[v6ops] Reminder: OPSEC IPv6 Slots

"Gunter Van de Velde (gvandeve)" <gvandeve@cisco.com> Wed, 01 August 2012 00:45 UTC

Return-Path: <gvandeve@cisco.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2376C11E8072 for <v6ops@ietfa.amsl.com>; Tue, 31 Jul 2012 17:45:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.548
X-Spam-Level:
X-Spam-Status: No, score=-10.548 tagged_above=-999 required=5 tests=[AWL=0.050, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rudA0mJeLZOZ for <v6ops@ietfa.amsl.com>; Tue, 31 Jul 2012 17:45:28 -0700 (PDT)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) by ietfa.amsl.com (Postfix) with ESMTP id 646BB21F8806 for <v6ops@ietf.org>; Tue, 31 Jul 2012 17:45:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=gvandeve@cisco.com; l=5499; q=dns/txt; s=iport; t=1343781928; x=1344991528; h=from:to:subject:date:message-id:mime-version; bh=hLL0+Ik22H8FwX71s5agROJakmQ7vc2HFyqDVKPQ1cg=; b=SyDzY1IOiJNEt6CE94g0xfX0s8YvuB4iP6rtDSoeHL6KzTJ+h0CtY0tm PLx3NsTWel0Jab/hHokoCRd7tfn4c6YEo4ESafByyEAGgkQkYK6RaaV7y xaFgFsp8b8nOdHdODllUioQk4oCCRqnMao36Dh7VROisKtnWx1ry+cVLF 4=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: Av4EAMV7GFCtJXG//2dsb2JhbABFgkq3MYEHgiIBBBIBGj4gASpWJgEEGxqHa5pEgSigW5FyYAOjboFmgl8
X-IronPort-AV: E=Sophos; i="4.77,690,1336348800"; d="scan'208,217"; a="107247208"
Received: from rcdn-core2-4.cisco.com ([173.37.113.191]) by rcdn-iport-3.cisco.com with ESMTP; 01 Aug 2012 00:45:28 +0000
Received: from xhc-aln-x15.cisco.com (xhc-aln-x15.cisco.com [173.36.12.89]) by rcdn-core2-4.cisco.com (8.14.5/8.14.5) with ESMTP id q710jR9I013002 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL) for <v6ops@ietf.org>; Wed, 1 Aug 2012 00:45:27 GMT
Received: from xmb-aln-x12.cisco.com ([169.254.7.132]) by xhc-aln-x15.cisco.com ([173.36.12.89]) with mapi id 14.02.0298.004; Tue, 31 Jul 2012 19:45:27 -0500
From: "Gunter Van de Velde (gvandeve)" <gvandeve@cisco.com>
To: "v6ops v6ops WG (v6ops@ietf.org)" <v6ops@ietf.org>
Thread-Topic: Reminder: OPSEC IPv6 Slots
Thread-Index: Ac1vffdCgM6s3G7kRnyfe+oX0RCR7g==
Date: Wed, 01 Aug 2012 00:45:27 +0000
Message-ID: <67832B1175062E48926BF3CB27C49B24047A85@xmb-aln-x12.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.21.72.181]
x-tm-as-product-ver: SMEX-10.2.0.1135-7.000.1014-19074.004
x-tm-as-result: No--33.175200-8.000000-31
x-tm-as-user-approved-sender: No
x-tm-as-user-blocked-sender: No
Content-Type: multipart/alternative; boundary="_000_67832B1175062E48926BF3CB27C49B24047A85xmbalnx12ciscocom_"
MIME-Version: 1.0
Subject: [v6ops] Reminder: OPSEC IPv6 Slots
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Aug 2012 00:45:29 -0000

Hi All,

Please kindly find this reminder.

At OPSEC tomorrow there will be 7 IPv6 drafts discussed about.
(all drafts are actually IPv6 only or are dual-stack oriented)

Feel free to attend the OPSEC meeting to share your expertise in this area, because
your quality feedback is desired.

Drafts:

Host Scanning in IPv6 Networks
draft-gont-opsec-ipv6-host-scanning-01

Security Implications of IPv6 on IPv4 Networks
draft-gont-opsec-ipv6-implications-on-ipv4-nets-01

DHCPv6-Shield: Protecting Against Rogue DHCPv6 Servers
draft-gont-opsec-dhcpv6-shield-00

Neighbor Discovery Shield (ND-Shield): Protecting against Neighbor Discovery Attacks
draft-gont-opsec-ipv6-nd-shield-00

Operational Security Considerations for IPv6 Networks
draft-vyncke-opsec-v6-01

Using Only Link-Local Addressing Inside an IPv6 Network
draft-behringer-lla-only-01

BGP Operations and Security
draft-jdurand-bgp-security-01

G/
KK,
Warren

OPSEC Chairs