SlideShare una empresa de Scribd logo
1 de 15
Descargar para leer sin conexión
The Truth about IPv6
Security

          Fernando Gont
               UTN/FRH

    FutureNet: MPLS, Ethernet and Beyond
      Boston, MA, USA, May 10-13, 2010
Agenda
   Brief comparision of IPv4 and IPv6
   A few myths about IPv6 security
   Transition Technologies
   Ongoing work on IPv6 security at UK CPNI
   Key areas where further work is needed
   Conclusions
Brief comparision of IPv4 and IPv6
   IPv4 and IPv6 are very similar in terms of functionality


                                  IPv4                     IPv6
    Addressing         32 bits                  128 bits
    Auto-              DHCP & RS/RA             ICMPv6 RS/RA & DHCPv6
    configuration
    Address            ARP                      (opt)
                                                ICMPv6
    resolution
    IPsec support      Optional                 Mandatory
    Fragmentation      Both in hosts and        Only in hosts
                       routers
Mandatory IPsec support
Myth: “IPv6 has improved security as a result of its
  mandatory IPsec support”

   IPsec already existed for IPv4
   The mandatory-ness of IPsec for IPv6 is just words on paper
   Also, there are problems with its deployment as a general end-
    to-end security mechanism
   Deployment of IPsec(v6) has similar problems as those of
    IPsec(4). As a result, IPsec(v6) is not deployed as a general
    end-to-end security mechanism, either
Larger address space
Myth: “It is unfeasible to brute-force scan an IPv6 network
  for alive nodes, as the IPv6 address space is so large.
  Such a scan would take ages!”

   [Malone, 2008] (*) measured IPv6 address assignement patterns
   For hosts,
        50% autoconf, 20% IPv4-based, 10% Teredo, 8% “low-byte”
   For infrastructure,
        70% “low-byte”, 5% IPv4-based
   Anyway, most compromised systems are hosts. Once a host is
    compromised, brute-force scanning becomes trivial


      Size matters… only if you use it properly! ;-)
(*) Malone, D. 2008. Observations of IPv6 Addresses. Passive and Active Measurement Conference (PAM 2008,
LNCS 4979), 29–30 April 2008.
Auto-configuration & address-resolution
   Based on Neighbor Discovery messages (ICMPv6) – DHCPv6 is
    optional
   Stateless autoconfiguration more powerful than the IPv4
    counterpart… but also provides more potential vectors for
    attackers to exploit (e.g., THCʼs IPv6 attack suite)
   Less support in Layer-2 boxes for mitigation of ND attacks
   Secure Neighbor Discovery (SEND) was specified for mitigating
    ND security threats, employing:
       Cryptographically-Generated Addresses (CGAs)
       RSA signatures (RSA signature option)
       Certificates
   Not widely supported (e.g., no support in Windows XP/Vista/7
    or KAME)
   Even then, SEND does not eliminate (nor should it) Layer-4+
    attack vectors (e.g., DNS spoofing)
Transition technologies
   Original IPv6 transition plan was dual-stack (yes, it failed)
   Current strategy is a transition/co-existence plan based on a
    toolbox:
       Configured tunnels
       Automatic tunnels (ISATAP, 6to4, Teredo, etc.)
       NATs (NAT64, NAT46, ALGs, etc.)
   Automatic-tunneling mechanisms are enabled by default in
    Windows Vista and Windows 7
   They may be (and have been) leveraged to bypass local
    network policies
   Some automatic tunnels use anycast IPv4 addresses:
       Where is your Teredo and 6to4 traffic going through?
       This might (or might not) be of concern to you
Ongoing work
(or “what weʼre doing on v6 security”)
Ongoing work on IPv6 security at CPNI
   The UK CPNI (Centre for the Protection of National
    Infrastructure) is currently working on a security assessment of
    the IPv6 protocol suite
   Similar project to the one we carried out years ago on TCP and
    IPv4:
       Security assessment of the protocol specifications
       Security assessment of common implementation strategies
       Production of assessment/Proof-Of-Concept tools
       Publication of best practices documents
   Currently cooperating with vendors and other parties
Further work
(or “whatʼs missing?”)
Key areas in which further work is needed
   IPv6 Resiliency
       Implementations have not really been the target of attackers, yet
       Only a handful of publicly available attack tools
       Lots of vulnerabilities and bugs still to be discovered.
   IPv6 support in security devices
       IPv6 transport is not broadly supported in security devices
        (firewalls, IDS/IPS, etc.)
       This is key to be able enforce security policies comparable with
        the IPv4 counterparts
   Education/Training
       Pushing people to “Enable IPv6” point-and-click style is simply
        insane.
       Training is needed for engineers, technicians, security personnel,
        etc., before the IPv6 network is running.
Conclusions
 (or “so what?”)
Conclusions

