MGv6C Standard
Malaysian Government IPv6 Compliance (MGv6C)
This page defines what MGv6C tests, why it tests it, how scoring works, what evidence is produced and how results remain suitable for repeatable audit. MGv6C-1.0 is aligned to the existing report output and does not require any changes to the current report format.
Standard Information
Contents
Purpose
MGv6C provides a national method to assess whether Malaysian Government services remain usable when users connect over IPv6. It focuses on external service readiness that can be measured objectively without requiring internal access.
Scope
In-Scope Targets
- Public websites and web applications
- Public APIs delivered over HTTP/HTTPS
- Authoritative DNS for the domain zone
- Email delivery infrastructure
In-Scope Outcomes
- Reachability over IPv6 and IPv4
- IPv6-only reachability outcome
- DNS and DNSSEC validation
- TLS certificate validity for IPv6
- Email transport readiness over IPv6
- Email authentication signals (SPF, DMARC)
- Evidence package for pass/fail justification
Out of Scope
- Internal network design and internal-only services
- Application vulnerability scanning beyond transport and DNS integrity
- Penetration testing and content security assessment
Standards Alignment
MGv6C controls are mapped to recognised global standards. The control set is limited to what the current report measures while aligning rationale to international references.
Core IPv6 Reachability & Addressing
- IETF IPv6 protocol specification (RFC 8200)
- IETF Default address selection behaviour (RFC 6724)
- IETF Dual-stack connection behaviour (RFC 8305)
DNS Integrity & DNSSEC
- IETF DNSSEC requirements and architecture (RFC 4033)
- IETF DNSSEC resource records (RFC 4034)
- IETF DNSSEC protocol behaviour (RFC 4035)
Web Transport Security
- IETF Recommendations for secure TLS deployment (RFC 7525)
- IETF TLS 1.3 specification (RFC 8446)
Email Transport & Authentication
- IETF SMTP transport (RFC 5321)
- IETF SPF (RFC 7208), DKIM (RFC 6376), DMARC (RFC 7489)
Governance & Quality Foundations
- ISO ISMS governance and control principles (ISO/IEC 27001)
- ISO Quality model dimensions: reliability and security (ISO/IEC 25010)
- ITU Performance parameter definitions for IP services (ITU-T Y.1540)
MGv6C references justify the existence of each control and guide interpretation during audit. MGv6C-1.0 uses the existing report control set and scoring.
Terms and Definitions
- Assessed domain
- A domain name under assessment including its public service hostnames and its authoritative DNS zone.
- Primary service hostname
- The hostname selected for the web test, typically the domain root or a declared primary web entry point.
- Dual stack
- A service that supports IPv4 and IPv6 concurrently.
- IPv6-only reachability
- A test outcome indicating the service is reachable when IPv4 connectivity is unavailable. This requires an IPv6-only test environment or equivalent enforcement.
- Validating resolver
- A DNS resolver that performs DNSSEC validation and reports the validation status.
- Evidence artefact
- A stored record supporting a control outcome, such as DNS responses, TLS certificate details or connection transcripts.
- Scored control
- A control that affects the MGv6C score.
- Diagnostic indicator
- A test output shown for transparency that does not affect the score.
Conformance Outcomes
MGv6C uses the same human-readable outcomes as the report. The score is a weighted percentage from 0 to 100.
Assessment Method and Test Environments
6.1 Non-Destructive Testing
MGv6C tests MUST be non-destructive and MUST avoid generating excessive traffic. Implementations SHOULD apply rate limits and sensible timeouts.
6.2 Network Environments
MGv6C recognises two execution contexts:
- Dual stack — IPv4 and IPv6 available
- IPv6 only — IPv4 unavailable
6.3 Determinism & Repeatability
Implementations SHOULD:
- Use consistent resolver configuration
- Store raw outputs for verification
- Record test time and observed addresses
- Record measured endpoint and port
Scoring Model
MGv6C scoring is fixed to match the current report format.
7.1 Category Weights (Fixed)
7.3 Score Calculation
For each category:
CategoryRatio = PassedScoredChecks / TotalScoredChecks
CategoryPoints = CategoryWeight × CategoryRatio
Overall MGv6C Score:
MGv6C Score = sum of all CategoryPoints (rounded to whole percent)
Worked example
If DNS & DNSSEC is 4/5 then DNS contribution is 25% × 0.8 = 20%. If all other categories are perfect then total becomes 95%.
INFO items and diagnostic indicators do not affect scoring.
