[ipv6hackers] Windows 7/2008 R2 Improved Resilliency to IPv6 Floods
jim.small at cdw.com
Wed Apr 3 03:43:02 CEST 2013
Thanks Doug - excellent thread.
So to summarize for Microsoft KB 2750841 which retrofits Windows 8/2012 IPv6 NCSI behavior to 7/2008R2:
Q1) If you have some sort of temporary interruption in your IPv6 connectivity at boot time will you lose IPv6 for the lifetime of the session?
A1) No, from the Microsoft product manager:
Only a combination of no proxies, AAAA resolution success, a default route, and a failure to connect to the beacon - enables this functionality to activate. And its activation is limited to depreferencing the default route. Any scoped routes that have been configured are untouched.
Q2) Are the NCSI results cached?
A2) Per the Microsoft product manager, only positive results are cached. Negative results are re-tried at each network attach (or disable/re-enable interface).
Q3) Is Windows 8 still vulnerable to DoS/BSOD from RAs?
A3) Need to test...
> -----Original Message-----
> From: ipv6hackers-bounces at lists.si6networks.com [mailto:ipv6hackers-
> bounces at lists.si6networks.com] On Behalf Of Doug Barton
> Sent: Tuesday, April 02, 2013 1:37 AM
> To: ipv6hackers at lists.si6networks.com
> Subject: Re: [ipv6hackers] Windows 7/2008 R2 Improved Resilliency to IPv6
> On 04/01/2013 06:03 AM, Jim Small wrote:
> > Could you provide a link/pointer to this discussion?
> Ipv6hackers mailing list
> Ipv6hackers at lists.si6networks.com
More information about the Ipv6hackers