   Most security vulnerabilities have to do with Layer4+
   No layer-3 protocol will help an unsecured DNS, broken
    browser, or broken database application
   Even when it comes to previously-known Layer3 issues, IPv6 is
    not that different from IPv4 to make a difference 
   After all, IPv6 is…


               “96 more bits, no magic”
                        -- Gaurab Raj Upadhaya
Questions?
Acknowledgements
   UK CPNI, for their continued support
   Future-Net organizers, for the invitation to present in this
    conference



                          Fernando Gont
                     fernando@gont.com.ar
                     http://www.gont.com.ar

Más contenido relacionado

La actualidad más candente

What's New in StealthWatch v6.5
What's New in StealthWatch v6.5 What's New in StealthWatch v6.5
What's New in StealthWatch v6.5 Lancope, Inc.
 
What is NetFlow?
What is NetFlow?What is NetFlow?
What is NetFlow?NetHound
 
A secure tunnel technique using i pv6 transition over ipv4 channel
A secure tunnel technique using i pv6 transition over ipv4 channelA secure tunnel technique using i pv6 transition over ipv4 channel
A secure tunnel technique using i pv6 transition over ipv4 channelMade Artha
 
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlowCisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlowLancope, Inc.
 
MIT EmTech TR35 India 2011
MIT EmTech TR35 India 2011MIT EmTech TR35 India 2011
MIT EmTech TR35 India 2011manav416
 
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...Cisco Russia
 
Peer-to-peer Internet telephony
Peer-to-peer Internet telephonyPeer-to-peer Internet telephony
Peer-to-peer Internet telephonyKundan Singh
 
Check Point CCSA NGX R71 Course Overview
Check Point CCSA NGX R71 Course OverviewCheck Point CCSA NGX R71 Course Overview
Check Point CCSA NGX R71 Course Overviewdaisuke_tanabe
 
Lancope and-cisco-asa-for-advanced-security
Lancope and-cisco-asa-for-advanced-securityLancope and-cisco-asa-for-advanced-security
Lancope and-cisco-asa-for-advanced-securityLancope, Inc.
 
Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center NetworkCollaborators
 
Новая эра корпоративных сетей с Cisco Catalyst 9000 и другие инновации для ма...
Новая эра корпоративных сетей с Cisco Catalyst 9000 и другие инновации для ма...Новая эра корпоративных сетей с Cisco Catalyst 9000 и другие инновации для ма...
Новая эра корпоративных сетей с Cisco Catalyst 9000 и другие инновации для ма...Cisco Russia
 
The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)
The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)
The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)Martin Schütte
 
AusNOG 2015 - Why you should read RFCs and Internet Drafts (and what you need...
AusNOG 2015 - Why you should read RFCs and Internet Drafts (and what you need...AusNOG 2015 - Why you should read RFCs and Internet Drafts (and what you need...
AusNOG 2015 - Why you should read RFCs and Internet Drafts (and what you need...Mark Smith
 
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 -  Security Through The Eyes of a HackerCisco Connect Toronto 2017 -  Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 - Security Through The Eyes of a HackerCisco Canada
 

La actualidad más candente (19)

What's New in StealthWatch v6.5
What's New in StealthWatch v6.5 What's New in StealthWatch v6.5
What's New in StealthWatch v6.5
 
What is NetFlow?
What is NetFlow?What is NetFlow?
What is NetFlow?
 
