• Who am I?
  • Creativity
  • IPv6
  • SDN
  • Security

Creative|Technologist

[email protected]
Login

Login
don't panic don't panic don't panic don't panic
  • Who am I?
  • Creativity
  • IPv6
  • SDN
  • Security

Archive


Category Archive for "IPv6 Security Myths"

1IPv6 Security Myth #10: Deploying IPv6 is Too Risky

IPv6 Security Myth #10: Deploying IPv6 is Too Risky

Mar 24, 2015

After a quick break to catch our breath (and read all those IPv6 Security Resources), it’s now time to look at our tenth and final IPv6 Security Myth. In many ways this myth is the most important myth to bust. Let’s take a look at why: Myth: Deploying IPv6 Makes My Network Less Secure Reality: […]

2IPv6 Security Myth #9: There Aren’t Any IPv6 Security Resources

IPv6 Security Myth #9: There Aren’t Any IPv6 Security Resources

Mar 10, 2015

We are approaching the end of this 10 part series on the most common IPv6 security myths. Now it’s time to turn our eyes away from security risks to focus a bit more on security resources. Today’s myth is actually one of the most harmful to those who hold it. If you believe that there […]

3IPv6 Security Myth #8: It Supports IPv6

IPv6 Security Myth #8: It Supports IPv6

Mar 3, 2015

Most of our IPv6 Security Myths are general notions, often passed on unwittingly between colleagues, friends, conference attendees, and others. Today’s myth is one that most often comes specifically from your vendors or suppliers. Whether it’s a hardware manufacturer, software developer, or Internet Service Provider (ISP), this myth is all about trust, but verify. Myth: […]

4IPv6 Security Myth #7: 96 More Bits, No Magic

IPv6 Security Myth #7: 96 More Bits, No Magic

Feb 24, 2015

This week’s myth is interesting because if we weren’t talking security it wouldn’t be a myth. Say what? The phrase “96 more bits, no magic” is basically a way of saying that IPv6 is just like IPv4, with longer addresses. From a pure routing and switching perspective, this is quite accurate. OSPF, IS-IS, and BGP […]

5IPv6 Security Myth #6: IPv6 is Too New to be Attacked

IPv6 Security Myth #6: IPv6 is Too New to be Attacked

Feb 17, 2015

Here we are, half-way through this list of the top 10 IPv6 security myths! Welcome to myth #6. Since IPv6 is just now being deployed at any real scale on true production networks, some may think that the attackers have yet to catch up. As we learned in Myth #2, IPv6 was actually designed starting […]

6IPv6 Security Myth #5: Privacy Addresses Fix Everything!

IPv6 Security Myth #5: Privacy Addresses Fix Everything!

Feb 10, 2015

Internet Protocol addresses fill two unique roles. They are both identifiers and locators. They both tell us which interface is which (identity) and tell us how to find that interface (location), through routing. In the last myth, about network scanning, we focused mainly on threats to IPv6 addresses as locators. That is, how to locate […]

7IPv6 Security Myth #4: IPv6 Networks are Too Big to Scan

IPv6 Security Myth #4: IPv6 Networks are Too Big to Scan

Feb 3, 2015

Here we are, all the way up to Myth #4! That makes this the 4th installment of our 10 part series on the top IPv6 Security Myths. This myth is one of my favorite myth’s to bust when speaking with folks around the world. The reason for that is how many otherwise well-informed and highly […]

8IPv6 Security Myth #3: No IPv6 NAT Means Less Security

IPv6 Security Myth #3: No IPv6 NAT Means Less Security

Jan 27, 2015

We’re back again with part 3 in this 10 part series that seeks to bust 10 of the most common IPv6 security myths. Today’s myth is a doozy. This is the only myth on our list that I have seen folks raise their voices over. For whatever reason, Network Address Translation (NAT) seems to be […]

9IPv6 Security Myth #2: IPv6 Has Security Designed In

IPv6 Security Myth #2: IPv6 Has Security Designed In

Jan 20, 2015

Today we continue with part 2 of the 10 part series on IPv6 Security Myths by debunking one of the myths I overhear people propagating out loud far too much: That you don’t need to worry about security because IPv6 has it built into the protocol. In this post, we’ll explore several of the reasons […]

  • 1
  • 2
Chris Grundemann

Recent:

2021: Setting My Intention

2021: Setting My Intention

17 January 2021

It feels like more people are paying attention to the...

2020 in the Rear View

2020 in the Rear View

10 January 2021

I admit, I had to resist the urge to use some play on...

General McChrystal is Wrong

General McChrystal is Wrong

18 July 2020

No, I’m not talking about the fact that he only sleeps 4...

2020: Six Down, Six To Go

2020: Six Down, Six To Go

1 July 2020

Wow. So, uh, this is not quite the year I expected when I...

What is APM and why should I care?

What is APM and why should I care?

25 May 2020

Today we’re going to figure out what is Application...

Tweets!

My Tweets

Reach Out

Hi! I'd love to hear from you. Send me an email and I'll get back to you, asap.

Send Message

Search this site!

Policy Philosophy ARIN IETF Juniper Politics Learning Security Networking Internet Happiness CircleID ISOC Tech Policy IPv6 IPv6 Security Myths Creativity Technology TechFieldDay Colorado SDN Travel Update Miscellaneous

Popular Posts:

  • 2021: Setting My Intention
  • NAT444 (CGN/LSN) and What it Breaks
  • Chris Grundemann
  • 100.64.0.0/10 - Shared Transition Space

Recent Posts:

  • 2021: Setting My Intention
  • 2020 in the Rear View
  • General McChrystal is Wrong
  • 2020: Six Down, Six To Go

Let’s Connect!

© 2021 · Chris Grundemann.