[ipv6hackers] "Stick to limited IPv6 deployments, businesses warned"
Owen DeLong
owend at he.net
Sat Aug 25 12:51:59 CEST 2012
On Aug 24, 2012, at 18:24 , Karl Auer <kauer at biplane.com.au> wrote:
> On Sat, 2012-08-25 at 01:49 +0100, Mike Jones wrote:
>> It's also an attack that the best defence against is to deploy v6
>> across your entire network.
>
> I don't see how you arrived at that conclusion. RA flooding has nothing
> to do with IPv4.
>
My understanding is that windows hosts are vulnerable to the attack
whether or not IPv6 is turned on on the host.
There are other things (like Teredo) where you have a serious security
hole potential with IPv6 turned off on your network, but turning on IPv6
will prevent (or at least make it quite a bit harder) to cause problems.
Owen
> Regards, K.
>
> --
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> Karl Auer (kauer at biplane.com.au)
> http://www.biplane.com.au/kauer
> http://www.biplane.com.au/blog
>
> GPG fingerprint: AE1D 4868 6420 AD9A A698 5251 1699 7B78 4EEE 6017
> Old fingerprint: DA41 51B1 1481 16E1 F7E2 B2E9 3007 14ED 5736 F687
>
> _______________________________________________
> Ipv6hackers mailing list
> Ipv6hackers at lists.si6networks.com
> http://lists.si6networks.com/listinfo/ipv6hackers
More information about the Ipv6hackers
mailing list