{"id":678,"date":"2018-04-02T18:51:11","date_gmt":"2018-04-02T18:51:11","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=678"},"modified":"2022-10-19T16:18:35","modified_gmt":"2022-10-19T23:18:35","slug":"ipv6-ddos-and-protection-measures","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-ddos-and-protection-measures\/","title":{"rendered":"IPv6 DDoS and Protection Measures"},"content":{"rendered":"<h2 id=\"toc-hId--1333278476\">DDoS Happens!<\/h2>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Denial-of-service_attack\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Denial of Service<\/a>\u00a0(DoS) attacks are malicious acts that prevent the utilization of an IT system.\u00a0 The attack can be a single \u201csilver bullet\u201d packet sent to a system that disrupts a service and crashes it.\u00a0 Other DoS attacks can involve an attacker gaining access to the target system, taking control of it and shutting it down.\u00a0 DoS attacks can also manifest with transmitting a deluge of packets or opening many connections to a target system, overwhelming it to the point of saturating its capacity and consuming all its available resources, thus rendering it unusable.<\/p>\n<p>The source of a DoS attack can be a geographically diverse set of traffic originators all sending packets to a single target.\u00a0 This is known as a\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Denial-of-service_attack#Distributed_attack\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Distributed Denial of Service<\/a>\u00a0(DDoS) attack.\u00a0David Dittrich\u00a0<a href=\"https:\/\/twitter.com\/davedittrich\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">(@davedittrich<\/a>) at the University of Washington Tacoma was one of the first to\u00a0discover DDoS attacks,\u00a0uncovering the\u00a0Stacheldraht attack tool in 1999.\u00a0 Ever since those early days of DDoS research, these types of attacks have continued to increase and metamorphose over the years.\u00a0 If you\u2019re interested in the evolution of DDoS, please review the presentation by Merike Kaeo from Farsight Security on \u201c<a class=\" bf_ungated_init\" href=\"https:\/\/www.nanog.org\/sites\/default\/files\/1_Kaeo_Ddos_Trends.pdf\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">DDoS History, Trends, Call for Action<\/a>,\u201d which she delivered at NANOG70.<\/p>\n<h2 id=\"toc-hId--445774795\">DDoS Traffic Packet Types<\/h2>\n<p>DDoS attacks are typically asymmetric, in that the source address of the packets are from spoofed addresses so the return traffic does not return to the transmitter.\u00a0 The source address can also be spoofed to appear to be from a victim system, such that the resulting reflected response traffic overwhelms the spoofed destination address.\u00a0 DDoS attacks can be volumetric floods of massive amounts of layer 3 and 4 or layer 7 attack traffic.\u00a0 DDoS attacks can consume CPU or memory resources or IP address pool resources in the victim\u2019s system, rendering it unusable.\u00a0 DDoS attacks can also take advantage of connection timeouts or session-state timers to bog down application servers.\u00a0 DDoS attacks can also target software vulnerabilities using specifically crafted packets.\u00a0 There are a wide\u00a0<a href=\"https:\/\/www.corero.com\/resources\/glossary.html\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">variety of packet types<\/a>\u00a0that comprise most DDoS attacks, including, but not limited to:<\/p>\n<ul>\n<li>ICMP packet floods<\/li>\n<li>UDP fragments<\/li>\n<li>TCP SYN\/ACK\/RST floods<\/li>\n<li>CharGEN floods<\/li>\n<li>NTP reflection floods<\/li>\n<li>DNS reflection floods<\/li>\n<li>SSDP reflection floods<\/li>\n<li>CLDAP reflection floods<\/li>\n<\/ul>\n<p>The types of packets that attackers generate can vary from year to year or day to day depending on which method may be the most detrimental to the victim.\u00a0 In recent years,\u00a0<a href=\"\/security\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">NTP<\/a>\u00a0and DNS reflection DDoS attacks have been prevalent.\u00a0 There are documented methods for \u201c<a href=\"\/ipv6-coe\/finding-and-fixing-open-dns-resolvers\" target=\"_blank\" rel=\"noopener noreferrer\">Finding and Fixing Open DNS Resolvers<\/a>\u201d that may prove helpful in ensuring that your DNS servers aren\u2019t complicit in these types of attacks.<\/p>\n<p>A great source of information on recent DDoS activities is the Akamai\u00a0<a href=\"https:\/\/www.akamai.com\/us\/en\/about\/our-thinking\/state-of-the-internet-report\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">State of the Internet Report<\/a>.