Security UPDATE--Look Before You Leap into IPv6 with Teredo--December 6, 2006


LinkScanner Pro - Stop zero-day Internet attacks

Free Whitepaper Kit: Top 10 Patch Management Tips

Clean Up Your Company's Email Act: Using Filters to Block Threats



IN FOCUS: Look Before You Leap into IPv6 with Teredo


- Loosened Copyright Restrictions Aid Security Researchers

- Exploit Prevention Labs LinkScanner Takes Aim at McAfee SiteAdvisor

- The Paros Proxy Server

- Recent Security Vulnerabilities


- Know Your IT Security Contest--Last Week to Enter

- Security Matters Blog: EU Wants a Crackdown on Spam

- FAQ: Security Assessment Tool

- From the Forum: Forgotten Password on HP Laptop

- Microsoft Learning Paths for Security: A More Secure Platform Through Identity and Access Management


- Speedy Antispyware Scanning in Vista

- Wanted: Your Reviews of Products




=== SPONSOR: ByteCrusher


LinkScanner Pro - Stop zero-day Internet attacks

LinkScanner Pro complements existing security products like a firewall or anti-virus by providing effective zero-day protection against web threats. Firewalls don't see these new threats because they use trusted browser connections. Anti-virus and anti-spyware programs only detect them after the damage has been done to the computer. LinkScanner provides real-time analysis of network traffic, web site content and behavior to protect users from a wide-range of online threats including malicious content, phishing, social engineering and targeted software exploits. Unlike products that use out-dated databases and questionable user feedback, LinkScanner's protection and site ratings are based on a current inspection of the web site and the data stream entering your computer. With LinkScanner, web surfing just became a whole lot safer.

=== IN FOCUS: Look Before You Leap into IPv6 with Teredo

by Mark Joseph Edwards, News Editor, mark at ntsecurity / net

We're told that the future of the Internet revolves around the IPv6 protocol. Meanwhile, the majority of computers on the Internet still use IPv4. The two protocols are different enough that key software packages that are designed for IPv4 are unable to properly handle IPv6 traffic. This is of course one of the major hurdles for IPv6 adoption.

To help with this problem, Microsoft developed the open Teredo protocol, which tunnels IPv6 traffic over IPv4 networks when IPv6 clients are behind some sort of Network Address Translation (NAT) device that doesn't understand IPv6. If you're interested in the technical specifications for Teredo, you can read RFC 4380, "Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs)," at the URL below.

Because Teredo is an open specification, Teredo software packages are available for a variety of platforms, including Mac OS X, Linux, BSD, and Sun Microsystems Solaris. One such package is Miredo, at the URL below.

For Windows, Teredo first appeared in service packs for Windows XP and Windows Server 2003. It's also a standard part of Windows Vista and will be a standard part of Longhorn when it's released. Teredo is a decent idea, however you should understand some security implications before you jump into using the technology.

Last week, Symantec published a white paper titled "The Teredo Protocol: Tunneling Past Network Security and Other Security Implications," written by Dr. James Hoagland, principal security researcher with Symantec Advanced Threat Research. The white paper presents an examination of real and potential security problems. For example, Hoagland explains how worms that use network layer 3 or 4 could use Teredo to escape a contained IPv6 network and reach remote IPv6 networks. You recall that the Slammer worm was able to propagate itself by using only one UDP packet.

Hoagland also writes that security devices such as intrusion detection and prevention systems (IDSs/IPSs) that are designed for IPv4 don't understand IPv6 traffic. Thus, the IPv4 devices can't enforce adequate security controls on IPv6 traffic encapsulated in IPv4 packets.

Another problem is that Teredo might allow unwanted traffic into the IPv6 or IPv4 network. Other potential security problems relate to the possibilities of creating a Denial of Service (DoS) condition in both Teredo clients and servers and the ability for remote systems to traverse the NAT in ways that are probably undesirable.

If you're interested in using Teredo, by all means download a copy of Symantec's white paper (at the URL below) and read it over carefully. It might save you many headaches and answer a lot of questions before they even arise as a result of oddities in your network.

Keep in mind that the white paper discusses Teredo in general and is based on the associated RFC. Hoagland said that Symantec intends to look specifically at Teredo in Windows Vista sometime in the future. So keep an eye out for that white paper to become available.


You still have one week (through December 13) to send us your security tips or stories and win a Zune media player. Email your contributions to [email protected] To find out more about the Know Your IT Security contest, go to

SPONSOR: PatchLink


Free Whitepaper Kit: Top 10 Patch Management Tips

Stop the endless streams of security patches. Accurately "assess, deploy and track" software patches across Multiple OSs. FREE Whitepaper distills the top 10 requirements for selecting an effective patch management solution. Plus test drive the #1 Patch Management Solution. FREE 30-Day Trial.



Loosened Copyright Restrictions Aid Security Researchers

A new exemption to the Digital Millennium Copyright Act (DMCA) lets researchers circumvent copyright protection systems on digital media, such as CD-ROMs, to test the security of those protection systems.

Exploit Prevention Labs LinkScanner Takes Aim at McAfee SiteAdvisor

Both companies now have free and paid products that are designed to protect users from malicious content.

The Paros Proxy Server

Proxy server Paros, a freeware Java application, helps you find your Web site's vulnerabilities and improve its security.

Recent Security Vulnerabilities

If you subscribe to this newsletter, you also receive Security Alerts, which inform you about recently discovered security vulnerabilities. You can also find information about these discoveries at

=== SPONSOR: St. Bernard Software


Clean Up Your Company's Email Act: Using Filters to Block Threats

Do you want to block unwanted or undesirable email? Download this free whitepaper to learn how to manage the content of information crossing your network.




