(IETF I-D) Implications of IPv6 Addressing on Security Operations (Fwd: New Version Notification for draft-ietf-opsec-ipv6-addressing-00.txt)

2023-06-02 Thread Fernando Gont
by the way! Regards, Fernando Forwarded Message Subject: New Version Notification for draft-ietf-opsec-ipv6-addressing-00.txt Date: Fri, 02 Jun 2023 07:26:18 -0700 From: internet-dra...@ietf.org To: Fernando Gont , Guillermo Gont A new version of I-D, draft-ietf-opsec-ipv6

Re: (IETF I-D): Implications of IPv6 Addressing on Security Operations (Fwd: New Version Notification for draft-gont-opsec-ipv6-addressing-00.txt)

2023-02-07 Thread Fernando Gont
ood advice .. i.e., that to the extent that is possible, folks refrain from sharing the same /64 across unrelated/disassociated users. Thanks, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: F242 FF0E A804 AF81 EB10 2F07 7CA1 321D 663B B494

Re: (IETF I-D): Implications of IPv6 Addressing on Security Operations (Fwd: New Version Notification for draft-gont-opsec-ipv6-addressing-00.txt)

2023-02-07 Thread Fernando Gont
AWS accounts. Do they lose or earn money when accounts are hacked? -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: F242 FF0E A804 AF81 EB10 2F07 7CA1 321D 663B B494

Re: (IETF I-D): Implications of IPv6 Addressing on Security Operations (Fwd: New Version Notification for draft-gont-opsec-ipv6-addressing-00.txt)

2023-02-07 Thread Fernando Gont
Hi, Bill, On 7/2/23 01:26, William Herrin wrote: On Mon, Feb 6, 2023 at 7:40 PM Fernando Gont wrote: On 7/2/23 00:05, William Herrin wrote: On the one hand, sophisticated attackers already scatter attacks between source addresses to evade protection software. Whereas in the IPv6 case , you

Re: (IETF I-D): Implications of IPv6 Addressing on Security Operations (Fwd: New Version Notification for draft-gont-opsec-ipv6-addressing-00.txt)

2023-02-06 Thread Fernando Gont
Hi, Bill, Thanks for your feedback! In-line On 7/2/23 00:05, William Herrin wrote: On Mon, Feb 6, 2023 at 6:43 PM Fernando Gont wrote: On 6/2/23 20:39, Owen DeLong wrote: After all, they’re only collecting addresses to ban at the rate they’re actually being used to send packets. Yeah

Re: (IETF I-D): Implications of IPv6 Addressing on Security Operations (Fwd: New Version Notification for draft-gont-opsec-ipv6-addressing-00.txt)

2023-02-06 Thread Fernando Gont
consistently use memory iptables-rules slot to store more and more rules/addresses youĺl get no benefit from, the attacker is winning Thanks! Regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: F242 FF0E A804 AF81 EB10 2F07 7CA1 321D 663B B494

(IETF I-D): Implications of IPv6 Addressing on Security Operations (Fwd: New Version Notification for draft-gont-opsec-ipv6-addressing-00.txt)

2023-02-05 Thread Fernando Gont
! Regards, Fernando Forwarded Message Subject: New Version Notification for draft-gont-opsec-ipv6-addressing-00.txt Date: Thu, 02 Feb 2023 19:48:40 -0800 From: internet-dra...@ietf.org To: Fernando Gont , Guillermo Gont A new version of I-D, draft-gont-opsec-ipv6-addressing-00

Windows 11 now implements RFC 7217 (stable privacy addresses)!

2022-12-12 Thread Fernando Gont
dress generation! [Original article with screenshots: https://www.linkedin.com/posts/fernandogont_after-over-10-yes-ten-years-we-have-activity-7008316664207290368-Wcto ] Thanks! Regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: F242 FF0E A804 AF81 EB10 2F07 7CA1 321D 663B B494

Re: Mitigating the effects of SLAAC renumbering events (draft-ietf-6man-slaac-renum)

2022-08-31 Thread Fernando Gont
o consider the case where the router intentionally splits the options into multiple packets (which does not exist in practice), AND the link is super lossy, you just increase the number of retransmissions. There's no guessing. Thanks, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP F

Mitigating the effects of SLAAC renumbering events (draft-ietf-6man-slaac-renum)

2022-08-31 Thread Fernando Gont
on the 6man wg mailing list (https://www.ietf.org/mailman/listinfo/ipv6), that´d be fabulous. But we'll appreciate your feedback off-line, on this list, etc. (that'd still be great ;-) ) Thanks in advance! Regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: F242 FF0E

Fwd: RFC 9288 on Recommendations on the Filtering of IPv6 Packets Containing IPv6 Extension Headers at Transit Routers

2022-08-18 Thread Fernando Gont
Hi, FYI. RFC 9288, "Recommendations on the Filtering of IPv6 Packets Containing IPv6 Extension Headers at Transit Routers" (available at: https://www.rfc-editor.org/rfc/rfc9288) FWIW, IMO most of the value is in the analysis of what protocols/features use what EHs, and what would break (if

Re: Scanning the Internet for Vulnerabilities

2022-06-22 Thread Fernando Gont
ght not be such a bad thing. > > - Matt -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

Re: Scanning the Internet for Vulnerabilities

2022-06-21 Thread Fernando Gont
Hi, Ronald, On 21/6/22 03:53, Ronald F. Guilmette wrote: In message <7c5f9d80-8686-07bb-b6ed-6e41fa1e1...@si6networks.com>, Fernando Gont wrote: Note: What's most usually done out there is scanning for ports, rather than for vulnerabilities. Yes, and at least some of the res

Re: Scanning the Internet for Vulnerabilities

2022-06-21 Thread Fernando Gont
). What's left probably falls into the DoS-like category... but is normally more targetted than sent to random networks/whole Internet. Thanks, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

IPv6 Addressing Considerations (IETF Internet-Draft)

2022-06-02 Thread Fernando Gont
! Regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

Re: shadowserver.org

2021-06-28 Thread Fernando Gont via NANOG
nly the responsible organization for the network prefixes get the scan results. Thanks, -- Fernando Gont Director of Information Security EdgeUno, Inc. PGP Fingerprint: DFBD 63E3 B248 AE79 C598 AF23 EBAE DA03 0644 1531

Re: shadowserver.org

2021-06-28 Thread Fernando Gont via NANOG
ur ISP asked for it. Thanks, -- Fernando Gont Director of Information Security EdgeUno, Inc. PGP Fingerprint: DFBD 63E3 B248 AE79 C598 AF23 EBAE DA03 0644 1531

Operational Implications of IPv6 Extension Headers (Fwd: [v6ops] I-D Action: draft-ietf-v6ops-ipv6-ehs-packet-drops-08.txt)

2021-06-11 Thread Fernando Gont via NANOG
item of the IPv6 Operations WG of the IETF. Title : Operational Implications of IPv6 Packets with Extension Headers Authors : Fernando Gont Nick Hilliard Gert Doering Warren Kumari

Re: NAT devices not translating privileged ports

2021-06-10 Thread Fernando Gont via NANOG
1. My clock synced perfectly. > > So your goal is to find the devices that don't follow this behaviour, > right? > No. The goal of our I-D is that NTP clients randomize their source > port -- there's no need for clients to use port 123, and using that > port on the client side has neg

Re: NAT devices not translating privileged ports

2021-06-10 Thread Fernando Gont via NANOG
NAT to external > NTP servers Please let me know if what I wrote above clarifies our intent. Thanks! Regards, -- Fernando Gont Director of Information Security EdgeUno, Inc. PGP Fingerprint: DFBD 63E3 B248 AE79 C598 AF23 EBAE DA03 0644 1531

Re: NAT devices not translating privileged ports

2021-06-10 Thread Fernando Gont via NANOG
Hi, Bjørn, On Thu, 2021-06-10 at 12:10 +0200, Bjørn Mork wrote: > Fernando Gont via NANOG writes: > > > What has been reported to us is that some boxes do not translate > > the > > src port if it's a privileged port. > > > > IN such scenarios, NTP implemen

Re: NAT devices not translating privileged ports

2021-06-10 Thread Fernando Gont via NANOG
ients behind the same NAT device Thanks! Regards, -- Fernando Gont Director of Information Security EdgeUno, Inc. PGP Fingerprint: DFBD 63E3 B248 AE79 C598 AF23 EBAE DA03 0644 1531

Re: NAT devices not translating privileged ports

2021-06-10 Thread Fernando Gont via NANOG
ernal real of the NAT try to use the same privileged port (say, 123) simultaneously, things wouldn't work. Thanks, -- Fernando Gont Director of Information Security EdgeUno, Inc. PGP Fingerprint: DFBD 63E3 B248 AE79 C598 AF23 EBAE DA03 0644 1531

NAT devices not translating privileged ports

2021-06-04 Thread Fernando Gont
les of this type of NATs? Thanks! Regards, -- Fernando Gont Director of Information Security EdgeUno, Inc. PGP Fingerprint: DFBD 63E3 B248 AE79 C598 AF23 EBAE DA03 0644 1531

Fwd: IPv6 addressing: Gaps? (draft-gont-v6ops-ipv6-addressing-considerations)

2021-02-12 Thread Fernando Gont
Subject: IPv6 addressing: Gaps? (draft-gont-v6ops-ipv6-addressing-considerations) Date: Fri, 12 Feb 2021 18:50:48 -0300 From: Fernando Gont To: IPv6 Operations Folks, In the aforementioned document (https://tools.ietf.org/html/draft-gont-v6ops-ipv6-addressing-considerations), we have tried

IETF I-D: "Operational Implications of IPv6 Packets with Extension Headers" (Fwd: [v6ops] WGLC on draft-ietf-v6ops-ipv6-ehs-packet-drops)

2020-10-20 Thread Fernando Gont
Folks, FYI. P.S.: The relevant IETF wg list is: https://www.ietf.org/mailman/listinfo/v6ops Thanks, Fernando Forwarded Message Subject: [v6ops] WGLC on draft-ietf-v6ops-ipv6-ehs-packet-drops Date: Mon, 19 Oct 2020 12:35:34 -0700 From: Fred Baker To: IPv6 Operations

Re: [v6ops] Question about "Operational Implications of IPv6 Packets with Extension Headers"

2020-07-29 Thread Fernando Gont
just meant to forward your request, and let folks know what the email alias for the chairs is (sometimes I get it wrong myself e.g. @ietf.org vs. @tools.ietf.org). I just didn't say "send your support comments" because I didn't want to bias the request. My apologies, -- Fernando Gont SI6

Fwd: [v6ops] Question about "Operational Implications of IPv6 Packets with Extension Headers"

2020-07-29 Thread Fernando Gont
arch/?qdr=a=%22Operational Implications of IPv6 Packets with Extension Headers%22 https://datatracker.ietf.org/doc/draft-gont-v6ops-ipv6-ehs-packet-drops https://tools.ietf.org/html/draft-gont-v6ops-ipv6-ehs-packet-drops "Operational Implications of IPv6 Packets with Extension Headers",

Operational Implications of IPv6 Packets with Extension Headers (Fwd: New Version Notification for draft-gont-v6ops-ipv6-ehs-packet-drops-04.txt)

2020-07-26 Thread Fernando Gont
, Fernando Forwarded Message Subject: New Version Notification for draft-gont-v6ops-ipv6-ehs-packet-drops-04.txt Date: Sat, 25 Jul 2020 22:28:50 -0700 From: internet-dra...@ietf.org To: Fernando Gont , Gert Doering , Geoff Huston , Warren Kumari , Nick Hilliard A new version of

SLAAC renumbering problems (Fwd: [v6ops] draft-gont-v6ops-slaac-renum **Call for adoption**)

2020-02-10 Thread Fernando Gont
Folks, A while ago some of us started working on an IETF draft to document and mitigate some issues experienced by SLAAC in the face of some renumbering events. Such work has resulted in three small documents. * draft-gont-v6ops-slaac-renum (problem statement) * draft-gont-v6ops-slaac-renum

Re: RIPE our of IPv4

2019-12-03 Thread Fernando Gont
On 3/12/19 17:47, Mark Andrews wrote: > > >> On 4 Dec 2019, at 02:04, Fernando Gont wrote: >> >> On 3/12/19 00:12, Mark Andrews wrote: >>> >>> >>>> On 3 Dec 2019, at 13:31, Valdis Klētnieks wrote: >>>> >>>&

Re: RIPE our of IPv4

2019-12-03 Thread Fernando Gont
ed your own IPv4 addresses for that. > Then there is in the cloud for other services, again you don’t need your own > IPv4 > addresses. Wwll, yeah.. you don't need IPv4 addresses if you are going to be using somebody else's networks and services. Not that you should, though -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

