Security Basics mailing list archives

Re: IPv6 intruders


From: "Mario A. Spinthiras" <mario () netway com cy>
Date: Sat, 07 Oct 2006 10:22:14 +0300

Alcides wrote:
When I was reading about China's Next Generation Internet project, I
came across something interesting:
It reads as following
"Your Hidden IPv6 Network"
Are you building an IPv6 network without even knowing it?
If you've bought any new network equipment over the past few years,
then chances are yes. >Most commercially available routers and
switches recognize both IPv4 and IPv6 traffic, as >do Windows, Linux
and Mac OS. But that doesn't mean your network is IPv6 ready—that
would require a full network redesign. Meanwhile, don't ignore the
IPv6 capabilities you may >already have. Most applications, including
network monitoring software, won't register a user >connecting with an
IPv6 address, making it possible for hackers to enter the network
undetected. Disable the IPv6 capabilities wherever possible until you
are ready for the >transition.

I came across this at the following link:
http://www.cio.com/archive/071506/china.html?page=2

Now I would like to know your opinion on this.

Warm regards,

---------------------------------------------------------------------------
This list is sponsored by: Norwich University

EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE
The NSA has designated Norwich University a center of Academic Excellence in Information Security. Our program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Using interactive e-Learning technology, you can earn this esteemed degree, without disrupting your career or home life.

http://www.msia.norwich.edu/secfocus
---------------------------------------------------------------------------


this does not give much information with regards to your statement on undetected ipv6 "hackers". Do you know of any methodology or implemented attacks ? Incidents? You cant just throw something at a list like that. Which networking devices are vulnerable to such an attack?

Plus you'd have to be able to route traffic to an ipv6 destination to do that and there are plenty of providers and backbone routers that are not ipv6.

Please provide more information if you wish to be supported on your topic...


Regards,
Mario A. Spinthiras

---------------------------------------------------------------------------
This list is sponsored by: Norwich University

EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE
The NSA has designated Norwich University a center of Academic Excellence in Information Security. Our program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Using interactive e-Learning technology, you can earn this esteemed degree, without disrupting your career or home life.

http://www.msia.norwich.edu/secfocus
---------------------------------------------------------------------------


Current thread: