US.gov set IPv6 upgrade deadlines

Get set, go


The Obama administration has set an ambitious target for all US government agencies to upgrade their networks and services to the next generation internet protocol, IPv6, by the end of September 2012.

A directive from Vivek Kundra, the US chief information officer, issued on Tuesday, also calls for internal networks to be upgraded to IPv6 by a later deadline by the end of September 2014. The push aims to ensure that federal web sites and e-government service are upgraded before the current allocation of IPv4 addresses is exhausted. Priority will be placed on upgrading public-facing Web services – including Web, email, and DNS services – to native IPv6 before moving on to internal PCs and servers.

IPv4 has a 32-bit address space offering up to 4.3 billion addresses. The may sound like a lot but less than six per cent of the current IPv4 address block remains, an allocation that might be exhausted in as little as 240 days, according to estimates by Huricane Electric.

The use of Network Address Translation technology has delayed the long predicted IPv4 crunch for many years but the increased use of smartphone devices and millions of consumers coming online in countries such as China has reversed the trend and brought IPv4 exhaustion much closer.

IPv6 offers 128-bit addresses and therefore offers a vastly increased address space as well as advantages in mobility and security, at least in theory. Early adopters in the Reg readership have said the "IPv6 support" does not always make for a smooth cross over of networking kit and problems remain, particularly when it comes to supporting wireless networks.

The US government is planning to run a series of workshops to refine best practice for upgrading to IPv6 and to test commercial products, an important job that will be handled by the National Institute of Standards and Technology. ®

Similar topics


Other stories you might like

  • Battlefield 2042: Please don't be the death knell of the franchise, please don't be the death knell of the franchise

    Another terrible launch, but DICE is already working on improvements

    The RPG Greetings, traveller, and welcome back to The Register Plays Games, our monthly gaming column. Since the last edition on New World, we hit level cap and the "endgame". Around this time, item duping exploits became rife and every attempt Amazon Games made to fix it just broke something else. The post-level 60 "watermark" system for gear drops is also infuriating and tedious, but not something we were able to address in the column. So bear these things in mind if you were ever tempted. On that note, it's time to look at another newly released shit show – Battlefield 2042.

    I wanted to love Battlefield 2042, I really did. After the bum note of the first-person shooter (FPS) franchise's return to Second World War theatres with Battlefield V (2018), I stupidly assumed the next entry from EA-owned Swedish developer DICE would be a return to form. I was wrong.

    The multiplayer military FPS market is dominated by two forces: Activision's Call of Duty (COD) series and EA's Battlefield. Fans of each franchise are loyal to the point of zealotry with little crossover between player bases. Here's where I stand: COD jumped the shark with Modern Warfare 2 in 2009. It's flip-flopped from WW2 to present-day combat and back again, tried sci-fi, and even the Battle Royale trend with the free-to-play Call of Duty: Warzone (2020), which has been thoroughly ruined by hackers and developer inaction.

    Continue reading
  • American diplomats' iPhones reportedly compromised by NSO Group intrusion software

    Reuters claims nine State Department employees outside the US had their devices hacked

    The Apple iPhones of at least nine US State Department officials were compromised by an unidentified entity using NSO Group's Pegasus spyware, according to a report published Friday by Reuters.

    NSO Group in an email to The Register said it has blocked an unnamed customers' access to its system upon receiving an inquiry about the incident but has yet to confirm whether its software was involved.

    "Once the inquiry was received, and before any investigation under our compliance policy, we have decided to immediately terminate relevant customers’ access to the system, due to the severity of the allegations," an NSO spokesperson told The Register in an email. "To this point, we haven’t received any information nor the phone numbers, nor any indication that NSO’s tools were used in this case."

    Continue reading
  • Utility biz Delta-Montrose Electric Association loses billing capability and two decades of records after cyber attack

    All together now - R, A, N, S, O...

    A US utility company based in Colorado was hit by a ransomware attack in November that wiped out two decades' worth of records and knocked out billing systems that won't be restored until next week at the earliest.

    The attack was detailed by the Delta-Montrose Electric Association (DMEA) in a post on its website explaining that current customers won't be penalised for being unable to pay their bills because of the incident.

    "We are a victim of a malicious cyber security attack. In the middle of an investigation, that is as far as I’m willing to go," DMEA chief exec Alyssa Clemsen Roberts told a public board meeting, as reported by a local paper.

    Continue reading

Biting the hand that feeds IT © 1998–2021