{"id":7225,"date":"2021-10-27T16:25:41","date_gmt":"2021-10-27T23:25:41","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7225"},"modified":"2021-10-27T16:25:41","modified_gmt":"2021-10-27T23:25:41","slug":"announcing-address-space-a-legacy-security-mindset-and-finally-ipv6","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\/","title":{"rendered":"Announcing Address Space, a Legacy Security Mindset\u2026 and finally IPv6"},"content":{"rendered":"<p>Back in January of this year (2021), something happened that caused a commotion in the networking community.\u00a0 The U.S. Department of Defense (DoD), via BGP proxy AS8003, advertised a vast amount of IPv4 address space that had been previously unannounced.\u00a0 This event got me thinking about several topics \u2013 and offers me an excuse to climb up on a soapbox and discuss a few subjects related to IPv4, IPv6, best practices, and an antiquated security mindset.<\/p>\n<h3><strong>The DoD announcement<\/strong><\/h3>\n<p>Numerous other blogs, podcasts, and articles have covered the surprise DoD action, and I will not go into detail here.\u00a0 (There is a good synopsis on <a href=\"https:\/\/www.kentik.com\/blog\/the-mystery-of-as8003\/\">Kentic\u2019s web site<\/a>.)\u00a0 But to provide a quick overview, back in January, the DoD started advertising to the Internet previously unannounced IPv4 address space from a seemingly dormant, mysterious company.\u00a0 In the months thereafter, AS8003 continued to advertise more and more DoD IPv4 CIDR blocks until they were originating 764 prefixes (including multiple \/8s), accounting for roughly 175 million IPv4 addresses.\u00a0 Conspiracy theories immediately popped up.\u00a0 Was the space hijacked?\u00a0 (It turns out that was not the case.)\u00a0 Was the DoD preparing to sell their wealth of IPv4 assets?\u00a0 Was it a honey pot to collect and analyze stray packets?\u00a0 Or, possibly, a combination of the last two?\u00a0 (In a <a href=\"https:\/\/arstechnica.com\/information-technology\/2021\/04\/pentagon-explains-odd-transfer-of-175-million-ip-addresses-to-obscure-company\/\">semi-official comment from the DoD\u2019s Defense Digital Service<\/a>, they stated the act was a \u201cpilot effort\u201d to \u201cassess, evaluate, and prevent unauthorized use of DoD IP address space\u2026\u201d that also \u201c\u2026may identify potential vulnerabilities.\u201d)<\/p>\n<p>Conspiracy theories aside, one thing is for certain: \u00a0it caught nearly everyone off guard.\u00a0 Several large enterprises, and even some service providers, use the DoD space internally.\u00a0 Most had exhausted IPv4 addresses, both public and private, and were scouring the IPv4 world for \u201cfree\u201d numbers to use for internal purposes.<\/p>\n<p>The DoD had a hand in creating the Internet, and most network engineers know they have a vast portfolio of IPv4 resources &#8211; and seemingly would never advertise that space publicly.\u00a0 So, despite their better judgment, organizations started using DoD blocks internally.\u00a0 Now those entities are in a pickle.\u00a0 Do they really know where their internal endpoint packets are going when they are destined for a server in 7.0.0.0\/8?\u00a0 Or what do they do if the DoD does sell all or part of their IPv4 assets?\u00a0 Azure or AWS could purchase blocks and use them for their IaaS clients \u2013 forcing squatters to re-number or risk losing access to legitimate Internet services.\u00a0 Obviously, this is not the best position for organizations to be in.\u00a0 Nor is it ideal for the DoD to have numerous networks using their addresses.<strong>\u00a0<\/strong><\/p>\n<h3><strong>The \u201csecurity through obscurity\u201d mindset<\/strong><\/h3>\n<p>This DoD event brought to fore the topic of advertising one\u2019s address space.\u00a0 Or more specifically <em>not<\/em> advertising it.\u00a0 Over the years I have come across numerous companies that opt to not advertise parts of their <a href=\"https:\/\/en.wikipedia.org\/wiki\/Provider-independent_address_space\">Provider Independent<\/a> (PI) address space.\u00a0 The reasoning is almost always that \u201cit is more secure\u201d to not advertise IPs to the public Internet.\u00a0 I suspect this comes, at least in part, from decades of network engineers using <a href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc1918\">RFC 1918<\/a> addresses and NAT for public Internet access, and the security model that accompanies this architecture.\u00a0 The thought is \u201cif something is hidden, it is safer.\u201d\u00a0 There is some truth to this, but in current networking, its validity is conditional at best.\u00a0 Network Address Translation and RFC 1918 addressing were developed to prolong limited IPv4 resources, not as a security mechanism.\u00a0 It may be widely accepted as such, but we know how exploits regularly circumvent this common design.\u00a0 And a strong argument can be made that, along with a false sense of security, the added complexity of NAT can lead to misconfiguration and other administrative errors that exacerbate risk (not to mention the problems sorting through logs and translating addresses during incident triage).<\/p>\n<p>Security experts make the case that topology-hiding is not a cornerstone of IT security.\u00a0 Using NAT and RFC 1918 address space does not specifically provide security, rather stateful inspection provides this function at the perimeter or on the host.