[Full-disclosure] (CFP) LACSEC 2014: Cancun, Mexico. May 7-8, 2014 (EXTENDED DEADLINE)

2014-03-18 Thread Fernando Gont
h, 2014 "9th Network Security Event for Latin America and the Caribbean" (LACSEC 2014) Chair Fernando Gont (SI6 Networks/UTN-FRH, Argentina) Evaluation Committee Iván Arce (Fundación Sadosky, Argentina) Carlos A. Ayala Rocha (Arbor Networks, Mexico) Julio César Balderrama (

[Full-disclosure] SI6 Networks' IPv6 Toolkit v1.5.2 released!

2014-01-17 Thread Fernando Gont
* All: Improved support for building the toolkit. The toolkit now contains one makefile for pmake, and another for GNU make. Added support for the DESTDIR variable. Appropriate paths are selected based on the value of a number of variables. Configuration file is

[Full-disclosure] Slideware of recent presentations about IPv6 security

2013-06-12 Thread Fernando Gont
I'd like to express gratitude to the conference organizers, and Enno Rey, for the warm reception, and the great time. Thanks! Best regards, - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 -BEGIN PGP SIGNATU

[Full-disclosure] Revision of "IPv6 Stable Privacy Addresses" (Fwd: I-D Action: draft-ietf-6man-stable-privacy-addresses-07.txt)

2013-05-19 Thread Fernando Gont
f-6man-stable-privacy-addresses-07>. This proposal is key for the mitigation of address-scanning attacks, while at the same time preventing host-tracking. Stay tuned for more IPv6 security news on our Twitter account: @SI6Networks Thanks! Best regards, Fernando Gont -

[Full-disclosure] Hacking IPv6 networks training (slideware, upcoming trainings, etc.)

2013-04-25 Thread Fernando Gont
you feel like chatting with us about IPv6 security, please check the security conferences we will be attending this year <http://www.si6networks.com/index.html#conferences>. As always, you can follow us on Twitter to get the latest news about IPv6 security: @SI6Networks Thanks! Best rega

[Full-disclosure] SI6 Networks' IPv6 Toolkit v1.3.4 released!

2013-04-17 Thread Fernando Gont
6hackers mailing list: <http://www.si6networks.com/community/mailing-lists.html>. Thanks! Best regards, - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 -BEGIN PGP SIGNATURE- Versio

[Full-disclosure] Host tracking in IPv6 (SI6 Networks' IPv6 toolkit v1.3.3)

2013-03-11 Thread Fernando Gont
which can be used to track systems across networks, even if they employ the so-called "Privacy Address" (and yes, that includes Microsoft Windows systems). Thanks, - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 74

[Full-disclosure] LACSEC 2013: 8th Network Security Event for Latin America and the Caribbean (CFP)

2013-02-19 Thread Fernando Gont
e for proposal submission: March 1st, 2013 * Notification of acceptance: March 11st, 2013 * Deadline for submitting the final version the presentation: May 5th, 2012 "8th Network Security Event for Latin America and the Caribbean" (LACSEC 2013) Chair Fernando Gont (SI6 Networks/UTN-FRH

[Full-disclosure] Scanning the IPv6 Internet with the scan6 tool (SI6 IPv6 toolkit)

2013-02-16 Thread Fernando Gont
Pv6 hackers mailing-list <http://www.si6networks.com/community/mailing-lists.html> -- feel free to join -- it's a low-noise and very focused list. P.S.: Please do read the scan6 manual page before using the tool .. you might cause trouble to the target network and/or to your own n

[Full-disclosure] SI6 Networks IPv6 Toolkit v1.3 released!

2013-02-16 Thread Fernando Gont
t least) the latest versions of Linux, FreeBSD, NetBSD, OpenBSD, and Mac OS X. Please send any bug reports and/or feature requests to . As always, you can get the latest news on IPv6 security research and tools by following us on Twitter: @SI6Networks. Thanks! Best regards, - -- Fernan

[Full-disclosure] IPv6: How to avoid security issues with VPN leaks on dual-stack networks

2013-01-24 Thread Fernando Gont
l be welcome. Thanks! Best regards, - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux) iQIcBAEBAgAGBQJRARJhAAoJEK4lDVUdTnSS

[Full-disclosure] LACSEC 2013: 8th Network Security Event for Latin America and the Caribbean (CFP)

