article thumbnail

Liveblog: IPv6 in the Cloud - Protocol and Service Overview

Scott Lowe

This is a liveblog of an AWS re:Invent 2017 breakout session titled “IPv6 in the Cloud: Protocol and Service Overview.” Global IPv6 adoption is currently around 22%, and is expected to hit 25% by the end of the year. T-Mobile, for example, now has 89% of their infrastructure running on IPv6.

IPv6 60
article thumbnail

Interop Liveblog: IPv6 Microsegmentation

Scott Lowe

This session was titled “IPv6 Microsegmentation,” and the speaker was Ivan Pepelnjak. The session starts with a discussion of the problems found in Layer 2 IPv6 networks. Note that some of these attacks are also common to IPv4 and are not necessarily unique to IPv6. Can we use shared Layer 3 IPv6 subnets?

IPv6 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

New Route 53 and ELB features: IPv6, Zone Apex, WRR and more.

All Things Distributed

New Route 53 and ELB features: IPv6, Zone Apex, WRR and more. allthingsdistributed.com) point to same location where for example www.allthingsdistributed.com is pointing to jump through complex redirect hoops. Elastic Load Balancing support for IPV6. ELB has support for both IPv6-only and Dual Stack configurations.

IPv6 114
article thumbnail

Bogons: Do not let them in or through your networks

CTOvision

So bogon packets cannot be used to, for example, send spam e-mails or to send HTTP/web traffic. But filtering the full bogon list requires about 5000 rules for IPv4 and about 70,000 rules for IPv6. Additionally, IPv4 networks are not safe from an IPv6 bogon bandwidth flooding attack.

IPv6 242
article thumbnail

What is Passive DNS and how do you leverage it in research?

CTOvision

A key use case of passive DNS data is to take an IP address known to be malicious and then find all the domain names that Passive DNS sensors have mapped to that IP address. As an example, lets take passivetotal.org. We will provide more info on how to tap into this type of data for your own analysis in the next post in this series.

Research 150
article thumbnail

A Tutorial For Enhancing Your Home DNS Protection

CTOvision

Consider for example, the example of the old fashioned phone operator. You can also use it to make customized filtering decisions for your home system (for example, you can tell it that no one should have access to certain types of sites). Also, consider again the example of the telephone operator. They get data.

Fashion 177
article thumbnail

What Can You Get from an IP Address and Why is it Important?

Galido

First of all, your Internet network is composed of four distinct parts, including something called a data link layer. For those who are scratching their heads, a good example of hardware that uses a data link layer is an ethernet cable. Here’s how to tell apart the following IP addresses: IPv4 and IPv6.

IPv6 105