\u00a0 In the\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/www.akamai.com\/us\/en\/multimedia\/documents\/state-of-the-internet\/q4-2017-state-of-the-internet-security-report.pdf\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Q4 2017 report<\/a>,\u00a0Akamai determined that there was a 14% increase in total DDoS attacks, a 14% increase in infrastructure layer 3 and 4 attacks, a 22% increase in application-layer attacks, and a 4% increase in reflection-based attacks.\u00a0 Another great source of DDoS trends and statistics is the\u00a0<a href=\"https:\/\/www.arbornetworks.com\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Arbor Networks<\/a>\u00a0(now the security division of Netscout)\u00a0<a href=\"https:\/\/www.arbornetworks.com\/report\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Worldwide Infrastructure Security Report<\/a>\u00a0(WISR); they recently published their thirteenth report.<\/p>\n<h2 id=\"toc-hId-441728886\">Do DDoS Attacks Really Occur Over IPv6?<\/h2>\n<p>The wide variety of attack packet types can use either IPv4 or IPv6 for the network-layer protocol.\u00a0 However, if a target only has IPv4 transport and connectivity to and from the Internet, then it\u2019s only possible for the attack to use IPv4.\u00a0 As IPv6 has becomes more widely deployed, IPv6 will be an increasingly viable attack protocol.<\/p>\n<p>Eric Vyncke and I wrote about IPv6 DDoS in 2008 in our book \u201c<a href=\"http:\/\/www.ciscopress.com\/store\/ipv6-security-9781587055942\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">IPv6 Security<\/a>\u201d (Chapter 3), but it took a few years for IPv6 DDoS attacks to be seen in the wild.\u00a0 Some of the first sizable IPv6 DDoS attacks were\u00a0<a href=\"http:\/\/www.zdnet.com\/article\/first-ipv6-distributed-denial-of-service-internet-attacks-seen\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">observed by Arbor Networks and documented in February 2012<\/a>.\u00a0 I was interviewed about these early IPv6 DDoS attacks and at the time I felt that the attacks were the result of one of two possibilities:\u00a0 The first possibility was that attackers might just be clueless about the IP version that the attack used.\u00a0 It could be that the attacker\u2019s botnet army happened to have IPv6 Internet connectivity and the attacker simply pointed to a victim\u2019s FQDN, which resolved to an IPv6 address.\u00a0 Therefore, the attack unknowingly took place over IPv6 transport.\u00a0 The second possibility was that the attackers were purposefully using IPv6 as the transport protocol to assess whether their victims had IPv6 DDoS mitigation measures in place.\u00a0 The attackers could also be betting the victim did not have an IPv6 defensive capability and hoping that an attack over IPv6 would be more disruptive.\u00a0 My hope was for the former possibility of clueless attackers unknowingly using IPv6.<\/p>\n<p>The concerns over\u00a0<a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/ipv6-and-the-growing-ddos-danger\/a\/d-id\/1322942\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">IPv6 DDoS attacks continued into 2015<\/a>\u00a0as more observations were being made.\u00a0 DDoS attack traffic volumes continued to rise:\u00a0 at the end of 2016, the Mirai botnet was able to generate an astounding 600 Mbps.\u00a0 An Arbor Networks report stated that the peak traffic volume that their ATLAS system monitored was 641 Gbps (in a DNS reflection attack), but the largest NTP reflection\/amplification attack observed was 662 Gbps.<\/p>\n<p>Recently, in early March 2018, there was an\u00a0<a href=\"https:\/\/arstechnica.com\/information-technology\/2018\/03\/us-service-provider-survives-the-biggest-recorded-ddos-in-history\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">unprecedentedly massive DDoS attack that leveraged Memcached servers<\/a>\u00a0to perform a packet amplification attack directed at GitHub.\u00a0 The traffic volume reported by Akamai\/Prolexic as an astounding 1.3 Tbps sent to Github. Then\u00a0<a href=\"https:\/\/www.arbornetworks.com\/blog\/asert\/netscout-arbor-confirms-1-7-tbps-ddos-attack-terabit-attack-era-upon-us\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Arbor Networks observed a 1.7 Tbps<\/a>\u00a0reflection attack directed toward an ISP customer.\u00a0 The second attack reportedly was initiated by 1900 compromised IPv6-connected hosts, exploiting open DNS resolvers for packet amplification.