2013-01-23 Thread Fernando Gont
e for proposal submission: March 1st, 2013 * Notification of acceptance: March 11st, 2013 * Deadline for submitting the final version the presentation: May 5th, 2012 "8th Network Security Event for Latin America and the Caribbean" (LACSEC 2013) Chair Fernando Gont (SI6 Networks/UTN-FRH

[Full-disclosure] Recently-revised IETF I-Ds about IPv6 security

2013-01-17 Thread Fernando Gont
ts/draft-ietf-opsec-dhcpv6-shield-00.txt> Title: Security Implications of IPv6 Fragmentation with IPv6 Neighbor Discovery URL: <http://www.ietf.org/internet-drafts/draft-ietf-6man-nd-extension-headers-02.txt> Thanks, - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP

[Full-disclosure] IPv6 Neighbor Discovery security (new documents)

2012-12-17 Thread Fernando Gont
d above. P.S.: If you are a vendor, I recommend you perform an assessment of your implementation with respect to the identified issues. Thanks! Best regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 --

[Full-disclosure] Network Reconnaissance in IPv6 Networks (errata)

2012-12-12 Thread Fernando Gont
u can find other documents, slideware, videos, and other materials about IPv6 security at our web site: <http://www.si6networks.com> And yes, you can follow us on Twitter: @SI6Networks Thanks! Best regards, - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31

[Full-disclosure] Network Reconnaissance in IPv6 Networks

2012-12-12 Thread Fernando Gont
ity at our web site: <http://www.si6networks.com> And yes, you can follow us on Twitter: @SI6Networks Thanks! Best regards, - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 -BEGIN PGP SIGNATURE- V

[Full-disclosure] IPv6 Toolkit v1.2.3 released! (and upcoming IPv6 security trainings)

2012-09-15 Thread Fernando Gont
heduled trainings can be found at: <http://www.hackingipv6networks.com/upcoming-t>, and currently includes trainings in Ghent (Belgium), Lisbon (Portugal), and Rio de Janeiro (Brazil). Please follow us on Twitter to get the latest news about the IPv6 Toolkit and IPv6 security: @SI6Networ

[Full-disclosure] ipv6mon v1.0 released! (IPv6 address monitoring daemon)

2012-09-13 Thread Fernando Gont
ng trainings <http://www.hackingipv6networks.com/upcoming-t> Follow us on twitter: @SI6Networks Best regards, - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 -BEGIN PGP SIGNATURE- Version:

[Full-disclosure] IPv6 implications on IPv4 nets: IPv6 RAs, IPv4, and VPN "evasion"

2012-09-04 Thread Fernando Gont
nternet-Draft will be welcome, too. And yeah, our Twitter is @SI6Networks... Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 ___ Full-Disclosu

[Full-disclosure] IPv6 security tools released

2012-07-05 Thread Fernando Gont
ts regarding how to use some of the tools. Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.o

[Full-disclosure] Slideware of IPv6 hacking training (HIP 2012 edition), and future trainings (Portugal & Belgium)

2012-07-02 Thread Fernando Gont
ttp://2012.brucon.org/index.php/Training>) Follow us on twitter: @SI6Networks Best regards, - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux) i

Re: [Full-disclosure] Analysis: Vast IPv6 address space actually enables IPv6 attacks

2012-06-08 Thread Fernando Gont
quot; work. > Still... where in the article does it say anything about "vast address > space... enables attacks"? > > The title and the article don't match. I might agree. The title was changed pre-publication. -- My original title was something along the lines of &q

Re: [Full-disclosure] Analysis: Vast IPv6 address space actually enables IPv6 attacks

2012-06-08 Thread Fernando Gont
Folks, FWIW, the full article is available at the URL below (you don't need to subscribe... just scroll the window down). CHeers, Fernando On 06/08/2012 07:32 AM, Fernando Gont wrote: > Folks, > > TechTarget has published an article I've authored for them, entitled >

[Full-disclosure] Analysis: Vast IPv6 address space actually enables IPv6 attacks

2012-06-08 Thread Fernando Gont
ables-IPv6-attacks> (FWIW, it's a human-readable version of the IETF Internet-Draft I published a month ago or so about IPv6 host scanning (see: <http://www.si6networks.com/presentations/ietf.html>)) Cheers, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 66

[Full-disclosure] New IETF I-D: (IPv6) "Neighbor Discovery Shield (ND-Shield): Protecting against Neighbor Discovery Attacks"

2012-06-06 Thread Fernando Gont
To: fg...@si6networks.com A new version of I-D, draft-gont-opsec-ipv6-nd-shield-00.txt has been successfully submitted by Fernando Gont and posted to the IETF repository. Filename:draft-gont-opsec-ipv6-nd-shield Revision:00 Title: Neighbor Discovery Shield (ND-Shiel

[Full-disclosure] IPv6 security: New IETF I-Ds, slideware and videos for recent presentations, trainings, etc...

