好的,坏的,IPv6

M. Dunlop, S. Groat, R. Marchany, J. Tront
{"title":"好的,坏的,IPv6","authors":"M. Dunlop, S. Groat, R. Marchany, J. Tront","doi":"10.1109/CNSR.2011.20","DOIUrl":null,"url":null,"abstract":"As more network-capable devices are developed, it becomes easier for us to remain connected to our friends, colleagues, and even our homes. Unfortunately, it becomes easier for unintended third parties to remain connected to us as well. The impact of this has been limited by our proximity to the third party (i.e. the same local area network) -- until now. The Internet Protocol version 6 (IPv6) includes a method for devices to automatically configure their own addresses. This technique relieves some administrative burden, but provides an opportunity to monitor users from anywhere in the world. We explain why this problem exists. We also provide proof of host tracking and monitoring. We then illustrate examples of how both well-intended and malicious parties can exploit auto configured addresses. We submit that the benefits of using auto configured addresses do not outweigh the privacy implications. Finally, we present some alternatives to resolve this issue before IPv6 is deployed globally.","PeriodicalId":272359,"journal":{"name":"2011 Ninth Annual Communication Networks and Services Research Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"The Good, the Bad, the IPv6\",\"authors\":\"M. Dunlop, S. Groat, R. Marchany, J. Tront\",\"doi\":\"10.1109/CNSR.2011.20\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As more network-capable devices are developed, it becomes easier for us to remain connected to our friends, colleagues, and even our homes. Unfortunately, it becomes easier for unintended third parties to remain connected to us as well. The impact of this has been limited by our proximity to the third party (i.e. the same local area network) -- until now. The Internet Protocol version 6 (IPv6) includes a method for devices to automatically configure their own addresses. This technique relieves some administrative burden, but provides an opportunity to monitor users from anywhere in the world. We explain why this problem exists. We also provide proof of host tracking and monitoring. We then illustrate examples of how both well-intended and malicious parties can exploit auto configured addresses. We submit that the benefits of using auto configured addresses do not outweigh the privacy implications. Finally, we present some alternatives to resolve this issue before IPv6 is deployed globally.\",\"PeriodicalId\":272359,\"journal\":{\"name\":\"2011 Ninth Annual Communication Networks and Services Research Conference\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-05-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 Ninth Annual Communication Networks and Services Research Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CNSR.2011.20\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 Ninth Annual Communication Networks and Services Research Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CNSR.2011.20","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

摘要

随着越来越多具有网络功能的设备被开发出来,我们与朋友、同事甚至我们的家保持联系变得越来越容易。不幸的是,无意的第三方也更容易与我们保持联系。到目前为止,这种影响一直受到我们与第三方(即同一局域网)的接近程度的限制。IPv6 (Internet Protocol version 6)提供了一种设备自动配置自己地址的方法。这种技术减轻了一些管理负担,但提供了从世界任何地方监视用户的机会。我们解释了这个问题存在的原因。我们还提供了主机跟踪和监控的证明。然后,我们举例说明善意和恶意的各方如何利用自动配置的地址。我们认为,使用自动配置地址的好处不会超过隐私影响。最后,我们提出了在全球部署IPv6之前解决这个问题的一些替代方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
The Good, the Bad, the IPv6
As more network-capable devices are developed, it becomes easier for us to remain connected to our friends, colleagues, and even our homes. Unfortunately, it becomes easier for unintended third parties to remain connected to us as well. The impact of this has been limited by our proximity to the third party (i.e. the same local area network) -- until now. The Internet Protocol version 6 (IPv6) includes a method for devices to automatically configure their own addresses. This technique relieves some administrative burden, but provides an opportunity to monitor users from anywhere in the world. We explain why this problem exists. We also provide proof of host tracking and monitoring. We then illustrate examples of how both well-intended and malicious parties can exploit auto configured addresses. We submit that the benefits of using auto configured addresses do not outweigh the privacy implications. Finally, we present some alternatives to resolve this issue before IPv6 is deployed globally.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信