[136871] in North American Network Operators' Group
Re: Random Port Blocking at Hotels (was: Re: quietly....)
daemon@ATHENA.MIT.EDU (Owen DeLong)
Sat Feb 5 23:45:02 2011
From: Owen DeLong <owen@delong.com>
In-Reply-To: <4D4E23EF.3050303@matthew.at>
Date: Sat, 5 Feb 2011 20:42:08 -0800
To: matthew@matthew.at
Cc: "John R. Levine" <johnl@iecc.com>, nanog@nanog.org, support@telcodata.us
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On Feb 5, 2011, at 8:30 PM, Matthew Kaufman wrote:
> On 2/5/2011 8:15 PM, Paul Timmins wrote:
>> OR just upgrade your gear, and while you're at it, you can now safely =
enable IPv6 anyway.
>=20
> Well, enable IPv6. Safely? I don't see how upgrading your gear =
magically makes the various security threats -- including the current =
topic of rogue RAs -- go away.
>=20
> Matthew Kaufman
Most rogue RAs are problematic on networks that don't have legitimate =
RAs to override them.
Yes, someone can do a malicious RA, but, the current problem is mostly =
people doing
accidental RAs thanks to Micr0$0ft's convenient "Click here to screw =
your neighbors"
buttons.
Owen