SlideShare ist ein Scribd-Unternehmen logo
1 von 53
IPv6 Threats Slides from June 2011 webcast
2 View the recorded webcast on SlideShare at
  http://www.slideshare.net/Commtouch/commtouch-ipv6-threats on
Eyal OrgilMarketing DirectorCommtouch Welcome to Part 2IPv6 Informational Series
IPv6 Informational Series Part 1: An Introduction to IPv6 on Eyal OrgilMarketing DirectorCommtouch http://www.slideshare.net/Commtouch or at www.commtouch.com/introduction-ipv6
IPv6 Informational Series Part 1: An Introduction to IPv6 Part 2: IPv6 Security Threats Eyal OrgilMarketing DirectorCommtouch
Speakers Asaf GreinerVP ProductsCommtouch Gabriel M. MizrahiVP TechnologiesCommtouch
Have a question?  Send questions to: IPv6@commtouch.com Responses posted: http://blog.commtouch.com
Is the Change to IPv6 aSignificant Security Event?
Is IPv6 a Significant Event Move to IPv6 a transition, not an event Taking place for several years Will continue for many more years There will be security implications During the transition period After fully implemented Many threats same as IPv4 Especially while dual-stacks are in use
Is IPv6 a Significant Event Many IPv4 threats not applicable to IPv6 Care must be taken when using dual-networks Many existing security solutions can protect against IPv6 threats But, must be properly configured Many threats related to transition to IPv6, not new threats
Is IPv6 a Significant Event Many IPv6 users today are experts and enthusiasts IPv6 is not yet in widespread usage Still see minimal usage of IPv6 Wider adoption of IPv6 depends on readiness of network infrastructures Currently no big incentive to move to IPv6
Is IPv6 a Significant Event Hackers will utilize IPv6 when it will bring them value Not deployed widely enough in order to invest time As IPv6 grows it will appear on the Hacker radar Transition a long process, not a one day event Advise that you learn and adjust
The Hype About IPv6 – Is it Just Another Y2K Scare?
Is IPv6 Another Y2K? Don’t be scared of IPv6, but don’t take lightly  IPv6 is a technology which offers: New opportunities New challenges No date for IPv6 Will take years for IPv6 to become the main protocol
Is IPv6 Another Y2K? Expect many mission critical infrastructures to remain IPv4 Enough IPv4 addresses for these Unlikely websites will be moved to be IPv6 in near future When a large move occurs, we will know: There is a large user IPv6 base End of transition period is near
Top Security Issues with IPv6
IPv6 Security Issues Top three security related issues IPv6: Tunneling of IPv6 over IPv4 (6 to 4) Rogue devices IP Reputation
Threat: IP Tunneling
IPv6 Tunneling Threat IPv4 ConfiguredFirewall IPv4 Network IPv4 IPv4 IPv4 IPv4 Address Internal Network Internet
IPv6 Tunneling Threat IPv4 ConfiguredFirewall IPv4 Network IPv4 IPv4 IPv4 IPv6 Address Internal Network Internet
IPv6 Tunneling Threat IPv4 ConfiguredFirewall IPv4 Network GW IPv4-to-IPv6 Gateway IPv4 IPv6 IPv4 IPv4 IPv6 IPv6 over IPv4 IPv6 Address IPv6 over IPv4 tunnel Internal Network Internet
IPv6 Tunneling Threat IPv4 ConfiguredFirewall IPv4website FW Policy: No Angry Birds IPv4 Network IPv4 IPv4 IPv4 Internal Network Internet
IPv6 Tunneling Threat IPv4 ConfiguredFirewall IPv4website FW Policy: No Angry Birds IPv4 Network GW IPv4-to-IPv6 Gateway IPv6website IPv6 IPv4 IPv6 IPv4 IPv4 IPv6 over IPv4 Bypass firewall policy Internal Network Internet
IPv6 Tunneling Threat Need to be aware that security devices are configured for IPv6 For example firewalls Another example – IDS (Intrusion Detection System)  Can inspect IPv6, but you need to enable it If not, you won’t be enforcing the policy on IPv6
Threat: Rogue Devices
Rogue Devices
Rogue Devices Rogue Device
Rogue Devices IPv6 Prefix IPv6 Prefix Rogue Device
Rogue Devices Windows 7 Windows 7 Windows 7 IPv4 Network
Rogue Devices Windows 7 Windows 7 Windows 7 IPv6 Network IPv4 Network IPv6 enabledby default
Rogue Devices Windows 7 Windows 7 Windows 7 Internet? Internet? Internet? IPv6 Network IPv4 Network IPv6 searchesfor accessto the Internet
Rogue Devices Windows 7 Windows 7 Windows 7 Internet? Internet? Internet? IPv6 Network IPv4 Network IPv6 Prefix IPv6 Prefix Internet IPv6 Rogue Device
Rogue Devices The difference is: IPv4 is used daily If a different allocation is provided, there will be noticeable effects With IPv6, the insertion of a rogue device may go unnoticed
Rogue Devices IPv6 Network Man in the middle Internet IPv6 Rogue Device
Rogue Devices IPv6 Network Man in the middle Internet IPv6 Rogue Device
Rogue Devices IPv6 Network Man in the middle Internet IPv6 Rogue Device
Rogue Devices IPv6 Network Man in the middle Internet IPv6 Rogue Device
Rogue Devices Not only a Windows problem An issue with most operating systems IPv6 is defined by default IPv6 could run in the background without anyone’s knowledge Security risk also in IPv4 with DHCP Make sure unauthorized devices cannot connect to your network
Threat: IP Reputation
IP Reputation Far more IP addresses in IPv6 232 compared to  2128 Challenges IP allocation will be different from IPv4 Anyone can get a large IP allocation Any person can get a 64 bit allocation (264) The entire Internet today is 232
IP Reputation Last 64 bits define the device ID Complicate issue by using randomizer to change 64 bit Every spam message could be sent from different IP From IP address: wwww From IP address: xxxx From IP address: yyyy 264 DifferentIP Addresses Internet From IP address: zzzz
IP Reputation ,[object Object]
Need other methods to build reputation
Such as subnets
Storing IP information in memory
Vast amount of memory will be needed
No NAT in IPv6
Some believe a security issue
They believe NAT provides a layer of security
IPv6 provides public IPs for all devices,[object Object]
Commtouch and IPv6 Commtouch has been working on IPv6 for some time Making changes to client side and back-end Client side will be transparent Focus has been on the back-end GlobalView Mail Reputation transparently supports more IPs addresses Still single query of an IP address but data storage more efficient
Commtouch and IPv6 Monitoring the Internet  Identifying IPv6 threats Classifying threats Currently seeing minor IPv6 spam activity Believe spammers experimenting with IPv6 Too noticeable today to send spam via IPv6 when there is very little email on this network
Recommendations for MinimizingIPv6 threats