A secure tunnel technique using i pv6 transition over ipv4 channel
A secure tunnel technique using i pv6 transition over ipv4 channelA secure tunnel technique using i pv6 transition over ipv4 channel
A secure tunnel technique using i pv6 transition over ipv4 channel
 
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlowCisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
 
BlockchainLAB Hackathon
BlockchainLAB HackathonBlockchainLAB Hackathon
BlockchainLAB Hackathon
 
ION Malta - Seeweb Thoughts on IPv6 Transition
ION Malta - Seeweb Thoughts on IPv6 TransitionION Malta - Seeweb Thoughts on IPv6 Transition
ION Malta - Seeweb Thoughts on IPv6 Transition
 
MIT EmTech TR35 India 2011
MIT EmTech TR35 India 2011MIT EmTech TR35 India 2011
MIT EmTech TR35 India 2011
 
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
 
Peer-to-peer Internet telephony
Peer-to-peer Internet telephonyPeer-to-peer Internet telephony
Peer-to-peer Internet telephony
 
Cns unit4
Cns unit4Cns unit4
Cns unit4
 
Check Point CCSA NGX R71 Course Overview
Check Point CCSA NGX R71 Course OverviewCheck Point CCSA NGX R71 Course Overview
Check Point CCSA NGX R71 Course Overview
 
Pro Viva Emmanuel
Pro Viva EmmanuelPro Viva Emmanuel
Pro Viva Emmanuel
 
Lancope and-cisco-asa-for-advanced-security
Lancope and-cisco-asa-for-advanced-securityLancope and-cisco-asa-for-advanced-security
Lancope and-cisco-asa-for-advanced-security
 
Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center
 
Futex ppt
Futex  pptFutex  ppt
Futex ppt
 
Новая эра корпоративных сетей с Cisco Catalyst 9000 и другие инновации для ма...
Новая эра корпоративных сетей с Cisco Catalyst 9000 и другие инновации для ма...Новая эра корпоративных сетей с Cisco Catalyst 9000 и другие инновации для ма...
Новая эра корпоративных сетей с Cisco Catalyst 9000 и другие инновации для ма...
 
The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)
The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)
The IPv6 Snort Plugin (at Troopers 14 IPv6 Security Summit)
 
AusNOG 2015 - Why you should read RFCs and Internet Drafts (and what you need...
AusNOG 2015 - Why you should read RFCs and Internet Drafts (and what you need...AusNOG 2015 - Why you should read RFCs and Internet Drafts (and what you need...
AusNOG 2015 - Why you should read RFCs and Internet Drafts (and what you need...
 
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 -  Security Through The Eyes of a HackerCisco Connect Toronto 2017 -  Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
 

Similar a 10 fn s05

IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the EnterpriseJohn Rhoton
 
Ipv6 - Hamzeh Al-Qudah
Ipv6 - Hamzeh Al-QudahIpv6 - Hamzeh Al-Qudah
Ipv6 - Hamzeh Al-QudahHamza Al-Qudah
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6John Rhoton
 
Introduction of IPv6NET in Tridentcom 2014
Introduction of IPv6NET in Tridentcom 2014Introduction of IPv6NET in Tridentcom 2014
Introduction of IPv6NET in Tridentcom 2014Marius Georgescu
 
IETF Activities Update
IETF Activities UpdateIETF Activities Update
IETF Activities UpdateARIN
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test MethodologyIxia
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksIOSR Journals
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002suvobgd
 
[CB19] New threats are already around you, the IPV6 attack must be understood...
[CB19] New threats are already around you, the IPV6 attack must be understood...[CB19] New threats are already around you, the IPV6 attack must be understood...
[CB19] New threats are already around you, the IPV6 attack must be understood...CODE BLUE
 
The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)Martin Schütte
 
IPV6 - Threats and Countermeasures / Crash Course
IPV6 - Threats and Countermeasures / Crash CourseIPV6 - Threats and Countermeasures / Crash Course
IPV6 - Threats and Countermeasures / Crash CourseThierry Zoller
 
Slides from IPv6 Threats
Slides from IPv6 ThreatsSlides from IPv6 Threats
Slides from IPv6 ThreatsCyren, Inc
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutionseroglu
 

Similar a 10 fn s05 (20)

IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the Enterprise
 
Presd1 09
Presd1 09Presd1 09
Presd1 09
 
IPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be IgnoredIPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be Ignored
 
Ipv6 - Hamzeh Al-Qudah
Ipv6 - Hamzeh Al-QudahIpv6 - Hamzeh Al-Qudah
Ipv6 - Hamzeh Al-Qudah
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6
 
Introduction of IPv6NET in Tridentcom 2014
Introduction of IPv6NET in Tridentcom 2014Introduction of IPv6NET in Tridentcom 2014
Introduction of IPv6NET in Tridentcom 2014
 
IETF Activities Update
IETF Activities UpdateIETF Activities Update
IETF Activities Update
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test Methodology
 
I pv6
I pv6I pv6
I pv6
 
Ipv6 presention
Ipv6 presentionIpv6 presention
Ipv6 presention
 
Ipv6 presention
Ipv6 presentionIpv6 presention
Ipv6 presention
 
D017131318
D017131318D017131318
D017131318
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
 
IPv6 training guide - Yuval Shaul
IPv6 training guide - Yuval ShaulIPv6 training guide - Yuval Shaul
IPv6 training guide - Yuval Shaul
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002
 
[CB19] New threats are already around you, the IPV6 attack must be understood...
[CB19] New threats are already around you, the IPV6 attack must be understood...[CB19] New threats are already around you, the IPV6 attack must be understood...
[CB19] New threats are already around you, the IPV6 attack must be understood...
 
The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)
 
IPV6 - Threats and Countermeasures / Crash Course
IPV6 - Threats and Countermeasures / Crash CourseIPV6 - Threats and Countermeasures / Crash Course
IPV6 - Threats and Countermeasures / Crash Course
 
Slides from IPv6 Threats
Slides from IPv6 ThreatsSlides from IPv6 Threats
Slides from IPv6 Threats
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutions
 

Más de Scott Foster (20)

