lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <Pine.GSO.4.43.0507291730450.15143-100000@tundra.winternet.com> Date: Fri Jul 29 23:36:07 2005 From: dufresne at winternet.com (Ron DuFresne) Subject: Cisco IOS Shellcode Presentation On Fri, 29 Jul 2005 Valdis.Kletnieks@...edu wrote: > On Fri, 29 Jul 2005 16:38:26 CDT, Ron DuFresne said: > > > being that we'll all be retired and all this equipment replaced by the > > time IPv6 becomes standard the threat is not as great then as it was first > > made out to be then, correct? > > Part of the problem is that IOS includes IPv6 support by default. > > How many sites that don't do IPv6 didn't do a 'no ipv6 enable' and 'no ipv6 > address' on *every* interface? > IPv6 has been hyped as the security shim of all shims for tcp/IP. Even able to cure the common cold, if implimented prior to mass rollout/acceptance. Which is why we are seeing many security admins on various platforms not paying attention to security 101 tenants, if it's not needed disable/remove it. I'm gessing now that many in the *nix as well as router realms will now pay a tad more heed to the basics? Thanks, Ron DuFresne -- "Sometimes you get the blues because your baby leaves you. Sometimes you get'em 'cause she comes back." --B.B. King ***testing, only testing, and damn good at it too!*** OK, so you're a Ph.D. Just don't touch anything.
Powered by blists - more mailing lists