On 09/10/2016 09:44 PM, James Knott wrote:
On 09/10/2016 01:42 PM, Carlos E. R. wrote:
Configure gai.conf to prefer IPv4 connections :-?
Perhaps you should be advising people to find and correct the problem, instead of preferring IPv4.
The point I was trying to make is that IPv6 seems so flawed by design that there's an RFC on the topic. Windows users can generate a Denial of Service on a subnet just by turning on ICS. If DOS and MITM can be done accidentally by regular users, think of the fun a dedicated intruder could have. Sure, v4 is susceptible to rogue DHCP servers and ARP poisoning, but I've been using it since 1986 and I never had a rogue router DOS problem. It takes a dedicated actor to DOS a v4 subnet, while v6 requires only a clueless Windows user. To rephrase my original question: has SUSE done anything to mitigate the rogue RA threat? Is it even possible to mitigate without causing collateral damage? I'm certainly not an expert here... Regards, Lew -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org