FINDING · DEFENSE

IPv6 phantom addresses drawn from an ISP's /32 prefix provide 2^96 potential addresses, making exhaustive enumeration and pre-image attacks computationally infeasible. Analysis of 4013 observed IPv6 addresses in a deployed /32 found approximately 75 bits of entropy (out of a maximum 96), with enough overlap with legitimate address distributions that blocking high-entropy addresses would produce significant collateral damage to real IPv6 services.

From 2019-frolov-conjureConjure: Summoning Proxies from Unused Address Space · §6.2.2 · 2019 · Computer and Communications Security

Implications

Tags

censors
generic
techniques
ip-blocking
defenses
conjuredecoy-routing

Extracted by claude-sonnet-4-6 — review before relying.