{"title":"保护Teredo客户端免受Nat漏洞攻击","authors":"S. Slehat, Z. Chaczko, Anup Kale","doi":"10.1109/APCASE.2015.71","DOIUrl":null,"url":null,"abstract":"The aim of paper to presents the contain problem in automatic tunneling. Automatic tunneling has three main components to encapsulate IPv6 packets into IPv4 packets. The components called Teredo, ISATAP, and 6to4. In some cases, these components related problems such as source routing, neighbor discovery and NAT holes. This paper present key issues related to the Teredo tunneling called \"Teredo NAT Holes\" that increases the attack surface. And thus causes the NAT service to become more vulnerable.","PeriodicalId":235698,"journal":{"name":"2015 Asia-Pacific Conference on Computer Aided System Engineering","volume":"124 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Securing Teredo Client from Nat Holes Vulnerability\",\"authors\":\"S. Slehat, Z. Chaczko, Anup Kale\",\"doi\":\"10.1109/APCASE.2015.71\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The aim of paper to presents the contain problem in automatic tunneling. Automatic tunneling has three main components to encapsulate IPv6 packets into IPv4 packets. The components called Teredo, ISATAP, and 6to4. In some cases, these components related problems such as source routing, neighbor discovery and NAT holes. This paper present key issues related to the Teredo tunneling called \\\"Teredo NAT Holes\\\" that increases the attack surface. And thus causes the NAT service to become more vulnerable.\",\"PeriodicalId\":235698,\"journal\":{\"name\":\"2015 Asia-Pacific Conference on Computer Aided System Engineering\",\"volume\":\"124 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-07-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Asia-Pacific Conference on Computer Aided System Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/APCASE.2015.71\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Asia-Pacific Conference on Computer Aided System Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APCASE.2015.71","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Securing Teredo Client from Nat Holes Vulnerability
The aim of paper to presents the contain problem in automatic tunneling. Automatic tunneling has three main components to encapsulate IPv6 packets into IPv4 packets. The components called Teredo, ISATAP, and 6to4. In some cases, these components related problems such as source routing, neighbor discovery and NAT holes. This paper present key issues related to the Teredo tunneling called "Teredo NAT Holes" that increases the attack surface. And thus causes the NAT service to become more vulnerable.