<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-GB">
	<id>https://wiki.chappell-family.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Wikiadmin</id>
	<title>timswiki - User contributions [en-gb]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.chappell-family.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Wikiadmin"/>
	<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=Special:Contributions/Wikiadmin"/>
	<updated>2026-04-18T22:52:09Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.35.6</generator>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=598</id>
		<title>ScanAutomation</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=598"/>
		<updated>2023-12-20T20:44:24Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==IPscan IPv6 Port Scan Automation==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of automated IPv6 firewall testing (IPv6 TCP and UDP port scans) using wget and IPscan. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Terms of Use===&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Please ensure that you accept the &amp;#039;&amp;#039;[https://wiki.chappell-family.com/wiki/index.php?title=Timswiki:About terms of use]&amp;#039;&amp;#039; and are authorised to perform IPv6 port scans against the machine that you wish to test &amp;#039;&amp;#039;BEFORE&amp;#039;&amp;#039; attempting any of the steps outlined below. Please also ensure that you are not accessing web pages using an HTTP proxy. If in doubt then a web proxy can be disabled by following the command-line examples shown below.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a [[Timswiki:Privacy_policy]]. Continued use of this website implies your consent to the storage of data outlined in the policy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Rules for Forming the URL===&lt;br /&gt;
&lt;br /&gt;
It is possible to request automatic scans using &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;wget&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; but the URLs must be constructed as shown below. In each case you &amp;#039;&amp;#039;&amp;#039;MUST:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* target the IPscan IPv6 host and IPv6 cgi-bin directory (www66.chappell-family.co.uk/cgi-bin6/)&lt;br /&gt;
* use the text-browser compatible cgi target (ipscan-txt.cgi)&lt;br /&gt;
* include an includeexisting query term, setting it to either 1 (include default ports [[IPv6_Ports]]) or -1 (exclude default ports)&lt;br /&gt;
* include all 4 customport terms (numbered 0 to 3), setting them equal to nothing if they are unused&lt;br /&gt;
* include the termsaccepted term, setting it to 1 to indicate your acceptance of the terms and conditions&lt;br /&gt;
* ensure that there are no spaces in the query string, particularly if using cut&amp;#039;n&amp;#039;paste&lt;br /&gt;
* wrap the resulting URL in quotes to ensure that the ampersand characters are not mis-interpreted&lt;br /&gt;
&lt;br /&gt;
Failure to follow all of the above rules will result in a failure to scan your host. I&amp;#039;d also suggest that you specify a desired output document in the wget command-line - otherwise the filename will be based on the called URL and so will be somewhat convoluted!&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you include the default ports (includeexisting=1) then the scan will take up to approximately 15 seconds to complete - please be patient!&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===Windows Users - please READ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re intending to test a windows PC, then you need to be careful which pre-compiled version of wget you have installed. Some of the available versions do not include IPv6 support. The download at the following link is known to work on windows 7:&lt;br /&gt;
&lt;br /&gt;
* [http://gnuwin32.sourceforge.net/packages/wget.htm http://gnuwin32.sourceforge.net/packages/wget.htm]&lt;br /&gt;
&lt;br /&gt;
Another good solution for PC users can be found within the [http://www.cygwin.com/ Cygwin] tool. Wget on Cygwin is built with the following options:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ wget -V&lt;br /&gt;
GNU Wget 1.13.4 built on cygwin.&lt;br /&gt;
&lt;br /&gt;
+digest +https +ipv6 +iri +large-file +nls -ntlm +opie +ssl/gnutls&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Example Scans==&lt;br /&gt;
&lt;br /&gt;
Now for some concrete examples:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing just the UDP and TCP default port list===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www66.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;  &lt;br /&gt;
  --2012-01-28 14:28:03--  https://www66.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&lt;br /&gt;
  Resolving www66.chappell-family.co.uk... 2001:470:971f:99::6&lt;br /&gt;
  Connecting to www66.chappell-family.co.uk|2001:470:971f:99::6|:443... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10147 (9.9K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039; &lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,147      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:28:03 (165 MB/s) - `ipv6.html&amp;#039; saved [10147/10147]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports and a single TCP port, e.g. 8080===&lt;br /&gt;
  &lt;br /&gt;
  &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www66.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:37:21--  https://www66.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&lt;br /&gt;
  Resolving www66.chappell-family.co.uk... 2001:470:971f:99::6&lt;br /&gt;
  Connecting to www66.chappell-family.co.uk|2001:470:971f:99::6|:443... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 7323 (7.2K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 7,323       --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:37:21 (112 MB/s) - `ipv6.html&amp;#039; saved [7323/7323]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports, the default TCP ports list and 3 custom TCP ports===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www66.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:39:53--  https://www66.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&amp;amp;termsaccepted=1&lt;br /&gt;
  Resolving www66.chappell-family.co.uk... 2001:470:971f:99::6&lt;br /&gt;
  Connecting to www66.chappell-family.co.uk|2001:470:971f:99::6|:443... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10263 (10K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,263      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:39:54 (222 MB/s) - `ipv6.html&amp;#039; saved [10263/10263]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Default test using curl===&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;$ curl -sS &amp;quot;https://www66.chappell-family.co.uk/cgi-bin6/ipscanfasttxt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
or&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;$ curl -sS &amp;quot;https://www66.chappell-family.co.uk/cgi-bin6/ipscanfasttxt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot; |awk -F&amp;#039;[&amp;lt;&amp;gt; ]&amp;#039; &amp;#039;BEGIN{printf(&amp;quot;\nPORT\tSTATE\n&amp;quot;)};{for(i=4;i&amp;lt;=NF;i++){if (index($i,&amp;quot;OPEN&amp;quot;)&amp;gt;0 &amp;amp;&amp;amp; $(i-1)==&amp;quot;=&amp;quot; &amp;amp;&amp;amp; $(i-3)==&amp;quot;Port&amp;quot;) {printf(&amp;quot;%s\t%s\n&amp;quot;,$(i-2),$i)}}};&amp;#039; &amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
PORT    STATE&lt;br /&gt;
80      OPEN&lt;br /&gt;
443     OPEN&lt;br /&gt;
1080    OPEN&lt;br /&gt;
3128    OPEN&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Testing on Ubiquity ERlite Routers===&lt;br /&gt;
&lt;br /&gt;
On the router:&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo /usr/bin/curl -G &amp;lt;nowiki&amp;gt;&amp;#039;https://www66.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039;&amp;lt;/nowiki&amp;gt; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/ipv6.html&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo scp /tmp/ipv6.html &amp;lt;user&amp;gt;@&amp;lt;host&amp;gt;:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo rm -f /tmp/ipv6.html&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Exchange &amp;lt;user&amp;gt; and &amp;lt;host&amp;gt; for an applicable account and machine name to transfer the results file to.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;sudo /usr/bin/curl -G &amp;lt;nowiki&amp;gt;&amp;#039;https://www66.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039;&amp;lt;/nowiki&amp;gt; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/ipv6.html&lt;br /&gt;
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current&lt;br /&gt;
                                 Dload  Upload   Total   Spent    Left  Speed&lt;br /&gt;
100  2844  100  2844    0     0     30      0  0:01:34  0:01:33  0:00:01   627&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===HTML Results Scraping===&lt;br /&gt;
&lt;br /&gt;
It is possible to open the resulting ipv6.html file in a local web-browser, however you may prefer to summarise the results for easier checking. Here is a very quick and inelegant example of [[ResultScraping]] the returned html file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=597</id>
		<title>ScanAutomation</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=597"/>
		<updated>2023-10-21T17:07:17Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: /* Testing on Ubiquity ERlite Routers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==IPscan IPv6 Port Scan Automation==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of automated IPv6 firewall testing (IPv6 TCP and UDP port scans) using wget and IPscan. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Terms of Use===&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Please ensure that you accept the &amp;#039;&amp;#039;[https://wiki.chappell-family.com/wiki/index.php?title=Timswiki:About terms of use]&amp;#039;&amp;#039; and are authorised to perform IPv6 port scans against the machine that you wish to test &amp;#039;&amp;#039;BEFORE&amp;#039;&amp;#039; attempting any of the steps outlined below. Please also ensure that you are not accessing web pages using an HTTP proxy. If in doubt then a web proxy can be disabled by following the command-line examples shown below.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a [[Timswiki:Privacy_policy]]. Continued use of this website implies your consent to the storage of data outlined in the policy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Rules for Forming the URL===&lt;br /&gt;
&lt;br /&gt;
It is possible to request automatic scans using &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;wget&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; but the URLs must be constructed as shown below. In each case you &amp;#039;&amp;#039;&amp;#039;MUST:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* target the IPscan IPv6 host and IPv6 cgi-bin directory (www66.chappell-family.co.uk/cgi-bin6/)&lt;br /&gt;
* use the text-browser compatible cgi target (ipscan-txt.cgi)&lt;br /&gt;
* include an includeexisting query term, setting it to either 1 (include default ports [[IPv6_Ports]]) or -1 (exclude default ports)&lt;br /&gt;
* include all 4 customport terms (numbered 0 to 3), setting them equal to nothing if they are unused&lt;br /&gt;
* include the termsaccepted term, setting it to 1 to indicate your acceptance of the terms and conditions&lt;br /&gt;
* ensure that there are no spaces in the query string, particularly if using cut&amp;#039;n&amp;#039;paste&lt;br /&gt;
* wrap the resulting URL in quotes to ensure that the ampersand characters are not mis-interpreted&lt;br /&gt;
&lt;br /&gt;
Failure to follow all of the above rules will result in a failure to scan your host. I&amp;#039;d also suggest that you specify a desired output document in the wget command-line - otherwise the filename will be based on the called URL and so will be somewhat convoluted!&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you include the default ports (includeexisting=1) then the scan will take up to approximately 15 seconds to complete - please be patient!&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===Windows Users - please READ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re intending to test a windows PC, then you need to be careful which pre-compiled version of wget you have installed. Some of the available versions do not include IPv6 support. The download at the following link is known to work on windows 7:&lt;br /&gt;
&lt;br /&gt;
* [http://gnuwin32.sourceforge.net/packages/wget.htm http://gnuwin32.sourceforge.net/packages/wget.htm]&lt;br /&gt;
&lt;br /&gt;
Another good solution for PC users can be found within the [http://www.cygwin.com/ Cygwin] tool. Wget on Cygwin is built with the following options:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ wget -V&lt;br /&gt;
GNU Wget 1.13.4 built on cygwin.&lt;br /&gt;
&lt;br /&gt;
+digest +https +ipv6 +iri +large-file +nls -ntlm +opie +ssl/gnutls&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Example Scans==&lt;br /&gt;
&lt;br /&gt;
Now for some concrete examples:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing just the UDP and TCP default port list===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www66.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;  &lt;br /&gt;
  --2012-01-28 14:28:03--  https://www66.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&lt;br /&gt;
  Resolving www66.chappell-family.co.uk... 2001:470:971f:99::6&lt;br /&gt;
  Connecting to www66.chappell-family.co.uk|2001:470:971f:99::6|:443... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10147 (9.9K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039; &lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,147      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:28:03 (165 MB/s) - `ipv6.html&amp;#039; saved [10147/10147]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports and a single TCP port, e.g. 8080===&lt;br /&gt;
  &lt;br /&gt;
  &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www66.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:37:21--  https://www66.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&lt;br /&gt;
  Resolving www66.chappell-family.co.uk... 2001:470:971f:99::6&lt;br /&gt;
  Connecting to www66.chappell-family.co.uk|2001:470:971f:99::6|:443... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 7323 (7.2K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 7,323       --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:37:21 (112 MB/s) - `ipv6.html&amp;#039; saved [7323/7323]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports, the default TCP ports list and 3 custom TCP ports===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www66.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:39:53--  https://www66.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&amp;amp;termsaccepted=1&lt;br /&gt;
  Resolving www66.chappell-family.co.uk... 2001:470:971f:99::6&lt;br /&gt;
  Connecting to www66.chappell-family.co.uk|2001:470:971f:99::6|:443... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10263 (10K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,263      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:39:54 (222 MB/s) - `ipv6.html&amp;#039; saved [10263/10263]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Testing on Ubiquity ERlite Routers===&lt;br /&gt;
&lt;br /&gt;
On the router:&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo /usr/bin/curl -G &amp;lt;nowiki&amp;gt;&amp;#039;https://www66.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039;&amp;lt;/nowiki&amp;gt; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/ipv6.html&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo scp /tmp/ipv6.html &amp;lt;user&amp;gt;@&amp;lt;host&amp;gt;:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo rm -f /tmp/ipv6.html&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Exchange &amp;lt;user&amp;gt; and &amp;lt;host&amp;gt; for an applicable account and machine name to transfer the results file to.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;sudo /usr/bin/curl -G &amp;lt;nowiki&amp;gt;&amp;#039;https://www66.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039;&amp;lt;/nowiki&amp;gt; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/ipv6.html&lt;br /&gt;
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current&lt;br /&gt;
                                 Dload  Upload   Total   Spent    Left  Speed&lt;br /&gt;
100  2844  100  2844    0     0     30      0  0:01:34  0:01:33  0:00:01   627&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===HTML Results Scraping===&lt;br /&gt;
&lt;br /&gt;
It is possible to open the resulting ipv6.html file in a local web-browser, however you may prefer to summarise the results for easier checking. Here is a very quick and inelegant example of [[ResultScraping]] the returned html file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=596</id>
		<title>ScanAutomation</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=596"/>
		<updated>2023-10-21T17:06:37Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: /* Testing the UDP ports, the default TCP ports list and 3 custom TCP ports */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==IPscan IPv6 Port Scan Automation==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of automated IPv6 firewall testing (IPv6 TCP and UDP port scans) using wget and IPscan. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Terms of Use===&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Please ensure that you accept the &amp;#039;&amp;#039;[https://wiki.chappell-family.com/wiki/index.php?title=Timswiki:About terms of use]&amp;#039;&amp;#039; and are authorised to perform IPv6 port scans against the machine that you wish to test &amp;#039;&amp;#039;BEFORE&amp;#039;&amp;#039; attempting any of the steps outlined below. Please also ensure that you are not accessing web pages using an HTTP proxy. If in doubt then a web proxy can be disabled by following the command-line examples shown below.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a [[Timswiki:Privacy_policy]]. Continued use of this website implies your consent to the storage of data outlined in the policy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Rules for Forming the URL===&lt;br /&gt;
&lt;br /&gt;
It is possible to request automatic scans using &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;wget&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; but the URLs must be constructed as shown below. In each case you &amp;#039;&amp;#039;&amp;#039;MUST:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* target the IPscan IPv6 host and IPv6 cgi-bin directory (www66.chappell-family.co.uk/cgi-bin6/)&lt;br /&gt;
* use the text-browser compatible cgi target (ipscan-txt.cgi)&lt;br /&gt;
* include an includeexisting query term, setting it to either 1 (include default ports [[IPv6_Ports]]) or -1 (exclude default ports)&lt;br /&gt;
* include all 4 customport terms (numbered 0 to 3), setting them equal to nothing if they are unused&lt;br /&gt;
* include the termsaccepted term, setting it to 1 to indicate your acceptance of the terms and conditions&lt;br /&gt;
* ensure that there are no spaces in the query string, particularly if using cut&amp;#039;n&amp;#039;paste&lt;br /&gt;
* wrap the resulting URL in quotes to ensure that the ampersand characters are not mis-interpreted&lt;br /&gt;
&lt;br /&gt;
Failure to follow all of the above rules will result in a failure to scan your host. I&amp;#039;d also suggest that you specify a desired output document in the wget command-line - otherwise the filename will be based on the called URL and so will be somewhat convoluted!&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you include the default ports (includeexisting=1) then the scan will take up to approximately 15 seconds to complete - please be patient!&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===Windows Users - please READ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re intending to test a windows PC, then you need to be careful which pre-compiled version of wget you have installed. Some of the available versions do not include IPv6 support. The download at the following link is known to work on windows 7:&lt;br /&gt;
&lt;br /&gt;
* [http://gnuwin32.sourceforge.net/packages/wget.htm http://gnuwin32.sourceforge.net/packages/wget.htm]&lt;br /&gt;
&lt;br /&gt;
Another good solution for PC users can be found within the [http://www.cygwin.com/ Cygwin] tool. Wget on Cygwin is built with the following options:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ wget -V&lt;br /&gt;
GNU Wget 1.13.4 built on cygwin.&lt;br /&gt;
&lt;br /&gt;
+digest +https +ipv6 +iri +large-file +nls -ntlm +opie +ssl/gnutls&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Example Scans==&lt;br /&gt;
&lt;br /&gt;
Now for some concrete examples:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing just the UDP and TCP default port list===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www66.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;  &lt;br /&gt;
