On 15/12/12 22:42, Jeremy Kitchen wrote:
On Sat, Dec 15, 2012 at 08:44:28PM +0000, Chris Dennis
wrote:
On 15/12/12 18:46, Jeremy Kitchen wrote:
That's 2**64 ips. Or the equivalent of the
current internet. Squared.
18446744073709551615 IP addresses. Assuming you could test for a port
being responsive with just a single packet, and assuming each packet is
a single byte (which it's not, by a long shot), that's 16 EXAbytes of
outbound traffic.
I'm not sure that's true. Scanners won't just try to guess a
server's address when it's publicly available. For example:
$ dig -t aaaa
ipv6.he.net
<snip>
;; ANSWER SECTION:
ipv6.he.net. 86246 IN AAAA 2001:470:0:64::2
which reveals the exact address to target.
Right, which means they have to start fuzzing your dns info (or just
grab a zone transfer if your server is set up improperly)
It makes it a more targeted attack than just scanning all of the IPs on
the internet for vulnerable points.
I really wish I could remember where I heard/read about this. It
discusses the dns discovery and everything.
-Jeremy
Here's one interesting document on the subject:
http://www.ietf.org/rfc/rfc5157.txt
One thing that struck me from a quick reading of that was the use of
logfiles for collecting IPv6 addresses. If I set up a website with
something tempting on it, I could then extract the IP addresses of
visitors, and sell them to would-be attackers, in the same way that
people sell lists of email addresses to spammers.
So yes, attacking IPv6 addresses is harder than with IPv4, but it's
certainly not impossible.
cheers
Chris
--
Chris Dennis cgdennis(a)btinternet.com
Fordingbridge, Hampshire, UK