Fwd: SLAAC renum: Problem Statement & Operational workarounds

2019-10-23 Thread Fernando Gont
Date: Wed, 23 Oct 2019 03:51:32 -0500 From: Fernando Gont To: IPv6 Operations Folks, Earlier this year there was a lot of discussion about slaac renumbering problems. Our original I-D covered everything from the problem statement to proposed protocol updates and operational workarounds. B

IPv6 Security for IPv4 Engineers

2019-03-13 Thread Fernando Gont
19/02/ipv6-security-faq Thanks! Cheers, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

Re: SLAAC in renumbering events

2019-03-10 Thread Fernando Gont
Hi, Bill, Thanks for the feedback! In-line On 10/3/19 13:54, William Herrin wrote: > > > On Fri, Mar 8, 2019 at 3:32 AM Fernando Gont <mailto:fg...@si6networks.com>> wrote: > > If you follow the 6man working group of the IETF you may have seen a > bu

SLAAC in renumbering events

2019-03-08 Thread Fernando Gont
rt We are looking forward to more input on the document (or any comments on the issue being discussed), particularly from operators. So feel free to send your comments on/off list as you prefer Thanks! Cheers, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

Re: IPv6 Security Frequently Asked Questions (FAQ)

2019-03-07 Thread Fernando Gont
Bs, since they may trigger fragmentation even for protocols that you'd assume would never emply fragmentation. Thanks! Cheers, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

IPv6 Security Frequently Asked Questions (FAQ)

2019-03-07 Thread Fernando Gont
d be added, or have comments on the answers, please do let me know -- the document can eventually be revised. Thanks! Cheers, -- -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

Re: WIndows Updates Fail Via IPv6 - Update!

2019-03-05 Thread Fernando Gont
On 6/3/19 03:29, Mark Andrews wrote: > > >> On 6 Mar 2019, at 3:37 pm, Fernando Gont wrote: >> >> On 6/3/19 01:09, Mark Andrews wrote: >>> >>> >>>> On 6 Mar 2019, at 1:30 pm, Fernando Gont wrote: >>>> >>>> On 3/3/19

Re: WIndows Updates Fail Via IPv6 - Update!

2019-03-05 Thread Fernando Gont
On 6/3/19 01:09, Mark Andrews wrote: > > >> On 6 Mar 2019, at 1:30 pm, Fernando Gont wrote: >> >> On 3/3/19 18:04, Mark Andrews wrote: >>> There are lots of IDIOTS out there that BLOCK ALL ICMP. That blocks PTB >>> getting >>> back to the T

Re: ICMPv6 "too-big" packets ignored (filtered ?) by Cloudflare farms

2019-03-05 Thread Fernando Gont
rotocol > failure. It is shitty implementations. Not to play devil's advocate but the IETF fot to publish a spec for ECMP use of Flow Labels only a few years ago. For quite a while, they were unasable... and might still be, for some implementations. -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

Re: WIndows Updates Fail Via IPv6 - Update!

2019-03-05 Thread Fernando Gont
unt of +20 year old > equipment on the > net is minimal. > > That said modern OS’s don’t need other equipment to “protect" them from ICMP > of any form. > These news don't help in that direction: https://www.theregister.co.uk/2016/06/02/cisco_warns_of_ipv6_dos_vul

Re: WIndows Updates Fail Via IPv6 - Update!

2019-03-05 Thread Fernando Gont
on is to actually move away from ICMPv6-based PMTUD, to the extent that is possible. (RFC4821). Thanks, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

Re: WIndows Updates Fail Via IPv6 - Update!

2019-03-05 Thread Fernando Gont
of fragmentation. Still, that's certainly not panacea. See: https://tools.ietf.org/html/rfc7872 -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

Re: ICMPv6 "too-big" packets ignored (filtered ?) by Cloudflare farms

2019-03-05 Thread Fernando Gont
support@cloudflare answered me that because I'm not the owner of > concerned site, > and because of security reasons, they wouldn't investigate further. > > are there security concerns with ICMP-too-big ? Please see: https://tools.ietf.org/html/rfc5927 and also: https://t

Re: UPnP/IPv6 support in home routers?

