Someone has recently post to a mailing list:
http://lists.grok.org.uk/pipermail/full-disclosure/2011-April/080096.html
Andrew
On 4/4/11 11:46 AM, andrew.wallace wrote:
Someone has recently post to a mailing list:
http://lists.grok.org.uk/pipermail/full-disclosure/2011-April/080096.html
Andrew
And users of that list certainly have it. Why is it being reposted
here? request for admin action
On Mon, 04 Apr 2011 08:46:22 PDT, andrew.wallace said:
Someone has recently post to a mailing list:
http://lists.grok.org.uk/pipermail/full-disclosure/2011-April/080096.html
*yawn* No news, move along, nothing to see. RFC4862, section 6:
The use of stateless address autoconfiguration and
On 04/04/11 12:14 -0400, valdis.kletni...@vt.edu wrote:
On Mon, 04 Apr 2011 08:46:22 PDT, andrew.wallace said:
Someone has recently post to a mailing list:
http://lists.grok.org.uk/pipermail/full-disclosure/2011-April/080096.html
*yawn* No news, move along, nothing to see. RFC4862, section
On Mon, 2011-04-04 at 12:14 -0400, valdis.kletni...@vt.edu wrote:
On Mon, 04 Apr 2011 08:46:22 PDT, andrew.wallace said:
Someone has recently post to a mailing list:
http://lists.grok.org.uk/pipermail/full-disclosure/2011-April/080096.html
*yawn* No news, move along, nothing to see.
On Mon, 4 Apr 2011, Jeroen van Ingen wrote:
a network yet. I believe this attack will work on most networks out
there, simply because IPv6 is enabled on hosts and rogue RA filtering
hasn't been implemented on most switches yet.
Any responsible ISP will block this kind of L2 unknown traffic
On 04/04/2011 16:46, andrew.wallace wrote:
Someone has recently post to a mailing list:
http://lists.grok.org.uk/pipermail/full-disclosure/2011-April/080096.html
There's a serious vulnerability in the default ipv4 configuration too:
Windows will accept a reply from any DHCP server which
Nick Hilliard n...@foobar.org wrote:
The fix right now is for Microsoft to disable IPv4 by default.
Yes, please. That would put a serious dent in most botnets...
Nick
--Johnny
On Mon, 2011-04-04 at 19:46 +0200, Mikael Abrahamsson wrote:
I believe this attack will work on most networks out
there, simply because IPv6 is enabled on hosts and rogue RA filtering
hasn't been implemented on most switches yet.
Any responsible ISP will block this kind of L2 unknown
9 matches
Mail list logo