  --2012-01-28 14:28:03--  https://www66.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&lt;br /&gt;
  Resolving www66.chappell-family.co.uk... 2001:470:971f:99::6&lt;br /&gt;
  Connecting to www66.chappell-family.co.uk|2001:470:971f:99::6|:443... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10147 (9.9K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039; &lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,147      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:28:03 (165 MB/s) - `ipv6.html&amp;#039; saved [10147/10147]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports and a single TCP port, e.g. 8080===&lt;br /&gt;
  &lt;br /&gt;
  &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www66.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:37:21--  https://www66.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&lt;br /&gt;
  Resolving www66.chappell-family.co.uk... 2001:470:971f:99::6&lt;br /&gt;
  Connecting to www66.chappell-family.co.uk|2001:470:971f:99::6|:443... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 7323 (7.2K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 7,323       --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:37:21 (112 MB/s) - `ipv6.html&amp;#039; saved [7323/7323]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports, the default TCP ports list and 3 custom TCP ports===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www66.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:39:53--  https://www66.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&amp;amp;termsaccepted=1&lt;br /&gt;
  Resolving www66.chappell-family.co.uk... 2001:470:971f:99::6&lt;br /&gt;
  Connecting to www66.chappell-family.co.uk|2001:470:971f:99::6|:443... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10263 (10K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,263      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:39:54 (222 MB/s) - `ipv6.html&amp;#039; saved [10263/10263]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Testing on Ubiquity ERlite Routers===&lt;br /&gt;
&lt;br /&gt;
On the router:&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo /usr/bin/curl -G &amp;lt;nowiki&amp;gt;&amp;#039;https://www64.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039;&amp;lt;/nowiki&amp;gt; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/ipv6.html&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo scp /tmp/ipv6.html &amp;lt;user&amp;gt;@&amp;lt;host&amp;gt;:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo rm -f /tmp/ipv6.html&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Exchange &amp;lt;user&amp;gt; and &amp;lt;host&amp;gt; for an applicable account and machine name to transfer the results file to.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;sudo /usr/bin/curl -G &amp;lt;nowiki&amp;gt;&amp;#039;https://www64.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039;&amp;lt;/nowiki&amp;gt; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/ipv6.html&lt;br /&gt;
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current&lt;br /&gt;
                                 Dload  Upload   Total   Spent    Left  Speed&lt;br /&gt;
100  2844  100  2844    0     0     30      0  0:01:34  0:01:33  0:00:01   627&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===HTML Results Scraping===&lt;br /&gt;
&lt;br /&gt;
It is possible to open the resulting ipv6.html file in a local web-browser, however you may prefer to summarise the results for easier checking. Here is a very quick and inelegant example of [[ResultScraping]] the returned html file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=595</id>
		<title>ScanAutomation</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=595"/>
		<updated>2023-10-21T17:05:41Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: /* Testing the UDP ports and a single TCP port, e.g. 8080 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==IPscan IPv6 Port Scan Automation==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of automated IPv6 firewall testing (IPv6 TCP and UDP port scans) using wget and IPscan. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Terms of Use===&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Please ensure that you accept the &amp;#039;&amp;#039;[https://wiki.chappell-family.com/wiki/index.php?title=Timswiki:About terms of use]&amp;#039;&amp;#039; and are authorised to perform IPv6 port scans against the machine that you wish to test &amp;#039;&amp;#039;BEFORE&amp;#039;&amp;#039; attempting any of the steps outlined below. Please also ensure that you are not accessing web pages using an HTTP proxy. If in doubt then a web proxy can be disabled by following the command-line examples shown below.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a [[Timswiki:Privacy_policy]]. Continued use of this website implies your consent to the storage of data outlined in the policy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Rules for Forming the URL===&lt;br /&gt;
&lt;br /&gt;
It is possible to request automatic scans using &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;wget&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; but the URLs must be constructed as shown below. In each case you &amp;#039;&amp;#039;&amp;#039;MUST:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* target the IPscan IPv6 host and IPv6 cgi-bin directory (www66.chappell-family.co.uk/cgi-bin6/)&lt;br /&gt;
* use the text-browser compatible cgi target (ipscan-txt.cgi)&lt;br /&gt;
* include an includeexisting query term, setting it to either 1 (include default ports [[IPv6_Ports]]) or -1 (exclude default ports)&lt;br /&gt;
* include all 4 customport terms (numbered 0 to 3), setting them equal to nothing if they are unused&lt;br /&gt;
* include the termsaccepted term, setting it to 1 to indicate your acceptance of the terms and conditions&lt;br /&gt;
* ensure that there are no spaces in the query string, particularly if using cut&amp;#039;n&amp;#039;paste&lt;br /&gt;
* wrap the resulting URL in quotes to ensure that the ampersand characters are not mis-interpreted&lt;br /&gt;
&lt;br /&gt;
Failure to follow all of the above rules will result in a failure to scan your host. I&amp;#039;d also suggest that you specify a desired output document in the wget command-line - otherwise the filename will be based on the called URL and so will be somewhat convoluted!&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you include the default ports (includeexisting=1) then the scan will take up to approximately 15 seconds to complete - please be patient!&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===Windows Users - please READ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re intending to test a windows PC, then you need to be careful which pre-compiled version of wget you have installed. Some of the available versions do not include IPv6 support. The download at the following link is known to work on windows 7:&lt;br /&gt;
&lt;br /&gt;
* [http://gnuwin32.sourceforge.net/packages/wget.htm http://gnuwin32.sourceforge.net/packages/wget.htm]&lt;br /&gt;
&lt;br /&gt;
Another good solution for PC users can be found within the [http://www.cygwin.com/ Cygwin] tool. Wget on Cygwin is built with the following options:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ wget -V&lt;br /&gt;
GNU Wget 1.13.4 built on cygwin.&lt;br /&gt;
&lt;br /&gt;
+digest +https +ipv6 +iri +large-file +nls -ntlm +opie +ssl/gnutls&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Example Scans==&lt;br /&gt;
&lt;br /&gt;
Now for some concrete examples:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing just the UDP and TCP default port list===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www66.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;  &lt;br /&gt;
  --2012-01-28 14:28:03--  https://www66.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&lt;br /&gt;
  Resolving www66.chappell-family.co.uk... 2001:470:971f:99::6&lt;br /&gt;
  Connecting to www66.chappell-family.co.uk|2001:470:971f:99::6|:443... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10147 (9.9K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039; &lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,147      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:28:03 (165 MB/s) - `ipv6.html&amp;#039; saved [10147/10147]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports and a single TCP port, e.g. 8080===&lt;br /&gt;
  &lt;br /&gt;
  &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www66.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:37:21--  https://www66.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&lt;br /&gt;
  Resolving www66.chappell-family.co.uk... 2001:470:971f:99::6&lt;br /&gt;
  Connecting to www66.chappell-family.co.uk|2001:470:971f:99::6|:443... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 7323 (7.2K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 7,323       --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:37:21 (112 MB/s) - `ipv6.html&amp;#039; saved [7323/7323]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports, the default TCP ports list and 3 custom TCP ports===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www64.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:39:53--  https://www64.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&amp;amp;termsaccepted=1&lt;br /&gt;
  Resolving www64.chappell-family.co.uk... 2001:470:971f:6::4&lt;br /&gt;
  Connecting to www64.chappell-family.co.uk|2001:470:971f:6::4|:443... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10263 (10K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,263      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:39:54 (222 MB/s) - `ipv6.html&amp;#039; saved [10263/10263]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Testing on Ubiquity ERlite Routers===&lt;br /&gt;
&lt;br /&gt;
On the router:&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo /usr/bin/curl -G &amp;lt;nowiki&amp;gt;&amp;#039;https://www64.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039;&amp;lt;/nowiki&amp;gt; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/ipv6.html&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo scp /tmp/ipv6.html &amp;lt;user&amp;gt;@&amp;lt;host&amp;gt;:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo rm -f /tmp/ipv6.html&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Exchange &amp;lt;user&amp;gt; and &amp;lt;host&amp;gt; for an applicable account and machine name to transfer the results file to.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;sudo /usr/bin/curl -G &amp;lt;nowiki&amp;gt;&amp;#039;https://www64.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039;&amp;lt;/nowiki&amp;gt; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/ipv6.html&lt;br /&gt;
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current&lt;br /&gt;
                                 Dload  Upload   Total   Spent    Left  Speed&lt;br /&gt;
100  2844  100  2844    0     0     30      0  0:01:34  0:01:33  0:00:01   627&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===HTML Results Scraping===&lt;br /&gt;
&lt;br /&gt;
It is possible to open the resulting ipv6.html file in a local web-browser, however you may prefer to summarise the results for easier checking. Here is a very quick and inelegant example of [[ResultScraping]] the returned html file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=594</id>
		<title>ScanAutomation</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=594"/>
		<updated>2023-10-21T17:04:47Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: /* Testing just the UDP and TCP default port list */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==IPscan IPv6 Port Scan Automation==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of automated IPv6 firewall testing (IPv6 TCP and UDP port scans) using wget and IPscan. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Terms of Use===&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Please ensure that you accept the &amp;#039;&amp;#039;[https://wiki.chappell-family.com/wiki/index.php?title=Timswiki:About terms of use]&amp;#039;&amp;#039; and are authorised to perform IPv6 port scans against the machine that you wish to test &amp;#039;&amp;#039;BEFORE&amp;#039;&amp;#039; attempting any of the steps outlined below. Please also ensure that you are not accessing web pages using an HTTP proxy. If in doubt then a web proxy can be disabled by following the command-line examples shown below.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a [[Timswiki:Privacy_policy]]. Continued use of this website implies your consent to the storage of data outlined in the policy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Rules for Forming the URL===&lt;br /&gt;
&lt;br /&gt;
It is possible to request automatic scans using &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;wget&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; but the URLs must be constructed as shown below. In each case you &amp;#039;&amp;#039;&amp;#039;MUST:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* target the IPscan IPv6 host and IPv6 cgi-bin directory (www66.chappell-family.co.uk/cgi-bin6/)&lt;br /&gt;
* use the text-browser compatible cgi target (ipscan-txt.cgi)&lt;br /&gt;
* include an includeexisting query term, setting it to either 1 (include default ports [[IPv6_Ports]]) or -1 (exclude default ports)&lt;br /&gt;
* include all 4 customport terms (numbered 0 to 3), setting them equal to nothing if they are unused&lt;br /&gt;
* include the termsaccepted term, setting it to 1 to indicate your acceptance of the terms and conditions&lt;br /&gt;
* ensure that there are no spaces in the query string, particularly if using cut&amp;#039;n&amp;#039;paste&lt;br /&gt;
* wrap the resulting URL in quotes to ensure that the ampersand characters are not mis-interpreted&lt;br /&gt;
&lt;br /&gt;
Failure to follow all of the above rules will result in a failure to scan your host. I&amp;#039;d also suggest that you specify a desired output document in the wget command-line - otherwise the filename will be based on the called URL and so will be somewhat convoluted!&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you include the default ports (includeexisting=1) then the scan will take up to approximately 15 seconds to complete - please be patient!&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===Windows Users - please READ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re intending to test a windows PC, then you need to be careful which pre-compiled version of wget you have installed. Some of the available versions do not include IPv6 support. The download at the following link is known to work on windows 7:&lt;br /&gt;
&lt;br /&gt;
* [http://gnuwin32.sourceforge.net/packages/wget.htm http://gnuwin32.sourceforge.net/packages/wget.htm]&lt;br /&gt;
&lt;br /&gt;
Another good solution for PC users can be found within the [http://www.cygwin.com/ Cygwin] tool. Wget on Cygwin is built with the following options:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ wget -V&lt;br /&gt;
GNU Wget 1.13.4 built on cygwin.&lt;br /&gt;
&lt;br /&gt;
+digest +https +ipv6 +iri +large-file +nls -ntlm +opie +ssl/gnutls&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Example Scans==&lt;br /&gt;
&lt;br /&gt;
Now for some concrete examples:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing just the UDP and TCP default port list===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www66.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;  &lt;br /&gt;
  --2012-01-28 14:28:03--  https://www66.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&lt;br /&gt;
  Resolving www66.chappell-family.co.uk... 2001:470:971f:99::6&lt;br /&gt;
  Connecting to www66.chappell-family.co.uk|2001:470:971f:99::6|:443... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10147 (9.9K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039; &lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,147      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:28:03 (165 MB/s) - `ipv6.html&amp;#039; saved [10147/10147]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports and a single TCP port, e.g. 8080===&lt;br /&gt;
  &lt;br /&gt;
  &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www64.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:37:21--  https://www64.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&lt;br /&gt;
  Resolving www64.chappell-family.co.uk... 2001:470:971f:6::4&lt;br /&gt;
  Connecting to www64.chappell-family.co.uk|2001:470:971f:6::4|:443... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 7323 (7.2K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 7,323       --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:37:21 (112 MB/s) - `ipv6.html&amp;#039; saved [7323/7323]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports, the default TCP ports list and 3 custom TCP ports===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www64.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:39:53--  https://www64.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&amp;amp;termsaccepted=1&lt;br /&gt;
  Resolving www64.chappell-family.co.uk... 2001:470:971f:6::4&lt;br /&gt;
  Connecting to www64.chappell-family.co.uk|2001:470:971f:6::4|:443... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10263 (10K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,263      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:39:54 (222 MB/s) - `ipv6.html&amp;#039; saved [10263/10263]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Testing on Ubiquity ERlite Routers===&lt;br /&gt;
&lt;br /&gt;
On the router:&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo /usr/bin/curl -G &amp;lt;nowiki&amp;gt;&amp;#039;https://www64.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039;&amp;lt;/nowiki&amp;gt; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/ipv6.html&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo scp /tmp/ipv6.html &amp;lt;user&amp;gt;@&amp;lt;host&amp;gt;:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo rm -f /tmp/ipv6.html&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Exchange &amp;lt;user&amp;gt; and &amp;lt;host&amp;gt; for an applicable account and machine name to transfer the results file to.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;sudo /usr/bin/curl -G &amp;lt;nowiki&amp;gt;&amp;#039;https://www64.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039;&amp;lt;/nowiki&amp;gt; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/ipv6.html&lt;br /&gt;
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current&lt;br /&gt;
                                 Dload  Upload   Total   Spent    Left  Speed&lt;br /&gt;
100  2844  100  2844    0     0     30      0  0:01:34  0:01:33  0:00:01   627&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===HTML Results Scraping===&lt;br /&gt;
&lt;br /&gt;
It is possible to open the resulting ipv6.html file in a local web-browser, however you may prefer to summarise the results for easier checking. Here is a very quick and inelegant example of [[ResultScraping]] the returned html file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=593</id>
		<title>ScanAutomation</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=593"/>
		<updated>2023-10-21T17:03:52Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: /* Rules for Forming the URL */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==IPscan IPv6 Port Scan Automation==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of automated IPv6 firewall testing (IPv6 TCP and UDP port scans) using wget and IPscan. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Terms of Use===&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Please ensure that you accept the &amp;#039;&amp;#039;[https://wiki.chappell-family.com/wiki/index.php?title=Timswiki:About terms of use]&amp;#039;&amp;#039; and are authorised to perform IPv6 port scans against the machine that you wish to test &amp;#039;&amp;#039;BEFORE&amp;#039;&amp;#039; attempting any of the steps outlined below. Please also ensure that you are not accessing web pages using an HTTP proxy. If in doubt then a web proxy can be disabled by following the command-line examples shown below.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a [[Timswiki:Privacy_policy]]. Continued use of this website implies your consent to the storage of data outlined in the policy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Rules for Forming the URL===&lt;br /&gt;
&lt;br /&gt;
It is possible to request automatic scans using &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;wget&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; but the URLs must be constructed as shown below. In each case you &amp;#039;&amp;#039;&amp;#039;MUST:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* target the IPscan IPv6 host and IPv6 cgi-bin directory (www66.chappell-family.co.uk/cgi-bin6/)&lt;br /&gt;
* use the text-browser compatible cgi target (ipscan-txt.cgi)&lt;br /&gt;