2017-12-14 Thread Fernando Gont
Hello, Valdis, On 12/11/2017 10:44 AM, valdis.kletni...@vt.edu wrote: > On Mon, 11 Dec 2017 09:23:11 -0300, Fernando Gont said: > >> Anyone can comment on the UPnP support for IPv6 in home routers? >> >> Those that I have checked have UPnP support for IPv4, but not

UPnP/IPv6 support in home routers?

2017-12-11 Thread Fernando Gont
(local ip, local port, remote ip, remote port) basis, which kind of sucks -- as one would want to be able to whitelist all ports for a given IP address, or at least (local ip, local port). Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6

Re: IPv6 first hop security on a budget?

2017-11-10 Thread Fernando Gont
to DHCPv6 snooping et al. Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

Fwd: New I-D: SLAAC and DHCPv6 (Fwd: New Version Notification for draft-gont-v6ops-host-configuration-00.txt)

2017-02-28 Thread Fernando Gont
you'll have at least a few #facepalm moments. Thanks, Fernando Forwarded Message Subject: New I-D: SLAAC and DHCPv6 (Fwd: New Version Notification for draft-gont-v6ops-host-configuration-00.txt) Date: Tue, 28 Feb 2017 05:13:25 -0300 From: Fernando Gont <fg...@si6network

Re: ICMPv6 PTBs and IPv6 frag filtering (particularly at BGP peers)

2017-01-13 Thread Fernando Gont
On 01/12/2017 11:14 PM, Mark Andrews wrote: > In message >

Re: ICMPv6 PTBs and IPv6 frag filtering (particularly at BGP peers)

2017-01-13 Thread Fernando Gont
On 01/12/2017 11:07 PM, Mark Andrews wrote: > In message > <cag6teat9eodf-oihh0vow25gfc-p__p+no9ykmycbsuqhop...@mail.gmail.com> > , Fernando Gont writes: >> El 12/1/2017 16:28, "Mark Andrews" <ma...@isc.org> escribi=C3=B3: >> >>> In message &

Re: ICMPv6 PTBs and IPv6 frag filtering (particularly at BGP peers)

2017-01-12 Thread Fernando Gont
El 12/1/2017 16:32, "Saku Ytti" <s...@ytti.fi> escribió: On 12 January 2017 at 17:02, Fernando Gont <fg...@si6networks.com> wrote: > That's the point: If you don't allow fragments, but your peer honors > ICMPv6 PTB<1280, then dropping fragments creates the attack

Re: ICMPv6 PTBs and IPv6 frag filtering (particularly at BGP peers)

2017-01-12 Thread Fernando Gont
El 12/1/2017 16:28, "Mark Andrews" <ma...@isc.org> escribió: In message <11ff128d-2fba-7c26-4a9c-5611433d8...@si6networks.com>, Fernando Gon t writes: > Hi, Saku, > > On 01/12/2017 11:43 AM, Saku Ytti wrote: > > On 12 January 2017 at 13:19, Fernan

Re: ICMPv6 PTBs and IPv6 frag filtering (particularly at BGP peers)

2017-01-12 Thread Fernando Gont
ipv6 header + ehs). Cheers, Fernando El 12/1/2017 16:32, "Saku Ytti" <s...@ytti.fi> escribió: > On 12 January 2017 at 17:02, Fernando Gont <fg...@si6networks.com> wrote: > > That's the point: If you don't allow fragments, but your peer honors > > ICMPv6 PTB&

Re: ICMPv6 PTBs and IPv6 frag filtering (particularly at BGP peers)

2017-01-12 Thread Fernando Gont
Hi, Saku, On 01/12/2017 11:43 AM, Saku Ytti wrote: > On 12 January 2017 at 13:19, Fernando Gont <fg...@si6networks.com> wrote: > > Hey, > >> I'm curious about whether folks are normally filtering ICMPv6 PTB<1280 >> and/or IPv6 fragments targeted to

ICMPv6 PTBs and IPv6 frag filtering (particularly at BGP peers)

2017-01-12 Thread Fernando Gont
ned routers will themselves be the ones dropping their own traffic. cut here Is this something waiting to be exploited? Am I missing something? Thanks, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

Fwd: [v6ops] RFC 7872 on Observations on the Dropping of Packets with IPv6 Extension Headers in the Real World

2016-06-28 Thread Fernando Gont
distribution. The RFC Editor Team Association Management Solutions, LLC ___ v6ops mailing list v6...@ietf.org https://www.ietf.org/mailman/listinfo/v6ops -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5

