{"id":3071,"date":"2015-02-10T15:54:07","date_gmt":"2015-02-10T15:54:07","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3071"},"modified":"2020-05-06T10:30:15","modified_gmt":"2020-05-06T17:30:15","slug":"holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\/","title":{"rendered":"Holding IPv6 Neighbor Discovery to a Higher Standard of Security"},"content":{"rendered":"<p>The security of IPv4 is roughly equivalent to IPv6.\u00a0 So why do we expect more from IPv6?<\/p>\n<p>When people embark on learning about IPv6, they are intrigued with how different the IPv6\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/Neighbor_Discovery_Protocol\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Neighbor Discovery Protocol<\/a>\u00a0(NDP) (<a href=\"http:\/\/tools.ietf.org\/html\/rfc4861\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 4861<\/a>) is from the IPv4 Address Resolution Protocol (ARP) that they are already familiar with.\u00a0 For instance, IPv6 uses multicast rather than broadcast (as with IPv4 ) and relies on ICMPv6 for both NDP and Multicast Listener Discovery (MLD). IPv6 NDP has far more functionality than simply binding IPv6 addresses and MAC addresses of local nodes.\u00a0 IPv6 NDP is critical to how nodes obtain their IPv6 addresses, join the network, and send their packets off-net.<\/p>\n<p>When someone starts to learn about IPv6 and NDP, they are commonly introduced to the various security issues and attacks that can take advantage of the vulnerabilities of the protocol.\u00a0 It is trivial to spoof\u00a0<a href=\"\/ipv6-coe\/why-you-must-use-icmpv6-router-advertisements-ras\/\" target=\"_blank\" rel=\"noopener noreferrer\">Router Advertisement<\/a>\u00a0(RA) messages causing hosts to engage IPv6, or to renumber an existing IPv6 network, or even perform a Man-In-The-Middle (MITM) attack.\u00a0 It is also possible to forge Neighbor Solicitation (NS) and Neighbor Advertisement (NA) messages to confuse link-local nodes and corrupt neighbor caches.\u00a0 These problems are well documented in \u201cOperational Neighbor Discovery Problems\u201d (<a href=\"http:\/\/tools.ietf.org\/html\/rfc6583\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 6583<\/a>).\u00a0 These issues are far from new.\u00a0 The industry has been aware of the insecurities in NDP for almost 15 years.<\/p>\n<p>Network and security administrators get really excited about these security vulnerabilities in IPv6 NDP.\u00a0 Their minds start to race thinking about the possibilities this represents for a determined attacker.\u00a0 Some even start to panic and consider halting their IPv6 deployment because of these security issues with NDP.\u00a0 My suggestion is similar to what Douglas Adams might say: \u201c<a href=\"http:\/\/en.wikipedia.org\/wiki\/Phrases_from_The_Hitchhiker%27s_Guide_to_the_Galaxy#Don.27t_Panic\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Don\u2019t Panic<\/a>\u201d.\u00a0 Take a deep breath, learn more about the details of IPv6 and NDP, and then deploy security measures to help mitigate the vulnerabilities.\u00a0 In other words,\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/Keep_Calm_and_Carry_On\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Keep Calm<\/a>\u00a0and IPv6 On!<\/p>\n<p>One important thing to keep in mind is that in order for an attacker to take advantage of the weaknesses in NDP, the attacker must be directly connected to that layer-2 network segment or have taken control over at least one computer on that LAN.\u00a0 That presumes that the attacker is already on the internal network.\u00a0 Typically an attacker who has gained access to an internal network does not want to raise awareness to their presence while they perform reconnaissance and pivot to other systems.\u00a0 The motivation for an attacker to perform DoS attacks or perform maneuvers (such as Rogue RA attacks) is low because these behaviors are easily detectable and leave traces of the attacker\u2019s presence.<\/p>\n<p>In response to these NDP vulnerabilities, much work has been done to monitor and help secure the use of IPv6 NDP.\u00a0 Some of this work to improve the situation has been done by the IETF.\u00a0 The first idea that was developed was the\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/Secure_Neighbor_Discovery\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Secure Neighbor Discovery<\/a>\u00a0(SEND) protocol.\u00a0 Wired and wireless network equipment manufacturers have also developed functions into their products to block and alert on these types of NDP attacks.