2012-05-22 Thread Fernando Gont
ences> Interested in IPv6 security? -- Follow us on Twitter: @SI6Networks Thanks, - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux) i

[Full-disclosure] LACSEC 2012 Agenda (May 6-11, 2012, Quito, Ecuador)

2012-05-03 Thread Fernando Gont
"Practical Network Forensics for CSIRTs" -- James Pichardo "2011 Infrastructure Security Report" -- Carlos Ayala (Arbor Networks) "IPv6 Network Reconnaissance" -- Fernando Gont (SI6 Networks) Invited talk: "RPKI: Experiences after one year of operation, and next steps"

[Full-disclosure] New IETF I-D: Security Implications of IPv6 on IPv4 networks

2012-04-24 Thread Fernando Gont
iscusses the security implications of native IPv6 support and IPv6 transition/co-existence technologies on "IPv4-only" networks, and describes possible mitigations for the aforementioned issues. cut here Any feedback will be very welcome. Thanks! Best regards, -- Fernan

[Full-disclosure] IPv6 host scanning in IPv6

2012-04-20 Thread Fernando Gont
still to be added... but hopefully a good starting point, and a nice reading ;-) ). Thanks! P.S.: Public discussion mostly welcome on the IPv6 hackers mailing-list <http://lists.si6networks.com/listinfo/ipv6hackers/>, but I'd be happy to discuss it here, too. Best regards, -- Fernando Go

[Full-disclosure] Slides for "Recent Advances in IPv6 Security" at Hackito Ergo Sum 2012

2012-04-14 Thread Fernando Gont
ailable in other formats at: <http://www.si6networks.com/presentations/index.html> Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 ___ Full-Disclos

[Full-disclosure] IPv6 stable privacy addresses

2012-03-31 Thread Fernando Gont
the privacy of users. cut here Interested in IPv6 security? -- Follow us on Twitter: @SI6Networks Interested in discussing IPv6 security topics? -- Join the ipv6hackers@ mailing-list at: <http://www.si6networks.com/community/mailing-lists.html> Thanks! Best regards, -- Fernando G

[Full-disclosure] Security Implications of Predictable IPv6 Fragment Identification values (rev'ed IETF I-D)

2012-03-03 Thread Fernando Gont
ar 2012 15:02:10 -0800 From: internet-dra...@ietf.org To: fg...@si6networks.com A new version of I-D, draft-gont-6man-predictable-fragment-id-01.txt has been successfully submitted by Fernando Gont and posted to the IETF repository. Filename:draft-gont-6man-predictable-fragment-id Rev

[Full-disclosure] IPv6 NIDS evasion and IPv6 fragmentation/reassembly improvements

2012-02-20 Thread Fernando Gont
Folks, FYI, just posted: <http://blog.si6networks.com/2012/02/ipv6-nids-evasion-and-improvements-in.html> It contains some test results regarding the implementation of RFC 5722 and draft-ietf-6man-ipv6-atomic-fragments. Thanks, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.c

[Full-disclosure] IETF I-D: Security and Interoperability Implications of Oversized IPv6 Header Chains

2012-02-17 Thread Fernando Gont
Folks, FYI, we've published a new IETF I-D entitled "Security and Interoperability Implications of Oversized IPv6 Header Chains". The I-D is available at: <http://tools.ietf.org/id/draft-gont-6man-oversized-header-chain-00.txt> Any feedback will be very welcome. Thanks,

[Full-disclosure] RFC 6528 on Defending against Sequence Number Attacks

2012-02-02 Thread Fernando Gont
Folks, FYI. (the RFC is available at: ) A new Request for Comments is now available in online RFC libraries. RFC 6528 Title: Defending against Sequence Number Attacks Author: F. Gont, S. Bellovin Status: St

