Feeds

WTF is... IPv6?

Address to impress

The smart choice: opportunity from uncertainty

End of the Road?

Perhaps the most important thing to realise is that IPv4 isn’t going to go away any time soon. Too many devices rely on it to make it easy to simply switch off. Connected TVs, games consoles and the like may not support IPv6 at all.

But your computer almost certainly does – all modern operating systems can run IPv6 alongside IPv4. Once I enabled IPv6 on my network, I didn’t have to do any configuration on my Mac, for example. It just autoconfigured itself, allowing me to browse IPv6 websites in Safari.

Although there are some sites in China that use only IPv6, most people are unlikely to come across such a beast for many years. But many ISPs contacted by Reg Hardware said they have plans to roll out IPv6 to their customers, and some anticipate being able to provide routers capable of handling it within the next few months, as a matter of course, at prices cheap enough to give away with connectivity.

IPv6 on Mac OS X

Sorted: personal computer operating systems already support IPv6

While it’s possible to use just IPv6, and a technology called NAT64 to allow access to IPv4 sites, most users are likely to have both version on their networks for years to come.

Typically, a broadband customer will be given a set of IPv6 addresses for their network, and the router will also provide an IPv4 address and NAT (Network Address Translation) for devices that can’t use the new protocol. The big change for many people is that all their IPv6 devices will be publicly available to the net. That will make setting up many devices much simpler, but also reinforces the need for a proper firewall in the router.

When you request a website in your browser, it will request an IPv6 address - a new DNS ‘AAAA’ record - and if there is one, then it’ll connect using IPv6. If there isn’t, then the existing A recording, pointing to an IPv4 address, will be used.

Similarly, most other software will work seamlessly. Connecting to my office mail server was just a matter of turning on IPv6 in the Postfix config file, while an ssh needed no work.

Largely, once you have IPv6 on your network – itself plug and play, with many systems auto-configuring using the network prefix and then their Ethernet MAC address to make up the rest of the IPv6 address – you won’t even notice, unless you visit sites that are IPv6 only, which you couldn’t reach before, or that explicitly tell you how you connected, like kame.net.

Mobile application security vulnerability report

Next page: Go Gamers

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
Microsoft unsheathes cheap Android-killer: Behold, the Lumia 530
Say it with us: I'm King of the Landfill-ill-ill-ill
All those new '5G standards'? Here's the science they rely on
Radio professor tells us how wireless will get faster in the real world
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
'Two-speed internet' storm turns FCC.gov into zero-speed website
Deadline for comments on net neutrality shake-up extended to Friday
Oh girl, you jus' didn't: Level 3 slaps Verizon in Netflix throttle blowup
Just hook us up to more 10Gbps ports, backbone biz yells in tit-for-tat spat
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.