{"id":7536,"date":"2022-05-16T16:10:00","date_gmt":"2022-05-16T13:10:00","guid":{"rendered":"https:\/\/vasexperts.com\/?p=7536"},"modified":"2025-08-11T14:13:52","modified_gmt":"2025-08-11T11:13:52","slug":"how-ipv6-can-compromise-networks","status":"publish","type":"post","link":"https:\/\/vasexperts.com\/br\/blog\/ipv6\/how-ipv6-can-compromise-networks\/","title":{"rendered":"&#8221;De onde voc\u00ea n\u00e3o esperava&#8221;: como o IPv6 pode comprometer as redes"},"content":{"rendered":"<h2>Obst\u00e1culos no caminho<\/h2>\r\n\u00c9 um fato comum que a implementa\u00e7\u00e3o do IPv6 \u00e9 bastante lenta \u2013 cerca de <a href=\"https:\/\/w3techs.com\/technologies\/details\/ce-ipv6\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">21% dos sites<\/a> suportam o trabalho com ele. Os especialistas esperam que a migra\u00e7\u00e3o em massa para um protocolo de nova gera\u00e7\u00e3o n\u00e3o ocorra antes de dez anos. H\u00e1 v\u00e1rios motivos para isso: dificuldades t\u00e9cnicas e financeiras, bem como a presen\u00e7a do NAT, que \u201csuaviza\u201d a escassez de endere\u00e7os IPv4. No entanto, o processo tamb\u00e9m \u00e9 prejudicado por quest\u00f5es relacionadas \u00e0 seguran\u00e7a das informa\u00e7\u00f5es.\r\n\r\nO lan\u00e7amento oficial do IPv6 ocorreu h\u00e1 quase dez anos, mas os engenheiros ainda est\u00e3o encontrando vulnerabilidades na pilha t\u00e9cnica. Assim, em 2020, foi descoberto um bug relacionado ao ICMPv6, que usa o mecanismo de declara\u00e7\u00e3o do roteador (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-16898\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2020-16898<\/a>).\r\n\r\n    [important]   Essa vulnerabilidade permitiu que os invasores executassem c\u00f3digos maliciosos em um computador comprometido.    [\/important]  \r\n\r\nUm dos problemas mais recentes foi <a href=\"https:\/\/www.theregister.com\/2022\/03\/22\/legacy_ipv6_addressing_standard_enables\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">identificado<\/a> por especialistas do Max Planck Institute of Informatics no final de mar\u00e7o. De acordo com seu relat\u00f3rio, os dispositivos que usam o mecanismo EUI-64 para gerar o identificador de interface (a segunda parte do endere\u00e7o IPv6) comprometem a opera\u00e7\u00e3o da rede em que est\u00e3o localizados.\r\n<h2>Como isso aconteceu?<\/h2>\r\nExiste um mecanismo SLAAC que permite que o dispositivo obtenha informa\u00e7\u00f5es de prefixo do roteador sem a ajuda de um protocolo de configura\u00e7\u00e3o de n\u00f3s <a href=\"https:\/\/en.wikipedia.org\/wiki\/DHCPv6\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DHCPv6<\/a>. Essas informa\u00e7\u00f5es e o identificador de interface (IID) de 64 bits s\u00e3o necess\u00e1rios para obter um endere\u00e7o de rede IPv6 individual.\r\n\r\nUma maneira de gerar um IID exclusivo \u00e9 ger\u00e1-lo com base no endere\u00e7o MAC do dispositivo (mecanismo <a href=\"https:\/\/standards.ieee.org\/wp-content\/uploads\/import\/documents\/tutorials\/eui.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">EUI-64<\/a>). No entanto, atualmente, essa abordagem \u00e9 considerada n\u00e3o apenas n\u00e3o confi\u00e1vel, mas at\u00e9 mesmo <a href=\"https:\/\/arxiv.org\/pdf\/1902.08968.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">perigosa<\/a>, pois revela o identificador de hardware no n\u00edvel da rede. Portanto, a comunidade desenvolveu extens\u00f5es especiais para a pilha IPv6, por exemplo, descritas em <a href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc4941\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RFC4941<\/a>, que \u201crandomizam\u201d a parte do endere\u00e7o selecionada pelo host. Ao mesmo tempo, os provedores de servi\u00e7os de Internet substituem os prefixos de endere\u00e7o para prote\u00e7\u00e3o adicional.\r\n\r\n<noscript><img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/05\/server-details-1024x625.jpg\" alt=\"server details\" width=\"100%\" height=\"auto\" class=\"alignnone size-full wp-image-7415\"><\/noscript><img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/05\/server-details-1024x625.jpg\" alt=\"server details\" width=\"100%\" height=\"auto\" class=\"alignnone size-full wp-image-7415 lazyload\" data-src=\"\/wp-content\/uploads\/2022\/05\/server-details-1024x625.jpg\">\r\n\r\nMas, infelizmente, v\u00e1rios desenvolvedores de hardware (em sua maioria, dispositivos da Internet das Coisas) ainda usam o EUI-64 \u201cpuro\u201d para gerar o IID. Com sua ajuda, os invasores podem identificar o fabricante do dispositivo de rede (e, como resultado, poss\u00edveis vulnerabilidades), bem como monitorar outros dispositivos na rede usando um IID semelhante.