<section title="18.5. Internet Protocol Version 6"><subsection title="Objective"><paragraph
    title="18.5.1."


><![CDATA[<p>IPv6 is disabled until it is ready to be deployed.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="18.5.2."


><![CDATA[<p>This section covers information on IPv6 and its deployment within networks.  Where this manual specifies requirements for network devices, the requirements apply equally whether deploying IPv6 or IPv4.</p>]]></paragraph>
<paragraph
    title="18.5.3."


><![CDATA[<p>IPv6 was officially launched by the Internet Society in June 2012.  With the change from IPv4 to IPv6, there is the potential to introduce vulnerabilities to agency networks through incorrect or mis-configuration, poor design and poor device compatibility.  Attackers will also be actively seeking to exploit vulnerabilities that will inevitably be exposed.</p>]]></paragraph>
<paragraph
    title="18.5.4."


><![CDATA[<p>Agencies unable to meet the compliance requirements as specified for a control when deploying IPv6 network infrastructure will need to follow the procedures as specified in this manual for varying from a control and the associated compliance requirements.</p>]]></paragraph>
</block>
<block title="DNS Security Extensions (DNSSEC)"><paragraph
    title="18.5.5."

    tags="Technical"


><![CDATA[<p>DNSSEC has been developed to enhance Internet security and can digitally ‘sign’ data to assure validity.  It is essential that DNSSEC is deployed at each step in the lookup from root zone to final domain name (e.g., <a href="https://www.icann.org/" target="_blank">www.icann.org</a>).  Signing the root (deploying DNSSEC on the root zone) is a necessary step in this overall process.  Importantly it does not encrypt data.  It just attests to the validity of the address of the site you visit.  DNSSEC and IPv6 have been engineered to integrate and thus enhance Internet security.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="18.5.6."


