[ipv6hackers] "Stick to limited IPv6 deployments, businesses warned"

Owen DeLong owend at he.net
Sat Aug 25 12:51:59 CEST 2012


On Aug 24, 2012, at 18:24 , Karl Auer <kauer at biplane.com.au> wrote:

> On Sat, 2012-08-25 at 01:49 +0100, Mike Jones wrote:
>> It's also an attack that the best defence against is to deploy v6
>> across your entire network.
> 
> I don't see how you arrived at that conclusion. RA flooding has nothing
> to do with IPv4.
> 

My understanding is that windows hosts are vulnerable to the attack
whether or not IPv6 is turned on on the host.

There are other things (like Teredo) where you have a serious security
hole potential with IPv6 turned off on your network, but turning on IPv6
will prevent  (or at least make it quite a bit harder) to cause problems.

Owen

> Regards, K.
> 
> -- 
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> Karl Auer (kauer at biplane.com.au)
> http://www.biplane.com.au/kauer
> http://www.biplane.com.au/blog
> 
> GPG fingerprint: AE1D 4868 6420 AD9A A698 5251 1699 7B78 4EEE 6017
> Old fingerprint: DA41 51B1 1481 16E1 F7E2 B2E9 3007 14ED 5736 F687
> 
> _______________________________________________
> Ipv6hackers mailing list
> Ipv6hackers at lists.si6networks.com
> http://lists.si6networks.com/listinfo/ipv6hackers




More information about the Ipv6hackers mailing list