This section lists common IPv6 challenges, which have been validated and discussed during several meetings and public events. The scope is to encourage more investigations. Despite that IPv6 has already been well proven in production, there are some challenges to consider. In this regard, it is worth noting that [
ETSI-GR-IPE-001] also discusses gaps that still exist in IPv6-related use cases.
A service provider, an enterprise, or a CSP may perceive quite a complex task with the transition to IPv6 due to the many technical alternatives available and the changes required in management and operations. Moreover, the choice of the method to support the transition is an important challenge and may depend on factors specific to the context, such as the IPv6 network design that fits the service requirements, the network operations, and the deployment strategy.
The subsections below briefly highlight the approaches that the different parties may take and the related challenges.
For fixed operators, the massive software upgrade of CPEs to support Dual-Stack already started in most of the service provider networks. On average, looking at the global statistics, the IPv6 traffic percentage is currently around 40% [
G_stats]. As highlighted in
Section 3.2, all major content providers have already implemented Dual-Stack access to their services, and most of them have implemented IPv6-only in their Data Centers. This aspect could affect the decision on the IPv6 adoption for an operator, but there are also other factors, like the current IPv4 address shortage, CPE costs, CGN costs, and so on.
-
Fixed operators with a Dual-Stack architecture can start defining and applying a new strategy when reaching the limit in terms of the number of IPv4 addresses available. This may be done through CGN or with an IPv4aaS approach.
-
Most of the fixed operators remain attached to a Dual-Stack architecture, and many have already employed CGN. In this case, it is likely that CGN boosts their ability to supply IPv4 connectivity to CPEs for more years to come. Indeed, only few fixed operators have chosen to move to an IPv6-only scenario.
For mobile operators, the situation is quite different, since in some cases, mobile operators are already stretching their IPv4 address space. The reason is that CGN translation limits have been reached and no more IPv4 public pool addresses are available.
-
Some mobile operators choose to implement Dual-Stack as a first and immediate mitigation solution.
-
Other mobile operators prefer to move to IPv4aaS solutions (e.g., 464XLAT) since Dual-Stack only mitigates and does not solve the IPv4 address scarcity issue completely.
For both fixed and mobile operators, the approach for the transition is not unique, and this brings different challenges in relation to the network architecture and related costs; therefore, each operator needs to do their own evaluations for the transition based on the specific situation.
At present, the usage of IPv6 for enterprises often relies on upstream service providers, since the enterprise connectivity depends on the services provided by their upstream provider. Regarding the enterprises' internal infrastructures, IPv6 shows its advantages in the case of a merger and acquisition, because it can be avoided by the overlapping of the two address spaces, which is common in case of IPv4 private addresses. In addition, since several governments are introducing IPv6 policies, all the enterprises providing consulting services to governments are also required to support IPv6.
However, enterprises face some challenges. They are shielded from IPv4 address depletion issues due to their prevalent use of proxy and private addressing [
RFC 1918]; thus, they do not have the business requirement or technical justification to transition to IPv6. Enterprises need to find a business case and a strong motivation to transition to IPv6 to justify additional CAPEX and OPEX. Also, since Information and Communication Technologies (ICTs) are not the core business for most of the enterprises, the ICT budget is often constrained and cannot expand considerably. However, there are examples of big enterprises that are considering IPv6 to achieve business targets through a more efficient IPv6 network and to introduce newer services that require IPv6 network architecture.
Enterprises worldwide, in particular small- and medium-sized enterprises, are quite late to adopt IPv6, especially on internal networks. In most cases, the enterprise engineers and technicians do not have a great experience with IPv6, and the problem of application porting to IPv6 looks quite difficult. As highlighted in the relevant poll, the technicians may need to be trained, but the management does not see a business need for adoption. This creates an unfortunate cycle where the perceived complexity of the IPv6 protocol and concerns about security and manageability combine with the lack of urgent business needs to prevent adoption of IPv6. In 2019 and 2020, there has been a concerted effort by some ARIN and APNIC initiatives to provide training [
ARIN-CG] [
ISIF-ASIA-G].
In an industrial environment, Operational Technology (OT) refers to the systems used to monitor and control processes within a factory or production environment, while Information Technology (IT) refers to anything related to computer technology and networking connectivity. IPv6 is frequently mentioned in relation to Industry 4.0 and the Internet of Things (IoT), affecting the evolution of both OT and IT.