* include an includeexisting query term, setting it to either 1 (include default ports [[IPv6_Ports]]) or -1 (exclude default ports)&lt;br /&gt;
* include all 4 customport terms (numbered 0 to 3), setting them equal to nothing if they are unused&lt;br /&gt;
* include the termsaccepted term, setting it to 1 to indicate your acceptance of the terms and conditions&lt;br /&gt;
* ensure that there are no spaces in the query string, particularly if using cut&amp;#039;n&amp;#039;paste&lt;br /&gt;
* wrap the resulting URL in quotes to ensure that the ampersand characters are not mis-interpreted&lt;br /&gt;
&lt;br /&gt;
Failure to follow all of the above rules will result in a failure to scan your host. I&amp;#039;d also suggest that you specify a desired output document in the wget command-line - otherwise the filename will be based on the called URL and so will be somewhat convoluted!&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you include the default ports (includeexisting=1) then the scan will take up to approximately 15 seconds to complete - please be patient!&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===Windows Users - please READ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re intending to test a windows PC, then you need to be careful which pre-compiled version of wget you have installed. Some of the available versions do not include IPv6 support. The download at the following link is known to work on windows 7:&lt;br /&gt;
&lt;br /&gt;
* [http://gnuwin32.sourceforge.net/packages/wget.htm http://gnuwin32.sourceforge.net/packages/wget.htm]&lt;br /&gt;
&lt;br /&gt;
Another good solution for PC users can be found within the [http://www.cygwin.com/ Cygwin] tool. Wget on Cygwin is built with the following options:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ wget -V&lt;br /&gt;
GNU Wget 1.13.4 built on cygwin.&lt;br /&gt;
&lt;br /&gt;
+digest +https +ipv6 +iri +large-file +nls -ntlm +opie +ssl/gnutls&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Example Scans==&lt;br /&gt;
&lt;br /&gt;
Now for some concrete examples:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing just the UDP and TCP default port list===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www64.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;  &lt;br /&gt;
  --2012-01-28 14:28:03--  https://www64.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&lt;br /&gt;
  Resolving www64.chappell-family.co.uk... 2001:470:971f:6::4&lt;br /&gt;
  Connecting to www64.chappell-family.co.uk|2001:470:971f:6::4|:443... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10147 (9.9K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039; &lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,147      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:28:03 (165 MB/s) - `ipv6.html&amp;#039; saved [10147/10147]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports and a single TCP port, e.g. 8080===&lt;br /&gt;
  &lt;br /&gt;
  &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www64.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:37:21--  https://www64.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&lt;br /&gt;
  Resolving www64.chappell-family.co.uk... 2001:470:971f:6::4&lt;br /&gt;
  Connecting to www64.chappell-family.co.uk|2001:470:971f:6::4|:443... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 7323 (7.2K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 7,323       --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:37:21 (112 MB/s) - `ipv6.html&amp;#039; saved [7323/7323]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports, the default TCP ports list and 3 custom TCP ports===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www64.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:39:53--  https://www64.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&amp;amp;termsaccepted=1&lt;br /&gt;
  Resolving www64.chappell-family.co.uk... 2001:470:971f:6::4&lt;br /&gt;
  Connecting to www64.chappell-family.co.uk|2001:470:971f:6::4|:443... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10263 (10K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,263      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:39:54 (222 MB/s) - `ipv6.html&amp;#039; saved [10263/10263]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Testing on Ubiquity ERlite Routers===&lt;br /&gt;
&lt;br /&gt;
On the router:&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo /usr/bin/curl -G &amp;lt;nowiki&amp;gt;&amp;#039;https://www64.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039;&amp;lt;/nowiki&amp;gt; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/ipv6.html&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo scp /tmp/ipv6.html &amp;lt;user&amp;gt;@&amp;lt;host&amp;gt;:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo rm -f /tmp/ipv6.html&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Exchange &amp;lt;user&amp;gt; and &amp;lt;host&amp;gt; for an applicable account and machine name to transfer the results file to.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;sudo /usr/bin/curl -G &amp;lt;nowiki&amp;gt;&amp;#039;https://www64.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039;&amp;lt;/nowiki&amp;gt; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/ipv6.html&lt;br /&gt;
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current&lt;br /&gt;
                                 Dload  Upload   Total   Spent    Left  Speed&lt;br /&gt;
100  2844  100  2844    0     0     30      0  0:01:34  0:01:33  0:00:01   627&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===HTML Results Scraping===&lt;br /&gt;
&lt;br /&gt;
It is possible to open the resulting ipv6.html file in a local web-browser, however you may prefer to summarise the results for easier checking. Here is a very quick and inelegant example of [[ResultScraping]] the returned html file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=592</id>
		<title>IPv6</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=592"/>
		<updated>2023-10-21T17:02:54Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: Update IPv6 addresses.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==The IPscan IPv6 Firewall Tester (ICMPv6, IPv6 TCP and UDP Port Scanner)==&lt;br /&gt;
&lt;br /&gt;
IPscan offers much of the functionality you might hope to find in an IPv6 version of [https://www.grc.com/ GRC&amp;#039;s ShieldsUp®] utility.&lt;br /&gt;
&lt;br /&gt;
=== Introduction ===&lt;br /&gt;
&lt;br /&gt;
Recent web-browsers request IPv6 DNS lookups in preference to IPv4 if they are running on a host with IPv6 enabled. The ipv6.chappell-family.com domain has DNS entries for both IPv4 and IPv6 addresses. This makes it possible for IPv4-only hosts, which make up most of the current web traffic, including search engines, to use the same URL. Browsers running on IPv4-only hosts will not request an IPv6 address and will therefore access the website entirely using IPv4. The landing page, as linked below, attempts to determine whether your machine has a valid globally routable IPv6 address (2000::/3) and whether it is behind an HTTP proxy, by looking for well known HTTP header variables which indicate that this may be the case. Only if the hosts&amp;#039; IP address is determined to be globally-routable unicast IPv6 and there are no tell-tale HTTP proxy variables will the landing page offer links to initiate the scan, as shown in the figure below.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_Landing_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) landing page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The tester is made available in two basic versions - one for browsers supporting javascript and the other suitable for text-only browsers such as Lynx, w3m and ELinks. The lightweight text-only browser version can be used on hosts which do not sport their own GUI environment (e.g. servers and embedded devices like routers). The original javascript browser version supports ongoing updates of the test status, whereas the text-only version only produces a results page once all the selected ports have been tested. Additionally, a fast and standard version of both of these testers is provided. The fast version tests multiple TCP or UDP ports in parallel, whereas the standard version tests only 1 port at a time, at a default rate of 1 port per second. Please be aware that some operating systems and firewalls apply rate-limiting to their generation, or passing, of ICMPv6 responses on the basis that this behaviour is indicative of a port scan being performed. Consequently such rate-limiting might cause a port which would normally generate an ICMPv6 response (e.g. PHBTD) to send no response at all, which IPscan would report as STEALTHed. If you are testing a host or firewall (whether on the client under test or elsewhere in the path between your client and the test server) which implements such rate-limiting then you are advised to use the standard, slower versions of IPscan which should not trigger the rate-limiting behaviour. If you&amp;#039;re unsure which version is appropriate for you, then try both and compare the results. Some Linux distributions and some ISP firewalls are known to implement such rate-limiting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please do NOT attempt to test hosts which are located behind HTTP proxies. Such proxies are very common in both corporate environments and on commercially-operated free wifi networks. The landing page for IPscan attempts to detect the common headers which such proxies insert, but it cannot detect truly transparent proxies. An HTTP Proxy is typically used by corporate networks to ensure employees are using their PCs in line with corporate computer-use policies. If you are interested in deploying your own HTTP proxy then [http://www.squid-cache.org/ Squid] is highly recommended as a proxy able to perform not only the usual access control and content-caching tasks but also offering IPv4 and IPv6 inter-working between single and dual-stack clients and web-sites. For further details please read the [https://ipv6.chappell-family.com/docs/IPv6_Squid_v01.pdf IPv6 Squid Proxy article.]&lt;br /&gt;
&lt;br /&gt;
=== The Test ===&lt;br /&gt;
&lt;br /&gt;
The tester allows a user to choose whether to include a commonly used set of &amp;#039;&amp;#039;&amp;#039;TCP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039; in their scan, as well as the ability to specify a number of their own specifically interesting TCP ports (this is intended to cover setups where you run services on non IANA-assigned ports, or just run less-common services). If you would like to see the list of commonly used ports expanded, or just changed, then please contact me.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_kickoff_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) original kickoff page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
The test begins by sending an ICMPv6 ECHO-REQUEST (an IPv6 ping) towards the host under test (HUT). The tester checks for related ICMPv6 responses from either the HUT or other hosts (e.g. routers and/or firewall devices protecting the HUT). If a response is detected from an host other than the HUT then the IPv6 address of this third-party is reported.   &lt;br /&gt;
 &lt;br /&gt;
The test continues by scanning a fixed set of commonly used &amp;#039;&amp;#039;&amp;#039;UDP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039;. The IPv6 UDP port test sets its&amp;#039; socket tx/rx timeouts to be 2 seconds - consequently the results can take up to 2s per tested UDP port - although the actual time depends heavily upon the filtering that your system employs (e.g. firewalls which mark protected ports as &amp;#039;unreachable&amp;#039; will resolve in much less than the allowed 2 second timeout assuming that your firewall sends the appropriate ICMPv6 packet in response).&lt;br /&gt;
&lt;br /&gt;
The test finishes by scanning the user-selected IPv6 TCP ports. The IPv6 TCP port test sets its&amp;#039; socket Tx/Rx timeouts to be 1 second - consequently the results can take up to 1s per tested port - although this depends heavily upon the filtering your system employs (e.g. firewalls which mark protected ports as &amp;#039;administratively prohibited&amp;#039; will resolve as PHBTD in much less than the allowed 1 second timeout assuming that your firewall sends an ICMPv6 type 1 code 1 packet in response).&lt;br /&gt;
&lt;br /&gt;
The tester will indicate the status of the tested UDP and TCP ports as either OPEN, STEALTHed or one of a series of other states depending on the positive or negative feedback received from your machine. A typical result is shown in the figures below. Note that if you run the test using an interactive gui-based browser then hovering over specific port numbers produces a pop-up describing the service run on that specific port. For a more detailed explanation of the reported states please read &amp;#039;&amp;#039;&amp;#039;[[ScanStatus]]&amp;#039;&amp;#039;&amp;#039;. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_results_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) IPscan results page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:IPscan_results_key1.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) IPscan results key (1 of 2) viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:IPscan_results_key2.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) IPscan results key (2 of 2) viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;&amp;#039;&amp;#039;&amp;#039;IMPORTANT:&amp;#039;&amp;#039;&amp;#039; this scanner will direct IPv6 TCP, UDP and ICMPv6 traffic towards the IP address that the webserver determines the request originates from. Please do NOT attempt to test machines that are operating behind transparent HTTP proxies, unless you also administer the proxy and specifically intend that machine to be tested.&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you wish to test your host now then please point your browser towards [https://ipv6.chappell-family.com/ipv6tcptest/ the IPv6 portscanner.]&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=== Test Server Source IPv6 Addresses ===&lt;br /&gt;
&lt;br /&gt;
Tests performed from the www66.chappell-family.co.uk host will be sourced from IPv6 address: &amp;#039;&amp;#039;&amp;#039;2001:470:971f:99::6&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
Note: during periods of planned server maintenance, a reduced service supporting only TCP testing may be offered, which will be sourced from an IPv6 address in the following range: &amp;#039;&amp;#039;&amp;#039;2001:8d8:100f::/48&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
=== Raspberry Pi Powered IPv6 Firewall Tester ===&lt;br /&gt;
&lt;br /&gt;
Outline details of the Raspberry Pi Powered IPv6 firewall tester can be found here [[Raspberry_Pi_IPv6_firewall_tester]], along with more complete [[Raspberry_Pi_IPv6_firewall_tester_installation]] details. &lt;br /&gt;
&lt;br /&gt;
All tests performed during non-maintenance periods are now handled by a Raspberry Pi powered host.&lt;br /&gt;
&lt;br /&gt;
=== Issues - Debugging ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re having trouble accessing the landing page via IPv6 (i.e. your IP address is reported as IPv4) then please see the following &amp;#039;&amp;#039;&amp;#039;[[IPv6_DEBUG]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Observations on IPv6 firewalls and IPv6 Address Selection ===&lt;br /&gt;
&lt;br /&gt;
For some general observations on IPv6 firewalls, as well as some useful references, please see the &amp;#039;&amp;#039;&amp;#039;[[IPv6_Firewalls]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Getting an IPv6 connection ===&lt;br /&gt;
&lt;br /&gt;
If you don&amp;#039;t already have an IPv6 connection but wish to get involved, then try a tunnel-broker such as [http://tunnelbroker.net Hurricane Electric].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Source code ===&lt;br /&gt;
&lt;br /&gt;
If you would like to view or download the IPv6 firewall scanner source code then please visit the &amp;#039;&amp;#039;&amp;#039;[https://github.com/timsgit/ipscan github]&amp;#039;&amp;#039;&amp;#039; page. If you deploy the scanner on an internet facing machine then &amp;#039;&amp;#039;please&amp;#039;&amp;#039; ensure that you protect users&amp;#039; privacy by following the instructions given in point 10 of the embedded [https://github.com/timsgit/ipscan/blob/master/README README] file.&lt;br /&gt;
&lt;br /&gt;
=== Automation ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;d like to automate IPv6 firewall testing, or run the same test a number of times on different hosts then please see the &amp;#039;&amp;#039;&amp;#039;[[ScanAutomation]]&amp;#039;&amp;#039;&amp;#039; and HTML &amp;#039;&amp;#039;&amp;#039;[[ResultScraping]]&amp;#039;&amp;#039;&amp;#039; sections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== URL for Sharing ===&lt;br /&gt;
&lt;br /&gt;
If you find this utility useful then please feel free to share the following URL with new users:&lt;br /&gt;
&lt;br /&gt;
   &amp;#039;&amp;#039;&amp;#039;https://ipv6.chappell-family.com/ipv6tcptest/&amp;#039;&amp;#039;&amp;#039; IPv6 Firewall Tester&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy. All other registered trademarks are the property of their respective owners.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=IPv6_DEBUG&amp;diff=591</id>
		<title>IPv6 DEBUG</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=IPv6_DEBUG&amp;diff=591"/>
		<updated>2022-07-09T17:19:15Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: /* IPv6 DEBUG */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== IPv6 DEBUG ==&lt;br /&gt;
&lt;br /&gt;
Debug suggestions related to IPv6 configuration issues that might be encountered when accessing the [https://ipv6.chappell-family.com/ipv6tcptest/ IPscan IPv6 firewall tester.]&lt;br /&gt;
&lt;br /&gt;
For general IPv6 debug please see:&lt;br /&gt;
&lt;br /&gt;
* [http://www.getipv6.info/index.php/Troubleshoot_IPv6_Issues Arin IPv6 debug - many useful links]&lt;br /&gt;
* [http://www.tldp.org/HOWTO/Linux+IPv6-HOWTO/index.html Linux IPv6 HOWTO] &lt;br /&gt;
* [http://technet.microsoft.com/en-us/library/cc737698%28WS.10%29.aspx Microsoft IPv6 Howto.]&lt;br /&gt;
* [http://n1.netalyzr.icsi.berkeley.edu/analysis/ Berkeley University Network analysis tool - very thorough, but requires Java]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== General IPv6 Connectivity ===&lt;br /&gt;
&lt;br /&gt;
First check your general IPv6 connectivity. At a command prompt or terminal check that your machine has a global unicast IPv6 address allocated (i.e. 2000::/3, so begins either 2XXX or 3XXX) as shown in these examples:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  C:\Users&amp;gt;ipconfig&lt;br /&gt;
  &lt;br /&gt;
  Windows IP Configuration&lt;br /&gt;
  &lt;br /&gt;
  &lt;br /&gt;
  Ethernet adapter Local Area Connection:&lt;br /&gt;
  &lt;br /&gt;
     Connection-specific DNS Suffix  . : home.example.com&lt;br /&gt;
     &amp;#039;&amp;#039;&amp;#039;IPv6 Address. . . . . . . . . . . : 2xxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
     Temporary IPv6 Address. . . . . . : 2xxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx&lt;br /&gt;
     Link-local IPv6 Address . . . . . : fe80::xxxx:xxxx:xxxx:xxxx%10&lt;br /&gt;
     IPv4 Address. . . . . . . . . . . : 192.168.33.3&lt;br /&gt;
     Subnet Mask . . . . . . . . . . . : 255.255.255.0&lt;br /&gt;
     Default Gateway . . . . . . . . . : fe80::xxxx:xxxx:xxxx:xxxx%10&lt;br /&gt;
                                         192.168.33.1&lt;br /&gt;
  &lt;br /&gt;
&lt;br /&gt;
On a Linux machine, or similar, then when queried as root, the response would look similar to:&lt;br /&gt;
&lt;br /&gt;
  machine:/home/user1 # ifconfig&lt;br /&gt;
  &lt;br /&gt;
  eth0      Link encap:Ethernet  HWaddr XX:XX:XX:XX:XX:XX&lt;br /&gt;
            inet addr:192.168.33.254  Bcast:192.168.33.255  Mask:255.255.255.0&lt;br /&gt;
            &amp;#039;&amp;#039;&amp;#039;inet6 addr: 2XXX:XXXX:XXXX:XXXX::XXXX/64 Scope:Global&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
            inet6 addr: fe80::abc:c0ff:fede:xxxx/64 Scope:Link&lt;br /&gt;
            UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1&lt;br /&gt;
            RX packets:225635003 errors:0 dropped:0 overruns:0 frame:0&lt;br /&gt;
            TX packets:268102245 errors:0 dropped:0 overruns:0 carrier:0&lt;br /&gt;
            collisions:0 txqueuelen:1000&lt;br /&gt;
            RX bytes:1533376458 (1462.3 Mb)  TX bytes:1466607126 (1398.6 Mb)&lt;br /&gt;
            Interrupt:220&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note: The output will differ from the above examples if you are using a tunneled approach, although it would still be useful to check that a valid IPv6 address is being allocated to your machine. &lt;br /&gt;
 &lt;br /&gt;
