the original cloud security
Showing 51 - 72 of 72 RSS Feed

Files from Fernando Gont

Email addressfernando at gont.com.ar
First Active2005-07-23
Last Active2015-04-06
Hack.lu 2011 IPv6 Security Presentation
Posted Sep 21, 2011
Authored by Fernando Gont

These are the slides for the IPv6 security talk given at Hack.lu 2011.

tags | paper
MD5 | 7ef53f72a2b8d5ecd427cde5cc10ef84
Hacking IPv6 Networks
Posted Jul 26, 2011
Authored by Fernando Gont

This file contains slides for the "Hacking IPv6 Networks" training provided at Hack in Paris 2011. They contain quite a few insights about IPv6 security, along with a number of practical examples.

tags | paper
MD5 | af9084e0f7f6d96d006da7ee6e4665e1
RFC 6274 - Security Assessment Of The Internet Protocol Version 4
Posted Jul 6, 2011
Authored by Fernando Gont | Site ietf.org

The IETF has just published RFC 6274, entitled "Security Assessment of the Internet Protocol Version 4". It contains a large amount of information on how to improve the security of IPv4 implementations and IPv4 deployments.

tags | paper, protocol
MD5 | 6919485928a0a8157f6b4318bc5ed031
Security Implications Of IPv6 Extensions Headers With Neighbor Discovery
Posted Jun 1, 2011
Authored by Fernando Gont | Site ietf.org

IPv6 Extension Headers with Neighbor Discovery messages can be leveraged to circumvent simple local network protections, such as "Router Advertisement Guard". Since there is no legitimate use for IPv6 Extension Headers in Neighbor Discovery messages, and such use greatly complicates network monitoring and simple security mitigations such as RA-Guard, this document proposes that hosts silently ignore Neighbor Discovery messages that use IPv6 Extension Headers.

tags | paper, local
MD5 | 16e3a34f0a9b3f9c61710e77b9451f98
IPv6 Router Advertisement Guard (RA-Guard) Evasion
Posted Jun 1, 2011
Authored by Fernando Gont | Site ietf.org

The IPv6 Router Advertisement Guard (RA-Guard) mechanism is commonly employed to mitigate attack vectors based on forged ICMPv6 Router Advertisement messages. Many existing IPv6 deployments rely on RA-Guard as the first line of defense against the aforementioned attack vectors. This document describes possible ways in which current RA- Guard implementations can be circumvented, and discusses possible mitigations.

tags | paper
MD5 | 602ca7cc5722e71a11eda3feba98831f
Security Implications Of IPv6
Posted May 27, 2011
Authored by Fernando Gont

This paper, called Security Implications of IPv6, was published by CPNI and is a collection of security implications to think about while transitioning to IPv6.

tags | paper
MD5 | 6dcdf237ac03cf32360097348699cfd8
RFC6093 - On The Implementation Of The TCP Urgent Mechanism
Posted Jan 25, 2011
Authored by Fernando Gont, A. Yourtchenko

This document analyzes how current TCP implementations process TCP urgent indications and how the behavior of some widely deployed middleboxes affects how end systems process urgent indications. This document updates the relevant specifications such that they accommodate current practice in processing TCP urgent indications, raises awareness about the reliability of TCP urgent indications in the Internet, and recommends against the use of urgent indications (but provides advice to applications that do).

tags | paper, tcp
MD5 | a31cbbe01271e9163088809ee810adac
RFC6056 - Recommendations For Transport-Protocol Port Randomization
Posted Jan 21, 2011
Authored by Fernando Gont, Michael Vittrup Larsen

RFC6056 has been released and is titled Recommendations for Transport-Protocol Port Randomization.

tags | paper, protocol
MD5 | abc44d0bfb92bd17e3ca816dd1e1a6c7
IPv6 Security Assessment Paper
Posted Oct 25, 2010
Authored by Fernando Gont

Results of a Security Assessment of the Internet Protocol version 6 (IPv6). These are the presentation slides that were used at LACNOG.

tags | paper, protocol
MD5 | 344a035e26a8e9cf28f5f2bbf65bad11
IETF Internet-Draft On TCP Timestamps
Posted Jun 29, 2010
Authored by Fernando Gont | Site ietf.org

This is a new IETF Internet-Draft about TCP timestamps generation, entitled "On the generation of TCP timestamps".

tags | paper, tcp
MD5 | 2aff9286527aa01221cec58afd3c92da
IETF TCP Urgent Data Draft
Posted Feb 27, 2009
Authored by Fernando Gont | Site ietf.org

This is the IETF Internet-Draft entitled "On the implementation of TCP urgent data". This document describes current issues relevant to the implementation and use of TCP urgent data, aims to change the IETF specifications so that they accommodate what virtually all implementations have been doing with urgent data.

tags | paper, tcp
MD5 | 159a184cd58a0d138051732e2abf043f
Security Assessment Of The Transmission Control Protocol
Posted Feb 12, 2009
Authored by Fernando Gont | Site ietf.org

The United Kingdom's Centre for the Protection of National Infrastructure document entitled "Security Assessment of the Transmission Control Protocol (TCP)".

tags | paper, tcp, protocol
MD5 | f0572eaca80d820910542f2a381d4b7b
draft-gont-opsec-ip-security-01.txt
Posted Sep 3, 2008
Authored by Fernando Gont | Site ietf.org

This is the IETF Internet-Draft entitled "Security Assessment of the Internet Protocol version 4", which is heavily based on the "Security Assessment of the Internet Protocol".

tags | paper, protocol
MD5 | 8df28368bfb0390ab4b35fd2f97b23a2
draft-ietf-tsvwg-port-randomization-02.txt
Posted Sep 3, 2008
Authored by Fernando Gont, Michael Vittrup Larsen | Site ietf.org

This document describes a simple and efficient method for random selection of a client port number, such that the possibility of an attacker guessing the exact value is reduced. While this is not a replacement for cryptographic methods, the described port number randomization algorithms provide improved security/obfuscation with very little effort and without any key management overhead. The mechanisms described in this document are a local modification that may be incrementally deployed, and that does not violate the specifications of any of the transport protocols that may benefit from it, such as TCP, UDP, SCTP, DCCP, and RTP.

