Re: IPv6 Interview Questions and critic

2002-08-29 Thread Kurtis Lindqvist
What is interesting is that people can identify a EUI-64 unicast address no matter where you are. For example, i use my laptop at work and at home (assuming I had an ipv6 connection at home). I could be identified as the same computer, without using cookies, since my base 64 address would

Re: IPv6 Interview Questions and critic

2002-08-28 Thread Kurtis Lindqvist
You can tell as much (more or less) with a port scan to a IPv4 address... How can I recognize someone by doing a portscan? Not the person, but the system type. - kurtis -

Re: IPv6 Interview Questions and critic

2002-08-28 Thread Peter John Hill
On Tuesday, August 27, 2002, at 05:33 PM, Iljitsch van Beijnum wrote: On Tue, 27 Aug 2002, Kurtis Lindqvist wrote: censored fears abuse as a hardware ID wired into the ipv6 protocol can be used to determine the manufacturer, make and model number, and value of the hardware equipment

IPv6 Interview Questions and critic

2002-08-27 Thread Joe Baptista
Hi: I'm doing an article on IPv6 and am looking for comments - here is a portion on IPv6 which relates to the privacy issue ... any comments, crtics or interviews welcomed. -- snip As you know IPv6 is a suite of protocols for the network layer of the Internet which uses IPv4 gateways. It's

Re: IPv6 Interview Questions and critic

2002-08-27 Thread Stephen J. Wilcox
ooh how exciting, you can tell who uses 3Com network cards :) Most networks eg P2P will use /127 and not use MAC anyway so I cant see this being a privacy on issue on anything but end devices and you can override if yuo feel the need... On end devices by default yes it uses mac, I cant see

Re: IPv6 Interview Questions and critic

2002-08-27 Thread John Palmer
- Original Message - From: Joe Baptista [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Tuesday, August 27, 2002 09:41 Subject: IPv6 Interview Questions and critic Hi: I'm doing an article on IPv6 and am looking for comments - here is a portion on IPv6 which relates to the privacy

Re: IPv6 Interview Questions and critic

2002-08-27 Thread Eric Gauthier
Joe, Ipv6 uses 128 bits to provide addressing, routing and identification information on a computer. The 128-bits are divided into the left-64 and the right-64. Ipv6 uses the right 64 bits to store an IEEE defined global identifier (EUI64). This identifier is composed of company id value

Re: IPv6 Interview Questions and critic

2002-08-27 Thread Kevin Oberman
Date: Tue, 27 Aug 2002 10:41:08 -0400 (EDT) From: Joe Baptista [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] Hi: I'm doing an article on IPv6 and am looking for comments - here is a portion on IPv6 which relates to the privacy issue ... any comments, crtics or interviews welcomed.

[OT] Re: IPv6 Interview Questions and critic

2002-08-27 Thread William Waites
Kevin == Kevin Oberman [EMAIL PROTECTED] writes: Kevin This is really pretty silly. Not really, Joe may actually have a point here. Kevin Only end nodes will auto-configure with the MAC address Kevin used for 48 bits of the IPv6 address. Exactly how this is a Kevin

Re: IPv6 Interview Questions and critic

2002-08-27 Thread Peter John Hill
On Tuesday, August 27, 2002, at 10:41 AM, Joe Baptista wrote: Ipv6 uses 128 bits to provide addressing, routing and identification information on a computer. The 128-bits are divided into the left-64 and the right-64. Ipv6 uses the right 64 bits to store an IEEE defined global

Re: IPv6 Interview Questions and critic

2002-08-27 Thread Marshall Eubanks
On Tue, 27 Aug 2002 14:43:38 -0400 Peter John Hill [EMAIL PROTECTED] wrote: On Tuesday, August 27, 2002, at 10:41 AM, Joe Baptista wrote: Ipv6 uses 128 bits to provide addressing, routing and identification information on a computer. The 128-bits are divided into the left-64 and

Re: IPv6 Interview Questions and critic

2002-08-27 Thread Kurtis Lindqvist
However IPv6 has many privacy issues. IPv6 address space uses an ID (indentifier) derived from your hardware or phone. That allows your packets to be traced back to your PC or cell-phone said censored. censored fears abuse as a hardware ID wired into the ipv6 protocol can be used to

Re: IPv6 Interview Questions and critic

2002-08-27 Thread Iljitsch van Beijnum
On Tue, 27 Aug 2002, Marshall Eubanks wrote: Since it so easy for a host (relative to ipv4) to have multiple ip addresses, I like what Microsoft has done. If told by a router, a Win XP box will assign itself a global unicast address using EUI-64. It will also create a global unicast

Re: IPv6 Interview Questions and critic

2002-08-27 Thread Iljitsch van Beijnum
On Tue, 27 Aug 2002, Kurtis Lindqvist wrote: censored fears abuse as a hardware ID wired into the ipv6 protocol can be used to determine the manufacturer, make and model number, and value of the hardware equipment being used by the end user. ...uhm, and? What is the real difference with

Re: IPv6 Interview Questions and critic

2002-08-27 Thread Peter John Hill
On Tuesday, August 27, 2002, at 05:07 PM, Marshall Eubanks wrote: On Tue, 27 Aug 2002 14:43:38 -0400 Peter John Hill [EMAIL PROTECTED] wrote: On Tuesday, August 27, 2002, at 10:41 AM, Joe Baptista wrote: Since it so easy for a host (relative to ipv4) to have multiple ip addresses, I

Re: IPv6 Interview Questions and critic

2002-08-27 Thread Valdis . Kletnieks
On Tue, 27 Aug 2002 23:33:40 +0200, Iljitsch van Beijnum said: How can I recognize someone by doing a portscan? http://www.insecure.org/nmap It slices, it dices, it makes julienne fries. (I'm assuming you mean in the same sense as you can identify a machine's vendor based on the EUI-64... -

Re: IPv6 Interview Questions and critic

2002-08-27 Thread Valdis . Kletnieks
On Tue, 27 Aug 2002 17:48:24 EDT, [EMAIL PROTECTED] said: (I'm assuming you mean in the same sense as you can identify a machine's vendor based on the EUI-64... - neither a portscan or a MAC address will tell you who's machine it is, as far as I know (although doing an nmap to find ports