[Full-disclosure] (CFP) LACSEC 2014: Cancun, Mexico. May 7-8, 2014 (EXTENDED DEADLINE)

2014-03-18 Thread Fernando Gont
the presentation: May 4th, 2014 9th Network Security Event for Latin America and the Caribbean (LACSEC 2014) Chair Fernando Gont (SI6 Networks/UTN-FRH, Argentina) Evaluation Committee Iván Arce (Fundación Sadosky, Argentina) Carlos A. Ayala Rocha (Arbor Networks, Mexico) Julio César

[Full-disclosure] SI6 Networks' IPv6 Toolkit v1.5.2 released!

2014-01-17 Thread Fernando Gont
paths are selected based on the value of a number of variables. Configuration file is dynamically generated, with the right path to the oui.txt file. = CHANGELOG = - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25

[Full-disclosure] Slideware of recent presentations about IPv6 security

2013-06-12 Thread Fernando Gont
organizers, and Enno Rey, for the warm reception, and the great time. Thanks! Best regards, - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux

[Full-disclosure] Revision of IPv6 Stable Privacy Addresses (Fwd: I-D Action: draft-ietf-6man-stable-privacy-addresses-07.txt)

2013-05-19 Thread Fernando Gont
-privacy-addresses-07. This proposal is key for the mitigation of address-scanning attacks, while at the same time preventing host-tracking. Stay tuned for more IPv6 security news on our Twitter account: @SI6Networks Thanks! Best regards, Fernando Gont - Original Message

[Full-disclosure] Hacking IPv6 networks training (slideware, upcoming trainings, etc.)

2013-04-25 Thread Fernando Gont
, please check the security conferences we will be attending this year http://www.si6networks.com/index.html#conferences. As always, you can follow us on Twitter to get the latest news about IPv6 security: @SI6Networks Thanks! Best regards, - -- Fernando Gont SI6 Networks e-mail: fg

[Full-disclosure] SI6 Networks' IPv6 Toolkit v1.3.4 released!

2013-04-17 Thread Fernando Gont
the ipv6hackers mailing list: http://www.si6networks.com/community/mailing-lists.html. Thanks! Best regards, - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux

[Full-disclosure] Host tracking in IPv6 (SI6 Networks' IPv6 toolkit v1.3.3)

2013-03-11 Thread Fernando Gont
systems across networks, even if they employ the so-called Privacy Address (and yes, that includes Microsoft Windows systems). Thanks, - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 -BEGIN PGP SIGNATURE

[Full-disclosure] LACSEC 2013: 8th Network Security Event for Latin America and the Caribbean (CFP)

2013-02-19 Thread Fernando Gont
. IMPORTANT DATES * Deadline for proposal submission: March 1st, 2013 * Notification of acceptance: March 11st, 2013 * Deadline for submitting the final version the presentation: May 5th, 2012 8th Network Security Event for Latin America and the Caribbean (LACSEC 2013) Chair Fernando Gont (SI6

[Full-disclosure] SI6 Networks IPv6 Toolkit v1.3 released!

2013-02-16 Thread Fernando Gont
of Linux, FreeBSD, NetBSD, OpenBSD, and Mac OS X. Please send any bug reports and/or feature requests to fg...@si6networks.com. As always, you can get the latest news on IPv6 security research and tools by following us on Twitter: @SI6Networks. Thanks! Best regards, - -- Fernando Gont SI6 Networks e

[Full-disclosure] Scanning the IPv6 Internet with the scan6 tool (SI6 IPv6 toolkit)

2013-02-16 Thread Fernando Gont
-lists.html -- feel free to join -- it's a low-noise and very focused list. P.S.: Please do read the scan6 manual page before using the tool .. you might cause trouble to the target network and/or to your own network. Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP

[Full-disclosure] IPv6: How to avoid security issues with VPN leaks on dual-stack networks

2013-01-24 Thread Fernando Gont
, - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux) iQIcBAEBAgAGBQJRARJhAAoJEK4lDVUdTnSS8WUQAIqZ7hw4LZxEafwStMHaKBi0 /xa3WJH/tbwpzuZrMkNwo6fyfUIaJuQnjIT0HNnYWpRIO

