{"id":2401,"date":"2015-01-20T11:11:53","date_gmt":"2015-01-20T18:11:53","guid":{"rendered":"http:\/\/chrisgrundemann.com\/?p=2394"},"modified":"2015-02-17T16:51:32","modified_gmt":"2015-02-17T23:51:32","slug":"ipv6-security-myth-2-ipv6-security-designed","status":"publish","type":"post","link":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/","title":{"rendered":"IPv6 Security Myth #2: IPv6 Has Security Designed In"},"content":{"rendered":"<p>Today we continue with part 2 of the 10 part series on IPv6 Security Myths by debunking one of the myths I overhear people propagating out loud far too much: That you don\u2019t need to worry about security because IPv6 has it built into the protocol. In this post, we\u2019ll explore several of the reasons that this is in fact a myth and look at some harsh realities surrounding IPv6 security.<\/p>\n<p style=\"padding-left: 30px;\"><strong>Myth: IPv6 Has Security Designed In<\/strong><br \/>\n<strong> Reality: IPv6 was Designed 15-20 Years Ago<\/strong><\/p>\n<p>The IPv6 protocol was primarily developed in the late 1990\u2019s. In fact, RFC 2460, the \u201cInternet Protocol, Version 6 (IPv6) Specification\u201d is dated December 1998. This was a time when the commercial Internet had just started to flourish; security threats at this time were not anywhere near the sophistication and scale of threats common today.<\/p>\n<p>While updates have been made to the protocol since 1998, the bottom line remains that relying on developers working well over a decade ago to protect you from security threats today and into the future is simply irresponsible.<\/p>\n<p>This is the point where someone invariably points out that IPv6 requires IPsec (Internet Protocol Security), but\u2026<\/p>\n<p style=\"padding-left: 30px;\"><strong>Myth: IPv6 Has Security Designed In<\/strong><br \/>\n<strong> Reality: IPsec is Not New<\/strong><\/p>\n<p>IPsec, which provides end-to-end per-packet IP layer authentication and encryption, has worked with both IPv6 and IPv4 since it was first standardized in RFC2401. This means that IPsec exists for IPv4 and that deploying it in IPv6 brings feature parity, not necessarily an enhancement.<\/p>\n<p>The fact that IPv6 requires IPsec does mean that it\u2019s available for use on all IPv6 capable devices, which is a step up over IPv4. It does not, however, guarantee the use of IPsec, which is what actually provides security. The responsibility remains with the application developer, the systems administrator, and the end user to actively apply IPsec for authentication and encryption.<\/p>\n<p><em>[Correction 26 January: IPv6 no longer requires IPsec. <a title=\"RFC 6434, section 11: Security\" href=\"https:\/\/tools.ietf.org\/html\/rfc6434#section-11\">Section 11 of RFC 6434<\/a>, which obsoletes RFC 4292 on IPv6 Node Requirements, now states that IPsec SHOULD be supported (vs. the previous MUST). When I speak on this topic I usually point out that IPsec was required when many devices and applications with existing IPv6 support implemented it and that new implementations are still r<a title=\"SHOULD defined, in RFC 2119\" href=\"https:\/\/tools.ietf.org\/html\/rfc2119\">ecommended<\/a> to include IPsec support. These two facts combine to mean that although IPsec is no longer strictly required in every IPv6 node, it is still generally available pretty much everywhere it would be useful. The fact remains:]<\/em><\/p>\n<p>You must actively use IPsec for it to provide any security whatsoever.<\/p>\n<p style=\"padding-left: 30px;\"><strong>Myth: IPv6 Has Security Designed In<\/strong><br \/>\n<strong> Reality: Extension Headers are Designed In<\/strong><\/p>\n<p>In order to make IPv6 as simple and interoperable as possible, it uses a minimalist<a title=\"Introducing IPv6 Headers\" href=\"http:\/\/chrisgrundemann.com\/index.php\/2012\/introducing-ipv6-ipv6-headers\/\"> standard packet header<\/a>. In order to make IPv6 as extensible as possible, it allows \u201cextension headers,\u201d additional chunks of meta-data that can be strung behind the IP header to provide additional features and functionality. IPsec leverages the extension header mechanism to carry necessary authentication and encryption data, for one example.<\/p>\n<p>Unfortunately, having extension headers designed into the protocol for extensibility also means having security flaws designed in along with them.<\/p>\n<p style=\"padding-left: 30px;\"><strong>Myth: IPv6 Has Security Designed In<\/strong><br \/>\n<strong> Reality: Source Routing was Designed In<\/strong><\/p>\n<p>The first example of this is Routing Header Type 0 (RH0), which is an extension header that facilitates source routing. That is, allowing the sender to determine the path the packet takes across the network, rather than allowing the routers to route the packet naturally.