There are potential advantages for using IPv6 for the Industrial Internet of Things (IIoT), in particular, the large IPv6 address space, the automatic IPv6 address configuration, and resource discovery. However, its industrial adoption, in particular, in smart manufacturing systems, has been much slower than expected. There are still many obstacles and challenges that prevent its pervasive use. The key problems identified are the incomplete or underdeveloped tool support, the dependency on manual configuration, and the poor knowledge of the IPv6 protocols. To promote the use of IPv6 for smart manufacturing systems and IIoT applications, a generic approach to remove these pain points is highly desirable. Indeed, as for enterprises, it is important to provide an easy way to familiarize system architects and software developers with the IPv6 protocol.
Advances in cloud-based platforms and developments in artificial intelligence (AI) and machine learning (ML) allow OT and IT systems to integrate and migrate to a centralized analytical, processing, and integrated platform, which must act in real time. The limitation is that manufacturing companies have diverse corporate cultures, and the adoption of new technologies may lag as a result.
For Industrial Internet and related IIoT applications, it would be desirable to leverage the configurationless characteristic of IPv6 to automatically manage and control the IoT devices. In addition, it could be interesting to have the ability to use IP-based communication and standard application protocols at every point in the production process and further reduce the use of specialized communication systems.
The high number of addresses required to connect the virtual and physical elements in a Data Center and the necessity to overcome the limitation posed by [
RFC 1918] have been the drivers to the adoption of IPv6 in several CSP networks.
Most CSPs have adopted IPv6 in their internal infrastructure but are also active in gathering IPv4 addresses on the transfer market to serve the current business needs of IPv4 connectivity. As noted in the previous section, most enterprises do not consider the transition to IPv6 as a priority. To this extent, the use of IPv4-based network services by the CSPs will last.
Several public references, as reported hereinafter, discuss how most of the major players find themselves at different stages in the transition to IPv6-only in their Data Center (DC) infrastructure. In some cases, the transition already happened and the DC infrastructure of these hyperscalers is completely based on IPv6.
It is interesting to look at how much traffic in a network is going to Caches and Content Delivery Networks (CDNs). The response is expected to be a high percentage, at least higher than 50% in most of the cases, since all the key Caches and CDNs are ready for IPv6 [
Cldflr] [
Ggl] [
Ntflx] [
Amzn] [
Mcrsft]. So the percentage of traffic going to the key Caches/CDNs is a good approximation of the potential IPv6 traffic in a network.
The challenges for CSPs are mainly related to the continuous support of IPv4 to be guaranteed, since most CSPs already completed the transition to IPv6-only. If, in the next years, the scarcity of IPv4 addresses becomes more evident, it is likely that the cost of buying an IPv4 address by a CSP could be charged to their customers.
It can be noted that most of the user devices (e.g., smartphones) have been IPv6 enabled for many years. But there are exceptions, for example, for the past few years, smart TVs have typically had IPv6 support; however, not all the economies replace them at the same pace.
As already mentioned, ISPs who historically provided public IPv4 addresses to their customers generally still have those IPv4 addresses (unless they chose to transfer them). Some have chosen to put new customers on CGN but without touching existing customers. Because of the extremely small number of customers who notice that IPv4 is done via NAT444 (i.e., the preferred CGN solution for carriers), it could be less likely to run out of IPv4 addresses and private IPv4 space. But as IPv4-only devices and traffic reduce, the need to support private and public IPv4 lessens. So to have CPEs completely support IPv6 serves as an important challenge and incentive to choose IPv4aaS solutions [
ANSI] over Dual-Stack.
The transition to IPv6 requires that the application software is adapted for use in IPv6-based networks ([
ARIN-SW] provides an example). The use of transition mechanisms like 464XLAT is essential to support IPv4-only applications while they evolve to IPv6. Depending on the transition mechanism employed, some issues may remain. For example, in the case of NAT64/DNS64, the use of literal IPv4 addresses, instead of DNS names, will fail unless mechanisms such as Application Level Gateways (ALGs) are used. This issue is not present in 464XLAT (see [
RFC 8683]).
It is worth mentioning Happy Eyeballs [
RFC 8305] as a relevant aspect of application transition to IPv6.
There are important IPv6 complementary solutions related to Operations, Administration, and Maintenance (OAM) that look less mature compared to IPv4. A Network Management System (NMS) has a central role in the modern networks for both network operators and enterprises, and its transition is a fundamental issue. This is because some IPv6 products are not as field proven as IPv4 products, even if conventional protocols (e.g., SNMP and RADIUS) already support IPv6. In addition, an incompatible vendor road map for the development of new NMS features affects the confidence of network operators or enterprises.