[Full-disclosure] LACSEC 2013: 8th Network Security Event for Latin America and the Caribbean (CFP)

2013-01-23 Thread Fernando Gont
. IMPORTANT DATES * Deadline for proposal submission: March 1st, 2013 * Notification of acceptance: March 11st, 2013 * Deadline for submitting the final version the presentation: May 5th, 2012 8th Network Security Event for Latin America and the Caribbean (LACSEC 2013) Chair Fernando Gont (SI6

[Full-disclosure] Recently-revised IETF I-Ds about IPv6 security

2013-01-17 Thread Fernando Gont
Implications of IPv6 Fragmentation with IPv6 Neighbor Discovery URL: http://www.ietf.org/internet-drafts/draft-ietf-6man-nd-extension-headers-02.txt Thanks, - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

[Full-disclosure] IPv6 Neighbor Discovery security (new documents)

2012-12-17 Thread Fernando Gont
perform an assessment of your implementation with respect to the identified issues. Thanks! Best regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 -- Fernando Gont SI6 Networks e-mail: fg

[Full-disclosure] Network Reconnaissance in IPv6 Networks

2012-12-12 Thread Fernando Gont
://www.si6networks.com And yes, you can follow us on Twitter: @SI6Networks Thanks! Best regards, - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux

[Full-disclosure] Network Reconnaissance in IPv6 Networks (errata)

2012-12-12 Thread Fernando Gont
, slideware, videos, and other materials about IPv6 security at our web site: http://www.si6networks.com And yes, you can follow us on Twitter: @SI6Networks Thanks! Best regards, - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E

[Full-disclosure] IPv6 Toolkit v1.2.3 released! (and upcoming IPv6 security trainings)

2012-09-15 Thread Fernando Gont
://www.hackingipv6networks.com/upcoming-t, and currently includes trainings in Ghent (Belgium), Lisbon (Portugal), and Rio de Janeiro (Brazil). Please follow us on Twitter to get the latest news about the IPv6 Toolkit and IPv6 security: @SI6Networks Thanks! Best regards, -- Fernando Gont SI6

[Full-disclosure] ipv6mon v1.0 released! (IPv6 address monitoring daemon)

2012-09-13 Thread Fernando Gont
trainings http://www.hackingipv6networks.com/upcoming-t Follow us on twitter: @SI6Networks Best regards, - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU

[Full-disclosure] IPv6 implications on IPv4 nets: IPv6 RAs, IPv4, and VPN evasion

2012-09-04 Thread Fernando Gont
... Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure

[Full-disclosure] IPv6 security tools released

2012-07-05 Thread Fernando Gont
regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted

[Full-disclosure] Slideware of IPv6 hacking training (HIP 2012 edition), and future trainings (Portugal Belgium)

2012-07-02 Thread Fernando Gont
on twitter: @SI6Networks Best regards, - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux) iQIcBAEBAgAGBQJP8kDSAAoJEK4lDVUdTnSSm18QAJng/bbmhdOUXxZx26pf9kIr

[Full-disclosure] Analysis: Vast IPv6 address space actually enables IPv6 attacks

2012-06-08 Thread Fernando Gont
, it's a human-readable version of the IETF Internet-Draft I published a month ago or so about IPv6 host scanning (see: http://www.si6networks.com/presentations/ietf.html)) Cheers, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55

Re: [Full-disclosure] Analysis: Vast IPv6 address space actually enables IPv6 attacks

2012-06-08 Thread Fernando Gont
Folks, FWIW, the full article is available at the URL below (you don't need to subscribe... just scroll the window down). CHeers, Fernando On 06/08/2012 07:32 AM, Fernando Gont wrote: Folks, TechTarget has published an article I've authored for them, entitled Analysis: Vast IPv6 address

Re: [Full-disclosure] Analysis: Vast IPv6 address space actually enables IPv6 attacks

2012-06-08 Thread Fernando Gont
in the article does it say anything about vast address space... enables attacks? The title and the article don't match. I might agree. The title was changed pre-publication. -- My original title was something along the lines of Host scanning in IPv6 networks. Cheers, -- Fernando Gont SI6 Networks e

