[129365] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: just seen my first IPv6 network abuse scan,

daemon@ATHENA.MIT.EDU (Steven Bellovin)
Fri Sep 3 13:20:10 2010

From: Steven Bellovin <smb@cs.columbia.edu>
In-Reply-To: <B2ADB949-9271-46BB-BC45-C6C6111E8257@arbor.net>
Date: Fri, 3 Sep 2010 13:19:51 -0400
To: "Dobbins, Roland" <rdobbins@arbor.net>
Cc: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On Sep 3, 2010, at 9:49 40AM, Dobbins, Roland wrote:

>=20
> On Sep 3, 2010, at 7:58 PM, Owen DeLong wrote:
>=20
>> However, scanning in IPv6 is not at all like the convenience of =
comprehensive scanning of the IPv4 address space.
>=20
>=20
> Concur, but I still maintain that lots of illicit automation plus =
refined scanning via DNS, et. al. is a viable practice.

See http://www.cs.columbia.edu/~smb/papers/v6worms.pdf


		--Steve Bellovin, http://www.cs.columbia.edu/~smb







home help back first fref pref prev next nref lref last post