An important factor is represented by the need for training the network operations workforce. Deploying IPv6 requires that policies and procedures have to be adjusted in order to successfully plan and complete an IPv6 transition. Staff has to be aware of the best practices for managing IPv4 and IPv6 assets. In addition to network nodes, network management applications and equipment need to be properly configured and, in some cases, also replaced. This may introduce more complexity and costs for the transition.
Availability of both systems and training is necessary in areas such as IPv6 addressing. IPv6 addresses can be assigned to an interface through different means, such as Stateless Auto-Configuration (SLAAC) [
RFC 4862], or by using the stateful Dynamic Host Configuration Protocol (DHCP) [
RFC 8415]. IP Address Management (IPAM) systems may contribute by handling the technical differences and automating some of the configuration tasks, such as the address assignment or the management of DHCP services.
People tend to compare the performance of IPv6 versus IPv4 to argue or motivate the IPv6 transition. In some cases, IPv6 behaving "worse" than IPv4 may be used as an argument for avoiding the full adoption of IPv6. However, there are some aspects where IPv6 has already filled (or is filling) the gap to IPv4. This position is supported when looking at available analytics on two critical parameters: packet loss and latency. These parameters have been constantly monitored over time, but only a few comprehensive measurement campaigns are providing up-to-date information. While performance is undoubtedly an important issue to consider and worth further investigation, the reality is that a definitive answer cannot be found on what IP version performs better. Depending on the specific use case and application, IPv6 is better; in others, the same applies to IPv4.
[
APNIC5] provides a measurement of both the failure rate and Round-Trip Time (RTT) of IPv6 compared against IPv4. Both measures are based on scripts that employ the three-way handshake of TCP. As such, the measurement of the failure rate does not provide a direct measurement of packet loss (which would need an Internet-wide measurement campaign). That said, despite that IPv4 is still performing better, the difference seems to have decreased in recent years. Two reports, namely [
RIPE1] and [
APRICOT], discussed the associated trend, showing how the average worldwide failure rate of IPv6 is still a bit worse than IPv4. Reasons for this effect may be found in endpoints with an unreachable IPv6 address, routing instability, or firewall behavior. Yet, this worsening effect may appear as disturbing for a plain transition to IPv6.
[
APNIC5] also compares the latency of both address families. Currently, the worldwide average is slightly in favor of IPv6. Zooming at the country or even at the operator level, it is possible to get more detailed information and appreciate that cases exist where IPv6 is faster than IPv4. Regions (e.g., Western Europe, Northern America, and Southern Asia) and countries (e.g., US, India, and Germany) with an advanced deployment of IPv6 (e.g., greater than 45%) are showing that IPv6 has better performance than IPv4. [
APRICOT] highlights how when a difference in performance exists, it is often related to asymmetric routing issues. Other possible explanations for a relative latency difference relate to the specificity of the IPv6 header, which allows packet fragmentation. In turn, this means that hardware needs to spend cycles to analyze all of the header sections, and when it is not capable of handling one of them, it drops the packet. A few measurement campaigns on the behavior of IPv6 in CDNs are also available [
MAPRG] [
INFOCOM]. The TCP connection time is still higher for IPv6 in both cases, even if the gap has reduced over the analysis time window.
It is not totally clear if the customer experience is in some way perceived as better when IPv6 is used instead of IPv4. In some cases, it has been publicly reported by IPv6 content providers that users have a better experience when using IPv6-only compared to IPv4 [
ISOC2]. This could be explained because, in the case of an IPv6 user connecting to an application hosted in an IPv6-only Data Center, the connection is end to end, without translations. Instead, when using IPv4, there is a NAT translation either in the CPE or in the service provider's network, in addition to IPv4 to IPv6 (and back to IPv4) translation in the IPv6-only content provider Data Center. [
ISOC2] and [
FB] provide reasons in favor of IPv6. In other cases, the result seems to be still slightly in favor of IPv4 [
INFOCOM] [
MAPRG], even if the difference between IPv4 and IPv6 tends to vanish over time.
An important point that is sometimes considered as a challenge when discussing the transition to IPv6 is related to the security and privacy. [
RFC 9099] analyzes the operational security issues in several places of a network (enterprises, service providers, and residential users). It is also worth considering the additional security issues brought by the applied IPv6 transition technologies used to implement IPv4aaS (e.g., 464XLAT and DS-Lite) [
ComputSecur].
The security aspects have to be considered to keep at least the same, or even a better, level of security as it exists nowadays in an IPv4 network environment. The autoconfiguration features of IPv6 will require some more attention. Router discovery and address autoconfiguration may produce unexpected results and security holes. IPsec protects IPv6 traffic at least as well as it does IPv4, and the security protocols for constrained devices (IoT) are designed for IPv6 operation.
