IPv6 stateless address autoconfiguration considered harmful

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations


IPv6 Stateless Address Autoconfiguration is used for autoconfiguring addresses without a server in IPv6 networks. The autoconfiguration mechanism consists of choosing an address candidate and verifying its uniqueness with Duplicate Address Detection. The autoconfiguration mechanism has privacy issues which have been identified before. However, we show that the autoconfiguration mechanisms can be used as a covert channel. The covert channel is a serious threat for communication security and privacy if used by malicious third party IPv6 vendors or malware implementors. We present practical attacks for divulging sensitive information such as secret keys of encryption protocols using the covert channel and lower layer information. The scheme can also be used for very effective Big Brother type surveillance.

Original languageEnglish (US)
Title of host publicationMilitary Communications Conference 2006, MILCOM 2006
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Print)1424406188, 9781424406180
StatePublished - Jan 1 2006
EventMilitary Communications Conference 2006, MILCOM 2006 - Washington, D.C., United States
Duration: Oct 23 2006Oct 25 2006

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM


OtherMilitary Communications Conference 2006, MILCOM 2006
CountryUnited States
CityWashington, D.C.

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'IPv6 stateless address autoconfiguration considered harmful'. Together they form a unique fingerprint.

Cite this