Author Archives: Ferry

IPv6:transitioning:perspectives

What options do you have when you want to transition to IPv6?
Besides the native IPv6 method, if your ISP is able to deliver,  it is possible to get connected through an intermediate solution.

Read about it in “Geoff Hutson’s story“.

Alternative:to:IPv6:in:the:Works

The global migration to IPv6 has been slow coming.  This got some people within IETF thinking about an alternative to the protocol.

Read all about it in this Packetlife article.
(…sure this was an April fool message)

IPv6:faster:than:IPv4

A speedtest website just revealed that my download over IPv6 is 40% faster than over IPv4.
This is a nice additional advantage of running IPv6. Have a look at the values.

IPv6 versus IPv4 download speed

IPv6:tcpip::Pocket:Reference:Guide

With the introduction of the IPv6 protocol we face not only a new extended addressing scheme, but also a new composition of the IP packet. Compared to the IPv4 protocol, we are dealing with a much more simplified and reduced amount of header sections.

This little “IPv6 tcpip Pocket Reference Guide” will help you understand the differences and composition.

IPv6:Privacy:extension:demands::Identity:based:firewalling

With SLAAC, your MAC address is embedded into your IPv6 address. When you connect to the world, you’re giving them something that can be traced back to you (or at least a piece of hardware you have). RFC3041 was created to help address this privacy issue. It’s since been obsoleted by RFC4941.

Read more in the article of IPcalypse how to enable this on Ubuntu (which will probably work on other Linux flavours as well)

Do:you:expect:as:well:with::IPv6

Do you expect that we will make the usual mistake again bij first enabling a functionality (IPv6), and later on realize that we can’t live with it business wise and have to secure it afterwards? Discussion is here at LinkedIn.
http://www.linkedin.com/groups/Do-you-expect-that-we-3817248.S.47407657?qid=7a240aab-4713-4eb2-8095-ff9d552c2e5a&goback=%2Egmp_3817248

Get:Hurricane:IPv6:Certified::Fun

If you are exploring IPv6 and planning to get connected as well, than do the certification at Hurricane Electric.

Test:your:speed:over::IPv6

Do you wonder what you download/upload speed it over IPv6?
You can check your actual speed at the IPv6-Speedtest website.

ICMP6:Recommended:Filtering

With IPv6 traffic is mainly regulated through ICMP6, whereas in IPv4 it was a mess of different protocols. Therefor it should be carefully configured and secured, to garantee a smooth functioning network environment.

The recommendations for ICMPv6 firewall filtering are based on RFC 4890. These recommendations allow propagation of ICMPv6 messages needed to maintain functionality of the network but drop messages posing potential security risks. Many ICMPv6 messages should only be used in a link-local context, rather than end-to-end, and filters need to be concerned with the types of addresses in ICMPv6 packets as well as the specific source address, destination addresses, and ICMPv6 Type. RFC 4890 classifies ICMPv6 messages according to whether they are designed for end-to-end communications (traffic to transit a firewall) or local communications within a link (local traffic addressed to an interface on a firewall). All experimental and undefined ICMPv6 messages should be dropped. ACLs should permit only those ICMPv6 messages that are required, based on specific local needs and policies; all others should be dropped.

 

Must Not Drop

Should Not Drop

Message (Type)

Transit

Local

Transit

Local

Maintenande of Communication: Allow non-local when associated with allowed connections

Destination Unreachable (1) – All codes

X

X

Packet Too Big (2)

X

X

Time Exceeded (3) – Code 0 only

X

X

Parameter Problem (4) – Codes 1 and 2 only

X

X

Connectivity Checking:  Allow/disallow non-localvbased on topology/information concealment policy

Echo Request (128)

X

X

Echo Response (129)

X

X

Address Configuration and Router Selection: Allow in link-local only

Router Solicitation (133)

X

Router Advertisement (134)

X

Neighbor Solicitation (135)

X

Neighbor Advertisement (136)

X

Inverse Neighbor Discovery Solicitation (141)

X

Inverse Neighbor Discovery Advertisement (142)

X

Link-local Multicast Receiver
Notification: Allow in link-local only

Listener Query (130)

X

Listener Report (131)

X

Listener Done (132)

X

Listener Report v2 (143)

X

SEND Certification Path Notification: Allow in link-local traffic only

Certification Path Solicitation (148)

X

Certification Path Advertisement (149)

X

Multicast Router
Discovery: Allow in link-local traffic only

Multicast Router Advertisement (151)

X

Multicast Router Solicitation (152)

X

Multicast Router Termination (153)

X

Error
Messages: Allow non-local when associated with allowed connections

Time Exceeded (3) – Code 1

X

X

Parameter Problem (4) – Code 0

X

x

Mobile IPv6: Allow non-local for predefined endpoints

Home Agent Address Discovery Request (144)

x

Home Agent Address Discovery Reply (145)

X

Mobile Prefix Solicitation (146)

x

Mobile Prefix Advertisement (147)

X

Source – Guidelines for the Secure Deployment of IPv6 (NIST)

Preparing:your:IPv6:addressing:plan

Dutch organisation SURFnet has created a document explaining how to prepair an addressing plan for your IPv6 based network. This document is intended for network architects and network managers implementing IPv6 in their organisation.

The manual is translated by the RIPE NCC and is available as:
Preparing an IPv6 Adressing Plan