<\/p>\n<p>This functionality can be abused. For example you could potentially \u201cprogram\u201d a packet, or a string of packets, to \u201cbounce\u201d back and forth between two routers \u2013 potentially exhausting the available bandwidth on that link. Luckily, this threat was identified and RH0 was deprecated in <a title=\"RFC 5095\" href=\"http:\/\/datatracker.ietf.org\/doc\/rfc5095\/\">RFC 5095<\/a>:<\/p>\n<blockquote><p>The functionality provided by IPv6&#8217;s Type 0 Routing Header can be exploited in order to achieve traffic amplification over a remote path for the purposes of generating denial-of-service traffic.<\/p><\/blockquote>\n<p>Although RH0 has been deprecated, there is always a chance of older or unpatched networking gear being affected by a source routing attack using RH0. Therefor, you should always discard packets using RH0, and any other extension headers that may be deprecated in the future as well.<\/p>\n<p style=\"padding-left: 30px;\"><strong>Myth: IPv6 Has Security Designed In<\/strong><br \/>\n<strong> Reality: The Hop-by-Hop Option Header is Designed In<\/strong><\/p>\n<p>Another potentially problematic extension header is the Hop-by-Hop option header. As the name implies, this header is intended to provide options at every hop along the packet\u2019s path. In other words, every IPv6 node that inspects, routes, or otherwise looks at the IP header must process the Hop-by-Hop option header. Most interestingly, perhaps, is that the Hop-by-Hop option header is generic and is designed to be filled with sub options, or TLVs (Type-Length-Values). These TLVs are unrestricted and unlimited, meaning you can stuff virtually any amount of virtually any data into the Hop-by-Hop option header.<\/p>\n<p>In sum, this means that the Hop-by-Hop option header can be used to pull off an effective low-bandwidth Denial of Service (DoS) attack. The threat is detailed in an expired IETF Internet Draft, \u201c<a title=\"draft-krishnan-ipv6-hopbyhop\" href=\"https:\/\/datatracker.ietf.org\/doc\/draft-krishnan-ipv6-hopbyhop\/\">The case against Hop-by-Hop options<\/a>:\u201d<\/p>\n<blockquote><p>The denial of service attack can be carried out by forming an IP datagram with a large number of TLV encoded options with random option type identifiers in the hop-by-hop options header.<\/p><\/blockquote>\n<p>This extension header has not been deprecated and may have valid uses on your network, so each network will need to deliberately decide how to mitigate this threat. Two popular options are discarding packets with the Hop-by-Hop header and rate-limiting packets with the Hop-by-Hop header, particularly when router CPE usage is high.<\/p>\n<p style=\"padding-left: 30px;\"><strong>Myth: IPv6 Has Security Designed In<\/strong><br \/>\n<strong> Reality: Extension Headers are Vulnerable in General<\/strong><\/p>\n<p>Beyond the two specific extension header types detailed above, there are vulnerabilities that come with using extension headers at all. Stuffing tons of bits into an unnaturally large header, adding multitudes of individual headers to a single packet, and using invalid extension headers are all methods of attack.<\/p>\n<p>Because extension headers are part of the IP packet, they must be identified and dealt with by at least some of the nodes on any IPv6 path. This means that IPv6 routers, firewalls, and other networking devices can have their CPU and memory resources exhausted dealing with malicious extension headers.<\/p>\n<p style=\"padding-left: 30px;\"><strong>Myth: IPv6 Has Security Designed In<\/strong><br \/>\n<strong> Reality: Neighbor Discovery is Vulnerable to LAN Attacks<\/strong><\/p>\n<p>Another one of the major enhancements to IPv6 (beyond address length and header structure) is <a title=\"Introducing Neighbor Discovery and SLAAC\" href=\"http:\/\/chrisgrundemann.com\/index.php\/2012\/introducing-ipv6-neighbor-discovery-slaac\/\">Neighbor Discovery<\/a> (ND). ND basically replaces the smattering of ICMP and ARP used by IPv4 with a more comprehensive, unified approach.<\/p>\n<p>Unfortunately, as you may have guessed, there are some potential vulnerabilities in ND. Due to its trusting, on-net focus, attackers who gain access to a victim\u2019s Local Area Network (LAN) can use ND to attack other hosts on that LAN. Forged ND messages can be used to glean information about other hosts, re-direct traffic, renumber other hosts, and even intercept traffic or launch a man in the middle attack. ND can also be exploited<\/p>\n<p>Rogue Router Advertisements (RAs) have the potential to be particularly problematic. That threat is detailed in <a title=\"RFC 6104\" href=\"https:\/\/datatracker.ietf.org\/doc\/rfc6104\/\">RFC 6104<\/a>:<\/p>\n<blockquote><p>However, unintended misconfigurations by users or administrators, or possibly malicious attacks on the network, may lead to bogus RAs being present, which in turn can cause operational problems for hosts on the network. In this document, we summarise the scenarios in which rogue RAs may be observed and present a list of possible solutions to the problem.