\u00a0 This is discussed in <a href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc4864\">RFC 4864<\/a>, Local Network Protection for IPv6.\u00a0 And of course, the perimeter is only one aspect of a broader security strategy and framework.<\/p>\n<h3><strong>Announce your IPv4 address space<\/strong><\/h3>\n<p>For those enterprises that have an IPv4 Provider Independent (PI) allocation, it should be viewed as a valuable asset.\u00a0 All five Regional Internet Registries (RIRs) have <a href=\"https:\/\/en.wikipedia.org\/wiki\/IPv4_address_exhaustion\">exhausted their IPv4 address pools<\/a>.\u00a0 Enterprises need to protect their PI space for internal use since acquiring more from their RIR is not an option.\u00a0 Or, if it is not needed, they can sell it on the gray market to an entity that can justify the transfer.\u00a0 (A note about the example above &#8211; the DoD\u2019s IPv4 CIDRs could be worth north of $7 billion based on the <a href=\"https:\/\/auctions.ipv4.global\/prior-sales\">current price of $40 per IPv4 address<\/a>.)<\/p>\n<p>My recommendation is to protect this asset by announcing it through your transit peers to the public Internet.\u00a0 If all or part of that announcement is not intended for public use, the route can simply be blackholed at the network perimeter, eliminating the attack surface.\u00a0 Having your CIDR(s) in the global table will discourage others from using those blocks for internal use, or worse yet, from squatting on them publicly.\u00a0 The advertisement of the DoD IPv4 address space could be a warning to organizations using DoD numbers internally that the practice should be discouraged and is not a long-term strategy for those entities.\u00a0 The perceived benefit of not advertising is more than offset by drawbacks and risks of not doing so.<\/p>\n<p>Another reason to advertise the DoD IPv4 addresses may be to put them into the Internet routing tables to show proof of ownership and use as part of a preparatory step to a sale.\u00a0 The IPv4 address transfer market pricing is often based on the cleanliness and reputation of those numbers.\u00a0 The DoD could be advertising these addresses to assess and prove their reputation to derive maximum value of these assets.\u00a0 The DoD would want to get top dollar for these addresses, but if they are squatted on frequently and there is significant &#8220;backscatter&#8221; from their use on the Internet, then the price per address could be lower than the DoD desires.<\/p>\n<p>The industry has seen organizations run out of RFC1918 address space, and now many are starting to use <a href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc6598\">RFC 6598<\/a> addresses (incorrectly applied), and, as we have seen, some are using DoD and\/or other allocated but unadvertised blocks.\u00a0 Organizations are desperate, not following networking best practices, and grasping at straws.\u00a0 Do not let them take your straw!<\/p>\n<h3><strong>Or better yet\u2026 IPv6<\/strong><\/h3>\n<p>If the DoD had started announcing a block of IPv6 address space, would that act have also caused such a fuss?\u00a0 I suspect anyone that even noticed would not have given it a second thought.\u00a0 Most of the discussion above has revolved around IPv4 networking and all the architectural, security, financial, and philosophical baggage that come with it.<\/p>\n<p>One way to circumvent all these issues is to simply deploy IPv6 \u2013 architect your network for the future and let go of the past.\u00a0 Many others have taken this step.\u00a0 Previously I wrote about <a href=\"https:\/\/blogs.infoblox.com\/ipv6-coe\/lessons-learned-recommendations-from-ipv6-only-deployments-part-one-of-two\/\">best practices and lessons learned<\/a> from companies that have gone IPv6-only.\u00a0 We know that IPv4 will be around for a while, but there are numerous ways for IPv6-only networks to communicate with the legacy Internet.\u00a0 IPv6 brings back the end-to-end nature of the Internet, which is much simpler and easier to operate.\u00a0 It can be secured without NAT, and it is also a model that fits well with zero trust networking.\u00a0 It is, in almost every manner, superior and leads one to ponder why we are still dealing with all the IPv4-related issues discussed above.<\/p>\n<h3><strong>Conclusions<\/strong><\/h3>\n<p>It is recommended that if you do have PI space from your RIR to advertise that block in the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Default-free_zone\">default free zone<\/a>.\u00a0 If that space is not to be accessed from the public Internet, simply blackhole the route.\u00a0 And follow other best practices related to your valuable IP assets such as keeping <a href=\"https:\/\/en.wikipedia.org\/wiki\/Internet_Routing_Registry\">Internet Route Registries<\/a> current, as well as maintaining your organization\u2019s information in RIR databases.\u00a0 (<a href=\"https:\/\/www.arin.net\/resources\/manage\/rpki\/\">For ARIN, you can find related information here<\/a>.)\u00a0 In addition, use an <a href=\"https:\/\/en.wikipedia.org\/wiki\/IP_address_management\">IPAM<\/a> system to properly manage your IP assets internally.<\/p>\n<p>As the cost of IPv4 address continues to increase, and companies start to employ more desperate measures, leave the drama behind, and embrace IPv6.