[76851] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: IPv6, IPSEC and DoS

daemon@ATHENA.MIT.EDU (Iljitsch van Beijnum)
Sat Jan 1 06:16:47 2005

In-Reply-To: <Pine.GSO.4.58.0412312021120.16868@kungfunix.net>
Cc: nanog@nanog.org
From: Iljitsch van Beijnum <iljitsch@muada.com>
Date: Sat, 1 Jan 2005 12:16:02 +0100
To: "J. Oquendo" <sil@politrix.org>
Errors-To: owner-nanog-outgoing@merit.edu


On 1-jan-05, at 2:22, J. Oquendo wrote:

> Supposedly the vulns associated with IPv6 are: reconnaissance, unauth'd
> access, layers 3-4 spoofing, ARP and DHCP attacks, smurfs, routing
> attacks, viruses andworms, translations, transistions, and tunneling
> mechanisms. According to Sean Covery's IPv6 Security Threats
> (http://www.seanconvery.com/SEC-2003.pdf)

No, that list is just a starting point for the discussion. A lot of 
stuff in the list doesn't amount to anything. (For instance, there is 
no ARP in IPv6.)

I don't understand your example, BTW.

But as long as people get to snif your packets, you're dead in the 
water unless you use IPsec.


home help back first fref pref prev next nref lref last post