Weitere Àhnliche Inhalte

Was ist angesagt?

Guy Podjarmy - Secure Node Code
Guy Podjarmy - Secure Node CodeGuy Podjarmy - Secure Node Code
Guy Podjarmy - Secure Node CodeDevSecCon
 
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...Cisco Canada
 
Open Source in the Era of 5G
Open Source in the Era of 5GOpen Source in the Era of 5G
Open Source in the Era of 5GAll Things Open
 
Elizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unisonElizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unisonDevSecCon
 
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...CODE BLUE
 
Introduction To NIDS
Introduction To NIDSIntroduction To NIDS
Introduction To NIDSMichael Boman
 
RSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of ThingsRSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of ThingsDaniel Miessler
 
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense FirewallDetect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense FirewallHuda Seyam
 
Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...Stanfy
 
Snort Intrusion Detection / Prevention System on PFSense Firewall
Snort Intrusion Detection / Prevention System  on PFSense FirewallSnort Intrusion Detection / Prevention System  on PFSense Firewall
Snort Intrusion Detection / Prevention System on PFSense FirewallHuda Seyam
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresAirTight Networks
 
The IoT Attack Surface
The IoT Attack SurfaceThe IoT Attack Surface
The IoT Attack SurfaceDaniel Miessler
 
PresentaciĂłn - Cisco ASA with FirePOWER Services
PresentaciĂłn -  Cisco ASA with FirePOWER ServicesPresentaciĂłn -  Cisco ASA with FirePOWER Services
PresentaciĂłn - Cisco ASA with FirePOWER ServicesOscar Romano
 
Migration to cisco next generation firewall
Migration to cisco next generation firewallMigration to cisco next generation firewall
Migration to cisco next generation firewallIT Tech
 
Linux security cookbook
Linux security cookbookLinux security cookbook
Linux security cookbookfernandao777
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?Zoltan Balazs
 
Hack wifi password using kali linux
Hack wifi password using kali linuxHack wifi password using kali linux
Hack wifi password using kali linuxHelder Oliveira
 
