[ppml] IPv6>>32

Owen DeLong owen at delong.com
Thu May 12 16:18:10 EDT 2005

--On Thursday, May 12, 2005 11:00 AM +0100 Michael.Dillon at radianz.com wrote:

>> All a virus, worm, or attacker needs is one vulnerable host. 
> And what if this "vulnerable" host is a Z-80 based PIC collecting
> readings from 8 sensors and transmitting them through Ethernet
> to a central data collection station? And yes, IPv6 has been
> ported to Z-80 CPUs and the configuration that I describe is
> actually in use today. 
If it's vulnerable, what difference does it make whether it's a Z-80 PIC
or a Cray YMP?  Once it's infected, it will spew infection to the other
hosts it knows about.

> The definition of a host becomes fuzzier and fuzzier as
> time goes on. 

> In making IPv6 addressing policy we must be aware that 
> we are not making policy for the computers and networks
> of 1995. Things are different today and will be moreso
> in the coming years.
And yet, in some cases, the more things change, the more they stay
the same.


If it wasn't crypto-signed, it probably didn't come from me.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 186 bytes
Desc: not available
URL: <https://lists.arin.net/pipermail/arin-ppml/attachments/20050512/6f2e2c63/attachment-0001.sig>

More information about the ARIN-PPML mailing list