\u00a0 The Register reported \u201c<a href=\"https:\/\/www.theregister.co.uk\/2018\/03\/03\/ipv6_ddos\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">It&#8217;s begun: &#8216;First&#8217; IPv6 denial-of-service attack puts IT bods on notice<\/a>\u201d, and others reported this as the \u201c<a href=\"https:\/\/www.informationsecuritybuzz.com\/news\/first-native-ipv6-ddos-attack-strikes-organisations-face-yet-another-new-cyber-threat\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">first native IPv6 DDoS attack<\/a>.\u201d \u00a0While this was far from being the first IPv6 DDoS attack, it was a sizable volumetric attack.\u00a0 The DDoS attack volume was way off the charts, setting a new high-water mark for these types of attacks, regardless of IP protocol version.\u00a0 It is now clear that as IPv6 gains adoption, it will become a more lucrative connection protocol for attackers.<\/p>\n<h2 id=\"toc-hId-1329232567\">How to Be Prepared?<\/h2>\n<p>Attackers have demonstrated that they can vary their attack methods quickly and, in some cases, they can stay ahead of the defender\u2019s ability to change their mitigation strategies.\u00a0 When enterprises are preparing their IPv6 DDoS mitigation measures, they should realize that their IPv6 protection measures are going to be very similar to their IPv4 protection measures.\u00a0 It is also important to recognize that an organization needs to have equal protections for IPv4 and IPv6.\u00a0 If the attacker senses weakness in either transport protocol, then the attacks will use the less defended protocol.<\/p>\n<p>The\u00a0<a href=\"https:\/\/www.arbornetworks.com\/blog\/insight\/netscout-arbor-publishes-13th-annual-worldwide-infrastructure-security-report\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Arbor Networks WISR #13 report<\/a>\u00a0stated that of those organizations who have deployed IPv6, only 61% could monitor their IPv6 traffic.\u00a0 Furthermore, DDoS over IPv6 was one of the major concerns of the survey\u2019s respondents.\u00a0 Even though most DDoS attacks occur over IPv4, 8% observed DDoS attacks that used IPv6 packets.<\/p>\n<p>Enterprises must plan to mitigate an IPv6 DDoS attack before it happens, and there is\u00a0<a href=\"http:\/\/searchsecurity.techtarget.com\/tip\/Potential-IPv6-DDoS-attacks-How-can-enterprises-prepare\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">published guidance<\/a>\u00a0on how to achieve this goal.\u00a0 Ognian Mitev (the\u00a0<a href=\"http:\/\/www.rmv6tf.org\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">RMv6TF Chair<\/a>, currently at Charter Communications) and Barry Dykes gave a great presentation at\u00a0<a href=\"https:\/\/www.nanog.org\/meetings\/nanog63\/agenda\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">NANOG63<\/a>\u00a0on \u201c<a class=\" bf_ungated_init\" href=\"https:\/\/www.nanog.org\/sites\/default\/files\/tuesday_general_ispddos_dykes_63.24.pdf\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Approaches for DDoS \u2014 an ISP Perspective<\/a>\u201d that covers many of the common mitigation methods.\u00a0 However, the most practical advice for enterprises is to simply IPv6-enable their currently used common DDoS mitigation techniques.<\/p>\n<p>Access Control Lists (ACLs) can be used to block the incoming packets based on type, source or destination.\u00a0 Even though ACLs are the lowest lifeform on the DDoS mitigation spectrum, they are quick and easy to deploy in a tactical situation.\u00a0 Ingress and egress filtering is considered a Best Current Practice (BCP) and documented in\u00a0<a href=\"https:\/\/tools.ietf.org\/html\/bcp38\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">IETF BCP 38<\/a>.\u00a0 ACLs can also be used to filter\u00a0<a href=\"http:\/\/www.team-cymru.org\/Services\/Bogons\/fullbogons-ipv6.txt\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Bogon<\/a>\u00a0addresses, thus filtering any packets sourced from anything other than\u00a0<a href=\"https:\/\/www.iana.org\/assignments\/ipv6-unicast-address-assignments\/ipv6-unicast-address-assignments.xhtml\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">assigned IPv6 global unicast addresses<\/a>.\u00a0 Bogon route servers, such as those maintained by\u00a0<a href=\"https:\/\/www.team-cymru.com\/bogon-reference.html\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Team Cymru<\/a>, can be helpful in keeping these route filter ACLs consistent and regularly-updated.