If you do NOT have a global unicast IPv6 address allocated then you need to determine the reason (which address allocation method are you using? DHCPv6, SLAAC or statically assigned addresses? If you&amp;#039;re using SLAAC then can you detect router advertisements (ICMPv6) being broadcast? Use Wireshark/tcpdump to determine this.) &lt;br /&gt;
&lt;br /&gt;
If you DO have a global unicast address, then you can check basic IPv6 connectivity using either ping (Windows) or ping6 (Linux). If you are using a tunnel then verify that you can ping/ping6 the distant end of the tunnel.&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
  ping6 ipv6.google.com&lt;br /&gt;
  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
you should see a response similar to:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  ping6 ipv6.google.com&lt;br /&gt;
   &lt;br /&gt;
  PING ipv6.google.com(fx-in-x63.1e100.net) 56 data bytes&lt;br /&gt;
  64 bytes from fx-in-x63.1e100.net: icmp_seq=1 ttl=56 time=24.7 ms&lt;br /&gt;
  64 bytes from fx-in-x63.1e100.net: icmp_seq=2 ttl=56 time=25.6 ms&lt;br /&gt;
  ...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If this is NOT successful then either your DNS AAAA lookups or general IPv6 connectivity is broken (determine which based on your error messages).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you have a name lookup error then it is possible to bypass the DNS lookups and ping google&amp;#039;s IPv6 host directly:&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
  ping6 -c 3 2a00:1450:400c:c01::67&lt;br /&gt;
  &lt;br /&gt;
  PING 2a00:1450:400c:c01::67(2a00:1450:400c:c01::67) 56 data bytes&lt;br /&gt;
  64 bytes from 2a00:1450:400c:c01::67: icmp_seq=1 ttl=56 time=19.0 ms&lt;br /&gt;
  64 bytes from 2a00:1450:400c:c01::67: icmp_seq=2 ttl=56 time=18.3 ms&lt;br /&gt;
  64 bytes from 2a00:1450:400c:c01::67: icmp_seq=3 ttl=56 time=18.3 ms&lt;br /&gt;
  &lt;br /&gt;
  &amp;#039;&amp;#039;&amp;#039;Caution: google&amp;#039;s ipv6 address changes frequently - this was correct in Jan 2012, it may not be now!&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
If this fails to work then your general IPv6 connectivity is broken! A few things to check if this is the case:&lt;br /&gt;
&lt;br /&gt;
* Can successfully ping your router? &lt;br /&gt;
* Check your IPv6 routing table:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  C:\Users\user1&amp;gt;route print&lt;br /&gt;
  ===========================================================================&lt;br /&gt;
  Interface List&lt;br /&gt;
   11...XX XX XX XX XX XX ......Intel(R) Centrino(R) Advanced-N 6200 AGN&lt;br /&gt;
   10...YY YY YY YY YY YY ......Atheros AR8131 PCI-E Gigabit Ethernet Controller&lt;br /&gt;
    1...........................Software Loopback Interface 1&lt;br /&gt;
   17...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter&lt;br /&gt;
   15...00 00 00 00 00 00 00 e0 Teredo Tunneling Pseudo-Interface&lt;br /&gt;
  ===========================================================================   &lt;br /&gt;
  IPv4 Route Table&lt;br /&gt;
  ===========================================================================&lt;br /&gt;
  removed for clarity&lt;br /&gt;
  ...&lt;br /&gt;
  ===========================================================================&lt;br /&gt;
  Persistent Routes:&lt;br /&gt;
    None &lt;br /&gt;
  &lt;br /&gt;
  IPv6 Route Table&lt;br /&gt;
  ===========================================================================&lt;br /&gt;
  Active Routes:&lt;br /&gt;
   If Metric Network Destination      Gateway&lt;br /&gt;
   &amp;#039;&amp;#039;&amp;#039;11    281 ::/0                     fe80::XXXX:XXXX:XXXX:XXXX&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
    1    306 ::1/128                  On-link&lt;br /&gt;
   15     58 2XXX::/32                On-link&lt;br /&gt;
   15    306 2XXX:X:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX/128&lt;br /&gt;
                                      On-link&lt;br /&gt;
   11     33 2XXX:XXXX:XXXX:XXXX::/64 On-link&lt;br /&gt;
   11    281 2XXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX/128&lt;br /&gt;
                                      On-link&lt;br /&gt;
   11    281 2XXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX/128&lt;br /&gt;
                                      On-link&lt;br /&gt;
   11    281 fe80::/64                On-link&lt;br /&gt;
   15    306 fe80::/64                On-link&lt;br /&gt;
   15    306 fe80::XXXX:XXXX:XXXX:XXXX/128&lt;br /&gt;
                                      On-link&lt;br /&gt;
   11    281 fe80::XXXX:XXXX:XXXX:XXXX/128&lt;br /&gt;
                                      On-link&lt;br /&gt;
    1    306 ff00::/8                 On-link&lt;br /&gt;
   15    306 ff00::/8                 On-link&lt;br /&gt;
   11    281 ff00::/8                 On-link&lt;br /&gt;
  ===========================================================================&lt;br /&gt;
  Persistent Routes:&lt;br /&gt;
    None&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Or for a linux host:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  machine:/home/user1 # &amp;#039;&amp;#039;&amp;#039;ip -6 route show&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
  2XXX:XXXX:XXXX:XXXX::/64 via :: dev tun-ipv6  proto kernel  metric 256  mtu 1280 advmss 1220 hoplimit 4294967295&lt;br /&gt;
  2XXX:XXXX:XXXX:XX::/64 dev eth0 proto kernel  metric 256  mtu 1500 advmss 1440 hoplimit 4294967295&lt;br /&gt;
  fe80::/64 dev eth0  proto kernel  metric 256  mtu 1500 advmss 1440 hoplimit 4294967295&lt;br /&gt;
  fe80::/64 via :: dev tun-ipv6  proto kernel  metric 256  mtu 1280 advmss 1220 hoplimit 4294967295&lt;br /&gt;
  &amp;#039;&amp;#039;&amp;#039;default via 2XXX:XXXX:XXXX:XXXX::X dev tun-ipv6  metric 1024  mtu 1280 advmss 1220 hoplimit 4294967295&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== DNS Related Issues ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If the direct ping6 does work then your DNS AAAA-record lookups may be broken. To check whether you can perform IPv6 AAAA lookups, at a command prompt try:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  nslookup -type=aaaa ipv6.chappell-family.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
you should see a response similar to:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  Server:         ::1&lt;br /&gt;
  Address:        ::1#53&lt;br /&gt;
  &lt;br /&gt;
  Non-authoritative answer:&lt;br /&gt;
  ipv6.chappell-family.com        has AAAA address 2001:470:1f08:185c::2&lt;br /&gt;
  &lt;br /&gt;
  Authoritative answers can be found from:&lt;br /&gt;
  ipv6.chappell-family.com        nameserver = ns4.he.net.&lt;br /&gt;
  ipv6.chappell-family.com        nameserver = ns2.he.net.&lt;br /&gt;
  ipv6.chappell-family.com        nameserver = ns1.he.net.&lt;br /&gt;
  ipv6.chappell-family.com        nameserver = ns3.he.net.&lt;br /&gt;
  ns1.he.net      internet address = 216.218.130.2&lt;br /&gt;
  ns2.he.net      internet address = 216.218.131.2&lt;br /&gt;
  ns2.he.net      has AAAA address 2001:470:200::2&lt;br /&gt;
  ns3.he.net      internet address = 216.218.132.2&lt;br /&gt;
  ns3.he.net      has AAAA address 2001:470:300::2&lt;br /&gt;
  ns4.he.net      internet address = 216.66.1.2&lt;br /&gt;
  ns4.he.net      has AAAA address 2001:470:400::2&lt;br /&gt;
  &lt;br /&gt;
&lt;br /&gt;
Based on the fact that must have already accessed the IPscan domain using IPv4, in order to be reading this, then the following IPv4 A-record lookup should work:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  &amp;#039;&amp;#039;&amp;#039;nslookup ipv6.chappell-family.com&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
    &lt;br /&gt;
  &lt;br /&gt;
  Server:         ::1&lt;br /&gt;
  Address:        ::1#53&lt;br /&gt;
  &lt;br /&gt;
  Non-authoritative answer:&lt;br /&gt;
  Name:   ipv6.chappell-family.com&lt;br /&gt;
  Address: B.C.D.E&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you don&amp;#039;t get a similar response then you need to investigate your DNS setup, or perhaps your ISP&amp;#039;s.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== DNS Resolver Issues ===&lt;br /&gt;
&lt;br /&gt;
Some DNS services don&amp;#039;t seem to reliably resolve AAAA lookups. In particular, some appear to resolve A and AAAA records with different delays, and/or reliability, which sometimes causes web-browsers to determine that only an IPv4 address exists since the IPv6 lookup resolves too slowly/unreliably. You can try one of the publicly accessible DNS resolvers as an alternative to your current providers&amp;#039; if you believe that this might be the case. For those using a tunneled IPv6 connection then it is likely that your tunnel provider also offers a DNS resolver:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Hurricane Electric - see Available DNS resolvers section of your tunnel setup (may be 2001:470:20::2 and 74.82.42.42)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Other public IPv6 DNS resolvers:&lt;br /&gt;
&lt;br /&gt;
* [https://developers.google.com/speed/public-dns/docs/using Google DNS Servers]&lt;br /&gt;
* [https://support.opendns.com/hc/en-us/articles/227986667-Does-OpenDNS-Support-IPv6- OpenDNS IPv6]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The order in which you list the resolvers in your DNS search list is important - so when trying a new resolver ensure that you place it at the front of your resolver list. Note that it is worth checking that you can communicate with the resolver &amp;#039;&amp;#039;&amp;#039;before&amp;#039;&amp;#039;&amp;#039; modifying your resolver list - if the resolver fails to respond then you may encounter significant delays when attempting to lookup a host. In a linux environment this can be checked using a command similar to:&lt;br /&gt;
&lt;br /&gt;
  machine:/home/user1 # &amp;#039;&amp;#039;&amp;#039;host ipv6.chappell-family.com 2001:4860:4860::8888&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  Using domain server:&lt;br /&gt;
  Name: 2001:4860:4860::8888&lt;br /&gt;
  Address: 2001:4860:4860::8888#53&lt;br /&gt;
  Aliases:&lt;br /&gt;
  &lt;br /&gt;
  ipv6.chappell-family.com has address 212.159.122.74&lt;br /&gt;
  ipv6.chappell-family.com has IPv6 address 2001:470:1f08:185c::2&lt;br /&gt;
  ipv6.chappell-family.com mail is handled by 10 mail.ipv6.chappell-family.com.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Note that it isn&amp;#039;t necessary to access your DNS resolver using IPv6 if you don&amp;#039;t want to - as long as the DNS server supports AAAA queries then this is sufficient. The same query, but on a windows machine, using Google&amp;#039;s IPv4 resolver:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  C:\Users\user1&amp;gt;&amp;#039;&amp;#039;&amp;#039;nslookup ipv6.chappell-family.com 8.8.4.4&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
  Server:  google-public-dns-b.google.com&lt;br /&gt;
  Address:  8.8.4.4&lt;br /&gt;
  &lt;br /&gt;
  Non-authoritative answer:&lt;br /&gt;
  Name:    ipv6.chappell-family.com&lt;br /&gt;
  Addresses:  2001:470:1f08:185c::2&lt;br /&gt;
            212.159.122.74&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== WINDOWS 7 RESPONSES ===&lt;br /&gt;
&lt;br /&gt;
A correctly configured Windows 7 machine shows the following responses:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
ipv6.chappell-family.com has two DNS entries (AAAA and A records) and consequently returns two addresses:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  nslookup ipv6.chappell-family.com&lt;br /&gt;
  &lt;br /&gt;
  Server:  server.example.com&lt;br /&gt;
  Address:  192.168.33.1&lt;br /&gt;
  &lt;br /&gt;
  Non-authoritative answer:&lt;br /&gt;
  Name:    ipv6.chappell-family.com&lt;br /&gt;
  Addresses:  2001:470:1f08:185c::2&lt;br /&gt;
              212.159.122.74&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
www6.ipv6.chappell-family.co.uk has a single AAAA DNS record:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  nslookup www6.ipv6.chappell-family.co.uk&lt;br /&gt;
    &lt;br /&gt;
  Server:  server.example.com&lt;br /&gt;
  Address:  192.168.33.1&lt;br /&gt;
  &lt;br /&gt;
  Name:    www6.ipv6.chappell-family.co.uk&lt;br /&gt;
  Address:  2001:470:1f08:185c::2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Assuming these work correctly then a ping should also resolve:&lt;br /&gt;
&lt;br /&gt;
  ping www6.ipv6.chappell-family.co.uk&lt;br /&gt;
  &lt;br /&gt;
  Pinging www6.ipv6.chappell-family.co.uk [2001:470:1f08:185c::2] with 32 bytes of data:&lt;br /&gt;
  Reply from 2001:470:1f08:185c::2: time&amp;lt;1ms&lt;br /&gt;
  Reply from 2001:470:1f08:185c::2: time&amp;lt;1ms&lt;br /&gt;
  Reply from 2001:470:1f08:185c::2: time&amp;lt;1ms&lt;br /&gt;
  Reply from 2001:470:1f08:185c::2: time&amp;lt;1ms&lt;br /&gt;
  &lt;br /&gt;
  Ping statistics for 2001:470:1f08:185c::2:&lt;br /&gt;
      Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),&lt;br /&gt;
  Approximate round trip times in milli-seconds:&lt;br /&gt;
      Minimum = 0ms, Maximum = 0ms, Average = 0ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Browser IPv6 Prioritisation ===&lt;br /&gt;
&lt;br /&gt;
If all of the above was successful then your browser may not be prioritising IPv6 DNS requests. The following browsers are known to support IPv6 prioritisation:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Microsoft&amp;#039;s Internet Explorer, &lt;br /&gt;
* Google&amp;#039;s Chrome&lt;br /&gt;
* Apple&amp;#039;s Safari&lt;br /&gt;
* Mozilla&amp;#039;s Firefox (but see the section below) &lt;br /&gt;
* w3m &lt;br /&gt;
* lynx &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you believe your browser is not prioritising IPv6 then check whether you can access the following URLs:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://ipv6.google.com Google&amp;#039;s IPv6-only-URL]&lt;br /&gt;
* [http://www6.chappell-family.co.uk/ An IPv6-only-URL]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Both of the above links are for IPv6-only websites - i.e. they have no IPv4 DNS entry - so if you get an error accessing these websites despite being able to perform the DNS lookups correctly then your browser is not prioritising IPv6.&lt;br /&gt;
&lt;br /&gt;
At this point it would be worthwhile checking whether another browser (from the list above) gives the same result.&lt;br /&gt;
&lt;br /&gt;
=== Firefox IPv6 DNS Prioritisation Specific ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Firefox has a specific configuration option with which to disable IPv6 DNS queries (I recently came across Firefox on Linux Mint v12 being configured this way). The option can be displayed by entering the following url into firefox:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  about:config&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Accept the warning about dragons, and then in the filter bar enter:&lt;br /&gt;
&lt;br /&gt;
  ipv6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The resulting list should now show an entry:&lt;br /&gt;
  &lt;br /&gt;
  network.dns.disableIPv6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If this entry is set to &amp;#039;&amp;#039;&amp;#039;true&amp;#039;&amp;#039;&amp;#039; then double click on the entry to change its sense to &amp;#039;&amp;#039;&amp;#039;FALSE&amp;#039;&amp;#039;&amp;#039;. Then try again!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== IPv6-only URL Test ===&lt;br /&gt;
&lt;br /&gt;
and finally pointing your web browser towards the [http://www64.chappell-family.co.uk/cgi-bin6/ipscanjs.cgi IPv6-only Raspberry Pi Powered port scanner] should also work.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=590</id>
		<title>ScanAutomation</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=590"/>
		<updated>2022-07-09T17:16:16Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==IPscan IPv6 Port Scan Automation==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of automated IPv6 firewall testing (IPv6 TCP and UDP port scans) using wget and IPscan. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Terms of Use===&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Please ensure that you accept the &amp;#039;&amp;#039;[https://wiki.chappell-family.com/wiki/index.php?title=Timswiki:About terms of use]&amp;#039;&amp;#039; and are authorised to perform IPv6 port scans against the machine that you wish to test &amp;#039;&amp;#039;BEFORE&amp;#039;&amp;#039; attempting any of the steps outlined below. Please also ensure that you are not accessing web pages using an HTTP proxy. If in doubt then a web proxy can be disabled by following the command-line examples shown below.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a [[Timswiki:Privacy_policy]]. Continued use of this website implies your consent to the storage of data outlined in the policy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Rules for Forming the URL===&lt;br /&gt;
&lt;br /&gt;
It is possible to request automatic scans using &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;wget&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; but the URLs must be constructed as shown below. In each case you &amp;#039;&amp;#039;&amp;#039;MUST:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* target the IPscan IPv6 host and IPv6 cgi-bin directory (www64.chappell-family.co.uk/cgi-bin6/)&lt;br /&gt;
* use the text-browser compatible cgi target (ipscan-txt.cgi)&lt;br /&gt;
* include an includeexisting query term, setting it to either 1 (include default ports [[IPv6_Ports]]) or -1 (exclude default ports)&lt;br /&gt;
* include all 4 customport terms (numbered 0 to 3), setting them equal to nothing if they are unused&lt;br /&gt;
* include the termsaccepted term, setting it to 1 to indicate your acceptance of the terms and conditions&lt;br /&gt;
* ensure that there are no spaces in the query string, particularly if using cut&amp;#039;n&amp;#039;paste&lt;br /&gt;
* wrap the resulting URL in quotes to ensure that the ampersand characters are not mis-interpreted&lt;br /&gt;
&lt;br /&gt;
Failure to follow all of the above rules will result in a failure to scan your host. I&amp;#039;d also suggest that you specify a desired output document in the wget command-line - otherwise the filename will be based on the called URL and so will be somewhat convoluted!&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you include the default ports (includeexisting=1) then the scan will take up to approximately 15 seconds to complete - please be patient!&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===Windows Users - please READ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re intending to test a windows PC, then you need to be careful which pre-compiled version of wget you have installed. Some of the available versions do not include IPv6 support. The download at the following link is known to work on windows 7:&lt;br /&gt;
&lt;br /&gt;
* [http://gnuwin32.sourceforge.net/packages/wget.htm http://gnuwin32.sourceforge.net/packages/wget.htm]&lt;br /&gt;
&lt;br /&gt;
Another good solution for PC users can be found within the [http://www.cygwin.com/ Cygwin] tool. Wget on Cygwin is built with the following options:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ wget -V&lt;br /&gt;
GNU Wget 1.13.4 built on cygwin.&lt;br /&gt;
&lt;br /&gt;
+digest +https +ipv6 +iri +large-file +nls -ntlm +opie +ssl/gnutls&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Example Scans==&lt;br /&gt;
&lt;br /&gt;
Now for some concrete examples:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing just the UDP and TCP default port list===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www64.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;  &lt;br /&gt;
  --2012-01-28 14:28:03--  https://www64.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&lt;br /&gt;
  Resolving www64.chappell-family.co.uk... 2001:470:971f:6::4&lt;br /&gt;
  Connecting to www64.chappell-family.co.uk|2001:470:971f:6::4|:443... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10147 (9.9K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039; &lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,147      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:28:03 (165 MB/s) - `ipv6.html&amp;#039; saved [10147/10147]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports and a single TCP port, e.g. 8080===&lt;br /&gt;
  &lt;br /&gt;
  &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www64.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:37:21--  https://www64.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&lt;br /&gt;
  Resolving www64.chappell-family.co.uk... 2001:470:971f:6::4&lt;br /&gt;
  Connecting to www64.chappell-family.co.uk|2001:470:971f:6::4|:443... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 7323 (7.2K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 7,323       --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:37:21 (112 MB/s) - `ipv6.html&amp;#039; saved [7323/7323]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports, the default TCP ports list and 3 custom TCP ports===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www64.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:39:53--  https://www64.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&amp;amp;termsaccepted=1&lt;br /&gt;