><![CDATA[<table class="table-main">
<tbody>
<tr>
<td>
<p><strong>Reference</strong></p>
</td>
<td>
<p><strong>Title</strong></p>
</td>
<td>
<p><strong>Publisher</strong></p>
</td>
<td style="width: 33%;">
<p><strong>Source</strong></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>A strategy for the transition to IPv6 for Australian Government agencies. (archived document)</strong></p>
</td>
<td style="text-align: center;">
<p>Australian Government Information Management Office</p>
</td>
<td style="width: 33%;">
<p><a title="A Strategy for the Implementation of IPv6 in Australian Government Agencies" rel="noopener noreferrer" href="https://www.hpc.mil/images/hpcdocs/ipv6/endorsed_strategy_for_the_transition_to_ipv6_for_australian_government_agencies_v2.pdf" target="_blank">https://www.hpc.mil/images/hpcdocs/ipv6/endorsed_strategy_for_the_transition_to_ipv6_for_australian_government_agencies_v2.pdf [PDF, 466 KB]</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>IPv6 First-Hop Security Concerns</strong></p>
</td>
<td style="text-align: center;"><span>Cisco</span></td>
<td style="width: 33%;"><a title="Cisco IPv6 First Hop Security (FHS)" rel="noopener noreferrer" href="https://www.cisco.com/c/en/us/products/ios-nx-os-software/ipv6-first-hop-security-fhs/index.html" target="_blank">https://www.cisco.com/c/en/us/products/ios-nx-os-software/ipv6-first-hop-security-fhs/index.html</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>Manageable Network Plan</strong></p>
</td>
<td style="text-align: center;">NSA</td>
<td style="width: 33%;">
<p><a href="https://archive.org/details/pdfy-vAXwuJUZh7w7OnBF">NSA Manageable Network Plan.pdf (PDFy mirror) : Free Download, Borrow, and Streaming : Internet Archive</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>Router Security Configuration Guide Supplement – Security for IPv6 Routers, 23 May 2006 Version: 1.0</strong></p>
</td>
<td style="text-align: center;">NSA</td>
<td style="width: 33%;">
<p><a title="Router Security Configuration Guide Supplement - Security for IPv6 Routers" rel="noopener noreferrer" href="https://hpc.mil/images/hpcdocs/ipv6/nsa-router-security-configuration-supplement-guide-for-ipv6.pdf" target="_blank">https://hpc.mil/images/hpcdocs/ipv6/nsa-router-security-configuration-supplement-guide-for-ipv6.pdf [PDF, 1.37 MB]</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>Firewall Design Considerations for IPv6, 10/3/2007</strong></p>
</td>
<td style="text-align: center;">NSA</td>
<td style="width: 33%;">
<p><a title="Firewall Design Considerations for IPv6" rel="noopener noreferrer" href="https://www.hpc.mil/images/hpcdocs/ipv6/nsa-firewall-design-ipv6-i733-041r-2007.pdf" target="_blank">https://www.hpc.mil/images/hpcdocs/ipv6/nsa-firewall-design-ipv6-i733-041r-2007.pdf [PDF, 332 KB]</a></p>
</td>
</tr>
<tr>
<td><strong>NIST Special Publication 800-41, Revision 1, September 2009</strong></td>
<td>
<p><strong>Guidelines on Firewalls and Firewall Policy,&nbsp;</strong></p>
</td>
<td style="text-align: center;">NIST</td>
<td style="width: 33%;">
<p><a title="Guidelines on Firewalls and Firewall Policy" rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-41/rev-1/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-41/rev-1/final</a></p>
</td>
</tr>
<tr>
<td><strong>NIST&nbsp;<strong>Special Publication 800-119, December 2010</strong></strong></td>
<td>
<p><strong>Guidelines for secure deployment of IPv6</strong></p>
</td>
<td style="text-align: center;">NIST</td>
<td style="width: 33%;">
<p><a title="Guidelines for the Secure Deployment of IPv6" rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-119/final" target="_blank">https://csrc.nist.gov/publications/detail/sp/800-119/final</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>A Complete Guide on IPv6 Attack and Defense</strong></p>
</td>
<td style="text-align: center;">
<p>SANS Institute</p>
</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://www.sans.org/white-papers/33904/?show=complete-guide-ipv6-attack-defense-33904&amp;cat=detection" target="_blank">https://www.sans.org/white-papers/33904/?show=complete-guide-ipv6-attack-defense-33904&amp;cat=detection</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 2460&nbsp;</strong></td>
<td>
<p><strong>Internet Protocol, Version 6 (IPv6) Specification, December 1998</strong></p>
</td>
<td style="text-align: center;">IETF</td>
<td style="width: 33%;">
<p><a title="Internet Protocol, Version 6 (IPv6) Specification" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc2460" target="_blank">https://datatracker.ietf.org/doc/html/rfc2460</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 4291&nbsp;</strong></td>
<td>
<p><strong>IP Version 6 Addressing Architecture, February 2006</strong></p>
</td>
<td style="text-align: center;">
<p>IETF</p>
</td>
<td style="width: 33%;">
<p><a title="IP Version 6 Addressing Architecture" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc4291" target="_blank">https://datatracker.ietf.org/doc/html/rfc4291</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 5952</strong></td>
<td>
<p><strong>A Recommendation for IPv6 Address Text Representation, ISSN: 2070-1721, August 2010</strong></p>
</td>
<td style="text-align: center;">IETF</td>
<td style="width: 33%;">
<p><a title="A Recommendation for IPv6 Address Text Representation" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc5952" target="_blank">https://datatracker.ietf.org/doc/html/rfc5952</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 6052&nbsp;</strong></td>
<td>
<p><strong>Ipv6 Addressing of IPv4/IPv6 Translators, ISSN: 2070-1721, October 2010</strong></p>
</td>
<td style="text-align: center;">IETF</td>
<td style="width: 33%;">
<p><a title="IPv6 Addressing of IPv4/IPv6 Translators" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc6052" target="_blank">https://datatracker.ietf.org/doc/html/rfc6052</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 7136</strong></td>
