IPv6 Technical Verification Consortium

Since IPv6, which achieves the advanced interconnection of various devices and software connected to a network, is a communication protocol which, unlike the currently widespread IPv4, has not undergone a long period of verification, and there remains a large amount of leeway for consideration - based on the specific envisaged uses of IPv6 - of actual environmental verification in terms of security functionality, implementation methods, and performance assessment. With widespread utilization of the Internet, it is now common for various information devices and services to be interconnected when used. Consequently, moving over to IPv6 will not only have an impact on the security risks faced by certain corporations but also on many corporate and public activities and general households, with the potential for attacks via the Internet and damage caused by viruses.

As we move towards the exhaustion of IPv4 addresses and future advancement of IPv6 utilization, it is desirable to establish measures to discover the new potential threats accompanying IPv6 through studies and research into the kinds of risks involved in IPv6 network environments. We need to plan technical countermeasures that consider mixed usage of IPv4 and IPv6 as well as the move to IPv6, whilst also utilizing the insight into security/safety technologies which has been developed under IPv4. Against this background, the IPv6 Technical Verification Consortium was established by ten founding members, including companies and organizations in the telecommunication, network, security, hardware and software fields. The Consortium will promote technical verification focusing on the security area in particular, aiming to achieve secure and stable IT environments where IPv6 is used.

Overview of Activities

The National Institute of Information and Communications Technology will conduct a study on security issues, and members of the Consortium will bring their solutions and products to Microsoft's Otemachi Technology Center for verification to be performed through the cooperation of members.
The issues identified will be shared amongst all members of the Consortium, who will contribute by utilizing the newly identified security interoperability issues and solutions - obtained through the activities of the Consortium - to promote the use of more secure and stable networks. It should be noted that there will be a clear division of roles between these activities and those of the IPv6 Promotion Council, and the results from both will be mutually shared in order to facilitate progress. All the action policies of the Consortium will be determined by mutual agreement of its founding members, the primary objective being to promote the use of secure and stable networks.

An annual plenary session will be held by the members of the Consortium in order to determine its action policies, and the status of activities will be shared amongst all members on a quarterly basis.

  • Download
  • Glossary
  • Information
  • Members