\r\n\r\n    [important]   De acordo com engenheiros de pesquisa, cerca de 19% de todos os prefixos nas redes dos principais provedores globais de servi\u00e7os de Internet est\u00e3o expostos a essa vulnerabilidade.    [\/important]  \r\n<h2>O que deve ser feito<\/h2>\r\nEm geral, a solu\u00e7\u00e3o para o problema recai sobre os desenvolvedores de hardware e software \u2013 eles devem prestar aten\u00e7\u00e3o \u00e0 seguran\u00e7a das informa\u00e7\u00f5es dos dispositivos e <a href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc8981\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ativar<\/a> os mecanismos de seguran\u00e7a dispon\u00edveis por padr\u00e3o.\r\n\r\nDe acordo com os especialistas, a quest\u00e3o tamb\u00e9m pode ser resolvida em n\u00edvel governamental, se os \u00f3rg\u00e3os reguladores exigirem que os fornecedores certifiquem os produtos quanto \u00e0 conformidade com os padr\u00f5es que permitem fechar as vulnerabilidades da EUI-64. Ao mesmo tempo, os provedores de servi\u00e7os de Internet podem verificar os roteadores antes de entreg\u00e1-los aos seus clientes.\r\n\r\n [subscription id=\u201d 11987\u2033]Assine nosso boletim informativo e fique atualizado sobre os \u00faltimos desenvolvimentos e ofertas especiais.[\/subscription]","protected":false},"excerpt":{"rendered":"<p>A culpa \u00e9 do padr\u00e3o EUI-64. Ele se tornou uma categoria legada, mas ainda \u00e9 usado por desenvolvedores de dispositivos de IoT (mas n\u00e3o se limita a eles). Explicamos qual \u00e9 o problema aqui.<\/p>\n","protected":false},"author":7,"featured_media":7538,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[],"class_list":["post-7536","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ipv6"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>(English) VASExperts<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/\",\"url\":\"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/\",\"name\":\"[:en]How IPv6 can compromise networks?[:es]\u00bfC\u00f3mo puede el IPv6 comprometer las redes?[:fr]Comment IPv6 peut compromettre les r\u00e9seaux?[:br]Como o IPv6 pode comprometer redes?\",\"isPartOf\":{\"@id\":\"https:\/\/vasexperts.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/#primaryimage\"},\"thumbnailUrl\":\"\/wp-content\/uploads\/2022\/05\/article_cover_danger-1140x749-1.jpg\",\"datePublished\":\"2022-05-16T13:10:00+00:00\",\"dateModified\":\"2025-08-11T11:13:52+00:00\",\"author\":{\"@id\":\"https:\/\/vasexperts.com\/#\/schema\/person\/f4edcaef26fe49b6b59baf8ac5b62170\"},\"description\":\"[:en]The EUI-64 standard is to be blamed. It became a legacy category, but is still used by IoT-device developers (but not limited to). We explain what the matter is here.[:es]Todo se debe al est\u00e1ndar EUI-64. Ha pasado a la categor\u00eda de legado, pero todav\u00eda lo usan los desarrolladores de dispositivos IoT (y no solo). Hablemos de lo que est\u00e1 pasando aqu\u00ed.[:fr]Tout cela \u00e0 cause de la norme EUI-64. Il est pass\u00e9 \u00e0 la cat\u00e9gorie legacy, mais est toujours utilis\u00e9 par les d\u00e9veloppeurs d'appareils IoT (et non seulement par ceux-ci). Parlons de ce qui se passe ici.[:br]O padr\u00e3o EUI-64 \u00e9 o culpado. Tornou-se uma categoria legada, mas ainda \u00e9 usado por desenvolvedores de dispositivos de IoT (mas n\u00e3o se limita a eles). Explicamos o problema aqui.\",\"breadcrumb\":{\"@id\":\"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/#breadcrumb\"},\"inLanguage\":\"br-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"br-PT\",\"@id\":\"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/#primaryimage\",\"url\":\"\/wp-content\/uploads\/2022\/05\/article_cover_danger-1140x749-1.jpg\",\"contentUrl\":\"\/wp-content\/uploads\/2022\/05\/article_cover_danger-1140x749-1.jpg\",\"width\":1140,\"height\":749},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u0413\u043b\u0430\u0432\u043d\u0430\u044f \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0430\",\"item\":\"https:\/\/vasexperts.