  Resolving www64.chappell-family.co.uk... 2001:470:971f:6::4&lt;br /&gt;
  Connecting to www64.chappell-family.co.uk|2001:470:971f:6::4|:443... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10263 (10K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,263      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:39:54 (222 MB/s) - `ipv6.html&amp;#039; saved [10263/10263]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Testing on Ubiquity ERlite Routers===&lt;br /&gt;
&lt;br /&gt;
On the router:&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo /usr/bin/curl -G &amp;lt;nowiki&amp;gt;&amp;#039;https://www64.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039;&amp;lt;/nowiki&amp;gt; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/ipv6.html&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo scp /tmp/ipv6.html &amp;lt;user&amp;gt;@&amp;lt;host&amp;gt;:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo rm -f /tmp/ipv6.html&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Exchange &amp;lt;user&amp;gt; and &amp;lt;host&amp;gt; for an applicable account and machine name to transfer the results file to.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;sudo /usr/bin/curl -G &amp;lt;nowiki&amp;gt;&amp;#039;https://www64.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039;&amp;lt;/nowiki&amp;gt; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/ipv6.html&lt;br /&gt;
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current&lt;br /&gt;
                                 Dload  Upload   Total   Spent    Left  Speed&lt;br /&gt;
100  2844  100  2844    0     0     30      0  0:01:34  0:01:33  0:00:01   627&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===HTML Results Scraping===&lt;br /&gt;
&lt;br /&gt;
It is possible to open the resulting ipv6.html file in a local web-browser, however you may prefer to summarise the results for easier checking. Here is a very quick and inelegant example of [[ResultScraping]] the returned html file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=IPv6_SpecialTests&amp;diff=589</id>
		<title>IPv6 SpecialTests</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=IPv6_SpecialTests&amp;diff=589"/>
		<updated>2022-07-09T17:14:46Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: /* Links to other material */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==IPv6 Special Tests==&lt;br /&gt;
&lt;br /&gt;
IPscan includes the following tests to identify known weak protocols or poorly configured services, which may be exploited.&lt;br /&gt;
&lt;br /&gt;
It is important to note that the same exploits may well apply to IPv4 hosts running the same protocols.&lt;br /&gt;
&lt;br /&gt;
===Links to other material===&lt;br /&gt;
&lt;br /&gt;
* [[IPv6]] - an overview of IPscan (IPv6 Port Scanner)&lt;br /&gt;
* [[IPv6_Firewalls]] - some observations on IPv6 firewalls and address selections&lt;br /&gt;
* [[IPv6_Ports]] - a list of the default TCP/IP and UDP/IP ports which IPscan will test&lt;br /&gt;
* [[ScanStatus]] - a description of the reportable states for each tested TCP/IP or UDP/IP port&lt;br /&gt;
* [[ScanAutomation]] - a quick overview of IPv6 TCP/UDP port scan automation using wget&lt;br /&gt;
* [[IPv6_DEBUG]] - some steps for debugging IPv6 access to the IPscan IPv6 Port Scanner&lt;br /&gt;
* [[IPv6_Windows7]] - some useful Win7 IPv6-related commands&lt;br /&gt;
* [[Raspberry_Pi_IPv6_firewall_tester]] - a quick HowTo describing the steps to make your own RasPi-powered IPv6 firewall tester.&lt;br /&gt;
&lt;br /&gt;
===NTP Monitor List Query &amp;#039;&amp;#039;&amp;#039;UDP/123[1]&amp;#039;&amp;#039;&amp;#039;===&lt;br /&gt;
&lt;br /&gt;
The NTP protocol daemon, in versions prior to 4.2.7, supported a feature which reported a list of up to 600 clients which had used the queried NTP server as their time reference. &lt;br /&gt;
&lt;br /&gt;
If an attacker uses a spoofed source address then a victim can be flooded with considerable NTP traffic. The size of the response is typically considerably larger than the request and consequently the attacker is able to amplify the volume of traffic directed at the victim. Additionally, because the responses are legitimate data coming from valid servers, it is especially difficult to block these types of attacks. The solution is to disable “monlist” within the NTP server or to upgrade to the latest version of NTP (4.2.7) which disables the “monlist” functionality.&lt;br /&gt;
&lt;br /&gt;
To prevent your NTP daemon being used in DDoS attacks it is necessary to disable “monlist” functionality. On a public-facing NTP server that cannot be updated to version 4.2.7 or later, add the “noquery” directive to the “restrict default” line in the system’s ntpd.conf, as shown below:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
restrict default kod nomodify notrap nopeer noquery&lt;br /&gt;
restrict -6 default kod nomodify notrap nopeer noquery&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
See [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5211 CVE-2013-5211] for further details.&lt;br /&gt;
&lt;br /&gt;
===SNMP Queries &amp;#039;&amp;#039;&amp;#039;UDP/161&amp;#039;&amp;#039;&amp;#039;===&lt;br /&gt;
&lt;br /&gt;
IPscan performs three SNMP queries. SNMP supports a variety of versions and authentication methods and since IPscan cannot know the credentials to use to test your system it defaults to using commonly-used, and therefore &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;insecure&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;, community strings.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;TABLE border=&amp;quot;1&amp;quot; style=&amp;quot;width:300px&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;TR&amp;gt;&amp;lt;TH&amp;gt;Port/Special Case&amp;lt;/TH&amp;gt;&amp;lt;TH&amp;gt;SNMP version&amp;lt;/TH&amp;gt;&amp;lt;TH&amp;gt;Test performed, credentials used&amp;lt;/TH&amp;gt;&amp;lt;/TR&amp;gt;&lt;br /&gt;
&amp;lt;TR&amp;gt;&amp;lt;TD&amp;gt;UDP/161&amp;lt;/TD&amp;gt;&amp;lt;TD&amp;gt;v1&amp;lt;/TD&amp;gt;&amp;lt;TD&amp;gt;GET with &amp;#039;public&amp;#039; community string&amp;lt;/TD&amp;gt;&amp;lt;/TR&amp;gt;&lt;br /&gt;
&amp;lt;TR&amp;gt;&amp;lt;TD&amp;gt;UDP/161[1]&amp;lt;/TD&amp;gt;&amp;lt;TD&amp;gt;v2c&amp;lt;/TD&amp;gt;&amp;lt;TD&amp;gt;GET with &amp;#039;private&amp;#039; community string&amp;lt;/TD&amp;gt;&amp;lt;/TR&amp;gt;&lt;br /&gt;
&amp;lt;TR&amp;gt;&amp;lt;TD&amp;gt;UDP/161[2]&amp;lt;/TD&amp;gt;&amp;lt;TD&amp;gt;v3&amp;lt;/TD&amp;gt;&amp;lt;TD&amp;gt;EngineID Discovery, credentials not required&amp;lt;/TD&amp;gt;&amp;lt;/TR&amp;gt;&lt;br /&gt;
&amp;lt;/TABLE&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy. Continued use of this website implies your consent to the use of data outlined in the policy. &lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=ScanStatus&amp;diff=588</id>
		<title>ScanStatus</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=ScanStatus&amp;diff=588"/>
		<updated>2022-07-09T17:13:59Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: /* Reported Status for Tim&amp;#039;s IPv6 Port Scanner */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Reported Status for the IPscan IPv6 Port Scanner==&lt;br /&gt;
&lt;br /&gt;
For an overview of the scanner, including example results and capabilities, please see the introduction at &amp;#039;&amp;#039;&amp;#039;[[IPv6]]&amp;#039;&amp;#039;&amp;#039;. For IANA ICMPv6 mappings please see &amp;#039;&amp;#039;&amp;#039;[[ICMPv6_Types_Codes]]&amp;#039;&amp;#039;&amp;#039;. If you&amp;#039;re interested in test automation then please see the &amp;#039;&amp;#039;&amp;#039;[[ScanAutomation]]&amp;#039;&amp;#039;&amp;#039; section. &lt;br /&gt;
&lt;br /&gt;
Each port tested by the &amp;#039;&amp;#039;&amp;#039;[https://ipv6.chappell-family.com/ipv6tcptest/ IPscan IPv6 Port Scanner]&amp;#039;&amp;#039;&amp;#039; will return one of the following states:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th scope=&amp;quot;col&amp;quot;&amp;gt;Port Status&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th scope=&amp;quot;col&amp;quot;&amp;gt;Definition&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;OPEN&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;An IPv6 TCP connection was successfully established to this port. You should check that this is the expected outcome since an attacker may be able to compromise your machine by accessing this IPv6 address/port combination.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;green&amp;quot;&amp;gt;STLTH&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;No response was received from your machine in the allocated time period. This is the ideal response since no-one can ascertain your machines&amp;#039; presence at this IPv6 address/port combination.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;ABRT&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;An abort indication was received when attempting to open this port. Someone can ascertain that your machine is responding on this IPv6 address/port combination, but cannot establish a TCP connection.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;RFSD&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A refused indication (TCP RST/ACK or ICMPv6 type 1 code 4) was received when attempting to open this port. Someone can ascertain that your machine is responding on this IPv6 address/port combination, but cannot establish a TCP connection.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;CRST&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A connection reset request was received when attempting to open this port. Someone can ascertain that your machine is responding on this IPv6 address/port combination, but cannot establish a TCP connection.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;NRST&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A network reset request was received when attempting to open this port. Someone can ascertain that your machine is responding on this IPv6 address/port combination, but cannot establish a TCP connection.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;PHBTD&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;An administratively prohibited response (ICMPv6 type 1 code 1) was received when attempting to open this port. Someone can ascertain that your machine is responding on this IPv6 address/port combination, but cannot establish a TCP connection.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;NUNRCH&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;An unreachable response (ICMPv6 type 1 code 0) was received when attempting to open this port. Someone can ascertain that your machine is responding on this IPv6 address/port combination, but cannot establish a TCP connection.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;HUNRCH&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A No route to host response (ICMPv6 type 1 code 3 or ICMPv6 type 3) was received when attempting to open this port. Someone can ascertain that your machine is responding on this IPv6 address/port combination, but cannot establish a TCP connection.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;TOOBIG&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Packet too big response (ICMPv6 type 2) was received when attempting to open this port. Someone can ascertain that your machine is responding on this IPv6 address/port combination, but cannot establish a TCP connection.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;PRMPRB&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Parameter problem response (ICMPv6 type 4) was received when attempting to open this port. Someone can ascertain that your machine is responding on this IPv6 address/port combination, but cannot establish a TCP connection.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;red&amp;quot;&amp;gt;UDPOPEN&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A valid UDP response was received in response to the UDP packet sent to this port. You should check that this is the expected outcome since an attacker may be able to compromise your machine by accessing this IPv6 address/port combination.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;green&amp;quot;&amp;gt;UDPSTEALTH&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;No UDP response was received from your machine in the allocated time period. This is the ideal response since no-one can ascertain your machines&amp;#039; presence at this IPv6 address/port combination.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;NOTE: Results in the ICMPv6 ECHO REQUEST test marked as INDIRECT indicate an ICMPv6 error response was received from another host (e.g. a router or firewall) rather than the host under test. In this case the IPv6 address of the responding host is also displayed.&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=IPv6_Ports&amp;diff=587</id>
		<title>IPv6 Ports</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=IPv6_Ports&amp;diff=587"/>
		<updated>2022-07-09T17:12:35Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: /* IPv6 Firewall Tester Default Port List */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== IPv6 Firewall Tester Default Port List ==&lt;br /&gt;
&lt;br /&gt;
IPscan tests a selection of the most commonly used service ports.&lt;br /&gt;
&lt;br /&gt;
If you wish to test the firewall of your IPv6 host then please point your browser towards the &amp;#039;&amp;#039;&amp;#039;[https://ipv6.chappell-family.com/ipv6tcptest/ IPscan IPv6 tester]&amp;#039;&amp;#039;&amp;#039;. For an overview of the tester please see &amp;#039;&amp;#039;&amp;#039;[[IPv6]]&amp;#039;&amp;#039;&amp;#039;. For an explanation of test automation please see &amp;#039;&amp;#039;&amp;#039;[[ScanAutomation]]&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The list of default IPv6 TCP ports which can be tested, and their common usage is defined in the table below:&lt;br /&gt;
&lt;br /&gt;
==TCP Ports==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th scope=&amp;quot;col&amp;quot;&amp;gt;Port Number&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th scope=&amp;quot;col&amp;quot;&amp;gt;Description of the traffic usually assigned to this port&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;7&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Echo - often used for test/development purposes.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;21&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;File Transfer (FTP) control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;22&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Secure Shell (SSH) Protocol&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;23&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Telnet&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;25&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Simple Mail Transfer Protocol (SMTP)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;37&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Time&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;53&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Domain Name Server (DNS)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;79&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Finger&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;80&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;World Wide Web (HTTP)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;88&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Kerberos&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;110&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Post Office Protocol - Version 3 (POP3)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;111&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Sun Remote Procedure Call (RPC)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;113&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Authentication Service (ident, auth)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;119&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Network News Transfer Protocol (NNTP)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;135&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;DCE endpoint resolution (epmap), Microsoft EPMAP RPCs, Messenger services&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;137&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;NETBIOS Name Service&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;138&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;NETBIOS Datagram Service&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;139&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;NETBIOS Session Service&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;143&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Internet Message Access Protocol (IMAP)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;311&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AppleShare IP WebAdmin, MAC OSX server admin&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;389&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Lightweight Directory Access Protocol (LDAP)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;427&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Server Location (SLP)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;443&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;HTTP Protocol over TLS/SSL (HTTPS)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;445&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Microsoft-DS (SMB, Samba)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;514&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Shell&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;543&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Kerberos login&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;544&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Kerberos remote shell&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;548&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Apple Filing Protocol over TCP&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;631&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Internet Printing Protocol (IPP)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;749&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Kerberos Administration&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;873&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Rsync&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;993&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;IMAP4 Protocol over TLS/SSL (IMAPS)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1025&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Network Blackjack, sometimes NFS, IIS or RFS&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1026&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Calendar Access Protocol (CAP), Microsoft DCOM&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1029&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Solid Mux Server, Microsoft DCOM&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1030&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;BBN IAD&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1080&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SOCKS&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1720&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;H.323 Hostcall - including Microsoft Netmeeting&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2869&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SSDP event notification&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;3128&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Active API Server Port (also default for Squid proxy)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;3306&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MySQL&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;3389&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MS Windows Based Terminal Server (RDP)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;3689&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Digital Audio Access Protocol (DAAP, iTunes)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;5000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Commplex-main (Windows Universal Plug and Play service - UPNP)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;5100&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Socalia service mux, Yahoo Messenger, Webcams&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;5357&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;WSDAPI HTTP&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;5900&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Remote Framebuffer (VNC Server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;8080&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;HTTP alternate&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;9090&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;WebSM&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;10243&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;WMP HTTP&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;11211&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;memcache&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;16992-4&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Intel AMT&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;32764&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Common Router backdoor&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==UDP Ports==&lt;br /&gt;
