Slowly, we’re making progress mainstreaming IPv6. I wanted to post on a few interesting developments. Late last month, Netflix got an IPv6 allocation from ARIN, and they’re advertising it in BGP... I look forward to the day I can stream movies to my Netflix set-top box over IPv6.
A Tipping Point for the Internet? Catching the precise moment of a tectonic shift in a global system as large and important as the Internet may be viewed as an exercise in the improbable. However, I point out in this summary that I think we are precisely in the midst of such a shift...
In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies.... "Wisdom consists in being able to distinguish among dangers and make a choice of the least harmful." That quote is quite possibly the most accurate depiction possible of the never-ending struggle between network security and corporate budget. Providing a mechanism to defend the enterprise network from every conceivable threat is impossible in terms of both technology and funding.
Here are my VoIP and Voice security predictions for 2009, limited to just a few, key predictions... The poor economy will slow the adoption rate for VoIP and Unified Communications (UC). This will continue to limit the size of the enterprise VoIP deployments for potential hackers to exploit. VoIP/UC will continue to be mostly an internal/campus application where the threat level for attack is low, so deployments will be largely secured along the same lines as other data network applications.
This very interesting document was released by ICANN's Generic Names Supporting Organization (GNSO) for public comment yesterday. And it asks some fundamental questions while at the same time pointing to sources such as the Honeynet Alliance's reports on fast flux.
With all the focus on neutrality in the provider networks we must not lose sight of what is happening in our own homes. As with some of the efforts to make the networks work better (as measured in the providers' paternalistic) view, their attempt to retake the home is about serving us better by reducing the operators' costs. "Better" is of course in terms of the operator's own measures. It's not quite the same as in 1995 when providers opposed home networks and want to charge us for each machine...
The beginning of the year saw IPv6 added to the DNS root, closing a major hole for IPv6-only communication. In mid-year, the US federal government's IPv6 mandate came into effect, requiring all federal IP backbones to support IPv6. While the mandate didn't have anywhere near the effect that many had hoped for, it did spur many vendors to add IPv6 support to their products. The amount of observed IPv6 traffic increased considerably, but we still lack good data for how much IPv6 is being used. So, where were we at the end of 2008?
Tunnel vision is a rather serious medical condition and the Internet or at least a number of service providers could be at risk if not treated soon enough. Symptoms of inter AS (Autonomous System) tunnel vision are many slower connections with IPv6 compared to IPv4 with some failing all together. Reason is that tunnels, especially inter-AS tunnels, can lead to long paths and non-optimal routing.
The end of the year is approaching which seems to be a harbinger of Internet disasters. Four years ago (on 24 Dec. 2004), TTNet significantly disrupted Internet traffic by leaking over 100,000 networks that were globally routed for about an hour. Two years ago (on 26 Dec. 2006), large earthquakes hit the Luzon Strait, south of Taiwan, severing several underwater cables and wreaking havoc on communications in the region. Last year there was a small delay. On 30 Jan. 2008, more underwater cables were severed in the Mediterranean, severely disrupting communications in the Middle East, Africa, and the Indian subcontinent. Calamity returned to its customary end-of-year schedule this year, when early today (19 Dec. 2008) several communications cables were severed, affecting traffic in the Middle East and Indian subcontinent.
A report "Securing Cyberspace for the 44th Presidency" has just been released. While I don't agree with everything it says (and in fact I strongly disagree with some parts of it), I regard it as required reading for anyone interested in cybersecurity and public policy. The analysis of the threat environment is, in my opinion, superb; I don't think I've seen it explicated better. Briefly, the US is facing threats at all levels, from individual cybercriminals to actions perpetrated by nation-states. The report pulls no punches...