\u00a0 For example, Cisco has put tremendous effort into their\u00a0<a class=\" bf_ungated_init\" href=\"http:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/ios-nx-os-software\/enterprise-ipv6-solution\/aag_c45-707354.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">First Hop Security<\/a>\u00a0(<a href=\"http:\/\/docwiki.cisco.com\/wiki\/FHS\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">FHS<\/a>) measures implemented in switches, routers, and wireless LAN controllers to help secure IPv6 nodes.<\/p>\n<p>The\u00a0<a href=\"\/ipv6-coe\/why-you-must-use-icmpv6-router-advertisements-ras\/\" target=\"_blank\" rel=\"noopener noreferrer\">Router Advertisement<\/a>\u00a0(RA) is an important part of how an IPv6-capable node will join an IPv6 network. It\u2019s also a well-known and popular IPv6 weakness.\u00a0 The IETF RFC titled \u201cRogue IPv6 Router Advertisement Problem Statement\u201d (<a href=\"http:\/\/tools.ietf.org\/html\/rfc6104\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 6104<\/a>) describes how an attacker can generate crafted RA messages to disrupt a LAN or gain an MITM position.\u00a0 In response to this problem, the IETF worked on IPv6 Router Advertisement Guard (RA Guard) (<a href=\"http:\/\/tools.ietf.org\/html\/rfc6105\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 6105<\/a>) as a technique within Ethernet switches and other network devices to permit only the legitimate RAs from the local IPv6 router to be forwarded.\u00a0 RA guard will then block any other RA packets originating from any downstream node on the LAN.\u00a0 The IETF has continued their work on the subject by publishing \u201cImplementation Advice for IPv6 Router Advertisement Guard (RA-Guard)\u201d (<a href=\"http:\/\/tools.ietf.org\/html\/rfc7113\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 7113<\/a>).\u00a0 Other improvements have come in the form of limiting fragmentation of NDP messages, outlined in \u201cSecurity Implications of IPv6 Fragmentation with IPv6 Neighbor Discovery\u201d (<a href=\"http:\/\/tools.ietf.org\/html\/rfc6980\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC 6980<\/a>).<\/p>\n<p>This same technique can be implemented by\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/Cable_modem_termination_system\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Cable Modem Termination Systems<\/a>\u00a0(CMTSs), Wireless LAN Controllers (<a href=\"http:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/wireless\/controller\/technotes\/8-0\/IPV6_DG.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">WLCs<\/a>), or simply as a software application running on a node on the LAN.\u00a0 There are many software tools that can help detect rogue RA messages and detect NDP funny business. These tools include\u00a0<a href=\"http:\/\/ndpmon.sourceforge.net\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">NDPMon<\/a>,\u00a0<a href=\"http:\/\/ramond.sourceforge.net\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ramond<\/a>,\u00a0<a href=\"https:\/\/github.com\/kame\/kame\/tree\/master\/kame\/kame\/rafixd\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Kame rafixd<\/a>,\u00a0<a href=\"https:\/\/github.com\/chenjj\/ipv6-attack-detector\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">6Guard<\/a>,\u00a0<a href=\"https:\/\/github.com\/fln\/addrwatch\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">addrwatch<\/a>,\u00a0<a href=\"http:\/\/www.digriz.org.uk\/slaacer\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">SLAACer<\/a>, and\u00a0<a href=\"https:\/\/6mon.iit.cnr.it\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">6MoN<\/a>.\u00a0 This is a long list of tools that are aimed at helping organizations gain visibility into, and awareness of, inappropriate NDP and RA messages on a LAN.\u00a0 Judging by the length of this list, there is significant interest in this topic.<\/p>\n<p>People sometimes get the impression that IPv6 is inherently more secure than IPv4.\u00a0 This has to do with the fact that\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/IPsec\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">IPsec<\/a>\u00a0was developed around the concept of IPv6 and its extension header convention.\u00a0 Authentication Headers (AH) and Encapsulating Security Payload (ESP) were originally conceived with IPv6\u2019s header structure in mind.\u00a0 The inclusion of IPsec within the protocol specification has led many to assume that all IPv6 communications must use IPsec, which is not the case.