All Windows users should immediately update their computers. An exploit rated 9.8/10 (CVE-2024-38063) compromises all devices running Windows with an IPv6 address. - eviltoast
  • 2xsaiko@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    4
    ·
    3 months ago

    ipv6 in home lans is likely to be unsafe due to the defaults in some/many/most routers?

    no

    and those ipv6 devices can in these szenarios escalate their permissions be spawning new ip adresses

    yes and this is not “escalating their permissions”, it is in fact the expected behavior with Privacy Extensions (RFC 4941) where devices will probably have multiple addresses at the same time that are used for outgoing connections

    that would overcome lazy output fw rules?

    any router that doesn’t have deny as the default rule for WAN->LAN traffic (probably not many) is trash, and if you’re filtering LAN->WAN traffic (not really usual for a home network) then you want default deny there too, but at that point that is not an ipv6 problem

    or if i upload a malicious apk to some smartTV and have a it spawn a dhvpv6 server and then spawn a new virtual device that would be given an IP by my fake dhcpv6 to bypass. and we all can use macaddresschanger.

    rogue dhcp is not an ipv6 exclusive problem

    so you say with macfiltering the router would still prevent unwanted direct connections between my c&c server and some malicious virtual device? that’d be cool, but i dont understand how.

    yes, firewall rules can work based on mac addresses, not sure exactly what you mean