[ipv6hackers] "Stick to limited IPv6 deployments, businesses warned"
owend at he.net
Sat Aug 25 12:51:59 CEST 2012
On Aug 24, 2012, at 18:24 , Karl Auer <kauer at biplane.com.au> wrote:
> On Sat, 2012-08-25 at 01:49 +0100, Mike Jones wrote:
>> It's also an attack that the best defence against is to deploy v6
>> across your entire network.
> I don't see how you arrived at that conclusion. RA flooding has nothing
> to do with IPv4.
My understanding is that windows hosts are vulnerable to the attack
whether or not IPv6 is turned on on the host.
There are other things (like Teredo) where you have a serious security
hole potential with IPv6 turned off on your network, but turning on IPv6
will prevent (or at least make it quite a bit harder) to cause problems.
> Regards, K.
> Karl Auer (kauer at biplane.com.au)
> GPG fingerprint: AE1D 4868 6420 AD9A A698 5251 1699 7B78 4EEE 6017
> Old fingerprint: DA41 51B1 1481 16E1 F7E2 B2E9 3007 14ED 5736 F687
> Ipv6hackers mailing list
> Ipv6hackers at lists.si6networks.com
More information about the Ipv6hackers