On the impact of security vulnerabilities in the npm package dependency network
On the impact of security vulnerabilities in the npm package dependency networkOn the impact of security vulnerabilities in the npm package dependency network
On the impact of security vulnerabilities in the npm package dependency networkTom Mens
 

Was ist angesagt? (20)

Guy Podjarmy - Secure Node Code
Guy Podjarmy - Secure Node CodeGuy Podjarmy - Secure Node Code
Guy Podjarmy - Secure Node Code
 
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
 
Open Source in the Era of 5G
Open Source in the Era of 5GOpen Source in the Era of 5G
Open Source in the Era of 5G
 
Elizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unisonElizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unison
 
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...
CODE BLUE 2014 : [Keynote] The 5 biggest problems of cyber security - and how...
 
Introduction To NIDS
Introduction To NIDSIntroduction To NIDS
Introduction To NIDS
 
RSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of ThingsRSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of Things
 
Wireguard VPN
Wireguard VPNWireguard VPN
Wireguard VPN
 
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense FirewallDetect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall
 
Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...
 
Snort Intrusion Detection / Prevention System on PFSense Firewall
Snort Intrusion Detection / Prevention System  on PFSense FirewallSnort Intrusion Detection / Prevention System  on PFSense Firewall
Snort Intrusion Detection / Prevention System on PFSense Firewall
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
 
Pxosys Webinar Amplify your Security
Pxosys Webinar Amplify your SecurityPxosys Webinar Amplify your Security
Pxosys Webinar Amplify your Security
 
The IoT Attack Surface
The IoT Attack SurfaceThe IoT Attack Surface
The IoT Attack Surface
 
PresentaciĂłn - Cisco ASA with FirePOWER Services
PresentaciĂłn -  Cisco ASA with FirePOWER ServicesPresentaciĂłn -  Cisco ASA with FirePOWER Services
PresentaciĂłn - Cisco ASA with FirePOWER Services
 
Migration to cisco next generation firewall
Migration to cisco next generation firewallMigration to cisco next generation firewall
Migration to cisco next generation firewall
 
Linux security cookbook
Linux security cookbookLinux security cookbook
Linux security cookbook
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
 
Hack wifi password using kali linux
Hack wifi password using kali linuxHack wifi password using kali linux
Hack wifi password using kali linux
 
On the impact of security vulnerabilities in the npm package dependency network
On the impact of security vulnerabilities in the npm package dependency networkOn the impact of security vulnerabilities in the npm package dependency network
On the impact of security vulnerabilities in the npm package dependency network
 

Ähnlich wie Slides from IPv6 Threats

IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the EnterpriseJohn Rhoton
 
Slides from Introduction to IPv6
Slides from Introduction to IPv6Slides from Introduction to IPv6
Slides from Introduction to IPv6Cyren, Inc
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6John Rhoton
 
IPv6 Adoption --- Acceleration
IPv6 Adoption --- AccelerationIPv6 Adoption --- Acceleration
IPv6 Adoption --- AccelerationSwiss IPv6 Council
 
Ireland Dublin VPS and Dedicated Server Hosting Provider TheServerHost IPV6
Ireland Dublin VPS and Dedicated Server Hosting Provider TheServerHost IPV6Ireland Dublin VPS and Dedicated Server Hosting Provider TheServerHost IPV6
Ireland Dublin VPS and Dedicated Server Hosting Provider TheServerHost IPV6TheServerHost
 
TheServerHost offering IPV6 Philippines VPS and Dedicated Server
TheServerHost offering IPV6 Philippines VPS and Dedicated ServerTheServerHost offering IPV6 Philippines VPS and Dedicated Server
TheServerHost offering IPV6 Philippines VPS and Dedicated ServerTheServerHost
 
Hacking 05 2011
Hacking 05 2011Hacking 05 2011
Hacking 05 2011Felipe Prado
 
June 2004 IPv6 – Hands on
June 2004 IPv6 – Hands on June 2004 IPv6 – Hands on
June 2004 IPv6 – Hands on Videoguy
 
IPv6: The New Internet Protocol
IPv6: The New Internet ProtocolIPv6: The New Internet Protocol
IPv6: The New Internet ProtocolTeresa Rothaar
 
NAv6TF I Pv6 State Of Union Jan 2008
NAv6TF  I Pv6  State Of  Union  Jan 2008NAv6TF  I Pv6  State Of  Union  Jan 2008
NAv6TF I Pv6 State Of Union Jan 2008digitaldivide
 