<\/p><\/blockquote>\n<p>Your primary defense against most ND based attacks is preventing unauthorized LAN access (and misconfigurations) in the first place.<\/p>\n<p style=\"padding-left: 30px;\"><strong>Myth: IPv6 Has Security Designed In<\/strong><br \/>\n<strong> Reality: Neighbor Discovery is Vulnerable<\/strong><\/p>\n<p>There is another NDP attack that does not necessarily require LAN access (although it makes it much easier). Just like ARP tables in IPv4, IPv6 routers and switches must keep track of LAN hosts. This is all done with NDP in IPv6. The problem arises from the fact that IPv6 networks have many, many more addresses than many switches and routers have NDP entries, so firing off packets with random source and\/or destination addresses can trivially flood many devices\u2019 neighbor cache. This results in a form of DoS on the network under attack.<\/p>\n<p>Because Secure Neighbor Discovery (SeND) is not widely implemented, possible mitigations include using devices that are not vulnerable, blocking the source of the malicious traffic, using subnets smaller than a \/64 (this has it\u2019s own complications currently), and\/or using static NDP entries. Beyond that, we need to demand more NDP configuration knobs from our vendors, to provide more granular control (logging, limiting, policing).<\/p>\n<p style=\"padding-left: 30px;\"><strong>Myth: IPv6 Has Security Designed In<\/strong><br \/>\n<strong> Reality: Many Attacks have Nothing To Do with IP<\/strong><\/p>\n<p>Finally, with all of that said, it is crucial to remember that buffer overflows, database injections, cross-site scripting, phishing, SPAM, DNS amplification, and many more of the most common attacks happen at layers above, or below, the IP layer. In other words, many attacks are completely unaffected by which version of IP you are using.<\/p>\n<p>The bottom line is that securing an IPv6 host or IPv6 network does not happen automagically. It takes the same forethought and diligence required to secure any valuable asset. We\u2019d like to give you a head start in that process with our <a title=\"IPv6 Resources specific to Security\" href=\"http:\/\/www.internetsociety.org\/deploy360\/ipv6\/security\/\">IPv6 security resources<\/a>, part of <a title=\"Deploy360\" href=\"http:\/\/www.internetsociety.org\/deploy360\/\">the Deploy360 portal<\/a>.<\/p>\n<p style=\"text-align: right;\">This post also appears on <a title=\"This post, on the Deploy360 blog\" href=\"http:\/\/wp.me\/p4eijv-5zN\">the Deploy360 blog<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today we continue with part 2 of the 10 part <a href=\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/\"> &#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":2390,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[9,11,12,24,27],"tags":[51,56,208,247,301,339,340,349,357,358,363,364,367,372,463,467,472,474,476,504,602,603],"class_list":["post-2401","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet","category-ipv6","category-ipv6-security-myths","category-security","category-technology","tag-address","tag-addresses","tag-deploy360","tag-extension-header","tag-hop-by-hop","tag-internet-protocol","tag-internet-protocols","tag-introducing-ipv6","tag-ipsec","tag-ipv4","tag-ipv6-deployment","tag-ipv6-header","tag-ipv6-protocol","tag-ipv6-transition-mechanisms","tag-neighbor-discovery","tag-network-architecture","tag-network-protocols","tag-networking","tag-networks","tag-osi-protocols","tag-router","tag-routing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IPv6 Security Myth #2: IPv6 Has Security Designed In ~ Chris Grundemann<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IPv6 Security Myth #2: IPv6 Has Security Designed In ~ Chris Grundemann\" \/>\n<meta property=\"og:description\" content=\"Today we continue with part 2 of the 10 part ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/\" \/>\n<meta property=\"og:site_name\" content=\"Chris Grundemann\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/chris.grundemann\" \/>\n<meta property=\"article:published_time\" content=\"2015-01-20T18:11:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-02-17T23:51:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"654\" \/>\n\t<meta property=\"og:image:height\" content=\"255\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"~Chris\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/ChrisGrundemann\" \/>\n<meta name=\"twitter:site\" content=\"@ChrisGrundemann\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"~Chris\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/\"},\"author\":{\"name\":\"~Chris\",\"@id\":\"https:\/\/chrisgrundemann.com\/#\/schema\/person\/16a6af2797267c7d91f29876d5a0870f\"},\"headline\":\"IPv6 Security Myth #2: IPv6 Has Security Designed In\",\"datePublished\":\"2015-01-20T18:11:53+00:00\",\"dateModified\":\"2015-02-17T23:51:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/\"},\"wordCount\":1558,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/chrisgrundemann.