OneTrust_Square Banner_300x250_DD_ROS_01_19

By Mathew J. Schwartz

Is the next-generation Internet protocol, known as IPv6, a privacy time bomb? To be sure, the increasing adoption of the protocol has triggered warnings about its potential to compromise the privacy of Internet users.

"Perhaps the most commonly identified privacy issue associated with IPv6 is the ability to embed a network device's Ethernet MAC address in an IPv6 address," said Bill Cerveny, a senior software quality assurance engineer at network security firm Arbor Networks in Chelmsford, Mass.

Since every MAC address is unique, that means IPv6 could allow individual devices to be fingerprinted and uniquely identified, as Bill Frezza of Adams Capital Management warned in a 1999 article for Internet Week, "Where's All the Outrage about IPv6 Privacy?" Of course, such fingerprinting could be used--or misused--by everyone from online behavior tracking firms to law enforcement agencies.

But why is a decade-old privacy warning still a concern? Primarily because almost no one has rushed to adopt IPv6. Indeed, since the Internet Engineering Task Force (IETF) published the official IPv6 standard in 2003, uptake has been slow, and the answers to tricky privacy questions thus postponed.

Networking Standard Evolves, In Theory

Since 2003, to be fair, the IETF has actively addressed IPv6-related privacy and security concerns, such as worries over the traceability of static IPv6 addresses. For example, in 2007, it released for comment "Privacy Extensions for Stateless Address Autoconfiguration in IPv6," detailing techniques for assigning temporary IPv6 address values. (Similar capabilities exist with IPv4, but their use is likewise optional.) Over time, these temporary values would be reassigned to different machines, an approach which the IETF said "makes it more difficult for eavesdroppers and other information collectors to identify when different addresses used in different transactions actually correspond to the same node."

As that guidance suggests, however, IPv6 is an engineering standard. How it gets applied remains to be seen. Indeed, "the implementation of the privacy-sensitive features is largely dependent on the operating system vendor, network administrator and even on the individual device user," said Cerveny.

From Apathy to Adoption

The decade of IPv6 adoption apathy is starting to end. On June 8, 2011, "IPv6 Day" featured the first trial, on a global scale, of the networking protocol. Notably, more than 400 sites, including Akamai, Facebook, Google and Yahoo, enabled native IPv6 on their servers, and by all accounts it went smoothly, although accounted for only a negligible amount of actual Internet traffic that day.

Still, the event was reassuring, since the previous protocol, IPv4, can only support about four billion IP addresses, and they've now mostly been assigned. In contrast, IPv6 can facilitate a mind-boggling quantity of IP addresses--some 340 trillion trillion trillion. Meanwhile, it also brings networking and security benefits, including better traffic routing and address allocation. It also eliminates the need to use network address translation (NAT), which had helped extend the life of IPv4 by separating IP addresses from the Ethernet addresses inside the corporate LAN. Now, every device can have its own IP.

Privacy and Accountability Concerns

That feature, however, also poses security and privacy concerns. Today, NAT means that nodes inside a corporate network typically get screened from entities outside the network, which has security upsides. But in an IPv6 environment, nodes might connect directly to the Internet, and thus be more directly exposed to malicious operators. As a result, businesses that adopt IPv6 will need to master new security strategies.

Unfortunately, the state of IPv6-related security lags. According to Arbor Networks, most networking equipment--routers, switchers and some firewalls--is ready to make the logical jump to handling IPv6. But many security products, such as intrusion detection systems, won't yet work in an IPv6 environment.

Another issue is that IPv6 was designed to make some IPv4 features, such as Dynamic Host Configuration Protocol (DHCP), unnecessary. “The problem we have had...is that Indiana University’s specific IPv4 accountability method, using DHCP, was built specific to IPv4 technologies that are not identical in IPv6,” said Indiana University’s chief privacy officer and compliance coordinator, Merri Beth Lavagnino, CIPP, CIPP/IT. “Higher education relies a lot on DHCP for accountability.” Accordingly, the university’s accountability system will have to be redesigned for IPv6, but short of adopting network access control technology or some type of persistent Web cookie-- neither of which the university is prepared to do--the solution isn’t clear.

IP Addresses: Personally Identifiable Information?

Consumers face a slightly different scenario, in that service providers might assign static IP addresses to customers, meaning that Internet connections and behavior could be more easily traced back to actual people, unless new types of legal protections are enacted.  

Currently, some countries--including most of the European Union--treat IP addresses as personal information, although others don't. For example, according to a 2009 decision from U.S. District Court Judge Richard Jones: "In order for 'personally identifiable information' to be personally identifiable, it must identify a person. But an IP address identifies a computer." Similarly, in 2010, a French court broke with the EU and ruled that IP addresses don't constitute personal information.

Of course, those cases also revolved around the technical capabilities of IPv4. Once IPv6 reaches widespread adoption, existing legal decisions will likely face new challenges.

IPv6 Shakedown Could Take Years

First, however, people actually have to start using IPv6 en masse. According to IPv6 guru Cricket Liu, vice president of architecture for Infoblox, it could take another five or 10 years before IPv6 adoption reaches maturity. In the interim, companies face potential hiccups from having to run mixed IPv4 and IPv6 networks, as well as figuring out how IPv6 really works.

Along the way, expect new surprises of the security- and privacy-compromising kind. For example, last year researchers disclosed that people relying on the most widely used type of VPN services, which are based on PPTP (point-to-point tunneling protocol), could still be uniquely identified when using IPv6. That's worrying, since many businesses, and some consumers, rely on VPN to secure and obscure their Internet activities.