<\/p>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Reverse_path_forwarding\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Unicast Reverse Path Forwarding<\/a>\u00a0(Unicast RPF) can also be a useful method in dropping packets where the source address does not match the return route back to that originating address.\u00a0 Routing tables can be used to identify traffic with spoofed source addresses arriving on an abnormal interface.\u00a0 Unicast RPF can work well by utilizing the IPv4 or IPv6 routing table to detect and drop spoofed packets.<\/p>\n<p>Remotely Triggered Black Hole (RTBH) (<a href=\"https:\/\/tools.ietf.org\/html\/rfc5635\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">RFC 5635<\/a>) is a common DDoS method used in large networks. This technique has been adapted for IPv6 (<a href=\"https:\/\/tools.ietf.org\/html\/rfc6666\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">RFC 6666<\/a>), too.\u00a0 Cisco has a great paper on configuring \u201c<a href=\"https:\/\/www.cisco.com\/c\/en\/us\/about\/security-center\/ipv6-remotely-triggered-black-hole.html\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Remotely Triggered Black Hole Filtering in IP Version 6<\/a>\u201d.<\/p>\n<p>Intrusion Prevention Systems (IPSs) can also be used to block IPv6 attack traffic.\u00a0 Depending on the vendor you choose, the IPv6 capabilities in these products vary greatly.\u00a0 Therefore, you want to look carefully at the ingredients list and scrutinize the vendor\u2019s IPv6 feature claims and prefer vendors who have\u00a0<a href=\"https:\/\/www.networkworld.com\/article\/2234240\/cisco-subnet\/cisco-subnet-ipv6-capabilities-in-cisco-s-ips-software-version-6-2.html\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">dual-protocol IPS engines<\/a>.<\/p>\n<p><a href=\"https:\/\/www.arbornetworks.com\/arbor-networks-introduces-pravail-security-analytics-for-advanced-threat-detection-incident-response-and-security-forensics\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">NetFlow-based DDoS protection<\/a>\u00a0measures, like those popularized by\u00a0<a href=\"https:\/\/www.arbornetworks.com\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Arbor Networks<\/a>,\u00a0are dual-protocol capable.\u00a0 Steinthor Bjarnason, from Arbor Networks, presented on \u201c<a class=\" bf_ungated_init\" href=\"https:\/\/pc.nanog.org\/static\/published\/meetings\/NANOG71\/1429\/20171003_Bjarnason_As_On_A_v1.pdf\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">As on a Darkling Plain: Network Survival in an Age of Pervasive DDoS<\/a>\u201d at the\u00a0<a href=\"https:\/\/pc.nanog.org\/static\/published\/meetings\/NANOG71\/agenda.html\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">NANOG71<\/a>\u00a0event.<\/p>\n<p>Other emerging solutions involve utilizing BGP Flowspec (<a href=\"https:\/\/tools.ietf.org\/html\/rfc5575\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">RFC 5575<\/a>); this method could be used with IPv4 or IPv6 equally well.\u00a0 There is an IETF draft (<a href=\"https:\/\/tools.ietf.org\/html\/draft-ietf-idr-flow-spec-v6-09\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">draft-ietf-idr-flow-spec-v6-09<\/a>) to disseminate flow spec rules for IPv6 attacks.\u00a0 Cisco provides configuration examples for\u00a0<a href=\"https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/routers\/asr9000\/software\/asr9k_r5-2\/routing\/configuration\/guide\/b_routing_cg52xasr9k\/b_routing_cg52xasr9k_chapter_011.html\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">BGP Flowspec on their ASR 9000 routers<\/a>.<\/p>\n<p>Another emerging mitigation technique is to leverage DDoS Packet Scrubbers.\u00a0 Examples of this would include the\u00a0<a href=\"https:\/\/www.radware.com\/products\/defenseflow\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Radware DefenseFlow<\/a>\u00a0and the\u00a0<a href=\"https:\/\/www.a10networks.com\/resources\/deployment-guides\/a10-thunder-threat-protection-system-tps\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">A10 Networks Threat Prevention System<\/a>\u00a0(TPS),\u00a0<a href=\"http:\/\/www.rmv6tf.org\/news-updates\/2014-best-of-show-for-ipv6-product-and-service-award-2014-10-1699\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">which won the 2014 RMv6TF Best of Show for IPv6 Product and Service Award<\/a>.<\/p>\n<p>A popular choice for enterprises is cloud DDoS mitigation.\u00a0 Akamai acquired DDoS mitigation company Prolexic, and now offers their DDoS mitigation service.