Introducing IPv6 vulnerability test program in Japan
draft-jpcert-ipv6vullnerability-check-02
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Shikano Keisuke , Yoshiaki Kitaguchi , Kenichi Nagami , Masataka Kosugi , Ruri Hiromi | ||
Last updated | 2015-06-04 (Latest revision 2014-12-01) | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
Japan Computer Emergency Response Team Coordination Center, known as JPCERT/CC have been researching about vulnerability in use of IPv6. JPCERT/CC provided the information toward vendors in Japan. They also verified the occurring those security incidents with several products. In 2013, JPCERT/CC called for vendors to participate their IPv6 security program. JPCERT/CC collects the results of equipments and open to the public for an user reference of procurement. In this document we describe about the program to share the experiment of activity.
Authors
Shikano Keisuke
Yoshiaki Kitaguchi
Kenichi Nagami
Masataka Kosugi
Ruri Hiromi
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)