IPv6 Security: Attacks and Countermeasures in a Nutshell


—The history of computers is full of underestimation: 640 kilobyte, 2-digit years, and 32-bit Internet addresses. IPv6 was invented to overcome the latter as well as to revise other drawbacks and security vulnerabilities of its predecessor IPv4. Initially considered the savior in terms of security because of its mandatory IPsec support, it turned out not to be the panacea it was thought to be. Outsourcing security to IPsec but eventually removing it as well as other design decisions led to a number of vulnerabilities. They range from the already known spoofing of answers to link-layer address requests to novel possibilities regarding node tracking. In an effort to fix them, a vast amount of updates have been introduced. In this paper, we discuss security and privacy vulnerabilities with regard to IPv6 and their current countermeasures. In a second step, vulnerabilities and countermeasures are systematized by the appliance of an extendible common language for computer security incidents. Our evaluation shows that a large part of vulnerabilities can be mitigated but several security challenges remain. We deduce three main research challenges for IPv6 security, namely address assignment and structure, securing local network discovery, and address selection for reconnaissance.

Extracted Key Phrases

7 Figures and Tables

Showing 1-10 of 76 references

IPv6 Flow Label Specification

  • S Amante, B Carpenter, S Jiang, J Rajahalme
  • 2011
Highly Influential
3 Excerpts

Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs)

  • C Huitema
Highly Influential
4 Excerpts

Deprecating EUI- 64 Based IPv6 Addresses Internet Engineering Task Force Available: http://tools.ietf.org/html/ draft-gont-6man-deprecate-eui64-based-addresses-00

  • F Gont, D Thaler, W Liue
  • 2013
2 Excerpts

Security Implications of IPv6 Options of Type 10xxxxxx Available: tools.ietf.org/html/ draft-gont-6man-ipv6-smurf-amplifier-03

  • F Gont, W Liue
  • 2013

A Uniform Format for IPv6 Extension Headers

  • S Krishnan, J Woodyatt, E Kline, J Hoagland, M Bhatia
  • 2012
1 Excerpt

Attacking ipv6 implementation using fragmentation

  • A Atlasis
  • 2012
1 Excerpt

Operational Neighbor Discovery Problems

  • I Gashinsky, J Jaeggli, W Kumari
  • 2012
1 Excerpt