Skip to main content

Introducing IPv6 vulnerability test program in Japan
draft-jpcert-ipv6vullnerability-check-02

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Shikano Keisuke , Yoshiaki Kitaguchi , Kenichi Nagami , Masataka Kosugi , Ruri Hiromi
Last updated 2015-06-04 (Latest revision 2014-12-01)
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

Japan Computer Emergency Response Team Coordination Center, known as JPCERT/CC have been researching about vulnerability in use of IPv6. JPCERT/CC provided the information toward vendors in Japan. They also verified the occurring those security incidents with several products. In 2013, JPCERT/CC called for vendors to participate their IPv6 security program. JPCERT/CC collects the results of equipments and open to the public for an user reference of procurement. In this document we describe about the program to share the experiment of activity.

Authors

Shikano Keisuke
Yoshiaki Kitaguchi
Kenichi Nagami
Masataka Kosugi
Ruri Hiromi

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)