10 fn tut3
10 fn tut310 fn tut3
10 fn tut3
 
10 fn tut2
10 fn tut210 fn tut2
10 fn tut2
 
10 fn tut1
10 fn tut110 fn tut1
10 fn tut1
 
10 fn s48
10 fn s4810 fn s48
10 fn s48
 
10 fn s47
10 fn s4710 fn s47
10 fn s47
 
10 fn s46
10 fn s4610 fn s46
10 fn s46
 
10 fn s45
10 fn s4510 fn s45
10 fn s45
 
10 fn s44
10 fn s4410 fn s44
10 fn s44
 
10 fn s43
10 fn s4310 fn s43
10 fn s43
 
10 fn s42
10 fn s4210 fn s42
10 fn s42
 
10 fn s40
10 fn s4010 fn s40
10 fn s40
 
10 fn s38
10 fn s3810 fn s38
10 fn s38
 
10 fn s37
10 fn s3710 fn s37
10 fn s37
 
10 fn s36
10 fn s3610 fn s36
10 fn s36
 
10 fn s35
10 fn s3510 fn s35
10 fn s35
 
10 fn s34
10 fn s3410 fn s34
10 fn s34
 
10 fn s33
10 fn s3310 fn s33
10 fn s33
 
10 fn s32
10 fn s3210 fn s32
10 fn s32
 
10 fn s31
10 fn s3110 fn s31
10 fn s31
 
10 fn s29
10 fn s2910 fn s29
10 fn s29
 

10 fn s05

  • 1. The Truth about IPv6 Security Fernando Gont UTN/FRH FutureNet: MPLS, Ethernet and Beyond Boston, MA, USA, May 10-13, 2010
  • 2. Agenda  Brief comparision of IPv4 and IPv6  A few myths about IPv6 security  Transition Technologies  Ongoing work on IPv6 security at UK CPNI  Key areas where further work is needed  Conclusions
  • 3. Brief comparision of IPv4 and IPv6  IPv4 and IPv6 are very similar in terms of functionality IPv4 IPv6 Addressing 32 bits 128 bits Auto- DHCP & RS/RA ICMPv6 RS/RA & DHCPv6 configuration Address ARP (opt) ICMPv6 resolution IPsec support Optional Mandatory Fragmentation Both in hosts and Only in hosts routers
  • 4. Mandatory IPsec support Myth: “IPv6 has improved security as a result of its mandatory IPsec support”  IPsec already existed for IPv4  The mandatory-ness of IPsec for IPv6 is just words on paper  Also, there are problems with its deployment as a general end- to-end security mechanism  Deployment of IPsec(v6) has similar problems as those of IPsec(4). As a result, IPsec(v6) is not deployed as a general end-to-end security mechanism, either
  • 5. Larger address space Myth: “It is unfeasible to brute-force scan an IPv6 network for alive nodes, as the IPv6 address space is so large. Such a scan would take ages!”  [Malone, 2008] (*) measured IPv6 address assignement patterns  For hosts,  50% autoconf, 20% IPv4-based, 10% Teredo, 8% “low-byte”  For infrastructure,  70% “low-byte”, 5% IPv4-based  Anyway, most compromised systems are hosts. Once a host is compromised, brute-force scanning becomes trivial Size matters… only if you use it properly! ;-) (*) Malone, D. 2008. Observations of IPv6 Addresses. Passive and Active Measurement Conference (PAM 2008, LNCS 4979), 29–30 April 2008.
  • 6. Auto-configuration & address-resolution  Based on Neighbor Discovery messages (ICMPv6) – DHCPv6 is optional  Stateless autoconfiguration more powerful than the IPv4 counterpart… but also provides more potential vectors for attackers to exploit (e.g., THCʼs IPv6 attack suite)  Less support in Layer-2 boxes for mitigation of ND attacks  Secure Neighbor Discovery (SEND) was specified for mitigating ND security threats, employing:  Cryptographically-Generated Addresses (CGAs)  RSA signatures (RSA signature option)  Certificates  Not widely supported (e.g., no support in Windows XP/Vista/7 or KAME)  Even then, SEND does not eliminate (nor should it) Layer-4+ attack vectors (e.g., DNS spoofing)
  • 7. Transition technologies  Original IPv6 transition plan was dual-stack (yes, it failed)  Current strategy is a transition/co-existence plan based on a toolbox:  Configured tunnels  Automatic tunnels (ISATAP, 6to4, Teredo, etc.)  NATs (NAT64, NAT46, ALGs, etc.)  Automatic-tunneling mechanisms are enabled by default in Windows Vista and Windows 7  They may be (and have been) leveraged to bypass local network policies  Some automatic tunnels use anycast IPv4 addresses:  Where is your Teredo and 6to4 traffic going through?  This might (or might not) be of concern to you
  • 8. Ongoing work (or “what weʼre doing on v6 security”)
  • 9. Ongoing work on IPv6 security at CPNI  The UK CPNI (Centre for the Protection of National Infrastructure) is currently working on a security assessment of the IPv6 protocol suite  Similar project to the one we carried out years ago on TCP and IPv4:  Security assessment of the protocol specifications  Security assessment of common implementation strategies  Production of assessment/Proof-Of-Concept tools  Publication of best practices documents  Currently cooperating with vendors and other parties
  • 11. Key areas in which further work is needed  IPv6 Resiliency  Implementations have not really been the target of attackers, yet  Only a handful of publicly available attack tools  Lots of vulnerabilities and bugs still to be discovered.  IPv6 support in security devices  IPv6 transport is not broadly supported in security devices (firewalls, IDS/IPS, etc.)  This is key to be able enforce security policies comparable with the IPv4 counterparts  Education/Training  Pushing people to “Enable IPv6” point-and-click style is simply insane.  Training is needed for engineers, technicians, security personnel, etc., before the IPv6 network is running.
  • 13. Conclusions  Most security vulnerabilities have to do with Layer4+  No layer-3 protocol will help an unsecured DNS, broken browser, or broken database application  Even when it comes to previously-known Layer3 issues, IPv6 is not that different from IPv4 to make a difference   After all, IPv6 is… “96 more bits, no magic” -- Gaurab Raj Upadhaya
  • 15. Acknowledgements  UK CPNI, for their continued support  Future-Net organizers, for the invitation to present in this conference Fernando Gont fernando@gont.com.ar http://www.gont.com.ar