[Full-disclosure] Fwd: IPv6 RA-Guard: Advice on the implementation (feedback requested)

2012-02-01 Thread Fernando Gont
g-list , and CC me if possible. Thanks! Best regards, Fernando Original Message Subject: RA-Guard: Advice on the implementation (feedback requested) Date: Wed, 01 Feb 2012 21:44:29 -0300 From: Fernando Gont Organization: SI6 Networks To: IPv6 Operations Folks, We hav

[Full-disclosure] Fwd: RA-Guard: Advice on the implementation (feedback requested)

2012-02-01 Thread Fernando Gont
g-list , and CC me if possible. Thanks! Best regards, Fernando Original Message Subject: RA-Guard: Advice on the implementation (feedback requested) Date: Wed, 01 Feb 2012 21:44:29 -0300 From: Fernando Gont Organization: SI6 Networks To: IPv6 Operations Folks, We hav

[Full-disclosure] (CFP) LACSEC 2012: 7th Network Security Event for Latin America and the Caribbean

2012-01-15 Thread Fernando Gont
: February 15th, 2012 * Notification of acceptance: February 27th, 2012 * Deadline for submitting the final version the presentation: May 6th, 2012 "7th Network Security Event for Latin America and the Caribbean" (LACSEC 2012) Chair Fernando Gont (SI6 Networks/UTN-FRH, Argentina) Evaluation C

[Full-disclosure] First-hop security in IPv6

2012-01-14 Thread Fernando Gont
ents." P.S.: The whole article is available online, and you can read it even without registering... just scroll the web page... Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE2

[Full-disclosure] Revised IETF I-D: IPv6 Neighbor Discovery, SEND, and IPv6 Fragmentation

2012-01-12 Thread Fernando Gont
des, among other thing, a discussion of possible issues with SEND as a result of IPv6 fragmentation. Any feedback will be very appreciated. Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE2

[Full-disclosure] Revised IETF I-D: Advice on IPv6 RA-Guard Implementation

2012-01-04 Thread Fernando Gont
on techniques already available and employed in the IPv4 world. Any feedback will be greatly appreciated. -- If possible, send your feedback to: (the relevant IETF mailing-list), and CC'me. Follow Us on Twitter: @SI6Networks Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6ne

[Full-disclosure] Slides of our "Hacking IPv6 Networks" training at DEEPSEC 2011

2011-12-19 Thread Fernando Gont
-networks.pdf> Follow Us on twitter: SI6Networks Thanks! Best regards, - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 -BEGIN PGP SIGNATURE- Version: GnuPG v1

[Full-disclosure] New IETF I-Ds on Fragmentation-related security issues

2011-12-15 Thread Fernando Gont
against such traffic. This document discusses the generation of the aforementioned "atomic fragments", the corresponding security implications, and formally updates RFC 2460 and RFC 5722 such that the attack vector based on "atomic fragments" is completely eliminated.

[Full-disclosure] New IETF I-D on "Stable Privacy Addresses"

2011-12-15 Thread Fernando Gont
y-addresses-00.txt>. Any feedback will be really appreciated. P.S.: Also, feel free to discuss the I-D on the ipv6hackers mailing-list <http://lists.si6networks.com/listinfo/ipv6hackers/> Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprin

[Full-disclosure] Implications of IPv6 on network firewalls

2011-11-20 Thread Fernando Gont
si6networks.com/community/mailing-lists.html>. Thanks! Best regards, - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux) iQIcBAEBAgAGBQJOybnr

[Full-disclosure] IPv6 security (slides and training)

2011-11-08 Thread Fernando Gont
ipv6networks.com/trainings/hacking-ipv6-networks>. Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 ___ Full-Disclosure - We believe in it. Char

[Full-disclosure] IPv6 security presentation at Hack.lu 2011

2011-09-20 Thread Fernando Gont
uring H2HC) and one in Austria (during DEEPSEC 2011). Please check out the details at <http://www.si6networks.com/index.html#conferences>. Thanks! - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 Web: www.si6networks

Re: [Full-disclosure] HP A-series switches are affected, too. [WAS: More on IPv6 RA-Guard evasion (IPv6 security)]

2011-09-01 Thread Fernando Gont
not be happening soon, if ever. Please see: http://tools.ietf.org/id/draft-gont-v6ops-ra-guard-evasion-01.txt It doesn't require any modifications at the client (assuming it completely bans fragmented RAs). > so until then, RA guard is reliability feature (prevent accidential RAs, >

