[ipv6hackers] "Stick to limited IPv6 deployments, businesses warned"
kauer at biplane.com.au
Fri Aug 24 23:20:28 CEST 2012
On Fri, 2012-08-24 at 16:52 +0000, Jim Small wrote:
> > And for the record: Windows 7 with all currennt updates applied
> > is still vulnerable to RA flooding, just tried last week.
> This sucks - I will do what I can to apply pressure for a solution.
Let's keep this in perspective too. To get an RA to a host you have to
be on the local link. There may be ways to remotely inject rogue RAs,
but I suspect that takes a lot of effort. And the panoply of attacks
possible if rogue RAs can be remotely injected or a link local host is
compromised go way beyond this one.
In short, how likely is this particular problem, RA flooding, to
actually be a problem in practice?
There are a lot of potential attacks that never turn into actual
attacks. Sure, we should be concerned about them and work to remove even
the theoretical possibilities, but should we let issues like this slow
I don't think so.
Karl Auer (kauer at biplane.com.au)
GPG fingerprint: AE1D 4868 6420 AD9A A698 5251 1699 7B78 4EEE 6017
Old fingerprint: DA41 51B1 1481 16E1 F7E2 B2E9 3007 14ED 5736 F687
More information about the Ipv6hackers