\u00a0 IPv6 brings back the end-to-end nature of the Internet by simplifying designs and often improving network performance.\u00a0 Stateful security and a zero trust network architecture can be employed to secure corporate assets in IPv6, just like IPv4.\u00a0 Your RIR has plenty of IPv6 address space to allocate your organization to get started, and lots more for future growth if needed.\u00a0 And when an IP-rich entity like the DoD starts advertising large swaths of IPv4 address space, you can safely ignore the news and move on to more pressing tasks.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Back in January of this year (2021), something happened that caused a commotion in the networking community.\u00a0 The U.S. Department of Defense (DoD), via BGP proxy AS8003, advertised a vast amount of IPv4 address space that had been previously unannounced.\u00a0 This event got me thinking about several topics \u2013 and offers me an excuse to [&hellip;]<\/p>\n","protected":false},"author":351,"featured_media":3730,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17],"tags":[38,585,56,368],"class_list":{"0":"post-7225","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ipv6-coe","8":"tag-ipv6","9":"tag-dod","10":"tag-ipv4","11":"tag-federal","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Announcing Address Space, a Legacy Security Mindset\u2026 and finally IPv6<\/title>\n<meta name=\"description\" content=\"Announcing Address Space, a Legacy Security Mindset\u2026 and finally IPv6. Back in January of this year (2021), something happened that caused a commotion in the networking community. The U.S. Department of Defense (DoD), via BGP proxy AS8003, advertised a vast amount of IPv4 address space that had been previously unannounced. This event got me thinking about several topics \u2013 and offers me an excuse to climb up on a soapbox and discuss a few subjects related to IPv4, IPv6, best practices, and an antiquated security mindset.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Announcing Address Space, a Legacy Security Mindset\u2026 and finally IPv6\" \/>\n<meta property=\"og:description\" content=\"Announcing Address Space, a Legacy Security Mindset\u2026 and finally IPv6. Back in January of this year (2021), something happened that caused a commotion in the networking community. The U.S. Department of Defense (DoD), via BGP proxy AS8003, advertised a vast amount of IPv4 address space that had been previously unannounced. This event got me thinking about several topics \u2013 and offers me an excuse to climb up on a soapbox and discuss a few subjects related to IPv4, IPv6, best practices, and an antiquated security mindset.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-27T23:25:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/1409954267002-Volleyball-ipv6.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"302\" \/>\n\t<meta property=\"og:image:height\" content=\"227\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cody Christman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cody Christman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\\\/\"},\"author\":{\"name\":\"Cody Christman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/467b05606b1887c11ca4576261e71c8a\"},\"headline\":\"Announcing Address Space, a Legacy Security Mindset\u2026 and finally IPv6\",\"datePublished\":\"2021-10-27T23:25:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\\\/\"},\"wordCount\":1502,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/1409954267002-Volleyball-ipv6.jpg\",\"keywords\":[\"IPv6\",\"DoD\",\"IPv4\",\"Federal\"],\"articleSection\":[\"IPv6 CoE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\\\/\",\"name\":\"Announcing Address Space, a Legacy Security Mindset\u2026 and finally IPv6\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/1409954267002-Volleyball-ipv6.jpg\",\"datePublished\":\"2021-10-27T23:25:41+00:00\",\"description\":\"Announcing Address Space, a Legacy Security Mindset\u2026 and finally IPv6. Back in January of this year (2021), something happened that caused a commotion in the networking community. The U.S. Department of Defense (DoD), via BGP proxy AS8003, advertised a vast amount of IPv4 address space that had been previously unannounced. This event got me thinking about several topics \u2013 and offers me an excuse to climb up on a soapbox and discuss a few subjects related to IPv4, IPv6, best practices, and an antiquated security mindset.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/1409954267002-Volleyball-ipv6.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/1409954267002-Volleyball-ipv6.jpg\",\"width\":302,\"height\":227,\"caption\":\"IPv4 with nothing but a volleyball for a friend\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6 CoE\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/ipv6-coe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Announcing Address Space, a Legacy Security Mindset\u2026 and finally IPv6\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/467b05606b1887c11ca4576261e71c8a\",\"name\":\"Cody Christman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_351_1611073779-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_351_1611073779-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_351_1611073779-96x96.jpg\",\"caption\":\"Cody Christman\"},\"description\":\"Cody (@notthefakecc) is a principal consultant at HexaBuild.io, an IPv6 consulting and training company. Cody is a cofounder of the Rocky Mountain IPv6 Task Force (RMv6TF) and a recognized IPv6 expert with decades of IPv6 experience. Follow HexaBuild on X (formerly Twitter) and LinkedIn to learn more about advancing cloud, IoT and security with IPv6.