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u201cFrom where you didn&#8217;t expect\u201d: how IPv6 can compromise networks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/vasexperts.com\/#website\",\"url\":\"https:\/\/vasexperts.com\/\",\"name\":\"ITGLOBAL.COM\",\"description\":\"(English) VASExperts\",\"inLanguage\":\"br-PT\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/vasexperts.com\/#\/schema\/person\/f4edcaef26fe49b6b59baf8ac5b62170\",\"name\":\"Elena Rudich\",\"url\":\"https:\/\/vasexperts.com\/br\/blog\/author\/elena-rudich\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"(English) VASExperts","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/","url":"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/","name":"[:en]How IPv6 can compromise networks?[:es]\u00bfC\u00f3mo puede el IPv6 comprometer las redes?[:fr]Comment IPv6 peut compromettre les r\u00e9seaux?[:br]Como o IPv6 pode comprometer redes?","isPartOf":{"@id":"https:\/\/vasexperts.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/#primaryimage"},"image":{"@id":"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2022\/05\/article_cover_danger-1140x749-1.jpg","datePublished":"2022-05-16T13:10:00+00:00","dateModified":"2025-08-11T11:13:52+00:00","author":{"@id":"https:\/\/vasexperts.com\/#\/schema\/person\/f4edcaef26fe49b6b59baf8ac5b62170"},"description":"[:en]The EUI-64 standard is to be blamed. It became a legacy category, but is still used by IoT-device developers (but not limited to). We explain what the matter is here.[:es]Todo se debe al est\u00e1ndar EUI-64. Ha pasado a la categor\u00eda de legado, pero todav\u00eda lo usan los desarrolladores de dispositivos IoT (y no solo). Hablemos de lo que est\u00e1 pasando aqu\u00ed.[:fr]Tout cela \u00e0 cause de la norme EUI-64. Il est pass\u00e9 \u00e0 la cat\u00e9gorie legacy, mais est toujours utilis\u00e9 par les d\u00e9veloppeurs d'appareils IoT (et non seulement par ceux-ci). Parlons de ce qui se passe ici.[:br]O padr\u00e3o EUI-64 \u00e9 o culpado. Tornou-se uma categoria legada, mas ainda \u00e9 usado por desenvolvedores de dispositivos de IoT (mas n\u00e3o se limita a eles). Explicamos o problema aqui.","breadcrumb":{"@id":"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/#breadcrumb"},"inLanguage":"br-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/"]}]},{"@type":"ImageObject","inLanguage":"br-PT","@id":"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/#primaryimage","url":"\/wp-content\/uploads\/2022\/05\/article_cover_danger-1140x749-1.jpg","contentUrl":"\/wp-content\/uploads\/2022\/05\/article_cover_danger-1140x749-1.jpg","width":1140,"height":749},{"@type":"BreadcrumbList","@id":"https:\/\/vasexperts.com\/blog\/ipv6\/how-ipv6-can-compromise-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0413\u043b\u0430\u0432\u043d\u0430\u044f \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0430","item":"https:\/\/vasexperts.com\/"},{"@type":"ListItem","position":2,"name":"\u201cFrom where you didn&#8217;t expect\u201d: how IPv6 can compromise networks"}]},{"@type":"WebSite","@id":"https:\/\/vasexperts.com\/#website","url":"https:\/\/vasexperts.com\/","name":"ITGLOBAL.COM","description":"(English) VASExperts","inLanguage":"br-PT"},{"@type":"Person","@id":"https:\/\/vasexperts.com\/#\/schema\/person\/f4edcaef26fe49b6b59baf8ac5b62170","name":"Elena Rudich","url":"https:\/\/vasexperts.com\/br\/blog\/author\/elena-rudich\/"}]}},"_links":{"self":[{"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/posts\/7536"}],"collection":[{"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/comments?post=7536"}],"version-history":[{"count":10,"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/posts\/7536\/revisions"}],"predecessor-version":[{"id":12855,"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/posts\/7536\/revisions\/12855"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/media\/7538"}],"wp:attachment":[{"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/media?parent=7536"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/categories?post=7536"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vasexperts.com\/br\/wp-json\/wp\/v2\/tags?post=7536"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}