TheServerHost offering USA, Phoenix VPS and Dedicated Server Hosting with IPV6
TheServerHost offering USA, Phoenix VPS and Dedicated Server Hosting with IPV6TheServerHost offering USA, Phoenix VPS and Dedicated Server Hosting with IPV6
TheServerHost offering USA, Phoenix VPS and Dedicated Server Hosting with IPV6TheServerHost
 
Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...
Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...
Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...ir. Carmelo Zaccone
 
IETF Activities Update
IETF Activities UpdateIETF Activities Update
IETF Activities UpdateARIN
 
IPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for MobilesIPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for MobilesAPNIC
 
IPv6IntegrationBestPracticesfinal.pdf
IPv6IntegrationBestPracticesfinal.pdfIPv6IntegrationBestPracticesfinal.pdf
IPv6IntegrationBestPracticesfinal.pdfCPUHogg
 
Wim Delrue - Trends in IPv6 Training
Wim Delrue - Trends in IPv6 TrainingWim Delrue - Trends in IPv6 Training
Wim Delrue - Trends in IPv6 TrainingIPv6 Conference
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
 

Ähnlich wie Slides from IPv6 Threats (20)

IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the Enterprise
 
Slides from Introduction to IPv6
Slides from Introduction to IPv6Slides from Introduction to IPv6
Slides from Introduction to IPv6
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6
 
10 fn s05
10 fn s0510 fn s05
10 fn s05
 
10 fn s05
10 fn s0510 fn s05
10 fn s05
 
IPv6 Adoption --- Acceleration
IPv6 Adoption --- AccelerationIPv6 Adoption --- Acceleration
IPv6 Adoption --- Acceleration
 
Ireland Dublin VPS and Dedicated Server Hosting Provider TheServerHost IPV6
Ireland Dublin VPS and Dedicated Server Hosting Provider TheServerHost IPV6Ireland Dublin VPS and Dedicated Server Hosting Provider TheServerHost IPV6
Ireland Dublin VPS and Dedicated Server Hosting Provider TheServerHost IPV6
 
TheServerHost offering IPV6 Philippines VPS and Dedicated Server
TheServerHost offering IPV6 Philippines VPS and Dedicated ServerTheServerHost offering IPV6 Philippines VPS and Dedicated Server
TheServerHost offering IPV6 Philippines VPS and Dedicated Server
 
ION Malta - Seeweb Thoughts on IPv6 Transition
ION Malta - Seeweb Thoughts on IPv6 TransitionION Malta - Seeweb Thoughts on IPv6 Transition
ION Malta - Seeweb Thoughts on IPv6 Transition
 
Hacking 05 2011
Hacking 05 2011Hacking 05 2011
Hacking 05 2011
 
June 2004 IPv6 – Hands on
June 2004 IPv6 – Hands on June 2004 IPv6 – Hands on
June 2004 IPv6 – Hands on
 
IPv6: The New Internet Protocol
IPv6: The New Internet ProtocolIPv6: The New Internet Protocol
IPv6: The New Internet Protocol
 
NAv6TF I Pv6 State Of Union Jan 2008
NAv6TF  I Pv6  State Of  Union  Jan 2008NAv6TF  I Pv6  State Of  Union  Jan 2008
NAv6TF I Pv6 State Of Union Jan 2008
 
TheServerHost offering USA, Phoenix VPS and Dedicated Server Hosting with IPV6
TheServerHost offering USA, Phoenix VPS and Dedicated Server Hosting with IPV6TheServerHost offering USA, Phoenix VPS and Dedicated Server Hosting with IPV6
TheServerHost offering USA, Phoenix VPS and Dedicated Server Hosting with IPV6
 
Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...
Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...
Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...
 
IETF Activities Update
IETF Activities UpdateIETF Activities Update
IETF Activities Update
 
IPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for MobilesIPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for Mobiles
 
IPv6IntegrationBestPracticesfinal.pdf
IPv6IntegrationBestPracticesfinal.pdfIPv6IntegrationBestPracticesfinal.pdf
IPv6IntegrationBestPracticesfinal.pdf
 
Wim Delrue - Trends in IPv6 Training
Wim Delrue - Trends in IPv6 TrainingWim Delrue - Trends in IPv6 Training
Wim Delrue - Trends in IPv6 Training
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 

Mehr von Cyren, Inc

Webinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowWebinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowCyren, Inc
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportCyren, Inc
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareCyren, Inc
 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksCyren, Inc
 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingCyren, Inc
 
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyWebinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyCyren, Inc
 
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatWebinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatCyren, Inc
 
Webinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeWebinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeCyren, Inc
 
Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteCyren, Inc
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksCyren, Inc
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseCyren, Inc
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportCyren, Inc
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityCyren, Inc
 
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportWebinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportCyren, Inc
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareCyren, Inc
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseCyren, Inc
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportCyren, Inc
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 PresentationCyren, Inc
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookCyren, Inc
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Cyren, Inc
 

Mehr von Cyren, Inc (20)

Webinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowWebinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to know
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat report
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomware
 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array works
 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxing
 
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyWebinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking survey
 
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatWebinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threat
 
Webinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeWebinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrime
 
Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsolete
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacks
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud Security
 
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportWebinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for Healthcare
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 Presentation
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
 

KĂŒrzlich hochgeladen

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vĂĄzquez
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 

KĂŒrzlich hochgeladen (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

Slides from IPv6 Threats

  • 1. IPv6 Threats Slides from June 2011 webcast
  • 2. 2 View the recorded webcast on SlideShare at
 http://www.slideshare.net/Commtouch/commtouch-ipv6-threats on
  • 3. Eyal OrgilMarketing DirectorCommtouch Welcome to Part 2IPv6 Informational Series
  • 4. IPv6 Informational Series Part 1: An Introduction to IPv6 on Eyal OrgilMarketing DirectorCommtouch http://www.slideshare.net/Commtouch or at www.commtouch.com/introduction-ipv6
  • 5. IPv6 Informational Series Part 1: An Introduction to IPv6 Part 2: IPv6 Security Threats Eyal OrgilMarketing DirectorCommtouch
  • 6. Speakers Asaf GreinerVP ProductsCommtouch Gabriel M. MizrahiVP TechnologiesCommtouch
  • 7. Have a question? Send questions to: IPv6@commtouch.com Responses posted: http://blog.commtouch.com
  • 8. Is the Change to IPv6 aSignificant Security Event?
  • 9. Is IPv6 a Significant Event Move to IPv6 a transition, not an event Taking place for several years Will continue for many more years There will be security implications During the transition period After fully implemented Many threats same as IPv4 Especially while dual-stacks are in use
  • 10. Is IPv6 a Significant Event Many IPv4 threats not applicable to IPv6 Care must be taken when using dual-networks Many existing security solutions can protect against IPv6 threats But, must be properly configured Many threats related to transition to IPv6, not new threats
  • 11. Is IPv6 a Significant Event Many IPv6 users today are experts and enthusiasts IPv6 is not yet in widespread usage Still see minimal usage of IPv6 Wider adoption of IPv6 depends on readiness of network infrastructures Currently no big incentive to move to IPv6
  • 12. Is IPv6 a Significant Event Hackers will utilize IPv6 when it will bring them value Not deployed widely enough in order to invest time As IPv6 grows it will appear on the Hacker radar Transition a long process, not a one day event Advise that you learn and adjust
  • 13. The Hype About IPv6 – Is it Just Another Y2K Scare?
  • 14. Is IPv6 Another Y2K? Don’t be scared of IPv6, but don’t take lightly IPv6 is a technology which offers: New opportunities New challenges No date for IPv6 Will take years for IPv6 to become the main protocol
  • 15. Is IPv6 Another Y2K? Expect many mission critical infrastructures to remain IPv4 Enough IPv4 addresses for these Unlikely websites will be moved to be IPv6 in near future When a large move occurs, we will know: There is a large user IPv6 base End of transition period is near