[Full-disclosure] New IETF I-D: (IPv6) Neighbor Discovery Shield (ND-Shield): Protecting against Neighbor Discovery Attacks

2012-06-06 Thread Fernando Gont
, draft-gont-opsec-ipv6-nd-shield-00.txt has been successfully submitted by Fernando Gont and posted to the IETF repository. Filename:draft-gont-opsec-ipv6-nd-shield Revision:00 Title: Neighbor Discovery Shield (ND-Shield): Protecting against Neighbor Discovery Attacks

[Full-disclosure] IPv6 security: New IETF I-Ds, slideware and videos for recent presentations, trainings, etc...

2012-05-23 Thread Fernando Gont
? -- Follow us on Twitter: @SI6Networks Thanks, - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux) iQIcBAEBAgAGBQJPvIk7AAoJEK4lDVUdTnSSe3sP/AxzLHwfKyC4Yg

[Full-disclosure] LACSEC 2012 Agenda (May 6-11, 2012, Quito, Ecuador)

2012-05-03 Thread Fernando Gont
Report -- Carlos Ayala (Arbor Networks) IPv6 Network Reconnaissance -- Fernando Gont (SI6 Networks) Invited talk: RPKI: Experiences after one year of operation, and next steps -- Carlos Martinez (LACNIC) Arturo Servin (LACNIC) Additionally, LACSEC 2012 will feature a slot for Lightning Talks

[Full-disclosure] New IETF I-D: Security Implications of IPv6 on IPv4 networks

2012-04-24 Thread Fernando Gont
implications of native IPv6 support and IPv6 transition/co-existence technologies on IPv4-only networks, and describes possible mitigations for the aforementioned issues. cut here Any feedback will be very welcome. Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg

[Full-disclosure] IPv6 host scanning in IPv6

2012-04-20 Thread Fernando Gont
... but hopefully a good starting point, and a nice reading ;-) ). Thanks! P.S.: Public discussion mostly welcome on the IPv6 hackers mailing-list http://lists.si6networks.com/listinfo/ipv6hackers/, but I'd be happy to discuss it here, too. Best regards, -- Fernando Gont SI6 Networks e-mail: fg

[Full-disclosure] Slides for Recent Advances in IPv6 Security at Hackito Ergo Sum 2012

2012-04-14 Thread Fernando Gont
at: http://www.si6networks.com/presentations/index.html Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 ___ Full-Disclosure - We believe

[Full-disclosure] IPv6 stable privacy addresses

2012-03-31 Thread Fernando Gont
. cut here Interested in IPv6 security? -- Follow us on Twitter: @SI6Networks Interested in discussing IPv6 security topics? -- Join the ipv6hackers@ mailing-list at: http://www.si6networks.com/community/mailing-lists.html Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg

[Full-disclosure] Security Implications of Predictable IPv6 Fragment Identification values (rev'ed IETF I-D)

2012-03-03 Thread Fernando Gont
: internet-dra...@ietf.org To: fg...@si6networks.com A new version of I-D, draft-gont-6man-predictable-fragment-id-01.txt has been successfully submitted by Fernando Gont and posted to the IETF repository. Filename:draft-gont-6man-predictable-fragment-id Revision:01 Title

[Full-disclosure] IPv6 NIDS evasion and IPv6 fragmentation/reassembly improvements

2012-02-20 Thread Fernando Gont
Folks, FYI, just posted: http://blog.si6networks.com/2012/02/ipv6-nids-evasion-and-improvements-in.html It contains some test results regarding the implementation of RFC 5722 and draft-ietf-6man-ipv6-atomic-fragments. Thanks, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP

[Full-disclosure] IETF I-D: Security and Interoperability Implications of Oversized IPv6 Header Chains

2012-02-17 Thread Fernando Gont
Folks, FYI, we've published a new IETF I-D entitled Security and Interoperability Implications of Oversized IPv6 Header Chains. The I-D is available at: http://tools.ietf.org/id/draft-gont-6man-oversized-header-chain-00.txt Any feedback will be very welcome. Thanks, -- Fernando Gont SI6