\u00a0 IPsec was also applied to IPv4.\u00a0 However, due to the extensive use of NAT in IPv4 networks, AH is not used as often. Instead, ESP with ESP-HMAC and NAT Traversal is more common.\u00a0 One could argue that IPsec connections using both AH and ESP with IPv6 and global addresses is more secure than IPsec used with IPv4, ESP-only and NAT.<\/p>\n<p>We should remind ourselves that both IPv4 and IPv6 are not intended to provide a secure network-layer transport service.\u00a0 Security is typically left to the lower layers or to the upper layers of the\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/OSI_model\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">OSI model<\/a>.\u00a0 The security of IPv4 and IPv6 are equivalent and should be secured equally.\u00a0 A knowledgeable attacker will try to leverage whichever protocol is least protected.\u00a0 The weakest link in the chain is the one that is most likely to break.\u00a0 All things being equal, the attacker will target the protocol that has not been defended properly.<\/p>\n<p>While we are focused on improving the security of IPv6, we should remind ourselves that it is important to secure IPv4, too.\u00a0 In fact, securing IPv4 is probably\u00a0<em>more\u00a0<\/em>urgent because it is the protocol that is ubiquitously deployed in our current production network environments.\u00a0\u00a0 While we consider the vulnerabilities in IPv6, we should remember that IPv4\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/Address_Resolution_Protocol\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ARP<\/a>\u00a0has many of the same insecurities.\u00a0 Chapter 6 of \u201c<a href=\"http:\/\/www.ciscopress.com\/store\/lan-switch-security-what-hackers-know-about-your-switches-9781587052569\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">LAN Switch Security: What Hackers Know About Your Switches<\/a>\u201d by Eric Vyncke and Christopher Paggen has a full description of the security weaknesses in ARP.\u00a0\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/ARP_spoofing\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ARP spoofing<\/a>\u00a0can be used to DoS a local LAN, perform an MITM attack, overload a switch\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/Content-addressable_memory\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CAM<\/a>\u00a0table and sniff traffic, and confuse nodes and disrupt traffic flow.\u00a0 Again, these attacks presume that the attacker is on-net or has already compromised a computer on the local segment.<\/p>\n<p>The startling fact is that most organizations have not taken any steps to secure their IPv4 ARP usage.\u00a0 There are several IPv4 LAN security techniques that are not being widely used today.\u00a0 For example, most IPv4 networks are not using Dynamic ARP Inspection (DAI) as a method to detect, stop or rate-limit ARP attacks.\u00a0 DAI is available on traditional Cisco\u00a0<a href=\"http:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/switches\/lan\/catalyst6500\/ios\/12-2SX\/configuration\/guide\/book\/dynarp.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">IOS LAN switches<\/a>\u00a0and\u00a0<a href=\"http:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/switches\/datacenter\/sw\/4_1\/nx-os\/security\/configuration\/guide\/sec_nx-os-cfg\/sec_arpinspect.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Nexus NX-OS switches<\/a>.\u00a0 DHCP Snooping is a method of detecting a stopping rogue DHCP servers, but few networks leverage this feature, already available with their\u00a0<a href=\"http:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/switches\/lan\/catalyst6500\/ios\/12-2SX\/configuration\/guide\/book\/snoodhcp.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Cisco IOS switches<\/a>\u00a0or\u00a0<a href=\"http:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/switches\/datacenter\/sw\/4_1\/nx-os\/security\/configuration\/guide\/sec_nx-os-cfg\/sec_dhcpsnoop.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">NX-OS switches<\/a>.\u00a0\u00a0<a href=\"http:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/switches\/lan\/catalyst6500\/ios\/12-2SY\/configuration\/guide\/sy_swcg\/ip_source_guard.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">IP Source Guard<\/a>\u00a0is a technique that can be used in conjunction with DHCP snooping to prevent nodes from sending traffic from any address other than the one assigned by the legitimate DHCP server.