Share your security-related tips, comments, or solutions in 1000 words or less, and you could be one of 13 lucky winners of a Zune media player. Tell us how you do patch management, share a security script, or write about a security article you've read or a Webcast you've viewed. Submit your entry between now and December 13. We'll select the 13 best entries, and the winners will receive a Zune media player. Email your contributions to [email protected]

Prizes are courtesy of Microsoft Learning Paths for Security:

SECURITY MATTERS BLOG: EU Wants a Crackdown on Spam

by Mark Joseph Edwards,

Spam is on the rise in Europe, and a crackdown is bound to ensue directly. The European Commission (EC) said that as much as 80 percent of all email in Europe is unsolicited. Read more about this issue and learn how one country has significantly reduced its spam problem.

FAQ: Security Assessment Tool

by John Savill,

Q: How can I perform a high-level security assessment of my company's computing environment?

Find the answer at

FROM THE FORUM: Forgotten Password on HP Laptop

A forum participant writes that a user set a power-on password on an HP NX6110 notebook computer and can't remember the password, so the computer can't be booted. Does anyone knows of a way to reset the password without sending the computer back to HP?

MICROSOFT LEARNING PATHS FOR SECURITY: Deploying Microsoft Identity and Access Management Technologies

Effective identity and access management is critical to information security and is one of the key components of the Core Infrastructure Optimization (IO). Use these resources at the Microsoft Learning Paths for Security Web site to learn more about the interdependent technologies and processes of deploying identity and access management solutions, including directory services, identity life-cycle management, access management, and more.



by Renee Munshi, [email protected]

Speedy Antispyware Scanning in Vista

Max Secure Software announced Max Spyware Detector 2.0 for Windows Vista and described it as "the world's fastest antispyware software." Max Spyware Detector incorporates Max Secure Software's SmartScan technology, which uses a proprietary scanning algorithm that reduces scan time by up to 20 minutes on repetitive spyware scans. Max Spyware Detector will be free until March 2007. After that, Max Spyware Detector 2.0 will cost $29.95 for a one-year subscription. For more information, go to

WANTED: your reviews of products you've tested and used in production. Send your experiences and ratings of products to [email protected] and get a Best Buy gift certificate.



For more security-related resources, visit

Your business, like most today, relies upon its computing systems to store financial information, house proprietary data, and maintain communications channels. This increasing reliance also increases the dangers to your systems from security breaches, including viruses, spyware, spam, and hackers. Visit the Windows Protection Site at for the latest tips on safeguarding your system.

If you're not prepared for the next time spyware attacks your network, your business's financial health and reputation could be on the line. You can't afford to lose proprietary customer information--or your own trade secrets. Register today for this free Web seminar, and learn about emerging threats in the spyware landscape, including a discussion of rootkits, keyloggers, and other forms of malware.

Are you an Oracle professional who has cross-platform responsibilities, or do you need to transfer your skill set to SQL Server? If so, register for free to attend the Cross Platform Data online event January 30 and 31 and February 1, 2007. In a seminar featuring SQL Server/Oracle experts Andrew Sisson from Scalability Experts and Douglas McDowell from Solid Quality Learning, you'll learn key concepts about SQL Server 2005, including how to deploy SQL Server's BI capabilities on Oracle, proof points demonstrating that SQL Server is enterprise-ready, and how to successfully deploy Oracle on the Windows platform.

Are you who you say you are? Really? Even on Linux? Really? If you're like most IT professionals, this type of identity crisis is a plague. Virtual TechX World--available December 14--makes your life (and the lives of your users) easier by equipping you with the latest interoperability insights and technology. Slots are filling quickly--register today!

Does your company have US$500,000 to spend on one email discovery request? Join us for this free Web seminar to learn how you can implement an email archiving solution to optimize email management and proactively take control of e-discovery--and save the IT search party for when you really need it! On-Demand Web Seminar



Securing multiple domains or host names? Learn how the Starter PKI program can save time and reduce costs, and provide you with a multiple digital certificate account.

BONUS: Register for any white paper from Windows IT Pro in the month of December, and be entered to win a Wii! Visit for more information and a complete white paper listing.



Uncover Essential Windows Knowledge Through Excavator

Try out the ultimate vertical search tool--Windows Excavator. Windows Excavator gives you fast, thorough third-party information while filtering out unwanted content. Visit today!

Vote for the Next "IT Pro of the Month!"

Your vote counts! Take the time to reward excellence in an IT pro that deserves it. The first 100 readers to cast a vote will receive a one-year subscription to Windows IT Pro, compliments of Microsoft. Voting takes only a few seconds, so don't miss out. Cast your vote now:


Security UDPATE is brought to you by the Windows IT Pro Web site's Security page (first URL below) and the Windows IT Security newsletter (subscribe at the second URL below).

Subscribe to Security UPDATE at

Unsubscribe by clicking

Be sure to add [email protected] to your antispam software's list of allowed senders.

To contact us:

About Security UPDATE content -- [email protected]

About technical questions --

About your product news -- [email protected]

About your subscription -- [email protected]

About sponsoring Security UPDATE -- [email protected]

View the Windows IT Pro privacy policy at

Windows IT Pro, a division of Penton Media, Inc.

221 East 29th Street, Loveland, CO 80538

Attention: Customer Service Department

Copyright 2006, Penton Media, Inc. All rights reserved.

Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.