[Full-disclosure] RFC 6528 on Defending against Sequence Number Attacks

2012-02-02 Thread Fernando Gont
Folks, FYI. (the RFC is available at: http://www.rfc-editor.org/rfc/rfc6528.txt) A new Request for Comments is now available in online RFC libraries. RFC 6528 Title: Defending against Sequence Number Attacks Author: F. Gont, S. Bellovin Status:

[Full-disclosure] Fwd: RA-Guard: Advice on the implementation (feedback requested)

2012-02-01 Thread Fernando Gont
...@ietf.org, and CC me if possible. Thanks! Best regards, Fernando Original Message Subject: RA-Guard: Advice on the implementation (feedback requested) Date: Wed, 01 Feb 2012 21:44:29 -0300 From: Fernando Gont fg...@si6networks.com Organization: SI6 Networks To: IPv6

[Full-disclosure] Fwd: IPv6 RA-Guard: Advice on the implementation (feedback requested)

2012-02-01 Thread Fernando Gont
...@ietf.org, and CC me if possible. Thanks! Best regards, Fernando Original Message Subject: RA-Guard: Advice on the implementation (feedback requested) Date: Wed, 01 Feb 2012 21:44:29 -0300 From: Fernando Gont fg...@si6networks.com Organization: SI6 Networks To: IPv6

[Full-disclosure] (CFP) LACSEC 2012: 7th Network Security Event for Latin America and the Caribbean

2012-01-15 Thread Fernando Gont
* Deadline for proposal submission: February 15th, 2012 * Notification of acceptance: February 27th, 2012 * Deadline for submitting the final version the presentation: May 6th, 2012 7th Network Security Event for Latin America and the Caribbean (LACSEC 2012) Chair Fernando Gont (SI6 Networks/UTN

[Full-disclosure] First-hop security in IPv6

2012-01-14 Thread Fernando Gont
.: The whole article is available online, and you can read it even without registering... just scroll the web page... Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

[Full-disclosure] Revised IETF I-D: IPv6 Neighbor Discovery, SEND, and IPv6 Fragmentation

2012-01-12 Thread Fernando Gont
, a discussion of possible issues with SEND as a result of IPv6 fragmentation. Any feedback will be very appreciated. Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

[Full-disclosure] Revised IETF I-D: Advice on IPv6 RA-Guard Implementation

2012-01-04 Thread Fernando Gont
and employed in the IPv4 world. Any feedback will be greatly appreciated. -- If possible, send your feedback to: v6...@ietf.org (the relevant IETF mailing-list), and CC'me. Follow Us on Twitter: @SI6Networks Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP

[Full-disclosure] Slides of our Hacking IPv6 Networks training at DEEPSEC 2011

2011-12-19 Thread Fernando Gont
Follow Us on twitter: SI6Networks Thanks! Best regards, - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux

[Full-disclosure] New IETF I-D on Stable Privacy Addresses

2011-12-15 Thread Fernando Gont
. Any feedback will be really appreciated. P.S.: Also, feel free to discuss the I-D on the ipv6hackers mailing-list http://lists.si6networks.com/listinfo/ipv6hackers/ Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25

[Full-disclosure] Implications of IPv6 on network firewalls

2011-11-20 Thread Fernando Gont
-lists.html. Thanks! Best regards, - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux) iQIcBAEBAgAGBQJOybnrAAoJEK4lDVUdTnSSL+IP/1tzwbRp/ZNpfnJMXh4/1G8g

[Full-disclosure] IPv6 security (slides and training)

2011-11-08 Thread Fernando Gont
-ipv6-networks. Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full

[Full-disclosure] IPv6 security presentation at Hack.lu 2011

2011-09-20 Thread Fernando Gont
(during DEEPSEC 2011). Please check out the details at http://www.si6networks.com/index.html#conferences. Thanks! - -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 Web: www.si6networks.com | Twitter: @SI6Networks

[Full-disclosure] More on IPv6 RA-Guard evasion (IPv6 security)

2011-09-01 Thread Fernando Gont
to join the IPv6 Hackers mailing-list: http://www.si6networks.com/community/mailing-lists.html Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com web: http://www.si6networks.com ___ Full-Disclosure - We believe

