[nsp-sec] IPv6 bad actors ??
Eli Dart
dart at es.net
Tue Mar 13 13:04:01 EDT 2012
I've seen some probing. Some of it exhibits traceroute-like behavior
(varying TTL), and some of it looks like experimentation with header
stacking (perhaps to avoid filtering).
It looked like recon traffic, not attack traffic.
--eli
On 3/13/12 8:14 AM, John Brown wrote:
> ----------- nsp-security Confidential --------
>
> With IPv6 become more prevalent, what sort of IPv6 attack vectors are people seeing??
> I see lists of IPv4 stuff, but hardly ever see IPv6 address space show up.
> I've got to believe that bad actors are actively probing v6 networks and devices.
>
> thoughts
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________
--
Eli Dart NOC: (510) 486-7600
ESnet Network Engineering Group (AS293) (800) 333-7638
Lawrence Berkeley National Laboratory
PGP Key fingerprint = C970 F8D3 CFDD 8FFF 5486 343A 2D31 4478 5F82 B2B3
More information about the nsp-security
mailing list