Interesting paper by Steve Bellovin - Worm propagation in a v6 internet
Suresh Ramasubramanian
ops.lists at gmail.com
Tue Feb 14 13:12:33 UTC 2006
On 2/14/06, Mohacsi Janos <mohacsi at niif.hu> wrote:
> In the 6NET project we identified, that exhaustive search in IPv6 is not
> feasible (e.g. nmap does not support it for IPv6), but there are also
Interesting. By the way is there a "currently" missing between "not"
and "feasible" there?
Even given the sheer size of v6 space some of the other traits noted
by SMB - like the tendency of network equipment to be clustered in the
first few bits of a /48, and possibly observing new v6 netblocks get
announced and routed might be used by someone to make intelligent
guesses.
And nmap can probably be hacked into doing that kind of scanning.
After all when there's an unlimited number of hosts connected to the
v6 network, all that needs to happen is a small botnet to develop, and
then start to port scan.
The potentially larger number of hosts that can get infected will
probably help do an exhaustive search for you, so that v6 botnets
start small and then grow exponentially in size over time.
I rather suspect that the portscanning will grow to keep pace with the
actual number of v6 connected hosts.
--
Suresh Ramasubramanian (ops.lists at gmail.com)
More information about the NANOG
mailing list