Most IPv6-related security concerns, however, will likely be more mundane, if no less dangerous. For example, one tried-and-true technique for hacking into corporate networks is to find and exploit misconfigurations, for example in firewalls. The same will be true with IPv6, although arguably the number of misconfigurations to exploit will rise sharply, as networking engineers learn their way around the new protocol.

Another oft-heard IPv6 concern is how it might be exploited for online behavioral tracking, as practiced by online advertisers who rely on cookies and sometimes quasi-legal, persistent tracking technologies. Given the relatively low level of IPv6 deployment so far, however, it's too soon to know the answer to that question.

In fact, the same can be said for IPv6 and virtually any related privacy concern. "Much will depend upon how IPv6-enabled networks are ultimately designed and deployed," said Arbor's Cerveney.

Mathew Schwartz reports on information security and privacy issues for InformationWeek and The Privacy Advisor. 


If you want to comment on this post, you need to login.


Board of Directors

See the esteemed group of leaders shaping the future of the IAPP.

Contact Us

Need someone to talk to? We’re here for you.

IAPP Staff

Looking for someone specific? Visit the staff directory.

Learn more about the IAPP»

Daily Dashboard

The day’s top stories from around the world

Privacy Perspectives

Where the real conversations in privacy happen

The Privacy Advisor

Original reporting and feature articles on the latest privacy developments

Privacy Tracker

Alerts and legal analysis of legislative trends

Privacy Tech

Exploring the technology of privacy

Canada Dashboard Digest

A roundup of the top Canadian privacy news

Europe Data Protection Digest

A roundup of the top European data protection news

Asia-Pacific Dashboard Digest

A roundup of the top privacy news from the Asia-Pacific region

Latin America Dashboard Digest

A roundup of the top privacy news from Latin America

IAPP Westin Research Center

Original works. Groundbreaking research. Emerging scholars.

Get more News »

IAPP Communities

Meet locally with privacy pros, dive deep into specialized topics or connect over common interests. Find your Community in KnowledgeNet Chapters, Sections and Affinity Groups.

IAPP Job Board

Looking for a new challenge, or need to hire your next privacy pro? The IAPP Job Board is the answer.

Join the Privacy List

Have ideas? Need advice? Subscribe to the Privacy List. It’s crowdsourcing, with an exceptional crowd.

Find a KnowledgeNet Chapter Near You

Talk privacy and network with local members at IAPP KnowledgeNet Chapter meetings, taking place worldwide.

Find more ways to Connect »

Find a Privacy Training Class

Two-day privacy training classes are held around the world. See the complete schedule now.

The Privacy Core™ Library Has Evolved

Privacy Core™ e-learning essentials just expanded to include seven new units for marketers. Keep your data safe and your staff in the know!

Online Privacy Training

Build your knowledge. The privacy know-how you need is just a click away.

Upcoming Web Conferences

See our list of upcoming web conferences. Just log on, listen in and learn!

Train Your Team

Get your team up to speed on privacy by bringing IAPP training to your organization.

Let’s Get You DPO Ready

There’s no better time to train than right now! We have all the resources you need to meet the challenges of the GDPR.

Learn more »

CIPP Certification

The global standard for the go-to person for privacy laws, regulations and frameworks

CIPM Certification

The first and only privacy certification for professionals who manage day-to-day operations

CIPT Certification

The industry benchmark for IT professionals worldwide to validate their knowledge of privacy requirements

FIP Designation

Recognizing the advanced knowledge and issue-spotting skills a privacy pro must attain in today’s complex world of data privacy.

Certify Your Staff

Find out how you can bring the world’s only globally recognized privacy certification to a group in your organization.


The IAPP’S CIPP/E and CIPM are the ANSI/ISO-accredited, industry-recognized combination for DPO readiness. Learn more today.

Learn more about IAPP certification »

Are You Ready for the GDPR?

Check out the IAPP's EU Data Protection Reform page for all the tools and resources you need.

IAPP-OneTrust PIA Platform

New U.S. Government Agency privacy impact assessments - free to IAPP members!

IAPP Communities

Meet locally with privacy pros, dive deep into specialized topics or connect over common interests. Find your Community in KnowledgeNet Chapters, Sections and Affinity Groups.

Privacy Vendor List

Find a privacy vendor to meet your needs with our filterable list of global service providers.

More Resources »

Europe Data Protection Intensive 2017

The Intensive is sold out! But cancellations do happen—so hurry and get on the wait list in case more seats become available.

Global Privacy Summit 2017

The world’s premier privacy conference returns with the sharpest minds, unparalleled programs and preeminent networking opportunities.

Canada Privacy Symposium 2017

The Symposium returns to Toronto this spring and registration has opened! Take advantage of Early Bird rates and join your fellow privacy pros for another stellar program.

The Privacy Bar Section Forum 2017

The Privacy Bar Section Forum returns to Washington, DC April 21, delivering renowned keynote speakers and a distinguished panel of legal and privacy experts.

Asia Privacy Forum 2017

The Forum returns to Singapore for exclusive networking and intensive education on data protection trends and challenges in the Asia Pacific region. Call for Speakers open!

Privacy. Security. Risk. 2017

This year, we're bringing P.S.R. to San Diego. The Call for Speakers is now open. Submit today and be a part of something big! Submission deadline: February 26.

Europe Data Protection Congress 2017

European policy debate, multi-level strategic thinking and thought-provoking discussion. The Call for Speakers is open until March 19.

Sponsor an Event

Increase visibility for your organization—check out sponsorship opportunities today.

More Conferences »

Become a Member

Start taking advantage of the many IAPP member benefits today

Corporate Members

See our list of high-profile corporate members—and find out why you should become one, too

Renew Your Membership

Don’t miss out for a minute—continue accessing your benefits

Join the IAPP»