\u00a0 Even fewer organizations are using Unicast Reverse Path Forwarding (<a href=\"http:\/\/en.wikipedia.org\/wiki\/Reverse_path_forwarding\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RPF<\/a>) for their IPv4 networks.\u00a0 This is a best practice (<a href=\"http:\/\/tools.ietf.org\/html\/rfc3704\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">BCP 84<\/a>) for IPv4 networks and IPv6 networks alike.\u00a0 While you are deploying Unicast RPF for IPv6, why not deploy it similarly for IPv4 so that you have equal security protections for both protocols?<\/p>\n<p>There are also several LAN switch security techniques that can be applied to networks running IPv4 or IPv6.\u00a0 The benefits of these methods is that they can provide security for both protocols at the same time.\u00a0\u00a0<a href=\"http:\/\/www.cisco.com\/c\/en\/us\/tech\/lan-switching\/private-vlans-pvlans-promiscuous-isolated-community\/index.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Private VLANs<\/a>\u00a0can be used to lock down a LAN segment that requires extra protections.\u00a0 IEEE\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/IEEE_802.1X\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">802.1X<\/a>\u00a0can authenticate nodes joining a network with Extensible Authentication Protocol (EAP), assigning the node to the proper VLAN or restricting the node\u2019s communication in other ways.\u00a0\u00a0<a href=\"http:\/\/www.cisco.com\/c\/en\/us\/solutions\/enterprise-networks\/trustsec\/index.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Cisco TrustSec<\/a>\u00a0(CTS) or IEEE\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/IEEE_802.1AE\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">802.1AE MACsec<\/a>\u00a0are methods of providing authentication, authorization and confidentiality to communications on a LAN.<\/p>\n<p>People should not fear the less-familiar IPv6 protocol. \u00a0They should educate themselves about the weaknesses in IPv6 and remember the weaknesses in IPv4.\u00a0 Once they know more, then they can start to form a strategy to protect both protocols equally.\u00a0 \u00a0\u00a0People who have not taken basic steps to secure their vulnerable IPv4 implementations should not be overly concerned about the IPv6 NDP security vulnerabilities.\u00a0 They should not criticize IPv6 if they have not done their due diligence by first protecting their production IPv4 networks.\u00a0 Many network and security administrators sleep soundly while ignoring the fact that they have vulnerabilities in their IPv4 LANs, but then the next night are restless thinking about the vulnerabilities in IPv6.\u00a0 As we move forward with deploying IPv6 over the coming years, we should do so by leveraging the available techniques to secure NDP and RA messages.\u00a0 Along the way we should also shore up our IPv4 networks and strive for equal protections for both protocols.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The security of IPv4 is roughly equivalent to IPv6.\u00a0 So why do we expect more from IPv6? When people embark on learning about IPv6, they are intrigued with how different the IPv6\u00a0Neighbor Discovery Protocol\u00a0(NDP) (RFC 4861) is from the IPv4 Address Resolution Protocol (ARP) that they are already familiar with.\u00a0 For instance, IPv6 uses multicast [&hellip;]<\/p>\n","protected":false},"author":321,"featured_media":2788,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17],"tags":[16,38,15],"class_list":{"0":"post-3071","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ipv6-coe","8":"tag-infoblox","9":"tag-ipv6","10":"tag-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Holding IPv6 Neighbor Discovery to a Higher Standard of Security<\/title>\n<meta name=\"description\" content=\"The security of IPv4 is roughly equivalent to IPv6. So why do we expect more from IPv6?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Holding IPv6 Neighbor Discovery to a Higher Standard of Security\" \/>\n<meta property=\"og:description\" content=\"The security of IPv4 is roughly equivalent to IPv6. So why do we expect more from IPv6?