&lt;br /&gt;
The list of IPv6 UDP ports which will always be tested, and their common usage is defined in the table below:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th scope=&amp;quot;col&amp;quot;&amp;gt;Port Number&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th scope=&amp;quot;col&amp;quot;&amp;gt;Description of the traffic usually assigned to this port&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;53&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;DNS&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;69&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TFTP&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;123&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;NTP&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;161&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SNMP&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;500&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;IKE&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;521&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RIPng&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;547&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;DHCPv6&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1900&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;UPnP (SSDP)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;3503&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;LSP Ping&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;4500&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;IKE-NATT&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;11211&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;memcache (ASCII and binary)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=IPv6_Firewalls&amp;diff=586</id>
		<title>IPv6 Firewalls</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=IPv6_Firewalls&amp;diff=586"/>
		<updated>2022-07-09T17:11:49Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: /* Testing your IPv6 Firewall */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==IPv6 Firewalls==&lt;br /&gt;
&lt;br /&gt;
===General Observations===&lt;br /&gt;
&lt;br /&gt;
IPv6 firewalls are separate from, and often control network traffic in different ways to, current IPv4 firewalls. IPv4 has evolved from its original flat architecture to involve multiple layers of hierarchy in order to support the burgeoning number of nodes that make up the internet. Not only can the imposed hierarchy offer some security in itself but clients have often relied on their online visibility and security being provided by another node (e.g. an ADSL router). This assumed protection, and the likelihood that it is missing if you connect your client to a foreign (non-home) network, is behind the frequently reported incidents of &amp;quot;coffee shop&amp;quot; wifi attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IPv6 intends to revert the network hierarchy back towards a flat structure, where any node can talk directly to any other IPv6 node. In line with this approach routers &amp;#039;&amp;#039;&amp;#039;may&amp;#039;&amp;#039;&amp;#039; or &amp;#039;&amp;#039;&amp;#039;may not&amp;#039;&amp;#039;&amp;#039; firewall IPv6 traffic for clients that operate behind them. This has several implications for the clients:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Clients may have globally routable IPv6 addresses&lt;br /&gt;
* Clients may be solely responsible for their own security/firewall protection (safest to assume this is the case for both IPv6 and IPv4)&lt;br /&gt;
* Clients may have more than one active IPv6 address&lt;br /&gt;
* Clients may frequently change their IPv6 address if using privacy addresses, as per [http://tools.ietf.org/html/rfc4941 RFC4941]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In response to this many of the current IPv6-enabled client devices (e.g. iOS and Android devices) include their own IPv6 firewalls, which are usually enabled by default.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IPv6 brings two other scenarios that mobile clients (i.e. those connecting to more than one network) need to consider:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Currently shipping operating systems have IPv6 enabled by default&lt;br /&gt;
* Even if your home network doesn&amp;#039;t have IPv6 enabled, you can&amp;#039;t assume other networks won&amp;#039;t have&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As a consequence of all of the above changes it is imperative that you &amp;#039;&amp;#039;&amp;#039;ensure that your IPv6-enabled client devices have their IPv6 firewall enabled&amp;#039;&amp;#039;&amp;#039;, and it is protecting the services running on your client. It is also advisable to disable any IPv6 services that you do not require (e.g. tunneling protocols that you are not actively using - this is especially applicable to Windows 7 clients).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
One other change IPv6 introduces compared to IPv4 is that additional ICMP traffic flows are necessary for normal protocol signalling whereas it was predominantly used for error-case reporting in IPv4 networks. This requires IPv6 firewalls to admit certain [[ICMPv6_Types_Codes]] in order to handle IPv6 address allocation, neighbour discovery (IPv6 replacement for ARP) and several other IPv6 processes. For many client devices this will be handled directly by the firewall itself, but if you are developing your own IPv6 firewall then you need to ensure you follow the recommendations in [http://www.ietf.org/rfc/rfc4890.txt RFC4890] which includes an ip6tables packet filter example.&lt;br /&gt;
&lt;br /&gt;
===IPv6 Addresses===&lt;br /&gt;
&lt;br /&gt;
One other observation relates to the selection of an IPv6 address for your host. There are three main IPv6 address allocation approaches:&lt;br /&gt;
&lt;br /&gt;
* Static unicast address allocation&lt;br /&gt;
* Stateless Address Autoconfiguration (SLAAC)&lt;br /&gt;
* DHCPv6&lt;br /&gt;
&lt;br /&gt;
A full IPv6 address is composed of a network address part (perhaps 64 bits) and a host address part (often 64 bits). Dependant upon the scheme that your host uses you &amp;#039;&amp;#039;&amp;#039;may&amp;#039;&amp;#039;&amp;#039; be able to freely select the host address part - e.g. when using static address allocation. Despite what you may find written elsewhere you are only safe from IPv6 port scans if the address of your machine is not easily discoverable within its IPv6 subnet. On this basis I suggest that you fight the urge to allocate easy to type/remember addresses (e.g. &amp;lt;network-address-part&amp;gt;::1 and any that use a mix of frequently used hexadecimal addresses that spell words - i.e. 0xdead, 0xbeef, 0xface). Many machines appear to use such allocations in their host address part and if you were writing an IPv6 port scanner then surely addresses using such choices would be the place that you would start scanning? A DNS with suitable Quad-A entries is your friend in this situation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Other useful links:&lt;br /&gt;
&lt;br /&gt;
* [https://tools.ietf.org/id/draft-ietf-opsec-v6-12.html Operational Security Considerations for IPv6 Networks]&lt;br /&gt;
* [https://tools.ietf.org/html/rfc7707 Network Reconnaissance in IPv6 Networks]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing your IPv6 Firewall===&lt;br /&gt;
&lt;br /&gt;
As well as ensuring that your IPv6 firewall is enabled it is &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;strongly recommended&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; that you actively test that it is correctly protecting your host. I have received feedback from several disgruntled users detailing how their default firewall settings either weren&amp;#039;t blocking any IPv6 traffic at all (e.g. some DLINK IPv6 enabled products and certain UK ISP-provided firewalls) or were leaving critical services open for remote access. That is not to say that any of these products are necessarily &amp;quot;broken&amp;quot;, or &amp;quot;unfit for purpose&amp;quot;, merely that they don&amp;#039;t necessarily perform in the same way for IPv6 traffic as they did for IPv4 traffic. &lt;br /&gt;
&lt;br /&gt;
If you wish to verify the operation of your IPv6 firewall then try the [https://ipv6.chappell-family.com/ipv6tcptest/ IPscan IPv6 firewall checker] which checks your machine&amp;#039;s IPv6 Ping response and scans a set of UDP ports and user-defined TCP ports.&lt;br /&gt;
&lt;br /&gt;
A &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;starting point&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; for an IPv6 iptables-based firewall can be found in the [[Raspberry_Pi_IPv6_firewall_tester_installation]] section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=585</id>
		<title>IPv6</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=585"/>
		<updated>2022-07-09T17:10:15Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: /* Source code */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==The IPscan IPv6 Firewall Tester (ICMPv6, IPv6 TCP and UDP Port Scanner)==&lt;br /&gt;
&lt;br /&gt;
IPscan offers much of the functionality you might hope to find in an IPv6 version of [https://www.grc.com/ GRC&amp;#039;s ShieldsUp®] utility.&lt;br /&gt;
&lt;br /&gt;
=== Introduction ===&lt;br /&gt;
&lt;br /&gt;
Recent web-browsers request IPv6 DNS lookups in preference to IPv4 if they are running on a host with IPv6 enabled. The ipv6.chappell-family.com domain has DNS entries for both IPv4 and IPv6 addresses. This makes it possible for IPv4-only hosts, which make up most of the current web traffic, including search engines, to use the same URL. Browsers running on IPv4-only hosts will not request an IPv6 address and will therefore access the website entirely using IPv4. The landing page, as linked below, attempts to determine whether your machine has a valid globally routable IPv6 address (2000::/3) and whether it is behind an HTTP proxy, by looking for well known HTTP header variables which indicate that this may be the case. Only if the hosts&amp;#039; IP address is determined to be globally-routable unicast IPv6 and there are no tell-tale HTTP proxy variables will the landing page offer links to initiate the scan, as shown in the figure below.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_Landing_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) landing page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The tester is made available in two basic versions - one for browsers supporting javascript and the other suitable for text-only browsers such as Lynx, w3m and ELinks. The lightweight text-only browser version can be used on hosts which do not sport their own GUI environment (e.g. servers and embedded devices like routers). The original javascript browser version supports ongoing updates of the test status, whereas the text-only version only produces a results page once all the selected ports have been tested. Additionally, a fast and standard version of both of these testers is provided. The fast version tests multiple TCP or UDP ports in parallel, whereas the standard version tests only 1 port at a time, at a default rate of 1 port per second. Please be aware that some operating systems and firewalls apply rate-limiting to their generation, or passing, of ICMPv6 responses on the basis that this behaviour is indicative of a port scan being performed. Consequently such rate-limiting might cause a port which would normally generate an ICMPv6 response (e.g. PHBTD) to send no response at all, which IPscan would report as STEALTHed. If you are testing a host or firewall (whether on the client under test or elsewhere in the path between your client and the test server) which implements such rate-limiting then you are advised to use the standard, slower versions of IPscan which should not trigger the rate-limiting behaviour. If you&amp;#039;re unsure which version is appropriate for you, then try both and compare the results. Some Linux distributions and some ISP firewalls are known to implement such rate-limiting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please do NOT attempt to test hosts which are located behind HTTP proxies. Such proxies are very common in both corporate environments and on commercially-operated free wifi networks. The landing page for IPscan attempts to detect the common headers which such proxies insert, but it cannot detect truly transparent proxies. An HTTP Proxy is typically used by corporate networks to ensure employees are using their PCs in line with corporate computer-use policies. If you are interested in deploying your own HTTP proxy then [http://www.squid-cache.org/ Squid] is highly recommended as a proxy able to perform not only the usual access control and content-caching tasks but also offering IPv4 and IPv6 inter-working between single and dual-stack clients and web-sites. For further details please read the [https://ipv6.chappell-family.com/docs/IPv6_Squid_v01.pdf IPv6 Squid Proxy article.]&lt;br /&gt;
&lt;br /&gt;
=== The Test ===&lt;br /&gt;
&lt;br /&gt;
The tester allows a user to choose whether to include a commonly used set of &amp;#039;&amp;#039;&amp;#039;TCP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039; in their scan, as well as the ability to specify a number of their own specifically interesting TCP ports (this is intended to cover setups where you run services on non IANA-assigned ports, or just run less-common services). If you would like to see the list of commonly used ports expanded, or just changed, then please contact me.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_kickoff_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) original kickoff page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
The test begins by sending an ICMPv6 ECHO-REQUEST (an IPv6 ping) towards the host under test (HUT). The tester checks for related ICMPv6 responses from either the HUT or other hosts (e.g. routers and/or firewall devices protecting the HUT). If a response is detected from an host other than the HUT then the IPv6 address of this third-party is reported.   &lt;br /&gt;
 &lt;br /&gt;
The test continues by scanning a fixed set of commonly used &amp;#039;&amp;#039;&amp;#039;UDP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039;. The IPv6 UDP port test sets its&amp;#039; socket tx/rx timeouts to be 2 seconds - consequently the results can take up to 2s per tested UDP port - although the actual time depends heavily upon the filtering that your system employs (e.g. firewalls which mark protected ports as &amp;#039;unreachable&amp;#039; will resolve in much less than the allowed 2 second timeout assuming that your firewall sends the appropriate ICMPv6 packet in response).&lt;br /&gt;
&lt;br /&gt;
The test finishes by scanning the user-selected IPv6 TCP ports. The IPv6 TCP port test sets its&amp;#039; socket Tx/Rx timeouts to be 1 second - consequently the results can take up to 1s per tested port - although this depends heavily upon the filtering your system employs (e.g. firewalls which mark protected ports as &amp;#039;administratively prohibited&amp;#039; will resolve as PHBTD in much less than the allowed 1 second timeout assuming that your firewall sends an ICMPv6 type 1 code 1 packet in response).&lt;br /&gt;
&lt;br /&gt;
The tester will indicate the status of the tested UDP and TCP ports as either OPEN, STEALTHed or one of a series of other states depending on the positive or negative feedback received from your machine. A typical result is shown in the figures below. Note that if you run the test using an interactive gui-based browser then hovering over specific port numbers produces a pop-up describing the service run on that specific port. For a more detailed explanation of the reported states please read &amp;#039;&amp;#039;&amp;#039;[[ScanStatus]]&amp;#039;&amp;#039;&amp;#039;. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_results_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) IPscan results page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:IPscan_results_key1.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) IPscan results key (1 of 2) viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:IPscan_results_key2.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) IPscan results key (2 of 2) viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;&amp;#039;&amp;#039;&amp;#039;IMPORTANT:&amp;#039;&amp;#039;&amp;#039; this scanner will direct IPv6 TCP, UDP and ICMPv6 traffic towards the IP address that the webserver determines the request originates from. Please do NOT attempt to test machines that are operating behind transparent HTTP proxies, unless you also administer the proxy and specifically intend that machine to be tested.&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you wish to test your host now then please point your browser towards [https://ipv6.chappell-family.com/ipv6tcptest/ the IPv6 portscanner.]&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=== Test Server Source IPv6 Addresses ===&lt;br /&gt;
&lt;br /&gt;
Tests performed from the www64.chappell-family.co.uk host will be sourced from IPv6 address: &amp;#039;&amp;#039;&amp;#039;2001:470:971f:6::4&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
Note: during periods of planned server maintenance, a reduced service supporting only TCP testing may be offered, which will be sourced from an IPv6 address in the following range: &amp;#039;&amp;#039;&amp;#039;2001:8d8:100f::/48&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
=== Raspberry Pi Powered IPv6 Firewall Tester ===&lt;br /&gt;
&lt;br /&gt;
Outline details of the Raspberry Pi Powered IPv6 firewall tester can be found here [[Raspberry_Pi_IPv6_firewall_tester]], along with more complete [[Raspberry_Pi_IPv6_firewall_tester_installation]] details. &lt;br /&gt;
&lt;br /&gt;
All tests performed during non-maintenance periods are now handled by a Raspberry Pi powered host.&lt;br /&gt;
&lt;br /&gt;
=== Issues - Debugging ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re having trouble accessing the landing page via IPv6 (i.e. your IP address is reported as IPv4) then please see the following &amp;#039;&amp;#039;&amp;#039;[[IPv6_DEBUG]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Observations on IPv6 firewalls and IPv6 Address Selection ===&lt;br /&gt;
&lt;br /&gt;
For some general observations on IPv6 firewalls, as well as some useful references, please see the &amp;#039;&amp;#039;&amp;#039;[[IPv6_Firewalls]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Getting an IPv6 connection ===&lt;br /&gt;
&lt;br /&gt;
If you don&amp;#039;t already have an IPv6 connection but wish to get involved, then try a tunnel-broker such as [http://tunnelbroker.net Hurricane Electric].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Source code ===&lt;br /&gt;
&lt;br /&gt;
If you would like to view or download the IPv6 firewall scanner source code then please visit the &amp;#039;&amp;#039;&amp;#039;[https://github.com/timsgit/ipscan github]&amp;#039;&amp;#039;&amp;#039; page. If you deploy the scanner on an internet facing machine then &amp;#039;&amp;#039;please&amp;#039;&amp;#039; ensure that you protect users&amp;#039; privacy by following the instructions given in point 10 of the embedded [https://github.com/timsgit/ipscan/blob/master/README README] file.&lt;br /&gt;
&lt;br /&gt;
=== Automation ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;d like to automate IPv6 firewall testing, or run the same test a number of times on different hosts then please see the &amp;#039;&amp;#039;&amp;#039;[[ScanAutomation]]&amp;#039;&amp;#039;&amp;#039; and HTML &amp;#039;&amp;#039;&amp;#039;[[ResultScraping]]&amp;#039;&amp;#039;&amp;#039; sections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== URL for Sharing ===&lt;br /&gt;
&lt;br /&gt;
If you find this utility useful then please feel free to share the following URL with new users:&lt;br /&gt;
&lt;br /&gt;
   &amp;#039;&amp;#039;&amp;#039;https://ipv6.chappell-family.com/ipv6tcptest/&amp;#039;&amp;#039;&amp;#039; IPv6 Firewall Tester&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy. All other registered trademarks are the property of their respective owners.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=584</id>
		<title>IPv6</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=584"/>
		<updated>2022-07-09T17:09:46Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: /* Raspberry Pi Powered IPv6 Firewall Tester */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==The IPscan IPv6 Firewall Tester (ICMPv6, IPv6 TCP and UDP Port Scanner)==&lt;br /&gt;
&lt;br /&gt;