Re: [Full-disclosure] HP A-series switches are affected, too. [WAS: More on IPv6 RA-Guard evasion (IPv6 security)]

2011-09-01 Thread Fernando Gont
we will have some discussion about that over there. Yep... will post something right now, and see if that triggers discussion. Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com web: http://www.si6networks.com

Re: [Full-disclosure] HP A-series switches are affected, too. [WAS: More on IPv6 RA-Guard evasion (IPv6 security)]

2011-09-01 Thread Fernando Gont
post, curiously enough the problem statement (RFC6104) is about accidental RAs, while the RA-Guard spec itself aims to be a security device. Thanks, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com web: http://www.si6networks.com ___ Full

[Full-disclosure] IPv6 Hackers mailing-list

2011-08-09 Thread Fernando Gont
://lists.si6networks.com/listinfo/ipv6hackers/ General information about our mailing-lists is available at: http://www.si6networks.com/community/mailing-lists.html Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com web: http://www.si6networks.com

Re: [Full-disclosure] Hacking IPv6 Networks (slides)

2011-08-09 Thread Fernando Gont
your post, I must admit :-) -- particularly when at least half of the stuff that usually gets published about IPv6 security has to do with how the mandatory-ness of IPsec is going to save us all. :-) Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com web: http

[Full-disclosure] Hacking IPv6 Networks (slides)

2011-07-26 Thread Fernando Gont
examples. Thanks! Best regards, -- Fernando Gont Hacking IPv6 Networks Security Trainings e-mail: fg...@hackingipv6networks.com web: http://www.hackingipv6networks.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full

[Full-disclosure] Fwd: RFC 6274 on Security Assessment of the Internet Protocol Version 4

2011-07-05 Thread Fernando Gont
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Folks, The IETF has just published RFC 6274, entitled Security Assessment of the Internet Protocol Version 4. It contains a large amount of information on how to improve the security of IPv4 implementations and IPv4 deployments. This document is the

Re: [Full-disclosure] Ra-Guard evasion (new Internet-Drafts)

2011-06-02 Thread Fernando Gont
be cooperating more between each other regarding IPv6 security Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Full-Disclosure - We believe in it. Charter: http

[Full-disclosure] IPv6 RA-Guard evasion (and neighbor discovery monitoring) vulnerabilities

2011-05-31 Thread Fernando Gont
/mailman/listinfo/ipv6). Thanks! Best regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full

[Full-disclosure] Viewpoint: Security implications of IPv6

2011-05-27 Thread Fernando Gont
://www.cpni.gov.uk/Documents/Publications/2011/2011mar22-infosec-cpni_viewpoint_security_implications_of_IPv6.pdf Best regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

[Full-disclosure] [CFP] LACSEC 2011: 6th Network Security Event for Latin America and the Caribbean

2011-01-25 Thread Fernando Gont
* Deadline for submitting the final version the presentation: May 9th, 2011 “6th Network Security Event for Latin America and the Caribbean” (LACSEC 2011) Chair Fernando Gont (UTN/FRH, Argentina) Evaluation Committee Eduardo Carozo (Amparo Project, Uruguay) Lorena Ferreyro (Independent

[Full-disclosure] IETF RFC on Port Randomization

2011-01-21 Thread Fernando Gont
port numbers). This memo documents an Internet Best Current Practice. cut here The RFC is available at: http://www.rfc-editor.org/rfc/rfc6056.txt P.S.: Below you'll find the formal announcement sent out by the RFC Editor. Thanks! Best regards, Fernando Gont Original Message

Re: [Full-disclosure] IPv6 security myths

2010-10-26 Thread Fernando Gont
PM, Fernando Gont fernando.g...@gmail.com wrote: Folks, I thought you might enjoy the slides of a talk about IPv6 security I gave last week at LACNOG (http://www.lacnog.org). The slides are available at: http://www.gont.com.ar/talks/lacnog2010/fgont-lacnog2010-ipv6-security.pdf

[Full-disclosure] IPv6 security myths

2010-10-24 Thread Fernando Gont
://www.lacnog.org/en/meetings/lacnog-2010/agenda-lacnog-2010) Thanks! Kind regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Full-Disclosure - We believe

[Full-disclosure] Details of cisco-sa-20081022-asa security advisory?

