lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <51011270.6050703@si6networks.com>
Date: Thu, 24 Jan 2013 07:52:32 -0300
From: Fernando Gont <fgont@...networks.com>
To: "bugtraq@...urityfocus.com" <bugtraq@...urityfocus.com>
CC: Full Disclosure <full-disclosure@...ts.grok.org.uk>
Subject: IPv6: How to avoid security issues with VPN leaks on dual-stack networks

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Folks,

Techtarget has just published an article I've authored for them,
entitled "How to avoid security issues with VPN leaks on dual-stack
networks".

The article is available at:
<http://searchsecurity.techtarget.com/tip/How-to-avoid-security-issues-with-VPN-leaks-on-dual-stack-networks>

(Note: There are some banners (?) intermixed... but the whole article
can be viewed without registration... just keep scrolling down!9

Its "Abstract" is:
- ---- cut here ----
The imminent exhaustion of freely available IPv4 addresses has, over a
number of years, led to the incorporation of IPv6 support by most
general-purpose operating systems. However, many applications, such as
VPN client and server software, have been lagging behind to become
IPv6-ready. This results in scenarios in which dual-stacked hosts employ
IPv6-unaware VPN software, thus opening the door to security
vulnerabilities, such as VPN traffic leaks. In this tip, we'll discuss
how these VPN security issues arise and the various mitigation options
available for containing VPN traffic leaks.
- ---- cut here ----

P.S.: Any comments will be welcome.

Thanks!

Best regards,
- -- 
Fernando Gont
SI6 Networks
e-mail: fgont@...networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492





-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=MtBC
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