lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <02fb217a-6f1f-d1be-01f0-569f7730d997@si6networks.com>
Date: Wed, 13 Mar 2019 22:58:47 -0300
From: Fernando Gont <fgont@...networks.com>
To: "bugtraq@...urityfocus.com" <bugtraq@...urityfocus.com>
Cc: fulldisclosure@...lists.org
Subject: [FD] IPv6 Security for IPv4 Engineers

Folks,

It is often argued that IPv4 practices should be forgotten when
deploying IPv6, as after all IPv6 is a different protocol! But we think
years of IPv4 operational experience should be leveraged as much as
possible.

So we are publishing IPv6 Security for IPv4 Engineers as a roadmap to
IPv6 security that is specifically aimed at IPv4 engineers and operators.

Rather than describing IPv6 in an isolated manner, it aims to re-use as
much of the existing IPv4 knowledge and experience as possible, by
highlighting the security issues that affect both protocols in the same
manner, and those that are new or different for the IPv6 protocol suite.
Additionally, it discusses the security implications arising from the
co-existence of the IPv6 and IPv4 protocols.

The document is available at:

https://www.internetsociety.org/resources/deploy360/ipv6/security/ipv4-engineers

Comments are always welcome. And if you think we've missed something or
the like, please drop me en email -- the document can always be revised.

* Personal plug-ins:

 + If you happen to be in Heidelberg next week
(https://www.troopers.de/troopers19/ngi/), there's an opportunity to
chat about IPv6 security.

 + I'll be doing IPv6 security training in Paris (France) next June:

https://hackinparis.com/trainings/#training-2019-hacking-ipv6-networks-v5-0-3-days

Thanks!

Cheers,
-- 
Fernando Gont
SI6 Networks
e-mail: fgont@...networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492





_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