Control Catalogue (Scored Controls)
This section defines the scored controls exactly as they appear in the report. Each control includes what is tested, why it matters, pass criteria, and the evidence expected.
Category A: Web Services
35% · 8 controlsAAAA Record
Globally Routable IPv6
HTTP over IPv6
HTTPS over IPv6
IPv6-Only Reachability
TLS Certificate Valid (IPv6)
Dual-Stack (IPv4 + IPv6)
HTTP/3 (QUIC)
Category B: DNS & DNSSEC
25% · 5 controlsNS Has AAAA Record
NS Reachable via IPv6
NS Answers Queries via IPv6
DNSSEC Validated
Reverse DNS (PTR)
Category C: Email Services
25% · 6 controlsMX Record Exists
MX Server Has IPv6
SMTP Reachable via IPv6
STARTTLS over IPv6
SPF Record
DMARC Record
Category D: IPv4 Baseline
15% · 3 controlsA Record
HTTP over IPv4
HTTPS over IPv4
Diagnostic Indicators (Not Scored)
These items are displayed for transparency but do not affect the category score.
DNS & DNSSEC
- Info DS Record at Parent
- Info RRSIG Valid
- Info Signing Algorithm
Email Services
- Info DKIM Selector
Network Information
- Info WHOIS/RDAP org, ASN, country, prefix
These items are useful for troubleshooting and remediation but are not counted in the scored ratio for that category in MGv6C-1.0.
Evidence Requirements
MGv6C assessments MUST produce evidence sufficient to justify each scored control outcome.
Minimum Evidence Set (Recommended)
- Raw DNS answers for A, AAAA, NS and MX
- DNSSEC validation outcome including failure reason when relevant
- Connection evidence for HTTP and HTTPS over IPv4 and IPv6 including port
- TLS certificate summary for IPv6 certificate validity
- SMTP reachability evidence over IPv6 including STARTTLS outcome
- Timestamp of test generation and assessed domain identity
Evidence should be stored in a manner that allows an auditor to review outcomes without re-running tests.
Reporting Requirements
Report Contents
- Assessed domain and display hostname
- Category weights and category pass counts
- MGv6C score and label outcome
- Per-control result (pass/fail or info)
- Key observed IPv4 and IPv6 addresses
- Optional RDAP summary for context
- Test generation timestamp
Machine-Readable Output
A JSON representation of the same results is recommended to enable national dashboards.
JSON should include category weights, passed and total counts, plus outcomes.
Data Protection and Safe Testing
Data Minimisation
MGv6C evidence focuses on protocol-level artefacts. Avoid collecting unnecessary personal data.
Safe Testing
- Tests should be rate limited
- Timeouts should be applied
- Only standard protocol handshakes
Integrity Protection
- Evidence storage should be access controlled
- Evidence should be protected from tampering
Versioning and Change Control
MGv6C MUST publish:
- Standard version number
- Publication date
- Control set description
- Change log for any future revisions
MGv6C-1.0 Change Policy
No changes are required to the existing report format. Any future MGv6C version that changes scoring MUST publish migration notes.
Interpretation Notes
1) Why DNSSEC can fail while other DNS items pass
DNS transport reachability can succeed even if DNSSEC is unsigned or chain of trust is incomplete. MGv6C scores DNSSEC validation explicitly via B4.
2) Why PTR is scored in DNS & DNSSEC
PTR improves traceability and operational hygiene. It is scored in MGv6C-1.0 because the current report scores it.
3) What "INFO" means
INFO items are diagnostic. They are displayed but do not affect scoring.
4) Why HTTP/3 is scored
MGv6C-1.0 follows the report which includes HTTP/3 in the Web Services scored list. Future versions may adjust but MGv6C-1.0 keeps it unchanged.
Frequently Asked Questions
Does MGv6C-1.0 require changing the current report?
No. MGv6C-1.0 is defined to match the current report structure and scoring.
Is MGv6C only for government domains?
The standard is published for Malaysian Government compliance but the tool may be used to assess any domain. Official compliance interpretation applies to in-scope government services.
What does "Fully IPv6 Ready" mean?
It means the MGv6C score is 90 to 100 based on the fixed weighted scoring model and the scored controls.
Can a domain be "Fully IPv6 Ready" while DNSSEC fails?
Yes. DNSSEC is one scored control within DNS & DNSSEC. A failure reduces the DNS category ratio which reduces the final score but may still remain above 90 depending on other results.