Group has used a variety of advanced techniques, including injecting malware into disk drive firmware, planting attack code on "photo" CDs sent to conference attendees, encrypting payloads...
Internet Protocol addresses fill two unique roles. They are both identifiers and locators. They both tell us which interface is which (identity) and tell us how to find that interface (location), through routing. In the last myth, about network scanning, we focused mainly on threats to IPv6 addresses as locators. That is, how to locate IPv6 nodes for exploitation. Today's myth also deals with IPv6 addresses as identifiers.
Yes, that was the theme of this year's Caribbean Cable and Telecommunications Association (CCTA) conference. This annual event was held in sunny Montego Bay, Jamaica, over the first week of February... For that, one has to applaud the fine work that CCTA puts into the event, drawing together operators, vendors, programmers, solution providers, marketers, and technologists alike -- and this year, over 270 attendees and 80-some exhibitors.
The following is a selected summary of the recent NANOG 63 meeting, held in early February, with some personal views and opinions thrown in! ...One view of the IETF's positioning is that as a technology standardisation venue, the immediate circle of engagement in IETF activities is the producers of equipment and applications, and the common objective is interoperability.
As Internet connection continues on a steady path of becoming a ubiquitous commodity in mature markets, we saw an eruption of big data tracking and analysis software in 2014. But what are operators going to do with all this new information? And how can they turn data into revenue? To start with, providers need more than just a data measurement tool. They need a solution that can analyze real-time data and then automate processes to optimize their networks and improve their subscribers' experiences.
We now know what direction the FCC will take in reorganising the American telecoms market. For many years I have mentioned the rather bizarre situation in that country wherein broadband is not seen as a telecoms service but rather as an internet service, which is itself classified as providing content. Thanks to extensive lobbying from among the telcos (who also refer to themselves as ISPs) in the early days of the internet, back in the 1990s, the FCC accepted their unbelievable proposals. As a result, over the last 20 years or so the USA's telecom market has changed from being one of the most competitive among developed economies to what it is now: a market with hardly any fixed telecoms competition at all.