<td>
<p><strong>Significance of IPv6 Interface Identifiers, ISSN: 2070-1721, February 2014</strong></p>
</td>
<td style="text-align: center;">IETF</td>
<td style="width: 33%;">
<p><a title="Significance of IPv6 Interface Identifiers" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc7136" target="_blank">https://datatracker.ietf.org/doc/html/rfc7136</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>RFC 6781</strong></p>
</td>
<td>
<p><strong>DNSSEC Operational Practices, Version 2</strong></p>
</td>
<td style="text-align: center;">
<p>IETF</p>
</td>
<td style="width: 33%;">
<p><a title="DNSSEC Operational Practices, Version 2" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/rfc6781/" target="_blank">https://datatracker.ietf.org/doc/rfc6781/</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 6840</strong></td>
<td>
<p><strong>Clarifications and Implementation Notes for DNS Security (DNSSEC)</strong></p>
</td>
<td style="text-align: center;">
<p>IETF</p>
</td>
<td style="width: 33%;">
<p><a title="Clarifications and Implementation Notes for DNS Security (DNSSEC)" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc6840" target="_blank">https://datatracker.ietf.org/doc/html/rfc6840</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 6841&nbsp;</strong></td>
<td>
<p><strong>A Framework for DNSSEC Policies and DNSSEC Practice Statements</strong></p>
</td>
<td style="text-align: center;">
<p>IETF</p>
</td>
<td style="width: 33%;">
<p><a title="A Framework for DNSSEC Policies and DNSSEC Practice Statements" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc6841" target="_blank">https://datatracker.ietf.org/doc/html/rfc6841</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 7123</strong></td>
<td>
<p><strong>Security Implications of IPv6 on IPv4 Networks</strong></p>
</td>
<td style="text-align: center;">
<p>IETF</p>
</td>
<td style="width: 33%;">
<p><a title="Security Implications of IPv6 on IPv4 Networks" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc7123" target="_blank">https://datatracker.ietf.org/doc/html/rfc7123</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 4861&nbsp;</strong></td>
<td>
<p><strong>Neighbor Discovery for IP version 6 (IPv6)</strong></p>
</td>
<td style="text-align: center;">
<p>IETF</p>
</td>
<td style="width: 33%;">
<p><a title="Neighbor Discovery for IP version 6 (IPv6)" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc4861" target="_blank">https://datatracker.ietf.org/doc/html/rfc4861</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 5942&nbsp;&nbsp;</strong></td>
<td>
<p><strong>IPv6 Subnet Model: The Relationship between Links and Subnet Prefixes</strong></p>
</td>
<td style="text-align: center;">
<p>IETF</p>
</td>
<td style="width: 33%;">
<p><a title="IPv6 Subnet Model: The Relationship between Links and Subnet Prefixes" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc5942" target="_blank">https://datatracker.ietf.org/doc/html/rfc5942</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 3315&nbsp;</strong></td>
<td>
<p><strong>Dynamic Host Configuration Protocol for IPv6 (DHCPv6)</strong></p>
</td>
<td style="text-align: center;">
<p>IETF</p>
</td>
<td style="width: 33%;">
<p><a title="Dynamic Host Configuration Protocol for IPv6 (DHCPv6)" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3315" target="_blank">https://datatracker.ietf.org/doc/html/rfc3315</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 6104&nbsp;</strong></td>
<td>
<p><strong>Rogue IPv6 Router Advertisement Problem Statement</strong></p>
</td>
<td style="text-align: center;">IETF</td>
<td style="width: 33%;">
<p><a title="Rogue IPv6 Router Advertisement Problem Statement" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc6104" target="_blank">https://datatracker.ietf.org/doc/html/rfc6104</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>DNSSEC – What Is It and Why Is It Important?</strong></p>
</td>
<td style="text-align: center;">
<p>Internet Corporation for Assigned Names and Numbers (ICAAN)</p>
</td>
<td style="width: 33%;">
<p><a title="dnssec-what-is-it-why-important" rel="noopener noreferrer" href="https://www.icann.org/resources/pages/dnssec-what-is-it-why-important-2019-03-05-en" target="_blank">https://www.icann.org/resources/pages/dnssec-what-is-it-why-important-2019-03-05-en#</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Use of dual-stack equipment"><paragraph
    title="18.5.7.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>In order to reduce the attack surface area of agency systems, it is good practice that agencies disable unused services and functions within network devices and operating systems.  If agencies are deploying dual-stack equipment but not using the IPv6 functionality, then that functionality should be disabled.  It can be re-enabled when required.  This will reduce the opportunity to exploit IPv6 functionality before appropriate security measures have been implemented.</p>]]></paragraph>
<paragraph
    title="18.5.7.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3951"
><![CDATA[<p>Agencies not using IPv6, but which have deployed dual-stack network devices and ICT equipment that supports IPv6, MUST disable the IPv6 functionality, unless that functionality is required.</p>]]></paragraph>
<paragraph
    title="18.5.7.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3952"
><![CDATA[<p>Network security devices on IPv6 or dual-stack networks MUST be IPv6 capable.</p>]]></paragraph>
</block>
<block title="Using IPv6"><paragraph
    title="18.5.8.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>The information security implications around the use of IPv6 are still largely unknown and un-tested.  As many of the deployed network protection technologies, such as firewalls and IDSs, do not consistently support IPv6, agencies choosing to implement IPv6 face an increased risk of systems compromise.</p>]]></paragraph>
<paragraph
    title="18.5.8.R.02."

