Note that there are a variety of forums that are a much better place
than a Debian mtr package bug report for these kind of questions.


On 2014-04-28 09:08, Rogier Wolff wrote:
> I personally have a good understanding of IPV4 and how I've secured my
> network against attacks from outside. I know what I'm doing. This
> means that I make decisions about what to protect against and what I
> won't protect against.
> 
> I have decided that I will have "fence security": I protect the
> outside, I do not put any effort into protecting my machines from an
> attacker who is able to access my network. (either by physically
> plugging in or by getting control over a machine on my network).

If your assumption is that, then you are 'safe' with the default
settings provided by Debian.

Unless somebody sets up a router advertisement to announce a prefix (for
which they need local access to the network), your host will only have a
link-local (fe80::/10) address, which means the adversary has local
access to your network.

> Now this fancy IPV6 comes along. I've been pusing my hosting provider
> for an IPV6 address so that I can gain some experience.

Chose with your money. If they do not get the picture in 2014, they will
never get it.

> The little I know about IPV6 is that there won't be a need to
> "masquerade" like we do now. Well, that masquerading is part of my
> security strategy.

The part that 'masquerading' adds in your 'security strategy' is
connection tracking. Not the actual act of translating addresses; they
actually make your box wide open.

> I know that my machines, when running a recent distribution, obtain an
> IPV6 address. If my home router suddenly started giving my home
> machines routable IPV6 addresses that would break my "fence".

If you do not trust machines connection to your local network then you
should fix that hole in the fence.

> So... best thing to do is to make sure my machine will never talk
> IPV6. How about I compile a kernel without IPV6? Or maybe just boot
> with ipv6disable=1?

Instead of disabling IPv6, just firewall it:

ip6tables -A INPUT -j REJECT
ip6tables -A FORWARD -j REJECT


If you consider disabling IPv6, you should also disable all kinds of
drivers, TCP/IP variants, etc. As that is then the same 'protection' you
are asking for.


More importantly though: it is 2014, IPv6 has been available to the
general public for almost 20 years (6bone is from 1996-ish). Use it.

Greets,
 Jeroen


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to