Nytro Posted January 21, 2019 Report Share Posted January 21, 2019 IPv6 Talks & Publications At first a very happy new year to everybody! While thinking about the agenda of the upcoming Troopers NGI IPv6 Track I realized that quite a lot of IPv6-related topics have been covered in the last years by various IPv6 practitioners (like my colleague Christopher Werny) or researchers (like my friend Antonios Atlasis). In a kind of shameless self plug I then decided to put together of list of IPv6 talks I myself gave at several occasions and of publications I (co-) authored. Please find this list below (sorted by years); you can click on the titles to access the respective documents/sources. I hope some of this can be of help for one or the other among you in the course of your own IPv6 efforts. Cheers, Enno 2018 IPv6 Address Management – The First Five YearsProperties of IPv6 and Their Implications for Offense & Defense 2017 Why it might make sense to use IPv6 in enterprise infrastructure projectsPosition Paper on an Enterprise Organization’s IPv6 Address StrategyBalanced Security for IPv6 CPE RevisitedLocal Packet Filtering with IPv6IPv6 Address Selection – A Look from the LabWhy IPv6 Security Is So Hard – Structural Deficits of IPv6 & Their ImplicationsTesting RFC 6980 Implementations with ChironIPv6 configuration approaches for servers / slides with additional infosIPv6 Properties of Windows Server 2016 / Windows 10 2016 Real Life Use Cases and Challenges When Implementing Link-local Addressing Only Networks as of RFC 7404IPv6 from a Developers’ PerspectiveThings to Consider When Deploying IPv6 in Enterprise SpaceIPv6 & Threat IntelligenceProtecting Hosts in IPv6 NetworksRemote Access and Business Partner ConnectionsDeveloping an Enterprise IPv6 Security StrategyDual Stack vs. IPv6-only in Enterprise NetworksThings to Consider When Starting Your IPv6 DeploymentIPv6 Address Planning in 2016 / Observations 2015 Developing an Enterprise IPv6 Security Strategy / Part 1: Baseline Analysis of IPv4 Network SecurityDeveloping an Enterprise IPv6 Security Strategy / Part 2: Network Isolation on the Routing LayerDeveloping an Enterprise IPv6 Security Strategy / Part 3: Traffic Filtering in IPv6 Networks (I)Developing an Enterprise IPv6 Security Strategy / Part 4: Traffic Filtering in IPv6 Networks (II)Developing an Enterprise IPv6 Security Strategy / Part 5: First Hop Security FeaturesDeveloping an Enterprise IPv6 Security Strategy / Part 6: Controls on the Host LevelSome Notes on the “Drop IPv6 Fragments” vs. “This Will Break DNS[SEC]” DebateIPv6 Router Advertisement Flags, RDNSS and DHCPv6 Conflicting ConfigurationsMain IPv6 Related Mailing ListsIPv6 in Virtualized Data CentersThe Strange Case of $SOME_SOFTWARE Adding an IPv6 Extension Header, and an Internet Router Dropping ThemWill It Be Routed?Evasion of Cisco ACLs by (Ab)Using IPv6IPv6 Address Planning / Some NotesOS IPv6 Behavior in Conflicting EnvironmentsWhat to Do Today if You Want to Deploy IPv6 TomorrowIs IPv6 more Secure than IPv4? Or Less?IPv6 & ComplexityMLD Considered HarmfulReliable & Secure DHCPv6IPv6-related Requirements for the Internet Uplink or MPLS NetworksAn MLD Testing MethodologyIs RFC 6939 Support Finally Here – Checking the Implementation of the “Client Link Layer Address Option” in DHCPv6/48 Considered Harmful. On the Interaction of Strict IPv6 Prefix Filtering and the Needs of Enterprise LIRsThe Persistent Problem of State in IPv6 (Security)IPv6-related Requirements for Security DevicesEvaluation of IPv6 Capabilities of Commercial IPAM Solutions 2014 Security Implications of Using IPv6 GUAs OnlyDynamics of IPv6 Prefixes within the LIR Scope in the RIPE NCC RegionEvasion of High-End IDPS Devices at the IPv6 EraIPv6 in RFIs/Tendering ProcessesProtocol Properties & Attack VectorsRouter Advertisement Options to the Rescue – A Deep Dive into DHCPv6, Part 2I Don’t Have Any Neighbors – A Deep Dive into DHCPv6, Part 1Security Implications of Disruptive TechnologiesIPv6 for ManagersIPv6 Requirements for Cloud Service ProvidersIPv6 Address Plan Considerations, Part 3: The Plan IPv6 Address Plan Considerations, Part 2: The “PI Space from (Single|Multiple) RIR(s) Debate”IPv6 Address Plan Considerations, Part 1: General Guidelines 2013 Design & Configuration of IPv6 Segments with High Security RequirementsIPv6 Capabilities of Commercial Security ComponentsIPAM Requirements in IPv6 NetworksIPv6 Neighbor Cache Exhaustion Attacks – Risk Assessment & Mitigation Strategies, Part 1 2012 IPv6 Privacy Extensions 2011 Yet another update on IPv6 security – Some notes from the IPv6-Kongress in FrankfurtIPv6 Security Part 2, RA Guard – Let’s get practicalIPv6 Security Part 1, RA Guard – The Theory Sursa: https://insinuator.net/2019/01/ipv6-talks-publications/ Quote Link to comment Share on other sites More sharing options...