    tags="Network Security,Technical"


><![CDATA[<p>A number of tunnelling protocols have been developed to facilitate interoperability between IPv4 and IPv6.  Disabling IPv6 tunnelling protocols when this functionality is not explicitly required will reduce the risk of bypassing network defences by means of encapsulating IPv6 data inside IPv4 packets.</p>]]></paragraph>
<paragraph
    title="18.5.8.R.03."

    tags="Network Security,Technical"


><![CDATA[<p>Stateless Address Autoconfiguration (SLAAC) is a method of stateless IP address configuration in IPv6.  SLAAC reduces the ability to maintain complete logs of IP address assignment on the network.  To avoid this constraint, stateless IP addressing SHOULD NOT be used.</p>]]></paragraph>
<paragraph
    title="18.5.8.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3960"
><![CDATA[<p>Agencies using IPv6 MUST conduct a security risk assessment on risks that could be introduced as a result of running a dual stack environment or transitioning completely to IPv6.</p>]]></paragraph>
<paragraph
    title="18.5.8.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3961"
><![CDATA[<p>Agencies implementing a dual stack or wholly IPv6 network or environment MUST re-accredit their networks.</p>]]></paragraph>
<paragraph
    title="18.5.8.C.03."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3962"
><![CDATA[<p>IPv6 tunnelling MUST be disabled on all network devices, unless explicitly required.</p>]]></paragraph>
<paragraph
    title="18.5.8.C.04."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3965"
><![CDATA[<p>Dynamically assigned IPv6 addresses SHOULD be configured with DHCPv6 in a stateful manner and with lease information logged and logs stored in a centralised logging facility.</p>]]></paragraph>
</block>
<block title="New systems and networks"><paragraph
    title="18.5.9.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>Planning and accommodating changes in technology are an essential part of securing architectures and systems development.</p>]]></paragraph>
<paragraph
    title="18.5.9.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3971"
><![CDATA[<p>Any network defence elements and devices MUST be IPv6 aware.</p>]]></paragraph>
<paragraph
    title="18.5.9.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="3972"
><![CDATA[<p>New network devices, including firewalls, IDS and IPS, MUST be IPv6 capable.</p>]]></paragraph>
<paragraph
    title="18.5.9.C.03."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3974"
><![CDATA[<p>Agencies SHOULD consider the use of DNSSEC.</p>]]></paragraph>
</block>
<block title="Introducing IPv6 capable equipment to gateways"><paragraph
    title="18.5.10.R.01."

    tags="Network Security,Technical,Gateways"


><![CDATA[<p>Introducing IPv6 capable network devices into agency gateways can introduce a significant number of new security risks. Undergoing reaccreditation when new IPv6 equipment is introduced will ensure that any IPv6 functionality that is not intended to be used cannot be exploited by an attacker before appropriate information security mechanisms have been put in place.</p>]]></paragraph>
<paragraph
    title="18.5.10.C.01."

    tags="Network Security,Technical,Gateways"


    classification="All Classifications"
    compliance="Must"
    cid="4012"
><![CDATA[<p>IPv6 tunnelling MUST be blocked by network security devices at externally connected network boundaries.</p>]]></paragraph>
<paragraph
    title="18.5.10.C.02."

    tags="Network Security,Technical,Gateways"


    classification="All Classifications"
    compliance="Should"
    cid="4014"
><![CDATA[<p>Agencies deploying IPv6 equipment in their gateway but not enabling the functionality SHOULD undergo reaccreditation.</p>]]></paragraph>
</block>
<block title="Enabling IPv6 in gateways"><paragraph
    title="18.5.11.R.01."

    tags="Network Security,Technical,Gateways"


><![CDATA[<p>Once agencies have completed the transition to a dual-stack environment or completely to an IPv6 environment, reaccreditation will assist in ensuring that the associated information security mechanisms for IPv6 are working effectively.</p>]]></paragraph>
<paragraph
    title="18.5.11.C.01."

    tags="Network Security,Technical,Gateways"


    classification="All Classifications"
    compliance="Must"
    cid="4018"
><![CDATA[<p>Agencies enabling a dual-stack environment or a wholly IPv6 environment in their gateways MUST reaccredit their gateway systems.</p>]]></paragraph>
</block>
</subsection>
</section>