IETF RFC 7707: Network Reconnaissance in IPv6 Networks

2016-03-12 Thread Fernando Gont
ed-rfc-7707_12.html> Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

IETF I-D: "Operational Implications of IPv6 Packets with Extension Headers"

2016-02-05 Thread Fernando Gont
to: <draft-gont-v6ops-ipv6-ehs-packet-dr...@tools.ietf.org> and CC <v6...@ietf.org>. P.S.: You can find a number of pointers to articles and other related work on this topic here: <http://blog.si6networks.com/2015/12/the-controversial-ipv6-extension-headers.html> Thanks! Best regard

Re: Seeking IPv6 Security Resources

2014-11-26 Thread Fernando Gont
Hackers mailing-list: http://lists.si6networks.com/listinfo/ipv6hackers/ * IPv6 Hackers web site: http://www.ipv6hackers.org This site includes the slideware (and videos) of the first (and so far only) IPv6 hackers meeting in Berlin 2013. Thanks! Best regards, -- Fernando Gont e-mail: ferna

IPv6 Extension Headers in the Real World

2014-09-29 Thread Fernando Gont
. Thanks! Best regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

Fwd: DoS attacks (ICMPv6-based) resulting from IPv6 EH drops

2014-08-19 Thread Fernando Gont
Folks, FYI -- currently being discussed on v6...@ietf.org Cheers, Fernando Forwarded Message Subject: DoS attacks (ICMPv6-based) resulting from IPv6 EH drops Date: Tue, 19 Aug 2014 09:00:15 -0300 From: Fernando Gont fg...@si6networks.com To: IPv6 Operations v6...@ietf.org

Fwd: New IETF I-D: IPv6 Extension Headers in the Real World

2014-08-07 Thread Fernando Gont
Folks, FYI: http://www.ietf.org/internet-drafts/draft-gont-v6ops-ipv6-ehs-in-real-world-00.txt. Comments welcome. Thanks! Fernando Forwarded Message Subject: New I-D: IPv6 Extension Headers in the Real World Date: Fri, 08 Aug 2014 00:04:37 -0400 From: Fernando Gont fg

Re: Requirements for IPv6 Firewalls

2014-04-21 Thread Fernando Gont
space that is not announced to the Internet and/or is completely blocked at borders for all traffic. Are you argung against of e.g. default-deny inbound traffic? Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE

Requirements for IPv6 Firewalls

2014-04-17 Thread Fernando Gont
let us know (please CC draft-gont-opsec-ipv6-firewall-r...@tools.ietf.org, such that all co-authors receive your feedback). FWIW, this I-D is being discussed on the IETF opsec wg list (op...@ietf.org, https://www.ietf.org/mailman/listinfo/opsec). Thanks! Best regards, -- Fernando Gont e-mail

Re: Requirements for IPv6 Firewalls

2014-04-17 Thread Fernando Gont
. [FW-Benchmark]). XXX: This note may be removed before publication if deemed appropriate. Because he RFCs we reference do require to make the measurements as you describe... Thanks! Best regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint

Re: Requirements for IPv6 Firewalls

2014-04-17 Thread Fernando Gont
point them to this sort of discussion. Thanks! Best regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

Re: Requirements for IPv6 Firewalls

2014-04-17 Thread Fernando Gont
for that, unfortunately. But I can tell you that the reason for which we posted a note on this list regarding our I-D is because your feedback does matter to us (us == at least the co-authors of this document) Thanks! Best regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg

Re: real-world data about fragmentation

2014-04-08 Thread Fernando Gont
interesting. Probably off-topic, but since you mentioned reliability of IPv6 fragmentation: * http://www.iepg.org/2013-11-ietf88/fgont-iepg-ietf88-ipv6-frag-and-eh.pdf * http://www.iepg.org/2014-03-02-ietf89/fgont-iepg-ietf89-eh-update.pdf Thanks! Cheers, -- Fernando Gont e-mail: ferna...@gont.com.ar

Question on DHCPv6 address assignment

2014-01-31 Thread Fernando Gont
/mechanism for them to be as stable as possible? Or is it usual for hosts to get a new address for each lease? P.S.: I understand this is likely to vary from one implementation to another... so please describe which implementation/version you're referring to. Thanks! Best regards, -- Fernando Gont e

Re: Question on DHCPv6 address assignment

2014-01-31 Thread Fernando Gont
-IPv6 mapping database, or something else? Cheers, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

