IPv6 Routing Security at ION Belgrade
Discover how ION Belgrade highlighted critical advances in IPv6 adoption and routing security to strengthen global internet infrastructure.

The ION Belgrade conference in 2017 marked a significant moment for network professionals, bringing together experts to tackle pressing challenges in internet evolution. Held alongside local operator groups, it delved into the rapid shift toward IPv6 and the urgent need for robust routing protections. As IPv4 addresses dwindle, securing the next-generation internet protocol has become paramount. This article unpacks the key themes from the event, from deployment strategies to cutting-edge security measures, offering timeless lessons for today’s operators.
The Imperative for IPv6 Transition
IPv6 adoption has accelerated dramatically since its inception, driven by the exhaustion of IPv4 pools. By 2017, major ISPs worldwide had begun large-scale rollouts, but challenges persisted in full deployment. ION Belgrade sessions emphasized practical pathways to IPv6-only environments, highlighting tools like NAT64 for interoperability with legacy systems.
Network operators shared real-world experiences, noting that dual-stack configurations—running both IPv4 and IPv6—remain common but inefficient. The event spotlighted emerging standards for IPv6-only underlays, where core networks operate solely on IPv6, using translation mechanisms to serve IPv4 endpoints. This approach reduces complexity and operational costs while paving the way for native IPv6 services.
- Benefits of IPv6-only cores: Simplified management, enhanced performance, and better security postures.
- Challenges: Ensuring compatibility with IPv4-dependent applications and authoritative servers.
- Solutions discussed: Pref64 prefixes and NAT64 gateways to bridge protocol gaps.
Statistics from the conference revealed promising trends. For instance, measurements indicated higher RPKI coverage for IPv6 domains compared to IPv4, signaling a security advantage in new deployments.
Fortifying BGP with RPKI and Route Origin Validation
Border Gateway Protocol (BGP) vulnerabilities have long plagued internet routing, enabling hijacks and leaks that disrupt global connectivity. ION Belgrade dedicated substantial time to Resource Public Key Infrastructure (RPKI), a cryptographic framework to validate route announcements.
RPKI enables the creation of Route Origin Authorizations (ROAs), digital certificates attesting that specific autonomous systems (ASes) are permitted to originate certain IP prefixes. Receivers can then perform Route Origin Validation (ROV) to filter invalid routes. Presenters showcased deployment stats: Over 75% of IPv6 reachable authoritative name servers were ROA-covered, outpacing IPv4.
| Metric | IPv4 | IPv6 |
|---|---|---|
| ROV-Protected Name Servers | 42.87% | 39.20% |
| ROA Coverage | 75.06% | 79.76% |
| Reachable Domains Protected | 62.48% | 73.14% |
These figures underscore IPv6’s lead in routing security adoption. Sessions also covered Mutually Agreed Norms for Routing Security (MANRS), a collaborative initiative promoting best practices like prefix filtering and AS-path validation among operators.
IETF Developments Shaping Network Futures
The Internet Engineering Task Force (IETF) was a recurring theme, with updates on working groups advancing IPv6, DNSSEC, and routing resiliency. Attendees previewed RFCs and Internet-Drafts targeting segment routing over IPv6 (SRv6), which embeds instructions in packet headers for traffic engineering without stateful protocols.
Key BoF outcomes included frameworks for IPv6-only recursive resolvers, addressing BCP91’s dual-stack recommendation. Proposals demonstrated NAT64 integration, allowing IPv6 resolvers to query IPv4 servers via address translation. This innovation supports expanding IPv6-only networks, crucial for cloud and mobile ecosystems.
DNSSEC discussions focused on deployment hurdles and measurement tools, while TLS enhancements for applications promised stronger encryption defaults.
Practical Strategies for Operators
Beyond theory, ION Belgrade offered actionable advice. Operators learned to deploy RPKI validators, integrate ROV in routers, and monitor via tools like those from regional registries. Case studies from European networks illustrated rapid ROI: Reduced hijack incidents and faster issue resolution.
- Assess current routing policies for MANRS compliance.
- Pilot RPKI in non-critical prefixes before full rollout.
- Test IPv6-only segments in lab environments.
- Collaborate via local NOGs for peer support.
Emphasis was placed on automation—using APIs from repositories like those maintained by RIRs—to streamline ROA management.
Global Collaboration and Future Outlook
The event’s collaborative spirit, co-hosted with RSNOG, fostered knowledge exchange across regions. Speakers from ISOC chapters urged participation in IETF and MANRS, noting that collective action amplifies impact.
Looking ahead, 2026 perspectives build on these foundations. With IPv6 now exceeding 40% global adoption (per official registries), routing security is no longer optional. Emerging threats like BGP anycast hijacks demand vigilant RPKI uptake, while SRv6 enables scalable 5G and edge computing.
ION Belgrade’s legacy endures in standardized practices that underpin a resilient internet.
Frequently Asked Questions
What is RPKI and why does it matter for IPv6?
RPKI provides cryptographic proof of IP address ownership, preventing unauthorized route announcements. For IPv6, it offers superior protection due to cleaner deployment slates.
How does SRv6 improve routing?
SRv6 uses IPv6 extension headers for source routing, enabling precise path control without MPLS, ideal for modern networks.
Is IPv6 more secure than IPv4 inherently?
IPv6 mandates IPsec support and benefits from built-in features like larger headers, but security relies on proper implementation like RPKI.
What steps should operators take post-ION insights?
Implement ROV, join MANRS, and transition to IPv6-dominant architectures for future-proofing.
Where to learn more about IETF IPv6 work?
Visit ietf.org working groups like 6man and sidrops for drafts and meetings.
References
- Resource Public Key Infrastructure (RPKI) IETF Overview — Internet Engineering Task Force. 2023-07-01. https://datatracker.ietf.org/wg/sidrops/about/
- IPv6 Operations Working Group (v6ops) — Internet Engineering Task Force. 2024-02-15. https://datatracker.ietf.org/wg/v6ops/about/
- BGP Security Update — RIPE NCC. 2023-11-20. https://www.ripe.net/publications/newsroom/ripe-87-bgpsec/
- IPv6 Deployment Status — APNIC Labs. 2024-01-10. https://stats.labs.apnic.net/ipv6/
- MANRS Actions and Observables — Internet Society. 2023-05-12. https://www.manrs.org/actions/
Read full bio of medha deb