\u00a0 Verisign offers a DDoS mitigation service; their\u00a0<a href=\"https:\/\/www.verisign.com\/en_US\/security-services\/ddos-protection\/ddos-report\/index.xhtml\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">4th Quarter 2017 DDoS Trends Report<\/a>\u00a0provides valuable information.\u00a0 Other popular cloud-based DDoS services come from\u00a0<a href=\"https:\/\/www.arbornetworks.com\/ddos-protection-products\/arbor-cloud\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Arbor Networks<\/a>, and\u00a0<a href=\"https:\/\/www.incapsula.com\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Incapsula\u2019s cloud DDoS solution<\/a>\u00a0comes from\u00a0<a href=\"https:\/\/www.imperva.com\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Imperva<\/a>.<\/p>\n<p>Content Delivery Networks (CDNs) such as\u00a0<a href=\"https:\/\/www.akamai.com\/uk\/en\/products\/cloud-security\/ddos-protection-service.jsp\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Akamai<\/a>,\u00a0<a href=\"https:\/\/www.cloudflare.com\/ddos\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">CloudFlare<\/a>, and\u00a0<a href=\"https:\/\/www.limelight.com\/security\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Limelight Networks<\/a>\u00a0can also provide DDoS protection,\u00a0<a href=\"\/ipv6-coe\/using-a-content-delivery-network-to-ipv6-enable-your-site\/\" target=\"_blank\" rel=\"noopener noreferrer\">many of which have significant IPv6 capabilities<\/a>.\u00a0 Krassimir Tzvetanov, from Fastly, gave a great presentation on \u201c<a class=\" bf_ungated_init\" href=\"https:\/\/pc.nanog.org\/static\/published\/meetings\/NANOG72\/1606\/20180221_Tzvetanov_Fundamentals_Of_Ddos_v1.pdf\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Fundamentals of DDoS Mitigation<\/a>\u201d at the recent\u00a0<a href=\"https:\/\/pc.nanog.org\/static\/published\/meetings\/NANOG72\/agenda.html\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">NANOG72<\/a>\u00a0event as an update to his\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/www.nanog.org\/sites\/default\/files\/DDoSTutorial-NANOG69-v3.pdf\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">DDoS Tutorial<\/a>\u00a0from NANOG69.<\/p>\n<p>Cloud-based Web Application Firewalls (WAFs) such as those from\u00a0<a href=\"https:\/\/threatx.com\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Threat X<\/a>,\u00a0<a href=\"https:\/\/www.cloudflare.com\/waf\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Cloudflare<\/a>, and\u00a0<a href=\"https:\/\/www.imperva.com\/blog\/2017\/11\/cloud-waf-versus-on-premises-waf\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Incapsula<\/a>\u00a0can also help protect DDoS attacks from affecting your web applications, regardless of IP protocol version.<\/p>\n<h2 id=\"toc-hId--2078231048\">Summary<\/h2>\n<p>You need to have DDoS mitigation procedures at-the-ready, and not wait to configure them until you need the DDoS mitigation techniques.\u00a0 People often utter the\u00a0<a href=\"https:\/\/www.goodreads.com\/quotes\/33373-better-to-have-and-not-need-than-to-need-and\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Franz Kafka<\/a>\u00a0quote \u201cBetter to have, and not need, than to need, and not have.\u201d\u00a0 I would like to put forward a revision of this Kafka quote for consideration: \u201cIt&#8217;s better to have a DDoS protection mechanism and not need it than to need a DDoS protection mechanism and not have it.\u201d\u00a0 The\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Scout_Motto\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Boy Scout Motto<\/a>\u00a0\u201cBe Prepared\u201d also rings true.<\/p>\n<p>When a DDoS attack strikes you do not want to frantically search for your upstream ISP\u2019s support contact information or try to hurriedly deploy an inline IPS.\u00a0 In the midst of a sudden IPv6 DDoS attack you do not want to be scrambling to apply IPv6 ACLs or to rapidly configure a BGP-based RTBH infrastructure.\u00a0 In times of crisis, you are highly likely to make mistakes, thus increasing your mean-time-to-mitigate.\u00a0 It is far better to prepare for this DDoS war during peacetime and, hopefully, you never need to deploy these measures.<\/p>\n<p>Scott Hogg (<a href=\"https:\/\/twitter.com\/scotthogg\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">@ScottHogg<\/a>) is CTO of\u00a0<a href=\"https:\/\/hexabuild.io\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">HexaBuild.io<\/a>, an IPv6 consulting and training company.