Taking control of IPv6

 

Connecting state and local government leaders

Agencies must learn to leverage ' and manage ' the wealth of IP addresses that come with the new set of Internet protocols.

THE ARRIVAL of IPv6 will eventually give agencies better security, more flexible networking and a number of available IP addresses so large it can make your head hurt just trying to grasp how many there will be. But how well agencies take advantage of IPv6 will depend in large part on how well administrators manage their newfound wealth of IP address spaces, experts say.By the end of June, the Office of Management and Budget expects agencies to have their network backbones ready to carry IPv6 traffic in addition to IPv4 traffic.Nobody is yet requiring that agencies use IPv6, but agencies have begun acquiring address space in the new protocols and are making plans for taking advantage of the improved security and networking capabilities.Management will be critical.'It is going to be a long cycle for people to swap out the IPv4 technology' now standard in their networks, said Richard Hyatt, chief technology officer at BlueCat Networks.'It is going to be the management of the address space that determines how quickly it happens.'Management can be a challenge because IPv6 addresses are larger than IPv4 addresses and there are exponentially more of them.As IPv4 addresses start running short, the abundance of new addresses will be a good thing. But administrators will have to resist the temptation to use the new addresses the same way they have used the current generation, said Chip Popoviciu, IPv6 address management expert at Cisco Systems.'We need to be mindful that this is a large resource, and we need to manage it properly,' Popoviciu said.How large a resource are we talking about? 'With IPv6, one subnet is as large as the entire Internet is today,' said Sean Siler, Microsoft's IPv6 program manager. And each agency will have tens of thousands of subnets.'It's a huge shift in paradigm.'The large number of addresses is because IPv6 addresses are 128 bits long. The last 64 bits are used to assign the address to a particular device or function rather than a network, but the networking portion still is large enough to provide an almost inexhaustible supply of numbers.Address groups are described in terms of a slash-number, written as '/number.' The smaller the slash-number, the larger the group of addresses.'The general size of an address allocation is a /48,' said Richard Jimmerson, chief information officer at the American Registry for Internet Numbers (ARIN). That size allocation includes 65,536 /64 subnets. A /32 address allocation would contain 4 billion subnets.ARIN is one of five Regional Internet Registries charged with allocating IP addresses.ARIN serves the United States, Canada, Mexico, much of the Caribbean and the North Atlantic islands. There are separate registries for Africa, the Asia-Pacific region, Latin America, and the region covering Europe, the Middle East and Central Asia. The registries have been issuing IPv6 addresses since 1999. The Euro-Asian registry has been the most active, having allocated 980 address blocks as of January, followed by the Asia-Pacific registry with 515. ARIN has assigned 386 blocks in North America.Each regional registry sets its own policies for distributing addresses. The Euro-Asian registry has a hierarchical scheme in which address blocks are assigned to local registries, which in turn distribute them to large network users. ARIN has a flatter scheme, intended to make it simpler for users to get addresses directly from the regional registry.'They decided to make acquisition easier,' Jimmerson said. 'With IPv6, the biggest concern was getting the address space into the hands of the people using it.'In May, ARIN's board of trustees issued a resolution on IP numbering availability, stating that IPv4 address space was nearing its end and advising 'the Internet community that migration to IPv6 number resources is necessary for any applications which require ongoing availability from ARIN of contiguous IP number resources.'U.S. government policy calls for agencies to get their address space directly from ARIN, and Jimmerson said 30 agencies have acquired address space so far, typically a /48 allocation.'There has been a good amount of activity' by government agencies, he said. In addition to getting their addresses, they have been attending the numerous informational meetings and conferences held in the Washington area on the IPv6 transition.After they acquire the addresses, the next question they face is how to divvy them up.'With IPv4, you had to be careful about allocating addresses in a network,' he said. 'With IPv6, you have less to worry about.'There is less worry about running out of addresses.But there still is a lot to consider. If addressing schemes are not built with an eye to the geography and architecture of a network and how it will use IPv6, administrators might waste network resources with unnecessarily complex routing tables requiring additional routers and slowing throughput.Most IPv4 addressing schemes were built ad hoc as the Internet and other IP networks grew, with little thought given to an overall architecture.Available address space was smaller and more easily managed, but this make-it-up-as-you-go process means that administrators are wrestling with inelegant network designs. 'We have an opportunity to build a clean addressing scheme that will let us simplify how we manage networks,' Popoviciu said. Administrators should resist the urge to simply plug IPv6 allocations into IPv4 addressing schemes, and this will require educating administrators.'Education is the long pole in this tent,' said Dave West, Cisco's global lead for IPv6.'It is absolutely critical. They are slowly but surely coming to the realization that they need to step back and think about this.'Managing IPv6 addresses is not rocket science, said Steve Grobman, director of business client architecture at Intel.'The management differences are real,' he said, 'but I don't think they are that different from the other transitions IT has gone through,' such as the introduction of TCP/IP and wireless communications into networks. Like a true hardware man, Grobman said, 'The good news is that most of the challenges are going to be on the software side.'Most operating systems and networking hardware already have a basic ability to handle IPv6. OMB's position on the transition has been that agencies could achieve this capability through routine upgrades of technology, without a major capital expense. To begin using IPv6 addresses, agencies will need Dynamic Host Configuration Protocol Version 6 servers and Domain Name System servers capable of handling IPv6 records.The DHCP provides configuration settings to network devices so they can be located on the network. If the autoconfiguration capability of IPv6 is used, no DHCP server will be needed.But if you choose to manage your own addresses, there are DHCPv6 servers available to allow this. There is a debate over the merits of stateful ' or managed ' addressing using DHCP, and stateless addressing using autoconfiguration.'Many administrators don't want hosts managing themselves,' Siler said. 