2010-08-25 Thread Fernando Gont
Hi, I'm curious if anybody is aware of the details of the IPv6 DoS vulnerabilities listed in the aforementioned advisory (available at: http://www.cisco.com/warp/public/707/cisco-sa-20081022-asa.shtml). Thanks! Kind regards, Fernando ___

Re: [Full-disclosure] Vulnerability in TCP

2010-06-26 Thread Fernando Gont
.txt Thanks, Fernando Gont ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] New IETF Internet-Drafts on TCP timestamps

2010-06-26 Thread Fernando Gont
generation one). P.S.: Related technical reports, presentations and stuff available at: http://www.gont.com.ar Thanks! Kind regards, Fernando Gont ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html

[Full-disclosure] IETF effort: Security Assesment of the Internet Protocol

2010-03-04 Thread Fernando Gont
of the Internet Protocol that I wrote for CPNI a couple of years ago, and that is available at: http://www.cpni.gov.uk/Docs/InternetProtocol.pdf Any comments will be more than welcome! -- feel free to post them here, or send them unicast to me at: ferna...@gont.com.ar Thanks! Kind regards, Fernando Gont

[Full-disclosure] Request for feedback on TCP security (IETF effort)

2010-02-19 Thread Fernando Gont
. Thanks! Kind regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html

Re: [Full-disclosure] Microsoft Windows TCP/IP Timestamps Code Execution Vulnerability

2009-11-27 Thread Fernando Gont
On Fri, Nov 27, 2009 at 1:59 AM, Ivan Security ivanch...@gmail.com wrote: Has anyone more details about this vulnerability?. The advisory just say: The vulnerability exists due to the TCP/IP stack not cleaning up state information correctly. This causes the TCP/IP stack to reference a field as

Re: [Full-disclosure] Security Assessment of TCP at the IETF

2009-06-26 Thread Fernando Gont
Please check again. They links do work. On Fri, Jun 26, 2009 at 3:41 PM, Hal Wigodahwig...@mindspring.com wrote: sorry, but the links do not work. On Jun 25, 2009, at 11:28 PM, Fernando Gont wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hello, folks, In February this year

[Full-disclosure] Security Assessment of TCP at the IETF

2009-06-25 Thread Fernando Gont
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hello, folks, In February this year the UK CPNI published the document Security Assessment of the Transmission Control Protocol (TCP) (available at: http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf) Earlier this year we published

[Full-disclosure] On the implementation of TCP urgent data (IETF Internet Draft)

2009-02-27 Thread Fernando Gont
it to the mailing-list, even if you are not subscribed to it. (Alternatively, you can send me your input, and I could forward it to the t...@ietf.org mailing-list). Thanks! Kind regards, - -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE

[Full-disclosure] Security Assessment of the Transmission Control Protocol (TCP)

2009-02-12 Thread Fernando Gont
of the document on my personal web site: http://www.gont.com.ar Any comments will be more than welcome. Kind regards, - -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 -BEGIN PGP SIGNATURE- Version: GnuPG

[Full-disclosure] Security Assessment of the Internet Protocol the IETF

2009-01-06 Thread Fernando Gont
(although your message will be held for moderator approval before it is distributed to the list members). The deadline for posting your opinion is January 9th (next Friday). Thanks so much! Kind regards, Fernando Gont -BEGIN PGP SIGNATURE- Version: PGP Desktop 9.5.3 (Build 5003

[Full-disclosure] Security Assessment of the Internet Protocol the IETF

2009-01-05 Thread Fernando Gont
(although your message will be held for moderator approval before it is distributed to the list members). The deadline for posting your opinion is January 9th (next Friday). Thanks so much! Kind regards, Fernando Gont -BEGIN PGP SIGNATURE- Version: PGP Desktop 9.5.3 (Build 5003

Re: [Full-disclosure] Port Randomization: New revision of our IETF Internet-Draft

