[フレーム] Skip to main content
Javascript disabled? Like other modern websites, the IETF Datatracker relies on Javascript. Please enable Javascript for full functionality.

Introducing IPv6 vulnerability test program in Japan
draft-jpcert-ipv6vullnerability-check-02

This document is an Internet-Draft (I-D). Anyone may submit an I-D to the IETF. This I-D is not endorsed by the IETF and has no formal standing in the IETF standards process.
Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Shikano Keisuke , Yoshiaki Kitaguchi , Kenichi Nagami , Masataka Kosugi , Ruri Hiromi
Last updated 2015年06月04日 (Latest revision 2014年12月01日)
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)
Email authors IPR References Referenced by Nits Search email archive

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

Japan Computer Emergency Response Team Coordination Center, known as JPCERT/CC have been researching about vulnerability in use of IPv6. JPCERT/CC provided the information toward vendors in Japan. They also verified the occurring those security incidents with several products. In 2013, JPCERT/CC called for vendors to participate their IPv6 security program. JPCERT/CC collects the results of equipments and open to the public for an user reference of procurement. In this document we describe about the program to share the experiment of activity.

Authors

Shikano Keisuke
Yoshiaki Kitaguchi
Kenichi Nagami
Masataka Kosugi
Ruri Hiromi

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)

AltStyle によって変換されたページ (->オリジナル) /