Re: [Full-disclosure] HP A-series switches are affected, too. [WAS: More on IPv6 RA-Guard evasion (IPv6 security)]

2011-09-01 Thread Fernando Gont
f at all possible) for the RA-Guard implementation to do. > But that is another conversation... > I subscribed to the IPv6 Hackers mailing list, maybe we will have some > discussion about that over there. Yep... will post something right now, and see if that trig

[Full-disclosure] More on IPv6 RA-Guard evasion (IPv6 security)

2011-09-01 Thread Fernando Gont
want to join the IPv6 Hackers mailing-list: http://www.si6networks.com/community/mailing-lists.html Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com web: http://www.si6networks.com ___ Full-Disclosure - We believe

Re: [Full-disclosure] Hacking IPv6 Networks (slides)

2011-08-09 Thread Fernando Gont
s caused by portscans/hostscans/outbound & crossbound DDoS > attacks initiated by botted hosts; now it's going to become even more > common in the wireline world, as well. It has been relieving to read your post, I must admit :-) -- particularly when at least half of the stuff that

[Full-disclosure] IPv6 Hackers mailing-list

2011-08-09 Thread Fernando Gont
be to this list here: http://lists.si6networks.com/listinfo/ipv6hackers/ General information about our mailing-lists is available at: http://www.si6networks.com/community/mailing-lists.html Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com web: http:/

[Full-disclosure] Hacking IPv6 Networks (slides)

2011-07-26 Thread Fernando Gont
er of practical examples. Thanks! Best regards, -- Fernando Gont Hacking IPv6 Networks Security Trainings e-mail: fg...@hackingipv6networks.com web: http://www.hackingipv6networks.com ___ Full-Disclosure - We believe in it. Charter: http://lists.g

[Full-disclosure] Fwd: RFC 6274 on Security Assessment of the Internet Protocol Version 4

2011-07-05 Thread Fernando Gont
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Folks, The IETF has just published RFC 6274, entitled "Security Assessment of the Internet Protocol Version 4". It contains a large amount of information on how to improve the security of IPv4 implementations and IPv4 deployments. This document is th

Re: [Full-disclosure] Ra-Guard evasion (new Internet-Drafts)

2011-06-02 Thread Fernando Gont
e the documents will be highly appreciated. P.S.: This whole thing is probably an indication that we should be cooperating more between each other regarding IPv6 security Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE

[Full-disclosure] IPv6 RA-Guard evasion (and neighbor discovery monitoring) vulnerabilities

2011-05-31 Thread Fernando Gont
/listinfo/v6ops and https://www.ietf.org/mailman/listinfo/ipv6). Thanks! Best regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Full-Disclosure - We believe in it. Charter:

[Full-disclosure] Viewpoint: Security implications of IPv6

2011-05-27 Thread Fernando Gont
lable at: <http://www.cpni.gov.uk/Documents/Publications/2011/2011mar22-infosec-cpni_viewpoint_security_implications_of_IPv6.pdf> Best regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 394

[Full-disclosure] IETF RFC on "the implementation of the TCP urgent mechanism"

2011-01-25 Thread Fernando Gont
t this and other related issues is available at my web site: http://www.gont.com.ar Thanks! Best regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Full-Discl

[Full-disclosure] [CFP] LACSEC 2011: 6th Network Security Event for Latin America and the Caribbean

2011-01-25 Thread Fernando Gont
submitting the final version the presentation: May 9th, 2011 “6th Network Security Event for Latin America and the Caribbean” (LACSEC 2011) Chair Fernando Gont (UTN/FRH, Argentina) Evaluation Committee Eduardo Carozo (Amparo Project, Uruguay) Lorena Ferreyro (Independent consultant, Argentina

[Full-disclosure] IETF RFC on Port Randomization

2011-01-21 Thread Fernando Gont
signals the RTP and RTCP port numbers). This memo documents an Internet Best Current Practice. cut here The RFC is available at: http://www.rfc-editor.org/rfc/rfc6056.txt P.S.: Below you'll find the formal announcement sent out by the RFC Editor. Thanks! Best regards, Ferna

Re: [Full-disclosure] IPv6 security myths

2010-10-26 Thread Fernando Gont
PM, Fernando Gont wrote: > Folks, > > I thought you might enjoy the slides of a talk about IPv6 security I > gave last week at LACNOG (http://www.lacnog.org). The slides are > available at: > http://www.gont.com.ar/talks/lacnog2010/fgont-lacnog2010-ipv6-security.pdf > > Th

[Full-disclosure] IPv6 security myths

2010-10-24 Thread Fernando Gont
://www.lacnog.org/en/meetings/lacnog-2010/agenda-lacnog-2010) Thanks! Kind regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Full-Disclosure - We believe in it

[Full-disclosure] Details of cisco-sa-20081022-asa security advisory?