IPscan offers much of the functionality you might hope to find in an IPv6 version of [https://www.grc.com/ GRC&amp;#039;s ShieldsUp®] utility.&lt;br /&gt;
&lt;br /&gt;
=== Introduction ===&lt;br /&gt;
&lt;br /&gt;
Recent web-browsers request IPv6 DNS lookups in preference to IPv4 if they are running on a host with IPv6 enabled. The ipv6.chappell-family.com domain has DNS entries for both IPv4 and IPv6 addresses. This makes it possible for IPv4-only hosts, which make up most of the current web traffic, including search engines, to use the same URL. Browsers running on IPv4-only hosts will not request an IPv6 address and will therefore access the website entirely using IPv4. The landing page, as linked below, attempts to determine whether your machine has a valid globally routable IPv6 address (2000::/3) and whether it is behind an HTTP proxy, by looking for well known HTTP header variables which indicate that this may be the case. Only if the hosts&amp;#039; IP address is determined to be globally-routable unicast IPv6 and there are no tell-tale HTTP proxy variables will the landing page offer links to initiate the scan, as shown in the figure below.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_Landing_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) landing page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The tester is made available in two basic versions - one for browsers supporting javascript and the other suitable for text-only browsers such as Lynx, w3m and ELinks. The lightweight text-only browser version can be used on hosts which do not sport their own GUI environment (e.g. servers and embedded devices like routers). The original javascript browser version supports ongoing updates of the test status, whereas the text-only version only produces a results page once all the selected ports have been tested. Additionally, a fast and standard version of both of these testers is provided. The fast version tests multiple TCP or UDP ports in parallel, whereas the standard version tests only 1 port at a time, at a default rate of 1 port per second. Please be aware that some operating systems and firewalls apply rate-limiting to their generation, or passing, of ICMPv6 responses on the basis that this behaviour is indicative of a port scan being performed. Consequently such rate-limiting might cause a port which would normally generate an ICMPv6 response (e.g. PHBTD) to send no response at all, which IPscan would report as STEALTHed. If you are testing a host or firewall (whether on the client under test or elsewhere in the path between your client and the test server) which implements such rate-limiting then you are advised to use the standard, slower versions of IPscan which should not trigger the rate-limiting behaviour. If you&amp;#039;re unsure which version is appropriate for you, then try both and compare the results. Some Linux distributions and some ISP firewalls are known to implement such rate-limiting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please do NOT attempt to test hosts which are located behind HTTP proxies. Such proxies are very common in both corporate environments and on commercially-operated free wifi networks. The landing page for IPscan attempts to detect the common headers which such proxies insert, but it cannot detect truly transparent proxies. An HTTP Proxy is typically used by corporate networks to ensure employees are using their PCs in line with corporate computer-use policies. If you are interested in deploying your own HTTP proxy then [http://www.squid-cache.org/ Squid] is highly recommended as a proxy able to perform not only the usual access control and content-caching tasks but also offering IPv4 and IPv6 inter-working between single and dual-stack clients and web-sites. For further details please read the [https://ipv6.chappell-family.com/docs/IPv6_Squid_v01.pdf IPv6 Squid Proxy article.]&lt;br /&gt;
&lt;br /&gt;
=== The Test ===&lt;br /&gt;
&lt;br /&gt;
The tester allows a user to choose whether to include a commonly used set of &amp;#039;&amp;#039;&amp;#039;TCP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039; in their scan, as well as the ability to specify a number of their own specifically interesting TCP ports (this is intended to cover setups where you run services on non IANA-assigned ports, or just run less-common services). If you would like to see the list of commonly used ports expanded, or just changed, then please contact me.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_kickoff_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) original kickoff page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
The test begins by sending an ICMPv6 ECHO-REQUEST (an IPv6 ping) towards the host under test (HUT). The tester checks for related ICMPv6 responses from either the HUT or other hosts (e.g. routers and/or firewall devices protecting the HUT). If a response is detected from an host other than the HUT then the IPv6 address of this third-party is reported.   &lt;br /&gt;
 &lt;br /&gt;
The test continues by scanning a fixed set of commonly used &amp;#039;&amp;#039;&amp;#039;UDP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039;. The IPv6 UDP port test sets its&amp;#039; socket tx/rx timeouts to be 2 seconds - consequently the results can take up to 2s per tested UDP port - although the actual time depends heavily upon the filtering that your system employs (e.g. firewalls which mark protected ports as &amp;#039;unreachable&amp;#039; will resolve in much less than the allowed 2 second timeout assuming that your firewall sends the appropriate ICMPv6 packet in response).&lt;br /&gt;
&lt;br /&gt;
The test finishes by scanning the user-selected IPv6 TCP ports. The IPv6 TCP port test sets its&amp;#039; socket Tx/Rx timeouts to be 1 second - consequently the results can take up to 1s per tested port - although this depends heavily upon the filtering your system employs (e.g. firewalls which mark protected ports as &amp;#039;administratively prohibited&amp;#039; will resolve as PHBTD in much less than the allowed 1 second timeout assuming that your firewall sends an ICMPv6 type 1 code 1 packet in response).&lt;br /&gt;
&lt;br /&gt;
The tester will indicate the status of the tested UDP and TCP ports as either OPEN, STEALTHed or one of a series of other states depending on the positive or negative feedback received from your machine. A typical result is shown in the figures below. Note that if you run the test using an interactive gui-based browser then hovering over specific port numbers produces a pop-up describing the service run on that specific port. For a more detailed explanation of the reported states please read &amp;#039;&amp;#039;&amp;#039;[[ScanStatus]]&amp;#039;&amp;#039;&amp;#039;. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_results_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) IPscan results page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:IPscan_results_key1.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) IPscan results key (1 of 2) viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:IPscan_results_key2.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) IPscan results key (2 of 2) viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;&amp;#039;&amp;#039;&amp;#039;IMPORTANT:&amp;#039;&amp;#039;&amp;#039; this scanner will direct IPv6 TCP, UDP and ICMPv6 traffic towards the IP address that the webserver determines the request originates from. Please do NOT attempt to test machines that are operating behind transparent HTTP proxies, unless you also administer the proxy and specifically intend that machine to be tested.&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you wish to test your host now then please point your browser towards [https://ipv6.chappell-family.com/ipv6tcptest/ the IPv6 portscanner.]&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=== Test Server Source IPv6 Addresses ===&lt;br /&gt;
&lt;br /&gt;
Tests performed from the www64.chappell-family.co.uk host will be sourced from IPv6 address: &amp;#039;&amp;#039;&amp;#039;2001:470:971f:6::4&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
Note: during periods of planned server maintenance, a reduced service supporting only TCP testing may be offered, which will be sourced from an IPv6 address in the following range: &amp;#039;&amp;#039;&amp;#039;2001:8d8:100f::/48&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
=== Raspberry Pi Powered IPv6 Firewall Tester ===&lt;br /&gt;
&lt;br /&gt;
Outline details of the Raspberry Pi Powered IPv6 firewall tester can be found here [[Raspberry_Pi_IPv6_firewall_tester]], along with more complete [[Raspberry_Pi_IPv6_firewall_tester_installation]] details. &lt;br /&gt;
&lt;br /&gt;
All tests performed during non-maintenance periods are now handled by a Raspberry Pi powered host.&lt;br /&gt;
&lt;br /&gt;
=== Issues - Debugging ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re having trouble accessing the landing page via IPv6 (i.e. your IP address is reported as IPv4) then please see the following &amp;#039;&amp;#039;&amp;#039;[[IPv6_DEBUG]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Observations on IPv6 firewalls and IPv6 Address Selection ===&lt;br /&gt;
&lt;br /&gt;
For some general observations on IPv6 firewalls, as well as some useful references, please see the &amp;#039;&amp;#039;&amp;#039;[[IPv6_Firewalls]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Getting an IPv6 connection ===&lt;br /&gt;
&lt;br /&gt;
If you don&amp;#039;t already have an IPv6 connection but wish to get involved, then try a tunnel-broker such as [http://tunnelbroker.net Hurricane Electric].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Source code ===&lt;br /&gt;
&lt;br /&gt;
If you would like to view or download the IPv6 firewall scanner source code then please visit my &amp;#039;&amp;#039;&amp;#039;[https://github.com/timsgit/ipscan github]&amp;#039;&amp;#039;&amp;#039; page. If you deploy the scanner on an internet facing machine then &amp;#039;&amp;#039;please&amp;#039;&amp;#039; ensure that you protect users&amp;#039; privacy by following the instructions given in point 10 of the embedded [https://github.com/timsgit/ipscan/blob/master/README README] file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Automation ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;d like to automate IPv6 firewall testing, or run the same test a number of times on different hosts then please see the &amp;#039;&amp;#039;&amp;#039;[[ScanAutomation]]&amp;#039;&amp;#039;&amp;#039; and HTML &amp;#039;&amp;#039;&amp;#039;[[ResultScraping]]&amp;#039;&amp;#039;&amp;#039; sections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== URL for Sharing ===&lt;br /&gt;
&lt;br /&gt;
If you find this utility useful then please feel free to share the following URL with new users:&lt;br /&gt;
&lt;br /&gt;
   &amp;#039;&amp;#039;&amp;#039;https://ipv6.chappell-family.com/ipv6tcptest/&amp;#039;&amp;#039;&amp;#039; IPv6 Firewall Tester&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy. All other registered trademarks are the property of their respective owners.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=583</id>
		<title>IPv6</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=583"/>
		<updated>2022-07-09T17:09:28Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: /* Test Server Source IPv6 Addresses */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==The IPscan IPv6 Firewall Tester (ICMPv6, IPv6 TCP and UDP Port Scanner)==&lt;br /&gt;
&lt;br /&gt;
IPscan offers much of the functionality you might hope to find in an IPv6 version of [https://www.grc.com/ GRC&amp;#039;s ShieldsUp®] utility.&lt;br /&gt;
&lt;br /&gt;
=== Introduction ===&lt;br /&gt;
&lt;br /&gt;
Recent web-browsers request IPv6 DNS lookups in preference to IPv4 if they are running on a host with IPv6 enabled. The ipv6.chappell-family.com domain has DNS entries for both IPv4 and IPv6 addresses. This makes it possible for IPv4-only hosts, which make up most of the current web traffic, including search engines, to use the same URL. Browsers running on IPv4-only hosts will not request an IPv6 address and will therefore access the website entirely using IPv4. The landing page, as linked below, attempts to determine whether your machine has a valid globally routable IPv6 address (2000::/3) and whether it is behind an HTTP proxy, by looking for well known HTTP header variables which indicate that this may be the case. Only if the hosts&amp;#039; IP address is determined to be globally-routable unicast IPv6 and there are no tell-tale HTTP proxy variables will the landing page offer links to initiate the scan, as shown in the figure below.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_Landing_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) landing page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The tester is made available in two basic versions - one for browsers supporting javascript and the other suitable for text-only browsers such as Lynx, w3m and ELinks. The lightweight text-only browser version can be used on hosts which do not sport their own GUI environment (e.g. servers and embedded devices like routers). The original javascript browser version supports ongoing updates of the test status, whereas the text-only version only produces a results page once all the selected ports have been tested. Additionally, a fast and standard version of both of these testers is provided. The fast version tests multiple TCP or UDP ports in parallel, whereas the standard version tests only 1 port at a time, at a default rate of 1 port per second. Please be aware that some operating systems and firewalls apply rate-limiting to their generation, or passing, of ICMPv6 responses on the basis that this behaviour is indicative of a port scan being performed. Consequently such rate-limiting might cause a port which would normally generate an ICMPv6 response (e.g. PHBTD) to send no response at all, which IPscan would report as STEALTHed. If you are testing a host or firewall (whether on the client under test or elsewhere in the path between your client and the test server) which implements such rate-limiting then you are advised to use the standard, slower versions of IPscan which should not trigger the rate-limiting behaviour. If you&amp;#039;re unsure which version is appropriate for you, then try both and compare the results. Some Linux distributions and some ISP firewalls are known to implement such rate-limiting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please do NOT attempt to test hosts which are located behind HTTP proxies. Such proxies are very common in both corporate environments and on commercially-operated free wifi networks. The landing page for IPscan attempts to detect the common headers which such proxies insert, but it cannot detect truly transparent proxies. An HTTP Proxy is typically used by corporate networks to ensure employees are using their PCs in line with corporate computer-use policies. If you are interested in deploying your own HTTP proxy then [http://www.squid-cache.org/ Squid] is highly recommended as a proxy able to perform not only the usual access control and content-caching tasks but also offering IPv4 and IPv6 inter-working between single and dual-stack clients and web-sites. For further details please read the [https://ipv6.chappell-family.com/docs/IPv6_Squid_v01.pdf IPv6 Squid Proxy article.]&lt;br /&gt;
&lt;br /&gt;
=== The Test ===&lt;br /&gt;
&lt;br /&gt;
The tester allows a user to choose whether to include a commonly used set of &amp;#039;&amp;#039;&amp;#039;TCP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039; in their scan, as well as the ability to specify a number of their own specifically interesting TCP ports (this is intended to cover setups where you run services on non IANA-assigned ports, or just run less-common services). If you would like to see the list of commonly used ports expanded, or just changed, then please contact me.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_kickoff_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) original kickoff page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
The test begins by sending an ICMPv6 ECHO-REQUEST (an IPv6 ping) towards the host under test (HUT). The tester checks for related ICMPv6 responses from either the HUT or other hosts (e.g. routers and/or firewall devices protecting the HUT). If a response is detected from an host other than the HUT then the IPv6 address of this third-party is reported.   &lt;br /&gt;
 &lt;br /&gt;
The test continues by scanning a fixed set of commonly used &amp;#039;&amp;#039;&amp;#039;UDP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039;. The IPv6 UDP port test sets its&amp;#039; socket tx/rx timeouts to be 2 seconds - consequently the results can take up to 2s per tested UDP port - although the actual time depends heavily upon the filtering that your system employs (e.g. firewalls which mark protected ports as &amp;#039;unreachable&amp;#039; will resolve in much less than the allowed 2 second timeout assuming that your firewall sends the appropriate ICMPv6 packet in response).&lt;br /&gt;
&lt;br /&gt;
The test finishes by scanning the user-selected IPv6 TCP ports. The IPv6 TCP port test sets its&amp;#039; socket Tx/Rx timeouts to be 1 second - consequently the results can take up to 1s per tested port - although this depends heavily upon the filtering your system employs (e.g. firewalls which mark protected ports as &amp;#039;administratively prohibited&amp;#039; will resolve as PHBTD in much less than the allowed 1 second timeout assuming that your firewall sends an ICMPv6 type 1 code 1 packet in response).&lt;br /&gt;
&lt;br /&gt;
The tester will indicate the status of the tested UDP and TCP ports as either OPEN, STEALTHed or one of a series of other states depending on the positive or negative feedback received from your machine. A typical result is shown in the figures below. Note that if you run the test using an interactive gui-based browser then hovering over specific port numbers produces a pop-up describing the service run on that specific port. For a more detailed explanation of the reported states please read &amp;#039;&amp;#039;&amp;#039;[[ScanStatus]]&amp;#039;&amp;#039;&amp;#039;. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_results_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) IPscan results page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:IPscan_results_key1.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) IPscan results key (1 of 2) viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:IPscan_results_key2.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) IPscan results key (2 of 2) viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;&amp;#039;&amp;#039;&amp;#039;IMPORTANT:&amp;#039;&amp;#039;&amp;#039; this scanner will direct IPv6 TCP, UDP and ICMPv6 traffic towards the IP address that the webserver determines the request originates from. Please do NOT attempt to test machines that are operating behind transparent HTTP proxies, unless you also administer the proxy and specifically intend that machine to be tested.&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you wish to test your host now then please point your browser towards [https://ipv6.chappell-family.com/ipv6tcptest/ the IPv6 portscanner.]&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=== Test Server Source IPv6 Addresses ===&lt;br /&gt;
&lt;br /&gt;
Tests performed from the www64.chappell-family.co.uk host will be sourced from IPv6 address: &amp;#039;&amp;#039;&amp;#039;2001:470:971f:6::4&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
Note: during periods of planned server maintenance, a reduced service supporting only TCP testing may be offered, which will be sourced from an IPv6 address in the following range: &amp;#039;&amp;#039;&amp;#039;2001:8d8:100f::/48&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
=== Raspberry Pi Powered IPv6 Firewall Tester ===&lt;br /&gt;
&lt;br /&gt;
Outline details of my Raspberry Pi Powered IPv6 firewall tester can be found here [[Raspberry_Pi_IPv6_firewall_tester]], along with more complete [[Raspberry_Pi_IPv6_firewall_tester_installation]] details. &lt;br /&gt;
&lt;br /&gt;
All tests performed during non-maintenance periods are now handled by a Raspberry Pi powered host.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Issues - Debugging ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re having trouble accessing the landing page via IPv6 (i.e. your IP address is reported as IPv4) then please see the following &amp;#039;&amp;#039;&amp;#039;[[IPv6_DEBUG]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Observations on IPv6 firewalls and IPv6 Address Selection ===&lt;br /&gt;
&lt;br /&gt;
For some general observations on IPv6 firewalls, as well as some useful references, please see the &amp;#039;&amp;#039;&amp;#039;[[IPv6_Firewalls]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Getting an IPv6 connection ===&lt;br /&gt;
&lt;br /&gt;