Fwd: Re: Some stats on IPv6 fragments and EH filtering on the Internet

2013-11-04 Thread Fernando Gont
Folks, FYI. Thought this might be of interest. P.S.: Input/comments welcome Thanks! Cheers, Fernando Original Message Subject: Some stats on IPv6 fragments and EH filtering on the Internet Date: Mon, 04 Nov 2013 15:01:48 -0800 From: Fernando Gont ferna...@gont.com.ar

Article: IPv6 addressing requires special attention to ensure security

2013-07-21 Thread Fernando Gont
-addressing-requires-special-attention-to-ensure-security (the ful article is available at the aforementioned URL, *without* the need to register --- just scroll down past the ad as necessary). Thanks, - -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809

ipv6hackers Meeting in Berlin (July 30, 2013)

2013-07-13 Thread Fernando Gont
- -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 - -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 -BEGIN PGP

SI6 Networks' IPv6 Toolkit v1.3.4 released!

2013-04-18 Thread Fernando Gont
/community/mailing-lists.html. Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9

SI6 Networks IPv6 Toolkit v1.3 released!

2013-02-16 Thread Fernando Gont
of Linux, FreeBSD, NetBSD, OpenBSD, and Mac OS X. Please send any bug reports and/or feature requests to fg...@si6networks.com. As always, you can get the latest news on IPv6 security research and tools by following us on Twitter: @SI6Networks. Thanks! Best regards, - -- Fernando Gont SI6 Networks e

How to avoid security issues with VPN leaks on dual-stack networks

2013-01-24 Thread Fernando Gont
to security vulnerabilities, such as VPN traffic leaks. In this tip, we'll discuss how these VPN security issues arise and the various mitigation options available for containing VPN traffic leaks. cut here P.S.: Any comments will be welcome. Thanks! Best regards, -- Fernando Gont SI6

Re: Dropping IPv6 Fragments

2012-10-04 Thread Fernando Gont
? -- If so, in theory *both* might be missing the upper layer information. IN practice, the first-fragment won't. If it does, feel free to drop it. Cheers, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

ipv6mon v1.0 released! (IPv6 address monitoring daemon)

2012-09-13 Thread Fernando Gont
trainings http://www.hackingipv6networks.com/upcoming-t Follow us on twitter: @SI6Networks Best regards, - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 - -- Fernando Gont e-mail: ferna...@gont.com.ar || fg

Re: ipv6mon v1.0 released! (IPv6 address monitoring daemon)

2012-09-13 Thread Fernando Gont
not like what NDPMon has been delivering for several years already. For instance, ipv6mon is not meant to be analogous to arpwatch, and is *not* meant to detect ND attacks. Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945

IPv6 Toolkit v1.2.2 released

2012-08-06 Thread Fernando Gont
likely it just means that I'm catching-up with them (feel free to resend!). Thanks! Best regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

IPv6 Toolkit v1.2: Latest snapshot, and git repo

2012-07-15 Thread Fernando Gont
of the examples in the manuals (and report any problems), that would be great, too. P.S.: If you've sent patches and your patches have not yet been applied, most likely it just means that I'm catching-up with them (feel free to resend!). Thanks! Best regards,-- Fernando Gont e-mail: ferna...@gont.com.ar

IPv6 security tools released

2012-07-05 Thread Fernando Gont
.: The slideware at: http://www.si6networks.com/presentations/hip2012/fgont-hip2012-hacking-ipv6-networks-training.pdf might give you some hints regarding how to use some of the tools. Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6

New I-D on SLAAC DNS configuration problems (Fwd: New Version Notification for draft-gont-6man-slaac-dns-config-issues-00.txt)

2012-06-27 Thread Fernando Gont
-dns-config-issues-00.txt has been successfully submitted by Fernando Gont and posted to the IETF repository. Filename:draft-gont-6man-slaac-dns-config-issues Revision:00 Title: Current issues with DNS Configuration Options for SLAAC Creation date: 2012-06-15 WG ID

IETF I-D: Current issues with DNS Configuration Options for SLAAC

2012-06-15 Thread Fernando Gont
*alternative* mitigations for the forementioned problem. Your input will be very appreciated. Thanks! Best regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

Re: Article: IPv6 host scanning attacks

2012-06-15 Thread Fernando Gont
, after the word syntax. Will check. Thanks! Cheers, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

