O'Reilly logo

IPv6 Security by Scott Hogg, Eric Vyncke

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. IPv6 Protocol Security Vulnerabilities

This chapter covers the following subjects:

The Internet Engineering Task Force (IETF) defines the specifications of the IPv6 protocol that implementers must follow to create an interoperable protocol. Some of the specifications can be ambiguous and incomplete in certain areas, or some security implications have not been considered at the time of writing. Therefore, unforeseen security issues can occur after software is developed and deployed. For example, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required