owen at delong.com
Thu May 12 16:18:10 EDT 2005
--On Thursday, May 12, 2005 11:00 AM +0100 Michael.Dillon at radianz.com wrote:
>> All a virus, worm, or attacker needs is one vulnerable host.
> And what if this "vulnerable" host is a Z-80 based PIC collecting
> readings from 8 sensors and transmitting them through Ethernet
> to a central data collection station? And yes, IPv6 has been
> ported to Z-80 CPUs and the configuration that I describe is
> actually in use today.
If it's vulnerable, what difference does it make whether it's a Z-80 PIC
or a Cray YMP? Once it's infected, it will spew infection to the other
hosts it knows about.
> The definition of a host becomes fuzzier and fuzzier as
> time goes on.
> In making IPv6 addressing policy we must be aware that
> we are not making policy for the computers and networks
> of 1995. Things are different today and will be moreso
> in the coming years.
And yet, in some cases, the more things change, the more they stay
If it wasn't crypto-signed, it probably didn't come from me.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 186 bytes
Desc: not available
More information about the ARIN-PPML