Security Issues of IPv6 Network Autoconfiguration

  • Maciej Rostański
  • Taras Mushynskyy
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8104)


IPv6 is a new version of IP protocol, which was defined in the series of RFC documents at the end of previous century. Although developments and improvements are conducted for many years already, a new standard still did not get such distribution as IPv4. The useful innovation and one of basic advantages of IPv6 protocol is a possibility of automatic assignment of addresses to the network devices. Such mode got the name SLAAC (StateLess Address AutoConfiguration). However, there are tasks, for implementation of which greater control is needed. In this case it is necessary to use the static addressing or DHCPv6 server for IPv6 protocol (stateful autoconfiguration). The aim of this work was to visualize an IPv6 network using stateless and stateful addressing modes and to reveal the features and security issues of the specific configurations. Those security issues need to be reminded to the administrators, as the big IPv6 migration is coming for small and medium businesses.


IPv6 Computer Networks Network Security SLAAC DHCPv6 


  1. 1.
    Ashton, K.: That ‘Internet of Things’ Thing. RFID Journal 22 (July 2009)Google Scholar
  2. 2.
    Curtis, S., Niedzielewski, D.: Internet of Things: miliardy urządzeń, czujników i liczników podłączonych do sieci. Networld polish ed. 01/2013, Miller Druk, Warszawa (2013)Google Scholar
  3. 3.
    Van Beijnum, I.: Running IPv6. Apress, New York (2006) ISBN: 1-59059-527-0Google Scholar
  4. 4.
    Odom, W.: CCNP Route 642-902 Official Certification Guide, 4th edn. Cisco Press, Indianapolis (2011)Google Scholar
  5. 5.
    Deering, S., Hinden, R.: Internet Protocol, Version 6 (IPv6) Specification, RFC 2460, IETF 1998 (1998)Google Scholar
  6. 6.
    Burkhalter, M.: Study: IPv6 adoption remaining slow, Perle Industry News (2011),
  7. 7.
    Narten, T., et al.: Privacy Extensions for Stateless Address Autoconfiguration in IPV6 (RFC 4941), IETF 2007 (2007)Google Scholar
  8. 8.
    Thomson, S., Narten, T., Jinmei, T.: IPv6 Stateless Address Autoconfiguration (RFC 4862), Draft Standard, IETF 2007 (2007)Google Scholar
  9. 9.
    Droms, R., et al.: Dynamic Host Configuration Protocol for IPv6 (DHCPv6) (RFC 3315), IETF 2003 (2003)Google Scholar
  10. 10.
    Droms, R., Narten, T.: Default Router and Prefix Advertisement Options for DHCPv6, IETF 2009 (2009),
  11. 11.
    Novak, J.: Target-Based Fragmentation Reassembly, Sourcefire, Columbia, MD 2005 (2005)Google Scholar
  12. 12.
    Hollis, K.: Rose Attack Explained, (retrieved: February 16, 2013)
  13. 13.
    Narten, T., et al.: Neighbor Discovery for IP version 6 (IPv6) (RFC 4861), Draft Standard, IETF 2007 (2007)Google Scholar
  14. 14.
    Chown, T., Venaas, S.: IPv6 Router Advertisement Problem Statement (RFC 6104), IETF 2011 (2011)Google Scholar
  15. 15.
    Chown, T.: Dynamic Host Configuration Protocol (DHCP): IPv4 and IPv6 Dual-Stack Issues (RFC 4477), IETF 2006 (2006)Google Scholar
  16. 16.
    Durand, A. et al.: Operational Considerations and Issues with IPv6 DNS (RFC 4472), IETF 2006 (2006)Google Scholar
  17. 17.
    Arkko, J. (ed.): SEcure Neighbor Discovery (SEND) (RFC 3971), IETF 2005 (2005)Google Scholar
  18. 18.
    Levy-Abegnoli, E., et al.: IPv6 Router Advertisement Guard (RFC 6105), IETF 2011 (2011)Google Scholar
  19. 19.
    Ward, N.: IPv6 Autoconfig Filtering on Ethernet Switches, Internet Draft, IETF 2009 (2009)Google Scholar
  20. 20.
    Chown, T.: Implications for Network Scanning (RFC 5157), IETF 2008 (2008)Google Scholar
  21. 21.
    Chown, T.: Default Address Selection for Internet Protocol Version 6 (IPv6) (RFC 6724), IETF 2012 (2012)Google Scholar
  22. 22.
    Nikander, P. (ed.): IPv6 Neighbor Discovery (ND) Trust Models and Threats, RFC 3756, IETF 2004 (2004)Google Scholar
  23. 23.
    Mankin, A.: Threat Models introduced by Mobile IPv6 and Requirements for Security in Mobile IPv6, Internet Draft, IETF 2002 (2002)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2013

Authors and Affiliations

  • Maciej Rostański
    • 1
  • Taras Mushynskyy
    • 1
  1. 1.Faculty of Computer ScienceAcademy of Business in Dąbrowa GórniczaDąbrowa GórniczaPoland

Personalised recommendations