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-10T15:54:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Scott Hogg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Hogg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\\\/\"},\"author\":{\"name\":\"Scott Hogg\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\"},\"headline\":\"Holding IPv6 Neighbor Discovery to a Higher Standard of Security\",\"datePublished\":\"2015-02-10T15:54:07+00:00\",\"dateModified\":\"2020-05-06T17:30:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\\\/\"},\"wordCount\":1605,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\",\"keywords\":[\"Infoblox\",\"IPv6\",\"Security\"],\"articleSection\":[\"IPv6 CoE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\\\/\",\"name\":\"Holding IPv6 Neighbor Discovery to a Higher Standard of Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\",\"datePublished\":\"2015-02-10T15:54:07+00:00\",\"dateModified\":\"2020-05-06T17:30:15+00:00\",\"description\":\"The security of IPv4 is roughly equivalent to IPv6. So why do we expect more from IPv6?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\",\"width\":660,\"height\":454,\"caption\":\"3 Ways to Ruin Your Future Network with IPv6 Unique Local Addresses (Part 2 of 2)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6 CoE\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/ipv6-coe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Holding IPv6 Neighbor Discovery to a Higher Standard of Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\",\"name\":\"Scott Hogg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"caption\":\"Scott Hogg\"},\"description\":\"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.\",\"sameAs\":[\"https:\\\/\\\/hexabuild.io\"],\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/scott-hogg\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Holding IPv6 Neighbor Discovery to a Higher Standard of Security","description":"The security of IPv4 is roughly equivalent to IPv6. So why do we expect more from IPv6?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\/","og_locale":"en_US","og_type":"article","og_title":"Holding IPv6 Neighbor Discovery to a Higher Standard of Security","og_description":"The security of IPv4 is roughly equivalent to IPv6. So why do we expect more from IPv6?","og_url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\/","og_site_name":"Infoblox Blog","article_published_time":"2015-02-10T15:54:07+00:00","article_modified_time":"2020-05-06T17:30:15+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","type":"image\/jpeg"}],"author":"Scott Hogg","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Scott Hogg","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\/"},"author":{"name":"Scott Hogg","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c"},"headline":"Holding IPv6 Neighbor Discovery to a Higher Standard of Security","datePublished":"2015-02-10T15:54:07+00:00","dateModified":"2020-05-06T17:30:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\/"},"wordCount":1605,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","keywords":["Infoblox","IPv6","Security"],"articleSection":["IPv6 CoE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\/","url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\/","name":"Holding IPv6 Neighbor Discovery to a Higher Standard of Security","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","datePublished":"2015-02-10T15:54:07+00:00","dateModified":"2020-05-06T17:30:15+00:00","description":"The security of IPv4 is roughly equivalent to IPv6. So why do we expect more from IPv6?","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/ipv6-coe\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","width":660,"height":454,"caption":"3 Ways to Ruin Your Future Network with IPv6 Unique Local Addresses (Part 2 of 2)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IPv6 CoE","item":"https:\/\/www.infoblox.com\/blog\/category\/ipv6-coe\/"},{"@type":"ListItem","position":3,"name":"Holding IPv6 Neighbor Discovery to a Higher Standard of Security"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c","name":"Scott Hogg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","caption":"Scott Hogg"},"description":"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.","sameAs":["https:\/\/hexabuild.io"],"url":"https:\/\/www.infoblox.com\/blog\/author\/scott-hogg\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3071","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/321"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3071"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3071\/revisions"}],"predecessor-version":[{"id":3780,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3071\/revisions\/3780"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2788"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}