2010-08-25 Thread Fernando Gont
Hi, I'm curious if anybody is aware of the details of the IPv6 DoS vulnerabilities listed in the aforementioned advisory (available at: http://www.cisco.com/warp/public/707/cisco-sa-20081022-asa.shtml). Thanks! Kind regards, Fernando ___ Full-Disclosu

[Full-disclosure] New IETF Internet-Drafts on TCP timestamps

2010-06-26 Thread Fernando Gont
articular, about the timestamps generation one). P.S.: Related technical reports, presentations and stuff available at: http://www.gont.com.ar Thanks! Kind regards, Fernando Gont ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-dis

Re: [Full-disclosure] Vulnerability in TCP

2010-06-26 Thread Fernando Gont
draft-gont-tcp-security-00.txt Thanks, Fernando Gont ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] IETF effort: Security Assesment of the Internet Protocol

2010-03-04 Thread Fernando Gont
curity Assessment of the Internet Protocol" that I wrote for CPNI a couple of years ago, and that is available at: http://www.cpni.gov.uk/Docs/InternetProtocol.pdf Any comments will be more than welcome! -- feel free to post them here, or send them unicast to me at: ferna...@gont.com.ar Thanks

[Full-disclosure] Request for feedback on TCP security (IETF effort)

2010-02-19 Thread Fernando Gont
nt.com.ar , if you prefer. Thanks! Kind regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/ful

Re: [Full-disclosure] Microsoft Windows TCP/IP Timestamps Code Execution Vulnerability

2009-11-27 Thread Fernando Gont
On Fri, Nov 27, 2009 at 1:59 AM, Ivan Security wrote: > Has anyone more details about this vulnerability?. The advisory just say: > "The vulnerability exists due to the TCP/IP stack not cleaning up state > information correctly. This causes the TCP/IP stack to reference a field as > a function po

Re: [Full-disclosure] Security Assessment of TCP at the IETF

2009-06-26 Thread Fernando Gont
Please check again. They links do work. On Fri, Jun 26, 2009 at 3:41 PM, Hal Wigoda wrote: > sorry, but the links do not work. > > > On Jun 25, 2009, at 11:28 PM, Fernando Gont wrote: > >> -BEGIN PGP SIGNED MESSAGE- >> Hash: SHA256 >> >> Hello, fo

[Full-disclosure] Security Assessment of TCP at the IETF

2009-06-25 Thread Fernando Gont
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hello, folks, In February this year the UK CPNI published the document "Security Assessment of the Transmission Control Protocol (TCP)" (available at: http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf) Earlier this year we published

[Full-disclosure] On the implementation of TCP urgent data (IETF Internet Draft)

2009-02-27 Thread Fernando Gont
akes it to the mailing-list, even if you are not subscribed to it. (Alternatively, you can send me your input, and I could forward it to the t...@ietf.org mailing-list). Thanks! Kind regards, - -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9

[Full-disclosure] Security Assessment of the Transmission Control Protocol (TCP)

2009-02-12 Thread Fernando Gont
ave posted a copy of the document on my personal web site: http://www.gont.com.ar Any comments will be more than welcome. Kind regards, - -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 -BEGIN PGP SIGNATURE

[Full-disclosure] "Security Assessment of the Internet Protocol" & the IETF

2009-01-06 Thread Fernando Gont
ng list to post a message (although your message will be held for moderator approval before it is distributed to the list members). The deadline for posting your opinion is January 9th (next Friday). Thanks so much! Kind regards, Fernando Gont -BEGIN PGP SIGNATURE- Version: PGP Desktop

