My time in the IT world is closer to three decades than two. And anyone else who has been around half as long can testify to the amount of change that has occurred. It’s more than impressive; it’s a shock. Across the years I have more than once likened keeping up with technology to treading […]
Disclosure: I am one of the world’s biggest fans of, and greatest advocates for, IPv6. In the words of rapper 50 Cent, “I love it like a fat kid loves cake.” Anyone I have ever been able to corner in a room knows this to be true. That being said… I just finished reading [yet […]
By Kathryn M. Farrish, CISSP Common Controls are security controls whose implementation results in a security capability that is inheritable by multiple information systems (IS). For example, the information systems hosted in a data center will typically inherit numerous security controls from the hosting provider, such as: Physical and environmental security controls Network boundary defense security controls Other inheritance scenarios include agency or departmental-level policies […]
By Lon J. Berman, CISSP According to NIST Special Publication (SP) 800-53, an overlay is a “fully specified set of security controls, control enhancements and supplemental guidance derived from the application of tailoring guidance to security control baselines”. The intent is to streamline the process of developing a security control set for specific communities of interest. The Committee on National Security Systems (CNSS) website, www.cnss.gov, […]
But the long ago the world received the commandment from the ether: Migrate!
Migrate …and pay for it yourself with no immediately obvious capacity for a return on the investment. And we wonder why the migration is almost 20 years in the making…
IPv6 has added many new words and ideas to the lexicon of IT professionals. One of the least expected: deprecate.
The dictionary (dictionary.com) says that deprecate means “to express earnest disapproval of”, to “urge reasons against” or, oddly, “to pray for deliverance from”. In the IT world the world a thing being ‘deprecated’ is a thing being removed from use and (hopefully) replaced with something better. And many things have been deprecated in IPv6’s journey to replace IPv4 as the mechanism for getting packets from near to far.
I’m sure the list is longer than even I realize but there are many ideas/implementations/technologies that IPv6 once employed that have since been deprecated. A few examples:
IPv4-compatible IPv6 Addresses. Status: Deprecated.
Network Address Translation – A Black Mark on IPv4’s Name
Why do people use Network Address Translation?
Because they always have, that’s why. “That’s the way we’ve always done it” is one of the dumbest reasons we do things. It precludes continued thought and absolves us the responsibility to think about why we are doing something. Network Address Translation (NAT) has been a bellwether of the Internet world for so long that many of us can’t remember a time without it. Many in the business rally around its role as a mechanism of security in our networks, “hiding the internal network” from the outside world. When presented in such a light it certainly sounds compelling. Being hidden from the evil, nasty outside world? Yeah! I-want-to-go-to-there.
“You hear that? That is the sound of inevitability…” – Agent Smith, The Matrix.
You will migrate to IPv6. It is happening. You will not be able to resist. The IANA gave out the last IPv4 allocations on 2/1/2011. There are no more. As I write, the RIR’s will completely run out of IPv4 addresses within days. Not years, not months …days.