\u00a0 Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (<a href=\"https:\/\/www.rmv6tf.org\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RMv6TF<\/a>) and authored the Cisco Press book on\u00a0<a href=\"http:\/\/www.ciscopress.com\/store\/ipv6-security-9781587055942\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">IPv6 Security<\/a>.\u00a0 Follow HexaBuild on\u00a0<a href=\"https:\/\/twitter.com\/hexabuild\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Twitter<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/hexabuild\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">LinkedIn<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DDoS Happens! Denial of Service\u00a0(DoS) attacks are malicious acts that prevent the utilization of an IT system.\u00a0 The attack can be a single \u201csilver bullet\u201d packet sent to a system that disrupts a service and crashes it.\u00a0 Other DoS attacks can involve an attacker gaining access to the target system, taking control of it and [&hellip;]<\/p>\n","protected":false},"author":321,"featured_media":666,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17],"tags":[41,38,31,47,15,48],"class_list":{"0":"post-678","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ipv6-coe","8":"tag-cloud","9":"tag-ipv6","10":"tag-networking","11":"tag-ntp","12":"tag-security","13":"tag-threat","14":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>IPv6 DDoS and Protection Measures<\/title>\n<meta name=\"description\" content=\"Denial of Service attacks are malicious acts against a network that prevent an IT system from being used. Learn more about DoS attacks and how to be protected.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-ddos-and-protection-measures\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IPv6 DDoS and Protection Measures\" \/>\n<meta property=\"og:description\" content=\"Denial of Service attacks are malicious acts against a network that prevent an IT system from being used. Learn more about DoS attacks and how to be protected.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-ddos-and-protection-measures\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-02T18:51:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-19T23:18:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Scott Hogg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Hogg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-ddos-and-protection-measures\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-ddos-and-protection-measures\\\/\"},\"author\":{\"name\":\"Scott Hogg\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\"},\"headline\":\"IPv6 DDoS and Protection Measures\",\"datePublished\":\"2018-04-02T18:51:11+00:00\",\"dateModified\":\"2022-10-19T23:18:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-ddos-and-protection-measures\\\/\"},\"wordCount\":1972,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-ddos-and-protection-measures\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-banner-2.jpg\",\"keywords\":[\"Cloud\",\"IPv6\",\"Networking\",\"NTP\",\"Security\",\"Threat\"],\"articleSection\":[\"IPv6 CoE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-ddos-and-protection-measures\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-ddos-and-protection-measures\\\/\",\"name\":\"IPv6 DDoS and Protection Measures\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-ddos-and-protection-measures\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-ddos-and-protection-measures\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-banner-2.jpg\",\"datePublished\":\"2018-04-02T18:51:11+00:00\",\"dateModified\":\"2022-10-19T23:18:35+00:00\",\"description\":\"Denial of Service attacks are malicious acts against a network that prevent an IT system from being used. Learn more about DoS attacks and how to be protected.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-ddos-and-protection-measures\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-ddos-and-protection-measures\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-ddos-and-protection-measures\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-banner-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-banner-2.jpg\",\"width\":660,\"height\":454,\"caption\":\"digital abstract background with skull\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-ddos-and-protection-measures\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6 CoE\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/ipv6-coe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IPv6 DDoS and Protection Measures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\",\"name\":\"Scott Hogg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"caption\":\"Scott Hogg\"},\"description\":\"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.