2008-09-06 Thread Fernando Gont
a better port reuse frequency that even the traditional BSD port selection algorithm, thus probably avoiding some collisions that you would have experienced with the traditional BSD port selection algorithm. Thanks! Kind regards, -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] PGP

Re: [Full-disclosure] Port Randomization: New revision of our IETF Internet-Draft

2008-09-02 Thread Fernando Gont
At 04:50 p.m. 01/09/2008, coderman wrote: On Sun, Aug 31, 2008 at 10:44 PM, Fernando Gont [EMAIL PROTECTED] wrote: ... IETF Internet-Draft about port randomization... wget -qO - http://www.gont.com.ar/drafts/port-randomization/draft-ietf-tsvwg-port-randomization-02.txt | grep -i grsec

Re: [Full-disclosure] Port Randomization: New revision of our IETF Internet-Draft

2008-09-02 Thread Fernando Gont
At 11:15 a.m. 02/09/2008, coderman wrote: On Tue, Sep 2, 2008 at 2:06 AM, Fernando Gont [EMAIL PROTECTED] wrote: ... there's no description of what Windows does some things speak for themselves... :) What speaks for itself? Our work is a proposal for a few alternatives for doing port

[Full-disclosure] New IETF I-D-: Security Assessment of the Internet Protocol version 4

2008-09-01 Thread Fernando Gont
the identified issues get documented in an official IETF document, and hopefully the IETF standards are modified as necessary. Any feedback on the IETF I-D and/or the original UK CPNI document will be more than welcome. Thanks! Kind regards, Fernando Gont -BEGIN PGP SIGNATURE- Version

[Full-disclosure] Port Randomization: New revision of our IETF Internet-Draft

2008-08-31 Thread Fernando Gont
will be more than welcome. Thanks! Kind regards, - -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 -BEGIN PGP SIGNATURE- Version: PGP Desktop 9.5.3 (Build 5003) - not licensed for commercial use

[Full-disclosure] Port Randomization: New revision of our IETF Internet-Draft

2008-08-31 Thread Fernando Gont
will be more than welcome. Thanks! Kind regards, - -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 -BEGIN PGP SIGNATURE- Version: PGP Desktop 9.5.3 (Build 5003) - not licensed for commercial use

Re: [Full-disclosure] TCP Port randomization paper

2008-08-27 Thread Fernando Gont
comments on grsecurity's approach for port randomization? Thanks, -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Full-Disclosure - We believe in it. Charter: http

[Full-disclosure] Security Assessment of the Internet Protocol

2008-08-14 Thread Fernando Gont
is available at CPNI's web site: http://www.cpni.gov.uk/Products/technicalnotes/3677.aspx Any comments will be more than welcome. Kind regards, Fernando Gont -BEGIN PGP SIGNATURE- Version: PGP Desktop 9.5.3 (Build 5003) - not licensed for commercial use: www.pgp.com wsBVAwUBSKSBzGl

[Full-disclosure] IETF Internet-Draft on TCP Port randomization

2008-07-16 Thread Fernando Gont
comments we receive in the next few weeks. Thanks, -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Full-Disclosure - We believe in it. Charter: http

Re: [Full-disclosure] TCP Port randomization paper

2007-12-11 Thread Fernando Gont
On Dec 9, 2007 2:20 AM, reepex [EMAIL PROTECTED] wrote: ~$ grep -i grsec draft-ietf-tsvwg-port-randomization-00.txt ~$ as stated by the last person its very strange you do not mention grsecurity in your Survey of the algorithms in use by some popular implementations Well, it's just *some*

Re: [Full-disclosure] TCP Port randomization paper

2007-12-07 Thread Fernando Gont
: SHA1 Strangely enough this stuff exists for more than 3 years ... Think GRSEC and more specifically Network stack randomization. Well of course bow to IETF for accepting this for draft ... Fernando Gont wrote: Folks, We have published a revision of our port randomization paper

[Full-disclosure] TCP Port randomization paper

2007-12-06 Thread Fernando Gont
will be welcome. The document is available at: http://www.ietf.org/internet-drafts/draft-ietf-tsvwg-port-randomization-00.txt Additionally, it is available in other fancy formats (PDF and HTML) at: http://www.gont.com.ar/drafts/port-randomization/index.html Thanks, -- Fernando Gont e-mail: [EMAIL