Re: Article: IPv6 host scanning attacks

2012-06-15 Thread Fernando Gont
/presentations/deepsec2011/fgont-deepsec2011-ipv6-security.pdf Cheers, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

Article: IPv6 host scanning attacks

2012-06-13 Thread Fernando Gont
, it's a human-readable version of the IETF Internet-Draft I published a month ago or so about IPv6 host scanning (see: http://tools.ietf.org/html/draft-gont-opsec-ipv6-host-scanning)) You can get news about this sort of stuff by following @SI6Networks on Twitter. Cheers, -- Fernando Gont e-mail

Heads up: IETF 6man poll for adoption of RA-Guard/firewalling/monitoring-related I-Ds

2012-06-13 Thread Fernando Gont
is available at: http://www.ietf.org/mail-archive/web/ipv6/current/msg15990.html IMO, these two I-Ds propose small spec updates which could result in concrete operational and security benefits. Thanks! Best regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP

Re: Article: IPv6 host scanning attacks

2012-06-13 Thread Fernando Gont
for marketing purposes. Please do the math regarding the number of posts/tweets announcing publications to the number of posts/tweets doing marketing (probably just those about trainings). Then comment. Cheers, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5

Re: Article: IPv6 host scanning attacks

2012-06-13 Thread Fernando Gont
. Cheers, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

IPv6 security: New IETF I-Ds, slideware and videos of recent presentations, trainings, etc...

2012-05-28 Thread Fernando Gont
/ipv6hackers/ Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF

Re: Vendor IPv6 RA Guard Support

2012-04-28 Thread Fernando Gont
://lists.si6networks.com/listinfo/ipv6hackers/), comments were that no vendor had addressed this, yet. Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

Re: New IETF I-D: Security Implications of IPv6 on IPv4 networks

2012-04-28 Thread Fernando Gont
Apologies for the possible inconvenience. Thanks, Fernando On 04/24/2012 07:20 AM, Fernando Gont wrote: Folks, We've published a new IETF I-D entitled Security Implications of IPv6 on IPv4 networks. The I-D is available at: http://www.ietf.org/id/draft-gont-opsec-ipv6-implications

New IETF I-D: Security Implications of IPv6 on IPv4 networks

2012-04-24 Thread Fernando Gont
implications of native IPv6 support and IPv6 transition/co-existence technologies on IPv4-only networks, and describes possible mitigations for the aforementioned issues. cut here Any feedback will be very welcome. Thanks! Best regards, -- Fernando Gont e-mail: ferna...@gont.com.ar

Fwd: Host scanning in IPv6 Networks

2012-04-20 Thread Fernando Gont
FYI Original Message Subject: IPv6 host scanning in IPv6 Date: Fri, 20 Apr 2012 03:57:48 -0300 From: Fernando Gont fg...@si6networks.com Organization: SI6 Networks To: IPv6 Hackers Mailing List ipv6hack...@lists.si6networks.com Folks, We've just published an IETF internet

Re: Host scanning in IPv6 Networks

2012-04-20 Thread Fernando Gont
page_, walking directly into their hands, instead of worms searching for needles in haystacks. Well, this is part of alternative scanning techniques, which so far are not the subject of this draft. Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint

IPv6 NIDS evasion and IPv6 fragmentation/reassembly improvements

2012-03-04 Thread Fernando Gont
Folks, FYI, http://blog.si6networks.com/2012/02/ipv6-nids-evasion-and-improvements-in.html It contains some test results regarding the implementation of RFC 5722 and draft-ietf-6man-ipv6-atomic-fragments. Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP

Fwd: IPv6 RA-Guard: Advice on the implementation (feedback requested)

2012-02-01 Thread Fernando Gont
). Thanks! Best regards, Fernando Original Message Subject: RA-Guard: Advice on the implementation (feedback requested) Date: Wed, 01 Feb 2012 21:44:29 -0300 From: Fernando Gont fg...@si6networks.com Organization: SI6 Networks To: IPv6 Operations v6...@ietf.org Folks, We have

IPv6 Hackers mailing-list

2011-08-09 Thread Fernando Gont
are considered off topic. Subscription to the list is open to the community. cut here You can subscribe to the mailing-list here: http://lists.si6networks.com/listinfo/ipv6hackers/ Thanks! Best regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809

  1   2   >