Changes: This new revision of the document addresses the feedback we got from Amit Klein, Matthias Bethke, and Alfred Hoenes.
tags | paper, local, udp, tcp, protocol
MD5 | 7148e6b60b79983dd6d3afc806fb28d5
InternetProtocol.pdf
Posted Aug 15, 2008
Authored by Fernando Gont | Site cpni.gov.uk

This document aims to raise awareness about the many security threats based on the IP protocol, those that we are currently facing, and those we may still have to deal with in the future. It provides advice for the secure implementation of the IP, and also insights about the security aspects of the IP that may be of help to the Internet operations community.

tags | paper, protocol
MD5 | 8621c729eab84344f70a70121b88b710
draft-ietf-tsvwg-port-randomization-01.txt
Posted Jul 17, 2008
Authored by Fernando Gont, Michael Vittrup Larsen | Site ietf.org

This document describes a simple and efficient method for random selection of a client port number, such that the possibility of an attacker guessing the exact value is reduced. While this is not a replacement for cryptographic methods, the described port number randomization algorithms provide improved security/obfuscation with very little effort and without any key management overhead. The mechanisms described in this document are a local modification that may be incrementally deployed, and that does not violate the specifications of any of the transport protocols that may benefit from it, such as TCP, UDP, SCTP, DCCP, and RTP.

tags | paper, local, udp, tcp, protocol
MD5 | 3169ae2876e24bcbe919b97c4fecdeb4
draft-ietf-tsvwg-port-randomization-00.txt
Posted Dec 8, 2007
Authored by Fernando Gont, Michael Vittrup Larsen | Site ietf.org

This document describes a simple and efficient method for random selection of a client port number, such that the possibility of an attacker guessing the exact value is reduced. While this is not a replacement for cryptographic methods, the described port number randomization algorithms provide improved security/obfuscation with very little effort and without any key management overhead. The mechanisms described in this document are a local modification that may be incrementally deployed, and that does not violate the specifications of any of the transport protocols that may benefit from it, such as TCP, UDP, SCTP, DCCP, and RTP.

tags | paper, local, udp, tcp, protocol
MD5 | a6d891234260fe58cfc46cda8aea2f7c
draft-larsen.tgz
Posted Feb 13, 2007
Authored by Fernando Gont, M. Larsen

Recently, awareness has been raised about a number of "blind" attacks that can be performed against the Transmission Control Protocol (TCP) and similar protocols. The consequences of these attacks range from throughput-reduction to broken connections or data corruption. These attacks rely on the attacker's ability to guess or know the four- tuple (Source Address, Destination Address, Source port, Destination Port) that identifies the transport protocol instance to be attacked. This document describes a simple and efficient method for random selection of the client port number, such that the possibility of an attacker guessing the exact value is reduced. While this is not a replacement for cryptographic methods, the described port number randomization algorithms provide improved security/obfuscation with very little effort and without any key management overhead. Both text and pdf formats of this paper are included.

tags | paper, tcp, protocol
MD5 | ea07aacce03e720b7693eb3d90822d48
filtering-of-icmp-error-messages.pdf
Posted Aug 17, 2006
Authored by Fernando Gont | Site gont.com.ar

Whitepaper titled Filtering Of ICMP Error Messages.

tags | paper
MD5 | d0a9291555fea0ba236126a45e33f2c9
draft-gont-tcpm-icmp-attacks-04.txt
Posted Sep 7, 2005
Authored by Fernando Gont | Site gont.com.ar

This document discusses the use of the Internet Control Message Protocol (ICMP) to perform a variety of attacks against the Transmission Control Protocol (TCP) and other similar protocols. It proposes several counter-measures to eliminate or minimize the impact of these attacks.

Changes: Version submitted to the IETF. Includes feedback received during the research period.
tags | paper, tcp, protocol
MD5 | 93c4879fab0bb3cd8449b2b2f0e31997
icmp-tools.tgz
Posted Jul 23, 2005
Authored by Fernando Gont | Site gont.com.ar

Various tools that demonstrate the use of the Internet Control Message Protocol (ICMP) to perform a variety of attacks against the Transmission Control Protocol (TCP). Inside this tarball lives icmp-mtu.tar.gz, icmp-quench.tar.gz, and icmp-reset.tar.gz.

tags | exploit, tcp, protocol
MD5 | 846c8bf7a9f947d3c0f2a46cc3be23d6
draft-gont-tcpm-icmp-attacks-03.txt
Posted Jul 23, 2005
Authored by Fernando Gont | Site gont.com.ar

This document discusses the use of the Internet Control Message Protocol (ICMP) to perform a variety of attacks against the Transmission Control Protocol (TCP) and other similar protocols. It proposes several counter-measures to eliminate or minimize the impact of these attacks.

tags | paper, tcp, protocol
MD5 | 5dfb66dce087bc5eed2842dd276ddc51
Page 3 of 3
Back123Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    2 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close