Re: [Full-disclosure] [funsec] Vista Protected Processes Bypassed

2007-04-08 Thread Fernando Gont
. Kind regards, -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html

[Full-disclosure] Port randomization paper

2007-02-11 Thread Fernando Gont
free to post your comments/questions on-list or send them off-list to : [EMAIL PROTECTED] Thanks, -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Full-Disclosure - We

[Full-disclosure] Revised draft on ICMP attacks

2005-10-24 Thread Fernando Gont
should go to /dev/null. -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

RE: [Full-disclosure] Revised paper on ICMP attacks against TCP

2005-09-10 Thread Fernando Gont
At 04:08 p.m. 05/09/2005, alex wrote: Russian version (22.08.2005, with some analysis): http://www.securitylab.ru/contest/239695.php IIRC, those Cisco products that are not vulnerable to the PMTU just don't implement PMTUD, right? ___

[Full-disclosure] Revised paper on ICMP attacks against TCP

2005-09-05 Thread Fernando Gont
be sent to /dev/null. Kindest regards, -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http

Re: [Full-disclosure] Fernando Gont remote command execution and big mouth vulnerability

2005-08-04 Thread Fernando Gont
, and is hosted on an OpenBSD server. If your bored, go and get a book. Belive me: it won't bite you. Kindest regards, -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk

Re: [Full-disclosure] Fernando Gont remote command execution and big mouth vulnerability

2005-08-04 Thread Fernando Gont
here continues to be ignored. If I were any of the involved organizations/companies, I'd certainly pay people to do the same thing you're doing: adding non-sensical noise. Kindest regards, -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED

[Full-disclosure] ICMP attacks against TCP: Conclusions

2005-07-22 Thread Fernando Gont
harm than good?). And have the specs address these issues. That's the real and final fix for these issues. Kindest regards, -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http

[Full-disclosure] ICMP-based blind connection-reset attack

2005-07-21 Thread Fernando Gont
, and make your vendor understand it and fix them, and get involved to have the IETF specs address these issues. Kindest regards, -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http

[Full-disclosure] Re: (ICMP attacks against TCP) (was Re: HPSBUX01137 SSRT5954

2005-07-21 Thread Fernando Gont
you do? Where do you draw the line in the sand? Again and again: Read the draft at http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html It fixes the problem without having to draw any line. -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED

[Full-disclosure] Re: (ICMP attacks against TCP) (was Re: HPSBUX01137 SSRT5954

2005-07-21 Thread Fernando Gont
attack you with IP fragments. Kindest regards, -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia

[Full-disclosure] Trivial BGP attacks (ICMP-based blind throughput-reduction attack)

2005-07-20 Thread Fernando Gont
you these attacks were not easy to perform, and show them the packet traces you obtain. Kindest regards, -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full

[Full-disclosure] ICMP-based blind performance-degrading attack

2005-07-20 Thread Fernando Gont
/icmp-attacks-against-tcp.html Kindest regards, -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia

[Full-disclosure] Re: (ICMP attacks against TCP) (was Re: HPSBUX01137 SSRT5954 rev.4

2005-07-20 Thread Fernando Gont
At 07:25 p.m. 20/07/2005, Darren Reed wrote: In some mail from Fernando Gont, sie said: The IPv4 minimum MTU is 68, and not 576. If you blindly send packets larger than 68 with the DF bit set, in the case there's an intermmediate with an MTU lower that 576, the connection will stall

[Full-disclosure] Re: ICMP-based blind performance-degrading attack

2005-07-20 Thread Fernando Gont
. It also needs to be enforced when the MTU parameter is checked in ICMP need frag packets. So I must assume this e-mail discusses a blind ICMP-based attacks? -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] ___ Full-Disclosure - We

Re: [Full-disclosure] ICMP Security Vulnerabilities - NEW (cough)

2005-07-14 Thread Fernando Gont
a formula than to master a principle. - James Clerk Maxwell Kindest regards, -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted

  1   2   >