[Full-disclosure] "Security Assessment of the Internet Protocol" & the IETF

2009-01-05 Thread Fernando Gont
ng list to post a message (although your message will be held for moderator approval before it is distributed to the list members). The deadline for posting your opinion is January 9th (next Friday). Thanks so much! Kind regards, Fernando Gont -BEGIN PGP SIGNATURE- Version: PGP Desktop

Re: [Full-disclosure] Port Randomization: New revision of our IETF Internet-Draft

2008-09-06 Thread Fernando Gont
s are being issued to different hosts or services, algorithm #4 will have a better port reuse frequency that even the traditional BSD port selection algorithm, thus probably avoiding some collisions that you would have experienced with the traditional BSD port selection algorithm. Thanks! Kind r

Re: [Full-disclosure] Port Randomization: New revision of our IETF Internet-Draft

2008-09-02 Thread Fernando Gont
At 11:15 a.m. 02/09/2008, coderman wrote: >On Tue, Sep 2, 2008 at 2:06 AM, Fernando Gont <[EMAIL PROTECTED]> wrote: > > ... there's no description of what Windows does > >some things speak for themselves... :) What speaks for itself? Our work is a proposal for a few a

Re: [Full-disclosure] Port Randomization: New revision of our IETF Internet-Draft

2008-09-02 Thread Fernando Gont
At 04:50 p.m. 01/09/2008, coderman wrote: >On Sun, Aug 31, 2008 at 10:44 PM, Fernando Gont ><[EMAIL PROTECTED]> wrote: > > ... IETF Internet-Draft about port randomization... > >wget -qO - >http://www.gont.com.ar/drafts/port-randomization/draft-ietf-tsvwg-port-rand

[Full-disclosure] New IETF I-D-: Security Assessment of the Internet Protocol version 4

2008-08-31 Thread Fernando Gont
he IETF, so that all the identified issues get documented in an official IETF document, and hopefully the IETF standards are modified as necessary. Any feedback on the IETF I-D and/or the original UK CPNI document will be more than welcome. Thanks! Kind regards, Fernando Gont

[Full-disclosure] Port Randomization: New revision of our IETF Internet-Draft

2008-08-31 Thread Fernando Gont
here Any comments will be more than welcome. Thanks! Kind regards, - -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 -BEGIN PGP SIGNATURE- Version: PGP Desktop 9.5.3 (Build 5003) - not licensed for

[Full-disclosure] Port Randomization: New revision of our IETF Internet-Draft

2008-08-31 Thread Fernando Gont
here Any comments will be more than welcome. Thanks! Kind regards, - -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 -BEGIN PGP SIGNATURE- Version: PGP Desktop 9.5.3 (Build 5003) - not licensed for

Re: [Full-disclosure] TCP Port randomization paper

2008-08-27 Thread Fernando Gont
ody please comments on grsecurity's approach for port randomization? Thanks, -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Full-Disclosure - We believe in it

[Full-disclosure] Security Assessment of the Internet Protocol

2008-08-14 Thread Fernando Gont
d. - cut here The document is available at CPNI's web site: http://www.cpni.gov.uk/Products/technicalnotes/3677.aspx Any comments will be more than welcome. Kind regards, Fernando Gont -BEGIN PGP SIGNATURE- Version: PGP Desktop 9.5.3 (Build 5003) - not licensed for

[Full-disclosure] IETF Internet-Draft on TCP Port randomization

2008-07-16 Thread Fernando Gont
tever comments we receive in the next few weeks. Thanks, -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-disclosure] TCP Port randomization paper

2007-12-11 Thread Fernando Gont
On Dec 9, 2007 2:20 AM, reepex <[EMAIL PROTECTED]> wrote: > ~$ grep -i grsec draft-ietf-tsvwg-port-randomization-00.txt > ~$ > > as stated by the last person its very strange you do not mention grsecurity > in your > "Survey of the algorithms in use by some popular implementations" Well, it's jus

Re: [Full-disclosure] TCP Port randomization paper

2007-12-07 Thread Fernando Gont
te: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Strangely enough this stuff exists for more than 3 years ... Think GRSEC > and more specifically Network stack randomization. > > Well of course bow to IETF for accepting this for draft ... > > Fernando Gont wrote: > >

[Full-disclosure] TCP Port randomization paper

2007-12-06 Thread Fernando Gont
welcome. The document is available at: http://www.ietf.org/internet-drafts/draft-ietf-tsvwg-port-randomization-00.txt Additionally, it is available in other fancy formats (PDF and HTML) at: http://www.gont.com.ar/drafts/port-randomization/index.html Thanks, -- Fernando Gont e-mail: [EMAIL

