[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4F9109B2.2080706@si6networks.com>
Date: Fri, 20 Apr 2012 04:01:06 -0300
From: Fernando Gont <fgont@...networks.com>
To: Full Disclosure <full-disclosure@...ts.grok.org.uk>,
"bugtraq@...urityfocus.com" <bugtraq@...urityfocus.com>
Subject: IPv6 host scanning in IPv6
Folks,
We've just published an IETF internet-draft about IPv6 host scanning
attacks.
The aforementioned document is available at:
<http://www.ietf.org/id/draft-gont-opsec-ipv6-host-scanning-00.txt>
The Abstract of the document is:
---- cut here ----
IPv6 offers a much larger address space than that of its IPv4
counterpart. The standard /64 IPv6 subnets can (in theory)
accommodate approximately 1.844 * 10^19 hosts, thus resulting in a
much lower host density (#hosts/#addresses) than their IPv4
counterparts. As a result, it is widely assumed that it would take a
tremendous effort to perform host scanning attacks against IPv6
networks, and therefore IPv6 host scanning attacks have long been
considered unfeasible. This document analyzes the IPv6 address
configuration policies implemented in most popular IPv6 stacks, and
identifies a number of patterns in the resulting addresses lead to a
tremendous reduction in the host address search space, thus
dismantling the myth that IPv6 host scanning attacks are unfeasible.
---- cut here ----
Any comments will be very welcome (note: this is a drafty initial
version, with lots of stuff still to be added... but hopefully a good
starting point, and a nice reading ;-) ).
Thanks!
P.S.: Public discussion mostly welcome on the IPv6 hackers mailing-list
<http://lists.si6networks.com/listinfo/ipv6hackers/>, but I'd be happy
to discuss it here, too.
Best regards,
--
Fernando Gont
SI6 Networks
e-mail: fgont@...networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492
Powered by blists - more mailing lists