Chapter 2. IPv6 Protocol Security Vulnerabilities

This chapter covers the following subjects:

The IPv6 Protocol Header: Review of the header, ICMPv6, and multicast

Extension Header Threats: Security implications of IPv6 headers

Reconnaissance on IPv6 Networks: Finding IPv6 nodes to attack

Layer 3 and Layer 4 Spoofing: Crafted packet threats

The Internet Engineering Task Force (IETF) defines the specifications of the IPv6 protocol that implementers must follow to create an interoperable protocol. Some of the specifications can be ambiguous and incomplete in certain areas, or some security implications have not been considered at the time of writing. Therefore, unforeseen security issues can occur after software is developed and ...

Get IPv6 Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.