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/cody-christman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Announcing Address Space, a Legacy Security Mindset\u2026 and finally IPv6","description":"Announcing Address Space, a Legacy Security Mindset\u2026 and finally IPv6. Back in January of this year (2021), something happened that caused a commotion in the networking community. The U.S. Department of Defense (DoD), via BGP proxy AS8003, advertised a vast amount of IPv4 address space that had been previously unannounced. This event got me thinking about several topics \u2013 and offers me an excuse to climb up on a soapbox and discuss a few subjects related to IPv4, IPv6, best practices, and an antiquated security mindset.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\/","og_locale":"en_US","og_type":"article","og_title":"Announcing Address Space, a Legacy Security Mindset\u2026 and finally IPv6","og_description":"Announcing Address Space, a Legacy Security Mindset\u2026 and finally IPv6. Back in January of this year (2021), something happened that caused a commotion in the networking community. The U.S. Department of Defense (DoD), via BGP proxy AS8003, advertised a vast amount of IPv4 address space that had been previously unannounced. This event got me thinking about several topics \u2013 and offers me an excuse to climb up on a soapbox and discuss a few subjects related to IPv4, IPv6, best practices, and an antiquated security mindset.","og_url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\/","og_site_name":"Infoblox Blog","article_published_time":"2021-10-27T23:25:41+00:00","og_image":[{"width":302,"height":227,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/1409954267002-Volleyball-ipv6.jpg","type":"image\/jpeg"}],"author":"Cody Christman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cody Christman","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\/"},"author":{"name":"Cody Christman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/467b05606b1887c11ca4576261e71c8a"},"headline":"Announcing Address Space, a Legacy Security Mindset\u2026 and finally IPv6","datePublished":"2021-10-27T23:25:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\/"},"wordCount":1502,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/1409954267002-Volleyball-ipv6.jpg","keywords":["IPv6","DoD","IPv4","Federal"],"articleSection":["IPv6 CoE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\/","url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\/","name":"Announcing Address Space, a Legacy Security Mindset\u2026 and finally IPv6","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/1409954267002-Volleyball-ipv6.jpg","datePublished":"2021-10-27T23:25:41+00:00","description":"Announcing Address Space, a Legacy Security Mindset\u2026 and finally IPv6. Back in January of this year (2021), something happened that caused a commotion in the networking community. The U.S. Department of Defense (DoD), via BGP proxy AS8003, advertised a vast amount of IPv4 address space that had been previously unannounced. This event got me thinking about several topics \u2013 and offers me an excuse to climb up on a soapbox and discuss a few subjects related to IPv4, IPv6, best practices, and an antiquated security mindset.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/ipv6-coe\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/1409954267002-Volleyball-ipv6.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/1409954267002-Volleyball-ipv6.jpg","width":302,"height":227,"caption":"IPv4 with nothing but a volleyball for a friend"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/announcing-address-space-a-legacy-security-mindset-and-finally-ipv6\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IPv6 CoE","item":"https:\/\/www.infoblox.com\/blog\/category\/ipv6-coe\/"},{"@type":"ListItem","position":3,"name":"Announcing Address Space, a Legacy Security Mindset\u2026 and finally IPv6"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/467b05606b1887c11ca4576261e71c8a","name":"Cody Christman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_351_1611073779-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_351_1611073779-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_351_1611073779-96x96.jpg","caption":"Cody Christman"},"description":"Cody (@notthefakecc) is a principal consultant at HexaBuild.io, an IPv6 consulting and training company. Cody is a cofounder of the Rocky Mountain IPv6 Task Force (RMv6TF) and a recognized IPv6 expert with decades of IPv6 experience. Follow HexaBuild on X (formerly Twitter) and LinkedIn to learn more about advancing cloud, IoT and security with IPv6.","url":"https:\/\/www.infoblox.com\/blog\/author\/cody-christman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/351"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7225"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7225\/revisions"}],"predecessor-version":[{"id":7226,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7225\/revisions\/7226"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/3730"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}