[ipv6hackers] IPv6 security presentation at Hack.lu 2011
Joakim Aronius
joakim at aronius.se
Thu Sep 22 10:29:59 CEST 2011
All nodes that keep state are vulnerable to DoS. Arbor Networks published a pretty intersting report which can be downloaded here:
http://www.arbornetworks.com/report
Regards,
/joakim
* fred (fred at fredbovy.com) wrote:
> Hi Douglas,
>
> This is really interesting. I realized that NAT was an easy target for DoS
> attacks but I never read anything about this before...
>
> I can see approximately how this may occur but if you have more doc about
> this I am interested.
>
> Thanks
>
>
>
> Le 21/09/2011 21:05, « Douglas Otis » <dotis at mail-abuse.org> a écrit :
>
> > Any NAT device within a network provides an easily exploited opportunity
> > for undetected MITM attacks. Only End-to-End security offers protection
> > from exploits related with ARP or ND+MLD where End-to-End security is
> > likely only possible with IPv6. This does not need to be IPsec.
>
> --
>
> Fred Bovy
> fred at fredbovy.com
> Skype: fredericbovy
> Mobile: +33676198206
> Siret: 5221049000017
> Twitter: http://twitter.com/#!/FredBovy
> Blog: http://fredbovyipv6.blogspot.com/
> ccie #3013
>
>
>
>
> _______________________________________________
> Ipv6hackers mailing list
> Ipv6hackers at lists.si6networks.com
> http://lists.si6networks.com/listinfo/ipv6hackers
More information about the Ipv6hackers
mailing list