%% You should probably cite rfc5157 instead of this I-D. @techreport{ietf-v6ops-scanning-implications-04, number = {draft-ietf-v6ops-scanning-implications-04}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-ietf-v6ops-scanning-implications/04/}, author = {Tim Chown}, title = {{IPv6 Implications for Network Scanning}}, pagetotal = 13, year = 2007, month = nov, day = 19, abstract = {The much larger default 64-bit subnet address space of IPv6 should in principle make traditional network (port) scanning techniques used by certain network worms or scanning tools less effective. While traditional network scanning probes (whether by individuals or automated via network worms) may become less common, administrators should be aware that attackers may use other techniques to discover IPv6 addresses on a target network, and thus they should also be aware of measures that are available to mitigate them. This informational document discusses approaches that administrators could take when planning their site address allocation and management strategies as part of a defence-in-depth approach to network security. This memo provides information for the Internet community.}, }