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg\",\"keywords\":[\"Address\",\"Addresses\",\"Deploy360\",\"extension header\",\"Hop-by-Hop\",\"Internet Protocol\",\"Internet protocols\",\"Introducing IPv6\",\"IPsec\",\"IPv4\",\"IPv6 deployment\",\"ipv6 header\",\"ipv6 protocol\",\"IPv6 transition mechanisms\",\"neighbor discovery\",\"Network architecture\",\"Network protocols\",\"networking\",\"Networks\",\"OSI protocols\",\"Router\",\"routing\"],\"articleSection\":[\"Internet\",\"IPv6\",\"IPv6 Security Myths\",\"Security\",\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/\",\"url\":\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/\",\"name\":\"IPv6 Security Myth #2: IPv6 Has Security Designed In ~ Chris Grundemann\",\"isPartOf\":{\"@id\":\"https:\/\/chrisgrundemann.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg\",\"datePublished\":\"2015-01-20T18:11:53+00:00\",\"dateModified\":\"2015-02-17T23:51:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/#primaryimage\",\"url\":\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg\",\"contentUrl\":\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg\",\"width\":654,\"height\":255,\"caption\":\"Security in an IPv6 World\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/chrisgrundemann.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6\",\"item\":\"https:\/\/chrisgrundemann.com\/index.php\/category\/ipv6\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IPv6 Security Myths\",\"item\":\"https:\/\/chrisgrundemann.com\/index.php\/category\/ipv6\/ipv6-security-myths\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"IPv6 Security Myth #2: IPv6 Has Security Designed In\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/chrisgrundemann.com\/#website\",\"url\":\"https:\/\/chrisgrundemann.com\/\",\"name\":\"Chris Grundemann\",\"description\":\"Use technology, marketing, and strategy to take your growing business to the next level.\",\"publisher\":{\"@id\":\"https:\/\/chrisgrundemann.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/chrisgrundemann.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/chrisgrundemann.com\/#organization\",\"name\":\"Grundemann Technology Solutions\",\"url\":\"https:\/\/chrisgrundemann.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png\",\"contentUrl\":\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png\",\"width\":512,\"height\":512,\"caption\":\"Grundemann Technology Solutions\"},\"image\":{\"@id\":\"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/ChrisGrundemann\",\"https:\/\/www.linkedin.com\/company\/grundemann\",\"https:\/\/www.linkedin.com\/in\/cgrundemann\/\",\"https:\/\/www.youtube.com\/channel\/UCJ3Pk4AAVMBG4KCzxYAtExA\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/chrisgrundemann.com\/#\/schema\/person\/16a6af2797267c7d91f29876d5a0870f\",\"name\":\"~Chris\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg\",\"caption\":\"~Chris\"},\"description\":\"Creative|Technologist. Curious. Boisterous. Autotelic Autodidact. Heretic. Hacker. Rider of Boards. Writer of Words. ...Traveler of Time...\",\"sameAs\":[\"https:\/\/chrisgrundemann.com\",\"https:\/\/www.facebook.com\/chris.grundemann\",\"http:\/\/instagram.com\/chrisgrundemann\",\"www.linkedin.com\/in\/cgrundemann\",\"https:\/\/x.com\/https:\/\/twitter.com\/ChrisGrundemann\",\"https:\/\/www.youtube.com\/channel\/UCJ3Pk4AAVMBG4KCzxYAtExA\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IPv6 Security Myth #2: IPv6 Has Security Designed In ~ Chris Grundemann","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/","og_locale":"en_US","og_type":"article","og_title":"IPv6 Security Myth #2: IPv6 Has Security Designed In ~ Chris Grundemann","og_description":"Today we continue with part 2 of the 10 part ...","og_url":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/","og_site_name":"Chris Grundemann","article_author":"https:\/\/www.facebook.com\/chris.grundemann","article_published_time":"2015-01-20T18:11:53+00:00","article_modified_time":"2015-02-17T23:51:32+00:00","og_image":[{"width":654,"height":255,"url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg","type":"image\/jpeg"}],"author":"~Chris","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/ChrisGrundemann","twitter_site":"@ChrisGrundemann","twitter_misc":{"Written