Re: [Full-disclosure] [funsec] Vista Protected Processes Bypassed

2007-04-08 Thread Fernando Gont
y already been fixed. Recent history has shown that both of these assumptions are incorrect. Kind regards, -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

[Full-disclosure] Port randomization paper

2007-02-11 Thread Fernando Gont
Feel free to post your comments/questions on-list or send them off-list to : [EMAIL PROTECTED] Thanks, -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Full-Disclosure

[Full-disclosure] Revised draft on ICMP attacks

2005-10-24 Thread Fernando Gont
should go to /dev/null. -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

RE: [Full-disclosure] Revised paper on "ICMP attacks against TCP"

2005-09-10 Thread Fernando Gont
At 04:08 p.m. 05/09/2005, alex wrote: Russian version (22.08.2005, with some analysis): http://www.securitylab.ru/contest/239695.php IIRC, those Cisco products that are not vulnerable to the PMTU just don't implement PMTUD, right? ___ Full-Disclo

[Full-disclosure] Revised paper on "ICMP attacks against TCP"

2005-09-05 Thread Fernando Gont
should be sent to /dev/null. Kindest regards, -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secu

Re: [Full-disclosure] Fernando Gont remote command execution and big mouth vulnerability

2005-08-04 Thread Fernando Gont
time, while the real problem that was raised here continues to be ignored. If I were any of the involved organizations/companies, I'd certainly pay people to do the same thing you're doing: adding non-sensical noise. Kindest regards, -- Fernando G

Re: [Full-disclosure] Fernando Gont remote command execution and big mouth vulnerability

2005-08-04 Thread Fernando Gont
hosted on an OpenBSD server. If your bored, go and get a book. Belive me: it won't bite you. Kindest regards, -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.o

[Full-disclosure] ICMP attacks against TCP: Conclusions

2005-07-22 Thread Fernando Gont
. Get your vendor fix the problems. And ask *how* they are fixing them (what if they just didn't understand, and are not really protecting you, or causing more harm than good?). And have the specs address these issues. That's the real and final fix for these issues. Kindest reg

[Full-disclosure] Re: (ICMP attacks against TCP) (was Re: HPSBUX01137 SSRT5954

2005-07-21 Thread Fernando Gont
that advertises an MTU lower than 576. And then would attack you with IP fragments. Kindest regards, -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disc

[Full-disclosure] Re: (ICMP attacks against TCP) (was Re: HPSBUX01137 SSRT5954

2005-07-21 Thread Fernando Gont
maller MTUs. What do you do? Where do you draw the line in the sand? Again and again: Read the draft at http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html It fixes the problem without having to draw any line. -- Fernando Gont e-mail: [EMAIL PROTECTED] |

[Full-disclosure] ICMP-based blind connection-reset attack

2005-07-21 Thread Fernando Gont
*against* implementing counter-measures for them. And vendors claiming that these attacks are hard to perform, etc. These attacks are still current. And probably your vendor will not do anything about it. So realize how simple they are to

[Full-disclosure] Re: ICMP-based blind performance-degrading attack

2005-07-20 Thread Fernando Gont
ver the choice and however it is calculated, it is not enough to just enforce it when the MSS option is received. It also needs to be enforced when the MTU parameter is checked in ICMP "need frag" packets. So I must assume this e-mail discusses a blind ICMP-based attacks? -- Fernando

[Full-disclosure] Re: (ICMP attacks against TCP) (was Re: HPSBUX01137 SSRT5954 rev.4

2005-07-20 Thread Fernando Gont
At 07:25 p.m. 20/07/2005, Darren Reed wrote: In some mail from Fernando Gont, sie said: > The IPv4 minimum MTU is 68, and not 576. If you blindly send packets larger > than 68 with the DF bit set, in the case there's an intermmediate with an > MTU lower that 576, the connect

[Full-disclosure] ICMP-based blind performance-degrading attack

2005-07-20 Thread Fernando Gont
0 seconds (5 minutes), before attacking again. Another option could have been to not sleep after each round, but use some ridiculous (low) bandwidth for the attack. Hint: Some people have reported "strange behaviour" when some implementations receive ICMP packets that claim MTUs smaller that 68

  1   2   >