'But there is a time and a place for both' stateful and stateless addressing.One of the advantages and problems with autoconfiguration is that it opens up the network to outside visibility, enabling flexible, dynamic configurations and peer-to-peer networking. There may be a temptation to use this to ease management burdens, 'but the problem is that a lot of people are going to expose a lot more information than they intended,' Hyatt said.For this reason, Siler said he believes that stateless addressing will not be used widely in managed enterprises as IPv6 is implemented.The more managed allocation of addresses using DHCP will be a better fit with existing security models.But IP addresses are too easily spoofed to be good security identifiers. As large numbers of new devices are added to networks and as security policies and tools are adapted to IPv6, DHCP will become less necessary.'As time goes by, I believe that stateless addressing will start to be introduced into the enterprise,' Siler said. 'It will come very slowly, but it will come.'The question of Network Address Translation still remains to be answered. NAT has been used to extend the more limited IPv4 address space by enabling the use of private addresses inside a network. But it also has the effect of putting another wall between your internal network and prying eyes on the outside. NAT may not be necessary on an IPv6 network. 'But if you remove it, you are beginning to expose what your network looks like,' Hyatt said. 'It might not be that great when you come to think of it.'However, the sheer size of the IPv6 address space might help mitigate the problem of visibility by providing room to hide. With IPv4, a typical subnet has about 254 hosts, Siler said.'That's the number most people work with,' and that size defines the number of servers, firewalls, routers and other devices on the subnet and where they are deployed. For convenience sake, most administrators probably will stick to that model, he said. But they will be distributing those hosts through a vastly larger subnet.Assigned addresses can be clustered closely together for easier management, or they can be distributed widely through a 4-billion-address subnet, effectively hiding them from outside scans. This can be a security asset, but it also can make devices harder for administrators to find.Managed devices can be located on a network, but unmanaged and mobile devices can easily be lost in this space, putting a premium on a good addressing scheme and good record-keeping.Tracking addresses and their users will generate a lot of data to be managed, Hyatt said. 'It's going to create a real problem, keeping and using those amounts of data.''An important consideration is top-down addressing,' Siler said. 'It is going to be important for one person to get a large address block and to suballocate it to other organizations within the department' to facilitate this record-keeping. This also can enable simpler routing tables, which will allow more efficient routing, improved security and easier network monitoring. A fragmented routing table slows throughput.And finally, IPv6 will have to be managed alongside IPv4 as long as both protocols continue to be used on the same networks.'It's more overhead until we can get rid of IPv4, and that's not going to be in the near future,' Siler said.The opportunities for new applications, efficiencies and flexibility offered by IPv6 will make it worth our while to address these issues, Popoviciu said. 'After all, we did this for the addressing,' he said. 'Why not make sure we do it right, now that we have the addresses in hand?'XXXSPLITXXX-IPv6, or Internet Protocol version 6, is the 'next generation' version of IPv4, the venerable networking standard that has increasingly driven the Internet since 1980. It's the true follow-on to IPv4 since IPv5 was nominally the designation for The Internet Stream Protocol that was first suggested in the late 1970s for experimental transmission of voice, video and distributed simulation.Technically, IPv6 differs mainly by using a 128-bit address space, four times that of IPv4. Other differences are allowance for universal plug and play, support for multiple forms of multicast and for anycast, inherent use of IPsec security protocols, and significantly better scalability.Though the IPv6 address space is only four times that of IPv4, it means the number of available unique IPv6 Internet addresses ' which define where systems and devices are on the network and how data packets get from one place to another ' totals 3.4 x 1038 (or 10 to the 38th power).The 4 billion addresses available under IPv4 could be completely consumed in the next several years. With IPv6, however, each person on Earth could theoretically have 50 octillion, or 5 x 1028, unique addresses.Exactly how many addresses are actually available is open to interpretation, however, since the first 64 bits of the 128-bit address space is reserved for network routing.The Defense Department, for example, has acquired a /16 (slash 16) Block address. That means 16 of the leftover bits go for externally reachable routing, and the other 48 bits for subnets, though each subnet can have its own 64-bit address space. The DOD's /16 gives it 'just' 281 trillion network addresses and, theoretically, 18.45 quintillion (18.45 x 1018) host addresses.IPv6 allows for end-to-end connectivity across the network, much greater mobility for network users and auto configuration of all IPv6-enabled devices connected to the network.The DOD's vision of the networked warrior and its goals for net-centric warfare, for example, would not be possible without IPv6.The protocol's use of longer addresses and optimized message headers will also allow users to specify just what function a device plays on the network, allowing for different quality-of-service for certain kinds of traffic and so boosting the operation of services such as voice over IP and videoconferencing.IPv6 adoption probably won't be driven by particular applications, though the overall move to converged, handheld devices and the increasing needs of mobile computing should be major incentives for the increased use of IPv6.That said, IPv6 should spawn some petty nifty