IPv6 was designed to restore the end-to-end model of communications with all nodes on networks using globally unique addresses. But considering this, IPv6 may imply privacy concerns due to greater visibility on the Internet. IPv6 nodes can (and typically do) use privacy extensions [
RFC 8981] to prevent any tracking of their burned-in Media Access Control (MAC) address(es), which are easily readable in the original modified 64-bit Extended Unique Identifier (EUI-64) interface identifier format. On the other hand, stable IPv6 interface identifiers [
RFC 8064] were developed, and this can also affect privacy.
As reported in [
ISOC3], in comparing IPv6 and IPv4 at the protocol level, one may probably conclude that the increased complexity of IPv6 will result in an increased number of attack vectors that imply more possible ways to perform different types of attacks. However, a more interesting and practical question is how IPv6 deployments compare to IPv4 deployments in terms of security. In that sense, there are a number of aspects to consider.
Most security vulnerabilities related to network protocols are based on implementation flaws. Typically, security researchers find vulnerabilities in protocol implementations, which eventually are "patched" to mitigate such vulnerabilities. Over time, this process of finding and patching vulnerabilities results in more robust implementations. For obvious reasons, the IPv4 protocols have benefited from the work of security researchers for much longer, and thus IPv4 implementations are generally more robust than IPv6. However, with more IPv6 deployment, IPv6 will also benefit from this process in the long run. It is also worth mentioning that most vulnerabilities nowadays are caused by human beings and are in the application layer, not the IP layer.
Besides the intrinsic properties of the protocols, the security level of the resulting deployments is closely related to the level of expertise of network and security engineers. In that sense, there is obviously much more experience and confidence with deploying and operating IPv4 networks than with deploying and operating IPv6 networks.
In general, there are security concerns related to IPv6 that can be classified as follows:
-
Basic IPv6 protocol (basic header, extension headers, addressing)
-
IPv6-associated protocols (ICMPv6, NDP, MLD, DNS, DHCPv6)
-
Internet-wide IPv6 security (filtering, DDoS, transition mechanisms)
ICMPv6 is an integral part of IPv6 and performs error reporting and diagnostic functions. The Neighbor Discovery Protocol (NDP) is a node discovery protocol in IPv6, which replaces and enhances functions of ARP. Multicast Listener Discovery (MLD) is used by IPv6 routers for discovering multicast listeners on a directly attached link, much like how the Internet Group Management Protocol (IGMP) is used in IPv4.
These IPv6-associated protocols, like ICMPv6, NDP, and MLD, are something new compared to IPv4, so they add new security threats and the related solutions are still under discussion today. NDP has vulnerabilities [
RFC 3756] [
RFC 6583]. [
RFC 3756] says to use IPsec, but it is impractical and not used; on the other hand, SEcure Neighbor Discovery (SEND) [
RFC 3971] is not widely available. It is worth mentioning that applying host isolation may address many of these concerns, as described in [
ND-CONSIDERATIONS].
[
RIPE2] describes the most important threats and solutions regarding IPv6 security.
IPv6 extension headers provide a hook for interesting new features to be added and are more flexible than IPv4 options. This does add some complexity. In particular, some security mechanisms may require processing the full chain of headers, and some firewalls may require filtering packets based on their extension headers. Additionally, packets with IPv6 extension headers may be dropped in the public Internet [
RFC 7872]. Some documents, e.g., [
HBH-PROCESSING], [
HBH-OPT-HDR], and [
IPv6-EXT-HDR], analyze and provide guidance regarding the processing procedures of IPv6 extension headers.
Defense against possible attacks through extension headers is necessary. For example, the original IPv6 Routing Header type 0 (RH0) was deprecated because of possible remote traffic amplification [
RFC 5095]. In addition, it is worth mentioning that the unrecognized Hop-by-Hop Options Header and Destination Options Header will not be considered by the nodes if they are not configured to deal with it [
RFC 8200]. Other attacks based on extension headers may be based on IPv6 header chains and fragmentation that could be used to bypass filtering. To mitigate this effect, the initial IPv6 header, the extension headers, and the upper-layer header must all be in the first fragment [
RFC 8200]. Also, the use of the IPv6 fragment header is forbidden in all Neighbor Discovery messages [
RFC 6980].
The fragment header is used by the IPv6 source node to send a packet bigger than the path MTU, and the destination host processes fragment headers. There are several threats related to fragmentation to pay attention to, e.g., overlapping fragments (not allowed), resource consumption while waiting for the last fragment (to discard), and atomic fragments (to be isolated).
The operational implications of IPv6 packets with extension headers are further discussed in [
RFC 9098].