[190061] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Netflix banning HE tunnels

daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Tue Jun 14 15:34:45 2016

X-Original-To: nanog@nanog.org
To: "Ricky Beam" <jfbeam@gmail.com>
From: Valdis.Kletnieks@vt.edu
In-Reply-To: <op.yi19mekgtfhldh@rbeam.xactional.com>
Date: Tue, 14 Jun 2016 15:34:37 -0400
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

--==_Exmh_1465932877_1959P
Content-Type: text/plain; charset=us-ascii

On Tue, 14 Jun 2016 14:57:40 -0400, "Ricky Beam" said:

> I've seen many "IPv6 Capable" CPEs that apply ZERO security to IPv6
> traffic. IPv4 goes through NAT, so one gets the pseudo-security of not
> being directly touchable from the internet.

And a very big *PSEUDO* on that.  It's amazing how many vendor firmwares
suck so bad that it's no challenge to pwn the CPE and then leapfrog from there....

--==_Exmh_1465932877_1959P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: Exmh version 2.5 07/13/2001
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=8nVl
-----END PGP SIGNATURE-----

--==_Exmh_1465932877_1959P--

home help back first fref pref prev next nref lref last post