apps. The peer-to-peer networking possible with IPv6, without the need for servers in between, could rewrite the notion of networked collaboration, for example. It should also provide for tighter control of networked devices.It will also mean lighter weight applications, and the chance to eliminate some of the network hardware that now performs some of the functions that will be included in these new applications.In the short-term, as agencies are transitioning to IPv6, security might be of more concern since a dual stack approach ' having both IPv4 and IPv6 active on the network at the same time ' will likely be the preferred approach, and the appropriate security for each version of the protocol has to be managed.Tunneling, as a way to encapsulate IPv6 packets for transport across an IPv4 network, is already popular as a relatively cheap way to provide dual IPv4/IPv6 capability, but it also introduces security issues. Unknown tunnels could be opened, which introduces a security risk, so policies have to be developed to determine who can use tunneling, and for what purpose.That said, IPsec is included in IPv6 as the default security scheme. As it operates at the network layer of the protocol stack it is independent of the applications and services that run over the network, and so is considered more flexible than other popular security such as SSL. It also provides for data encryption.If IPsec is turned on, IPv6 capable security devices such as firewalls and intrusion detection systems will automatically configure themselves with an IPv6 address.To some extent it's already here. Microsoft's Windows Vista operating system is IPv6 enabled by default, other operating systems support IPv6, and more and more devices are IPv6 capable. Telecom companies' backbone networks are all IPv6 ready, and some of those are carrying IPv6 traffic now.However, there were very few active IPv6 nodes on the Internet at the beginning of 2008. There are not many applications that require it and until there is, or until the number of IPv4 addresses wilts completely, both private companies and government agencies have little incentive to turn to IPv6 for their networking needs.Federal government agencies have until June of 2008 to make sure their backbone networks are capable of carrying IPv6 traffic, but that doesn't mean they will have to at that time.The Office of Management and Budget said in 2005 it would require federal agency networks to be IPv6 capable by June 2008. At the time only the Defense Department had made serious efforts to prepare for IPv6, according to a Government Accountability Office report, and most others had not inventoried IPv6 software and equipment, or had developed business cases or cost estimates.By the end of 2007, most agencies were seen as having made some progress toward IPv6, though the level of progress differed widely. Some were well into implementing their plans and had begun the move, some were still considering the best way to make the transition.Where practical, OMB requires agencies to only buy equipment and software that is IPv6 compliant. A written waiver is required for any other procurement. Where it isn't compliant, it has to be adapted for IPv6 by the June 2008 deadline.Federal standards agencies are generally well advanced in developing the necessary guidance for agencies making the move to IPv6. Early in 2008 the National Institute of Standards and Technology released its latest draft of proposed standards for IPv6 networking and security products. The National Security Agency in 2007 started development of software to make sure IPv6 was secure enough to be used on classified networks.Both the DOD and intelligence agencies are planning to move at least their classified networks to IPv6 by 2010.The next deadline is June 30, 2008. By then, all agencies should have completed their transition to IPv6 on their backbone networks, and all other agency networks should be able to interface with them.Before then, deadlines set by the Office of Management and Budget were:Microsoft made IPv6 the preferred network protocol in its latest operating system, Windows Vista, and committed to making all of its enterprise applications IPv6-ready out of the box.To allow its customers to use IPv6 it included Teredo, a protocol that allows dual stack IPv6/IPv4 nodes to pass IPv6 traffic to each other by tunneling through Network Address Translation (NAT) devices and across non IPv6 enabled local networks.NAT's are used on the Internet as a way of artificially expanding the IPv4 address space by translating the address and port numbers of traffic to and from private network hosts that use IPv4 addresses.However, some observers have noted that, although Teredo is designed to be used as the IPv6 provider of last resort, it's typically used more often than recommended leaving computers open to attack from the outside since it can bypass regular security controls.Workarounds include making security devices specifically aware of Teredo packets so they can inspect them, or blocking them completely and relying on native IPv6 traffic only.XXXSPLITXXX-Today, faced with the exhaustion of IPv4 address space within five to 15 years, we are turning to a new generation of protocols and a new addressing scheme to fill our seemingly insatiable desire for more and better networks and devices.What happened to all of those old addresses? Were they squandered? Common estimates put the efficiency of address usage at 25 percent to 50 percent, which would mean that as many as 50 percent or 75 percent of available IPv4 addresses remain unused, sitting idly in sparsely populated subnets within the allocations of early adopters.That's probably not so, said Richard Jimmerson, chief information officer at the American Registry for Internet Numbers, one of five Regional Internet Registries responsible for doling out address space. 'A lot of address space is in use inside networks that is not announced on Internet routing tables, for one reason or another,' he said.These addresses sit, not necessarily idle, behind firewalls and are not reachable from the Internet. The U.S. government has entire secret networks that are not announced, Jimmerson said. 'That's a large amount of address space.'Of course, the original IPv4 addresses were not evenly distributed, forcing users in Asia and Europe to turn to IPv6 earlier than those of us in address-rich North America.Some of this inequity has been mitigated by tools, such as Network Address Translation, which have helped stretch available space. But on the whole, we have done a pretty good job of managing the original 4 billion addresses available through IPv4, Jimmerson said. 'We have to be approaching 4 billion devices on the Internet now.'