  • 16. Top Security Issues with IPv6
  • 17. IPv6 Security Issues Top three security related issues IPv6: Tunneling of IPv6 over IPv4 (6 to 4) Rogue devices IP Reputation
  • 19. IPv6 Tunneling Threat IPv4 ConfiguredFirewall IPv4 Network IPv4 IPv4 IPv4 IPv4 Address Internal Network Internet
  • 20. IPv6 Tunneling Threat IPv4 ConfiguredFirewall IPv4 Network IPv4 IPv4 IPv4 IPv6 Address Internal Network Internet
  • 21. IPv6 Tunneling Threat IPv4 ConfiguredFirewall IPv4 Network GW IPv4-to-IPv6 Gateway IPv4 IPv6 IPv4 IPv4 IPv6 IPv6 over IPv4 IPv6 Address IPv6 over IPv4 tunnel Internal Network Internet
  • 22. IPv6 Tunneling Threat IPv4 ConfiguredFirewall IPv4website FW Policy: No Angry Birds IPv4 Network IPv4 IPv4 IPv4 Internal Network Internet
  • 23. IPv6 Tunneling Threat IPv4 ConfiguredFirewall IPv4website FW Policy: No Angry Birds IPv4 Network GW IPv4-to-IPv6 Gateway IPv6website IPv6 IPv4 IPv6 IPv4 IPv4 IPv6 over IPv4 Bypass firewall policy Internal Network Internet
  • 24. IPv6 Tunneling Threat Need to be aware that security devices are configured for IPv6 For example firewalls Another example – IDS (Intrusion Detection System) Can inspect IPv6, but you need to enable it If not, you won’t be enforcing the policy on IPv6
  • 28. Rogue Devices IPv6 Prefix IPv6 Prefix Rogue Device
  • 29. Rogue Devices Windows 7 Windows 7 Windows 7 IPv4 Network
  • 30. Rogue Devices Windows 7 Windows 7 Windows 7 IPv6 Network IPv4 Network IPv6 enabledby default
  • 31. Rogue Devices Windows 7 Windows 7 Windows 7 Internet? Internet? Internet? IPv6 Network IPv4 Network IPv6 searchesfor accessto the Internet
  • 32. Rogue Devices Windows 7 Windows 7 Windows 7 Internet? Internet? Internet? IPv6 Network IPv4 Network IPv6 Prefix IPv6 Prefix Internet IPv6 Rogue Device
  • 33. Rogue Devices The difference is: IPv4 is used daily If a different allocation is provided, there will be noticeable effects With IPv6, the insertion of a rogue device may go unnoticed
  • 34. Rogue Devices IPv6 Network Man in the middle Internet IPv6 Rogue Device
  • 35. Rogue Devices IPv6 Network Man in the middle Internet IPv6 Rogue Device
  • 36. Rogue Devices IPv6 Network Man in the middle Internet IPv6 Rogue Device
  • 37. Rogue Devices IPv6 Network Man in the middle Internet IPv6 Rogue Device
  • 38. Rogue Devices Not only a Windows problem An issue with most operating systems IPv6 is defined by default IPv6 could run in the background without anyone’s knowledge Security risk also in IPv4 with DHCP Make sure unauthorized devices cannot connect to your network
  • 40. IP Reputation Far more IP addresses in IPv6 232 compared to 2128 Challenges IP allocation will be different from IPv4 Anyone can get a large IP allocation Any person can get a 64 bit allocation (264) The entire Internet today is 232
  • 41. IP Reputation Last 64 bits define the device ID Complicate issue by using randomizer to change 64 bit Every spam message could be sent from different IP From IP address: wwww From IP address: xxxx From IP address: yyyy 264 DifferentIP Addresses Internet From IP address: zzzz
  • 42.
  • 43. Need other methods to build reputation
  • 46. Vast amount of memory will be needed
  • 47. No NAT in IPv6
  • 48. Some believe a security issue
  • 49. They believe NAT provides a layer of security
  • 50.
  • 51. Commtouch and IPv6 Commtouch has been working on IPv6 for some time Making changes to client side and back-end Client side will be transparent Focus has been on the back-end GlobalView Mail Reputation transparently supports more IPs addresses Still single query of an IP address but data storage more efficient
  • 52. Commtouch and IPv6 Monitoring the Internet Identifying IPv6 threats Classifying threats Currently seeing minor IPv6 spam activity Believe spammers experimenting with IPv6 Too noticeable today to send spam via IPv6 when there is very little email on this network
  • 54. Gabriel Mizrahi’s IPv6 Recommendations Make sure you have mapped all devices on your network Implement IPv6 step-by-step Have a written procedure of how you will introduce IPv6 Plan to implement a dual stack as a first stage
  • 55. Asaf Greiner’s IPv6 Recommendations Get educated about IPv6 Everyone should go back to networking fundamentals Understand what’s implemented on our network today, and why Then look at what needs to remain or change Learn from others What mistakes and successes other have experienced
  • 56. Asaf Greiner’s IPv6 Recommendations Lockdown from IPv6 as a start Then implement staged plan to roll out IPv6 Take care to avoid configuration errors
  • 57. Thank you to Asaf Greiner Commtouch VP Products Gabriel M. MizrahiCommtouch VP Technologies
  • 58. 51 View the recorded webcast on SlideShare at
 http://www.slideshare.net/Commtouch/commtouch-ipv6-threats on
  • 59. Have a question? Send questions to: IPv6@commtouch.com Responses posted: http://blog.commtouch.com
  • 60. Please check back for future informational webcasts