by":"~Chris","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/#article","isPartOf":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/"},"author":{"name":"~Chris","@id":"https:\/\/chrisgrundemann.com\/#\/schema\/person\/16a6af2797267c7d91f29876d5a0870f"},"headline":"IPv6 Security Myth #2: IPv6 Has Security Designed In","datePublished":"2015-01-20T18:11:53+00:00","dateModified":"2015-02-17T23:51:32+00:00","mainEntityOfPage":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/"},"wordCount":1558,"commentCount":0,"publisher":{"@id":"https:\/\/chrisgrundemann.com\/#organization"},"image":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/#primaryimage"},"thumbnailUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg","keywords":["Address","Addresses","Deploy360","extension header","Hop-by-Hop","Internet Protocol","Internet protocols","Introducing IPv6","IPsec","IPv4","IPv6 deployment","ipv6 header","ipv6 protocol","IPv6 transition mechanisms","neighbor discovery","Network architecture","Network protocols","networking","Networks","OSI protocols","Router","routing"],"articleSection":["Internet","IPv6","IPv6 Security Myths","Security","Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/","url":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/","name":"IPv6 Security Myth #2: IPv6 Has Security Designed In ~ Chris Grundemann","isPartOf":{"@id":"https:\/\/chrisgrundemann.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/#primaryimage"},"image":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/#primaryimage"},"thumbnailUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg","datePublished":"2015-01-20T18:11:53+00:00","dateModified":"2015-02-17T23:51:32+00:00","breadcrumb":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/#primaryimage","url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg","contentUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg","width":654,"height":255,"caption":"Security in an IPv6 World"},{"@type":"BreadcrumbList","@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/chrisgrundemann.com\/"},{"@type":"ListItem","position":2,"name":"IPv6","item":"https:\/\/chrisgrundemann.com\/index.php\/category\/ipv6\/"},{"@type":"ListItem","position":3,"name":"IPv6 Security Myths","item":"https:\/\/chrisgrundemann.com\/index.php\/category\/ipv6\/ipv6-security-myths\/"},{"@type":"ListItem","position":4,"name":"IPv6 Security Myth #2: IPv6 Has Security Designed In"}]},{"@type":"WebSite","@id":"https:\/\/chrisgrundemann.com\/#website","url":"https:\/\/chrisgrundemann.com\/","name":"Chris Grundemann","description":"Use technology, marketing, and strategy to take your growing business to the next level.","publisher":{"@id":"https:\/\/chrisgrundemann.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/chrisgrundemann.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/chrisgrundemann.com\/#organization","name":"Grundemann Technology Solutions","url":"https:\/\/chrisgrundemann.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/","url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png","contentUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png","width":512,"height":512,"caption":"Grundemann Technology Solutions"},"image":{"@id":"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/ChrisGrundemann","https:\/\/www.linkedin.com\/company\/grundemann","https:\/\/www.linkedin.com\/in\/cgrundemann\/","https:\/\/www.youtube.com\/channel\/UCJ3Pk4AAVMBG4KCzxYAtExA"]},{"@type":"Person","@id":"https:\/\/chrisgrundemann.com\/#\/schema\/person\/16a6af2797267c7d91f29876d5a0870f","name":"~Chris","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg","url":"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg","caption":"~Chris"},"description":"Creative|Technologist. Curious. Boisterous. Autotelic Autodidact. Heretic. Hacker. Rider of Boards. Writer of Words. ...Traveler of Time...","sameAs":["https:\/\/chrisgrundemann.com","https:\/\/www.facebook.com\/chris.grundemann","http:\/\/instagram.com\/chrisgrundemann","www.linkedin.com\/in\/cgrundemann","https:\/\/x.com\/https:\/\/twitter.com\/ChrisGrundemann","https:\/\/www.youtube.com\/channel\/UCJ3Pk4AAVMBG4KCzxYAtExA"]}]}},"jetpack_featured_media_url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg","jetpack_shortlink":"https:\/\/wp.me\/ps8ie-CJ","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/posts\/2401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/comments?post=2401"}],"version-history":[{"count":0,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/posts\/2401\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/media\/2390"}],"wp:attachment":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/media?parent=2401"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/categories?post=2401"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/tags?post=2401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}