\",\"sameAs\":[\"https:\\\/\\\/hexabuild.io\"],\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/scott-hogg\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IPv6 DDoS and Protection Measures","description":"Denial of Service attacks are malicious acts against a network that prevent an IT system from being used. Learn more about DoS attacks and how to be protected.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-ddos-and-protection-measures\/","og_locale":"en_US","og_type":"article","og_title":"IPv6 DDoS and Protection Measures","og_description":"Denial of Service attacks are malicious acts against a network that prevent an IT system from being used. Learn more about DoS attacks and how to be protected.","og_url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-ddos-and-protection-measures\/","og_site_name":"Infoblox Blog","article_published_time":"2018-04-02T18:51:11+00:00","article_modified_time":"2022-10-19T23:18:35+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-2.jpg","type":"image\/jpeg"}],"author":"Scott Hogg","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Scott Hogg","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-ddos-and-protection-measures\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-ddos-and-protection-measures\/"},"author":{"name":"Scott Hogg","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c"},"headline":"IPv6 DDoS and Protection Measures","datePublished":"2018-04-02T18:51:11+00:00","dateModified":"2022-10-19T23:18:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-ddos-and-protection-measures\/"},"wordCount":1972,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-ddos-and-protection-measures\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-2.jpg","keywords":["Cloud","IPv6","Networking","NTP","Security","Threat"],"articleSection":["IPv6 CoE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-ddos-and-protection-measures\/","url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-ddos-and-protection-measures\/","name":"IPv6 DDoS and Protection Measures","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-ddos-and-protection-measures\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-ddos-and-protection-measures\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-2.jpg","datePublished":"2018-04-02T18:51:11+00:00","dateModified":"2022-10-19T23:18:35+00:00","description":"Denial of Service attacks are malicious acts against a network that prevent an IT system from being used. Learn more about DoS attacks and how to be protected.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-ddos-and-protection-measures\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-ddos-and-protection-measures\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-ddos-and-protection-measures\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-2.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-2.jpg","width":660,"height":454,"caption":"digital abstract background with skull"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-ddos-and-protection-measures\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IPv6 CoE","item":"https:\/\/www.infoblox.com\/blog\/category\/ipv6-coe\/"},{"@type":"ListItem","position":3,"name":"IPv6 DDoS and Protection Measures"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c","name":"Scott Hogg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","caption":"Scott Hogg"},"description":"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.","sameAs":["https:\/\/hexabuild.io"],"url":"https:\/\/www.infoblox.com\/blog\/author\/scott-hogg\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/678","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/321"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=678"}],"version-history":[{"count":7,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/678\/revisions"}],"predecessor-version":[{"id":8109,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/678\/revisions\/8109"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/666"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=678"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=678"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=678"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}