
oss-sec mailing list archives
Re: Linux kernel handling of IPv6 temporary addresses
From: Ludwig Nussel <ludwig.nussel () suse de>
Date: Wed, 05 Dec 2012 09:37:59 +0100
Kurt Seifried wrote:
[...] Sounds like this needs a CVE, is it correct that: an attacker can create a bunch of RA prefixes thus filling up the # of allowed IPv6 addresses for an interface, preventing any more IPv6 addresses from being assigned to that interface? In other words an attack over the local network resulting in a DoS condition.
Well, an attacker that is allowed to send RA's could do all kinds of ugly things, just like a rogue DHCP server could. Since that kind of address configuration provides no means to verify authenticity, hosts have no way to tell whether an RA is correct or malicious. Security basically relies on the switches blocking unintended address configuration. cu Ludwig -- (o_ Ludwig Nussel //\ V_/_ http://www.suse.de/ SUSE LINUX Products GmbH, GF: Jeff Hawn, Jennifer Guild, Felix Imendörffer, HRB 16746 (AG Nürnberg)
Current thread:
- Linux kernel handling of IPv6 temporary addresses George Kargiotakis (Nov 14)
- Re: Linux kernel handling of IPv6 temporary addresses Greg KH (Nov 14)
- Re: Linux kernel handling of IPv6 temporary addresses Kurt Seifried (Dec 04)
- Re: Linux kernel handling of IPv6 temporary addresses Ludwig Nussel (Dec 05)
- Re: Linux kernel handling of IPv6 temporary addresses Kurt Seifried (Dec 04)
- Re: Linux kernel handling of IPv6 temporary addresses Greg KH (Nov 14)