Sysadmins need to start looking at the security implicatiosn of IPv6, a security consultant has warned.
For many IT managers, the next version of the Internet Protocol seems like a far-off concern. But the technology will make its way into corporate IT systems sooner than many people realise, forcing IT departments to confront potential security vulnerabilities, Van Hauser, a security consultant and the founder of hacking group The Hacker's Choice, has warned.
Companies need to prepare themselves for IPv6, even if they don't have plans to upgrade their networks, said Hauser as he discussed security vulnerabilities during a presentation at the Hack In The Box Security Conference (HITB) in Kuala Lumpur, Malaysia.
"Most people think there's no IPv6 now, so where's the problem?" Hauser said. "The thing is if you install any Unix operating system now it comes with IPv6 enabled." Microsoft's Vista operating system will also have support for IPv6 enabled.
And that means sysadmins need to be prepared to address security issues in the new protocol. "It has the same vulnerabilites as IPv4. When you thought with IPv6 everything will change in regards to security this is not really the case," Hauser said.
Among the vulnerabilities that IPv6 and IPv4 share is the ability of a hacker to launch a man-in-the-middle attack, Hauser said. In this type of attack, a hacker is able to monitor or insert packets being sent back and forth between two parties, without either one realising that the network link between them has been compromised by a third party.
To secure against vulnerabilities in IPv6, companies must use IPSec on their networks, Hauser said. "If you use IPSec, most of the problems go away," he said. However, even then networks will not be completely secure. "It's not that easy. If you do encryption and authentication, it doesn't mean that security is okay," Hauser said. "It just narrows down the number of people who can do something."
Find your next job with techworld jobs