Default security functions on an IPv6 CPE

Mikael Abrahamsson swmike at swm.pp.se
Fri May 6 09:41:08 CEST 2011


On Thu, 5 May 2011, Doug Barton wrote:

> A) It depends on who you ask. The millions of infected hosts comprising the 
> bot armies in the current DDOS wars would seem to argue against your point.

Today, people get infected by browsing or downloading and components in 
their operating system environment have security vulnerabilities. "Drive 
by infections" are a lot more common compared to remote exploits by means 
of exploiting services on their end-systems.

Hackers hack web servers and install java and adobe reader exploits, and 
since most end systems are not regularilty up-to-date with these 3rd party 
applications, they get p0wned. I have talked to people claiming 20% 
infection rate with just Java and Adobe Reader exploits, and hacking blogs 
etc to inject links to exploit code is relatively easy, infecting 
"regular" people who are surfing "the Internet" is not that hard.

Then we of course have the clasical email attachment vector that people 
tend to click on... All of these are not stopped by having a firewall, and 
having a firewall default-on causes a lot of other problems without 
helping much.

I work for an SP where we give all devices (mobile and fixed) GUA IPv4 
addresses with no filtering (many millions of customers) and we've been 
doing this "forever". We provide "Internet Connectivity", and we try not 
to filter. We've had to filter TCP/25 and the "windows ports" on some 
access types though due to pressure from the outside and customers, but 
that's more like "BCP filtering" than actually providing a firewall.

> I'm not familiar with the data points you're providing, however these 
> anecdotes don't advance the discussion. In your mind what problems are 
> created by enabling the firewall by default?

In my mind, things like video conferencing and other endsystem to 
endsystem activity is hampered by a firewall that is default-on.

> Windows XP supports IPv6 (albeit it is not on by default), and it 
> certainly was not designed with security in mind. If you put an 
> unpatched version of XP on the live, open network it'll be pwned before 
> you have a chance to download the first service pack.

Not if it's SP2 or SP3 which has firewall on by default.

-- 
Mikael Abrahamsson    email: swmike at swm.pp.se


More information about the ipv6-ops mailing list