nanog mailing list archives
Re: AWS Elastic IP architecture
From: Nikolay Shopik <shopik () inblock ru>
Date: Tue, 2 Jun 2015 20:01:31 +0300
Matthew, Good list - Windows doesn't run non-privacy addresses, so it won't work next time. - If you could guess address of router props to you - Before using SNMP you still need device address. - If you can install software on remote PC, when you probably have same result in IPv4 world. - If you able run popular web/DNS server you probably have already enough money from elsewhere unless someone offer you more money to sell that info and this applies both to IPv4 and IPv6 regardless of firewall. So I'm not saying IPv6 doing just fine w/o firewall, just that it doing much better than IPv4 and its NAT with security through obscurity. And especially from simple kind attacks. On 02.06.2015 19:35, Matthew Kaufman wrote:
Ah, the "IPv6 subnets are so big you can't find the hosts" myth. Let's see... to find which hosts are active in IPv6 I can: - run a popular web service that people connect to, revealing their addresses - run a DNS server that lots of folks directly use (see Google) - use the back door login your router vendor provided and ask - query your unsecured public SNMP and ask - get you to install software that sends back a list of what's on your subnet - make educated guesses about your non-privacy IP addresses based on the MAC address ranges of popular hardware that is available in stores this year to reduce the search space to a manageable size - hack the site where you get automatic updates from and use its logs That's just off the top of my head Matthew Kaufman (Sent from my iPhone)On Jun 2, 2015, at 9:21 AM, Nikolay Shopik <shopik () inblock ru> wrote: Tell me how do you plan find printer in /64 subnet, scan it?On 02.06.2015 18:08, Matthew Kaufman wrote: I can't run my laser printer without a firewall in front of it, and I can't even guess how secure the controller in the septic system pump box might be... so I don't risk it. And I *know* that some of the webcams I have are vulnerable and have no updates available.
Current thread:
- Re: AWS Elastic IP architecture, (continued)
- Re: AWS Elastic IP architecture Ca By (Jun 01)
- Re: AWS Elastic IP architecture Christopher Morrow (Jun 01)
- Re: AWS Elastic IP architecture Mark Andrews (Jun 01)
- Re: AWS Elastic IP architecture Christopher Morrow (Jun 01)
- Re: AWS Elastic IP architecture Matthew Kaufman (Jun 01)
- Re: AWS Elastic IP architecture Mark Andrews (Jun 01)
- Re: AWS Elastic IP architecture Matthew Kaufman (Jun 02)
- Re: AWS Elastic IP architecture Nikolay Shopik (Jun 02)
- Re: AWS Elastic IP architecture mikea (Jun 02)
- Re: AWS Elastic IP architecture Matthew Kaufman (Jun 02)
- Re: AWS Elastic IP architecture Nikolay Shopik (Jun 02)
- Re: AWS Elastic IP architecture Valdis . Kletnieks (Jun 03)
- Re: AWS Elastic IP architecture Hugo Slabbert (Jun 03)
- RE: AWS Elastic IP architecture Steve Mikulasik (Jun 03)
- Re: AWS Elastic IP architecture Mark Andrews (Jun 02)
- Re: AWS Elastic IP architecture Owen DeLong (Jun 02)
- Re: AWS Elastic IP architecture Matthew Kaufman (Jun 02)
- Re: AWS Elastic IP architecture Owen DeLong (Jun 03)
- Re: AWS Elastic IP architecture Matthew Kaufman (Jun 03)
- Re: AWS Elastic IP architecture Owen DeLong (Jun 04)
- Re: AWS Elastic IP architecture Christopher Morrow (Jun 04)
