[nsp-sec] IPv6 bad actors ??

Eli Dart dart at es.net
Tue Mar 13 13:04:01 EDT 2012


I've seen some probing.  Some of it exhibits traceroute-like behavior 
(varying TTL), and some of it looks like experimentation with header 
stacking (perhaps to avoid filtering).

It looked like recon traffic, not attack traffic.

		--eli


On 3/13/12 8:14 AM, John Brown wrote:
> ----------- nsp-security Confidential --------
>
> With IPv6 become more prevalent, what sort of IPv6 attack vectors are people seeing??
> I see lists of IPv4 stuff, but hardly ever see IPv6 address space show up.
> I've got to believe that bad actors are actively probing v6 networks and devices.
>
> thoughts
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________

-- 
Eli Dart                                            NOC: (510) 486-7600
ESnet Network Engineering Group (AS293)                  (800) 333-7638
Lawrence Berkeley National Laboratory
PGP Key fingerprint = C970 F8D3 CFDD 8FFF 5486 343A 2D31 4478 5F82 B2B3



More information about the nsp-security mailing list