As the June deadline for having a backbone for the next-generation Internet protocol approaches, Government Computer News and its affiliate publications, Federal Computer Week and Washington Technology assess where agencies are in meeting the goal.



Click here for 360-degree news coverage of IPv6.



Know your IPv6?



For the lowdown on what IPv6 is and what it can do for you, check out our IPv6 FAQ at GCN.com/953.



Maxine Lunn, research director at 1105 Government Information Group, conducted surveys on agencies' and vendors' IPv6 awareness and readiness. Watch her discuss the results here.























































Clean slate





























Room to hide




















What is IPv6?





What ever happened to IPv5?

What does IPv6 mean for address space?









Bitten by IPv6

What can IPv6 do for you?













Ask not what you can do for IPv6, but rather what IPv6 can do for you

A new kind of protocol


The means to end-to-end

How does IPv6 do for security?









IPv6 security: The forgotten element

Hackers are ready for IPv6'are you?

When will IPv6 arrive?







Getting ready for IPv6? It's already here

How does IPv6 affect you now?











The answer is: 'IPv.what?'

NSA ponies up to secure IPv6


Latest draft of federal IPv6 profile released for comment

What are the IPv6 deadlines?




  • By June 30, 2006 agencies should have completed an inventory of IP-aware applications and peripherals that depend on the backbone network, along with an IPv6 transition impact analysis.
  • By February 28, 2006, agencies should have developed backbone transition plans.
  • By November 15, 2008, agencies had to identify who would lead their IPv6 transitions, and had to have completed an inventory of IP-aware devices in the backbone.

OMB details milestones to move to IPv6

Agencies, start your protocols!

Office of Management and Budget IPv6 directive

How is Microsoft handling Vista?











IPv6 tunneling in Vista ' a new area of concern

Many unknowns remain in move to IPv6
When IPv4 was adopted, 4 billion sounded like an awful lot of IP addresses.












NEXT STORY: IPv6 profile takes the long view

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.