If you don&amp;#039;t already have an IPv6 connection but wish to get involved, then try a tunnel-broker such as [http://tunnelbroker.net Hurricane Electric].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Source code ===&lt;br /&gt;
&lt;br /&gt;
If you would like to view or download the IPv6 firewall scanner source code then please visit my &amp;#039;&amp;#039;&amp;#039;[https://github.com/timsgit/ipscan github]&amp;#039;&amp;#039;&amp;#039; page. If you deploy the scanner on an internet facing machine then &amp;#039;&amp;#039;please&amp;#039;&amp;#039; ensure that you protect users&amp;#039; privacy by following the instructions given in point 10 of the embedded [https://github.com/timsgit/ipscan/blob/master/README README] file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Automation ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;d like to automate IPv6 firewall testing, or run the same test a number of times on different hosts then please see the &amp;#039;&amp;#039;&amp;#039;[[ScanAutomation]]&amp;#039;&amp;#039;&amp;#039; and HTML &amp;#039;&amp;#039;&amp;#039;[[ResultScraping]]&amp;#039;&amp;#039;&amp;#039; sections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== URL for Sharing ===&lt;br /&gt;
&lt;br /&gt;
If you find this utility useful then please feel free to share the following URL with new users:&lt;br /&gt;
&lt;br /&gt;
   &amp;#039;&amp;#039;&amp;#039;https://ipv6.chappell-family.com/ipv6tcptest/&amp;#039;&amp;#039;&amp;#039; IPv6 Firewall Tester&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy. All other registered trademarks are the property of their respective owners.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=582</id>
		<title>IPv6</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=582"/>
		<updated>2022-07-09T17:09:09Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: /* The Test */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==The IPscan IPv6 Firewall Tester (ICMPv6, IPv6 TCP and UDP Port Scanner)==&lt;br /&gt;
&lt;br /&gt;
IPscan offers much of the functionality you might hope to find in an IPv6 version of [https://www.grc.com/ GRC&amp;#039;s ShieldsUp®] utility.&lt;br /&gt;
&lt;br /&gt;
=== Introduction ===&lt;br /&gt;
&lt;br /&gt;
Recent web-browsers request IPv6 DNS lookups in preference to IPv4 if they are running on a host with IPv6 enabled. The ipv6.chappell-family.com domain has DNS entries for both IPv4 and IPv6 addresses. This makes it possible for IPv4-only hosts, which make up most of the current web traffic, including search engines, to use the same URL. Browsers running on IPv4-only hosts will not request an IPv6 address and will therefore access the website entirely using IPv4. The landing page, as linked below, attempts to determine whether your machine has a valid globally routable IPv6 address (2000::/3) and whether it is behind an HTTP proxy, by looking for well known HTTP header variables which indicate that this may be the case. Only if the hosts&amp;#039; IP address is determined to be globally-routable unicast IPv6 and there are no tell-tale HTTP proxy variables will the landing page offer links to initiate the scan, as shown in the figure below.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_Landing_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) landing page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The tester is made available in two basic versions - one for browsers supporting javascript and the other suitable for text-only browsers such as Lynx, w3m and ELinks. The lightweight text-only browser version can be used on hosts which do not sport their own GUI environment (e.g. servers and embedded devices like routers). The original javascript browser version supports ongoing updates of the test status, whereas the text-only version only produces a results page once all the selected ports have been tested. Additionally, a fast and standard version of both of these testers is provided. The fast version tests multiple TCP or UDP ports in parallel, whereas the standard version tests only 1 port at a time, at a default rate of 1 port per second. Please be aware that some operating systems and firewalls apply rate-limiting to their generation, or passing, of ICMPv6 responses on the basis that this behaviour is indicative of a port scan being performed. Consequently such rate-limiting might cause a port which would normally generate an ICMPv6 response (e.g. PHBTD) to send no response at all, which IPscan would report as STEALTHed. If you are testing a host or firewall (whether on the client under test or elsewhere in the path between your client and the test server) which implements such rate-limiting then you are advised to use the standard, slower versions of IPscan which should not trigger the rate-limiting behaviour. If you&amp;#039;re unsure which version is appropriate for you, then try both and compare the results. Some Linux distributions and some ISP firewalls are known to implement such rate-limiting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please do NOT attempt to test hosts which are located behind HTTP proxies. Such proxies are very common in both corporate environments and on commercially-operated free wifi networks. The landing page for IPscan attempts to detect the common headers which such proxies insert, but it cannot detect truly transparent proxies. An HTTP Proxy is typically used by corporate networks to ensure employees are using their PCs in line with corporate computer-use policies. If you are interested in deploying your own HTTP proxy then [http://www.squid-cache.org/ Squid] is highly recommended as a proxy able to perform not only the usual access control and content-caching tasks but also offering IPv4 and IPv6 inter-working between single and dual-stack clients and web-sites. For further details please read the [https://ipv6.chappell-family.com/docs/IPv6_Squid_v01.pdf IPv6 Squid Proxy article.]&lt;br /&gt;
&lt;br /&gt;
=== The Test ===&lt;br /&gt;
&lt;br /&gt;
The tester allows a user to choose whether to include a commonly used set of &amp;#039;&amp;#039;&amp;#039;TCP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039; in their scan, as well as the ability to specify a number of their own specifically interesting TCP ports (this is intended to cover setups where you run services on non IANA-assigned ports, or just run less-common services). If you would like to see the list of commonly used ports expanded, or just changed, then please contact me.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_kickoff_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) original kickoff page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
The test begins by sending an ICMPv6 ECHO-REQUEST (an IPv6 ping) towards the host under test (HUT). The tester checks for related ICMPv6 responses from either the HUT or other hosts (e.g. routers and/or firewall devices protecting the HUT). If a response is detected from an host other than the HUT then the IPv6 address of this third-party is reported.   &lt;br /&gt;
 &lt;br /&gt;
The test continues by scanning a fixed set of commonly used &amp;#039;&amp;#039;&amp;#039;UDP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039;. The IPv6 UDP port test sets its&amp;#039; socket tx/rx timeouts to be 2 seconds - consequently the results can take up to 2s per tested UDP port - although the actual time depends heavily upon the filtering that your system employs (e.g. firewalls which mark protected ports as &amp;#039;unreachable&amp;#039; will resolve in much less than the allowed 2 second timeout assuming that your firewall sends the appropriate ICMPv6 packet in response).&lt;br /&gt;
&lt;br /&gt;
The test finishes by scanning the user-selected IPv6 TCP ports. The IPv6 TCP port test sets its&amp;#039; socket Tx/Rx timeouts to be 1 second - consequently the results can take up to 1s per tested port - although this depends heavily upon the filtering your system employs (e.g. firewalls which mark protected ports as &amp;#039;administratively prohibited&amp;#039; will resolve as PHBTD in much less than the allowed 1 second timeout assuming that your firewall sends an ICMPv6 type 1 code 1 packet in response).&lt;br /&gt;
&lt;br /&gt;
The tester will indicate the status of the tested UDP and TCP ports as either OPEN, STEALTHed or one of a series of other states depending on the positive or negative feedback received from your machine. A typical result is shown in the figures below. Note that if you run the test using an interactive gui-based browser then hovering over specific port numbers produces a pop-up describing the service run on that specific port. For a more detailed explanation of the reported states please read &amp;#039;&amp;#039;&amp;#039;[[ScanStatus]]&amp;#039;&amp;#039;&amp;#039;. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_results_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) IPscan results page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:IPscan_results_key1.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) IPscan results key (1 of 2) viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:IPscan_results_key2.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) IPscan results key (2 of 2) viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;&amp;#039;&amp;#039;&amp;#039;IMPORTANT:&amp;#039;&amp;#039;&amp;#039; this scanner will direct IPv6 TCP, UDP and ICMPv6 traffic towards the IP address that the webserver determines the request originates from. Please do NOT attempt to test machines that are operating behind transparent HTTP proxies, unless you also administer the proxy and specifically intend that machine to be tested.&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you wish to test your host now then please point your browser towards [https://ipv6.chappell-family.com/ipv6tcptest/ the IPv6 portscanner.]&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=== Test Server Source IPv6 Addresses ===&lt;br /&gt;
&lt;br /&gt;
Tests performed from my www64.chappell-family.co.uk host will be sourced from IPv6 address: &amp;#039;&amp;#039;&amp;#039;2001:470:971f:6::4&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
Note: during periods of planned server maintenance, a reduced service supporting only TCP testing may be offered, which will be sourced from an IPv6 address in the following range: &amp;#039;&amp;#039;&amp;#039;2001:8d8:100f::/48&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
=== Raspberry Pi Powered IPv6 Firewall Tester ===&lt;br /&gt;
&lt;br /&gt;
Outline details of my Raspberry Pi Powered IPv6 firewall tester can be found here [[Raspberry_Pi_IPv6_firewall_tester]], along with more complete [[Raspberry_Pi_IPv6_firewall_tester_installation]] details. &lt;br /&gt;
&lt;br /&gt;
All tests performed during non-maintenance periods are now handled by a Raspberry Pi powered host.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Issues - Debugging ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re having trouble accessing the landing page via IPv6 (i.e. your IP address is reported as IPv4) then please see the following &amp;#039;&amp;#039;&amp;#039;[[IPv6_DEBUG]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Observations on IPv6 firewalls and IPv6 Address Selection ===&lt;br /&gt;
&lt;br /&gt;
For some general observations on IPv6 firewalls, as well as some useful references, please see the &amp;#039;&amp;#039;&amp;#039;[[IPv6_Firewalls]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Getting an IPv6 connection ===&lt;br /&gt;
&lt;br /&gt;
If you don&amp;#039;t already have an IPv6 connection but wish to get involved, then try a tunnel-broker such as [http://tunnelbroker.net Hurricane Electric].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Source code ===&lt;br /&gt;
&lt;br /&gt;
If you would like to view or download the IPv6 firewall scanner source code then please visit my &amp;#039;&amp;#039;&amp;#039;[https://github.com/timsgit/ipscan github]&amp;#039;&amp;#039;&amp;#039; page. If you deploy the scanner on an internet facing machine then &amp;#039;&amp;#039;please&amp;#039;&amp;#039; ensure that you protect users&amp;#039; privacy by following the instructions given in point 10 of the embedded [https://github.com/timsgit/ipscan/blob/master/README README] file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Automation ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;d like to automate IPv6 firewall testing, or run the same test a number of times on different hosts then please see the &amp;#039;&amp;#039;&amp;#039;[[ScanAutomation]]&amp;#039;&amp;#039;&amp;#039; and HTML &amp;#039;&amp;#039;&amp;#039;[[ResultScraping]]&amp;#039;&amp;#039;&amp;#039; sections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== URL for Sharing ===&lt;br /&gt;
&lt;br /&gt;
If you find this utility useful then please feel free to share the following URL with new users:&lt;br /&gt;
&lt;br /&gt;
   &amp;#039;&amp;#039;&amp;#039;https://ipv6.chappell-family.com/ipv6tcptest/&amp;#039;&amp;#039;&amp;#039; IPv6 Firewall Tester&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy. All other registered trademarks are the property of their respective owners.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=581</id>
		<title>IPv6</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=581"/>
		<updated>2022-07-09T17:08:13Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==The IPscan IPv6 Firewall Tester (ICMPv6, IPv6 TCP and UDP Port Scanner)==&lt;br /&gt;
&lt;br /&gt;
IPscan offers much of the functionality you might hope to find in an IPv6 version of [https://www.grc.com/ GRC&amp;#039;s ShieldsUp®] utility.&lt;br /&gt;
&lt;br /&gt;
=== Introduction ===&lt;br /&gt;
&lt;br /&gt;
Recent web-browsers request IPv6 DNS lookups in preference to IPv4 if they are running on a host with IPv6 enabled. The ipv6.chappell-family.com domain has DNS entries for both IPv4 and IPv6 addresses. This makes it possible for IPv4-only hosts, which make up most of the current web traffic, including search engines, to use the same URL. Browsers running on IPv4-only hosts will not request an IPv6 address and will therefore access the website entirely using IPv4. The landing page, as linked below, attempts to determine whether your machine has a valid globally routable IPv6 address (2000::/3) and whether it is behind an HTTP proxy, by looking for well known HTTP header variables which indicate that this may be the case. Only if the hosts&amp;#039; IP address is determined to be globally-routable unicast IPv6 and there are no tell-tale HTTP proxy variables will the landing page offer links to initiate the scan, as shown in the figure below.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_Landing_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) landing page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The tester is made available in two basic versions - one for browsers supporting javascript and the other suitable for text-only browsers such as Lynx, w3m and ELinks. The lightweight text-only browser version can be used on hosts which do not sport their own GUI environment (e.g. servers and embedded devices like routers). The original javascript browser version supports ongoing updates of the test status, whereas the text-only version only produces a results page once all the selected ports have been tested. Additionally, a fast and standard version of both of these testers is provided. The fast version tests multiple TCP or UDP ports in parallel, whereas the standard version tests only 1 port at a time, at a default rate of 1 port per second. Please be aware that some operating systems and firewalls apply rate-limiting to their generation, or passing, of ICMPv6 responses on the basis that this behaviour is indicative of a port scan being performed. Consequently such rate-limiting might cause a port which would normally generate an ICMPv6 response (e.g. PHBTD) to send no response at all, which IPscan would report as STEALTHed. If you are testing a host or firewall (whether on the client under test or elsewhere in the path between your client and the test server) which implements such rate-limiting then you are advised to use the standard, slower versions of IPscan which should not trigger the rate-limiting behaviour. If you&amp;#039;re unsure which version is appropriate for you, then try both and compare the results. Some Linux distributions and some ISP firewalls are known to implement such rate-limiting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please do NOT attempt to test hosts which are located behind HTTP proxies. Such proxies are very common in both corporate environments and on commercially-operated free wifi networks. The landing page for IPscan attempts to detect the common headers which such proxies insert, but it cannot detect truly transparent proxies. An HTTP Proxy is typically used by corporate networks to ensure employees are using their PCs in line with corporate computer-use policies. If you are interested in deploying your own HTTP proxy then [http://www.squid-cache.org/ Squid] is highly recommended as a proxy able to perform not only the usual access control and content-caching tasks but also offering IPv4 and IPv6 inter-working between single and dual-stack clients and web-sites. For further details please read the [https://ipv6.chappell-family.com/docs/IPv6_Squid_v01.pdf IPv6 Squid Proxy article.]&lt;br /&gt;
&lt;br /&gt;
=== The Test ===&lt;br /&gt;
&lt;br /&gt;
The tester allows a user to choose whether to include a commonly used set of &amp;#039;&amp;#039;&amp;#039;TCP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039; in their scan, as well as the ability to specify a number of their own specifically interesting TCP ports (this is intended to cover setups where you run services on non IANA-assigned ports, or just run less-common services). If you would like to see the list of commonly used ports expanded, or just changed, then please contact me.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_kickoff_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) original kickoff page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
The test begins by sending an ICMPv6 ECHO-REQUEST (an IPv6 ping) towards the host under test (HUT). The tester checks for related ICMPv6 responses from either the HUT or other hosts (e.g. routers and/or firewall devices protecting the HUT). If a response is detected from an host other than the HUT then the IPv6 address of this third-party is reported.   &lt;br /&gt;
 &lt;br /&gt;
The test continues by scanning a fixed set of commonly used &amp;#039;&amp;#039;&amp;#039;UDP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039;. The IPv6 UDP port test sets its&amp;#039; socket tx/rx timeouts to be 2 seconds - consequently the results can take up to 2s per tested UDP port - although the actual time depends heavily upon the filtering that your system employs (e.g. firewalls which mark protected ports as &amp;#039;unreachable&amp;#039; will resolve in much less than the allowed 2 second timeout assuming that your firewall sends the appropriate ICMPv6 packet in response).&lt;br /&gt;
&lt;br /&gt;
The test finishes by scanning the user-selected IPv6 TCP ports. The IPv6 TCP port test sets its&amp;#039; socket Tx/Rx timeouts to be 1 second - consequently the results can take up to 1s per tested port - although this depends heavily upon the filtering your system employs (e.g. firewalls which mark protected ports as &amp;#039;administratively prohibited&amp;#039; will resolve as PHBTD in much less than the allowed 1 second timeout assuming that your firewall sends an ICMPv6 type 1 code 1 packet in response).&lt;br /&gt;
&lt;br /&gt;
The tester will indicate the status of the tested UDP and TCP ports as either OPEN, STEALTHed or one of a series of other states depending on the positive or negative feedback received from your machine. A typical result is shown in the figures below. Note that if you run the test using an interactive gui-based browser then hovering over specific port numbers produces a pop-up describing the service run on that specific port. For a more detailed explanation of the reported states please read &amp;#039;&amp;#039;&amp;#039;[[ScanStatus]]&amp;#039;&amp;#039;&amp;#039;. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_results_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) IPscan results page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:IPscan_results_key1.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) IPscan results key (1 of 2) viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:IPscan_results_key2.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) IPscan results key (2 of 2) viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;&amp;#039;&amp;#039;&amp;#039;IMPORTANT:&amp;#039;&amp;#039;&amp;#039; this scanner will direct IPv6 TCP, UDP and ICMPv6 traffic towards the IP address that my webserver determines the request originates from. Please do NOT attempt to test machines that are operating behind transparent HTTP proxies, unless you also administer the proxy and specifically intend that machine to be tested.&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you wish to test your host now then please point your browser towards [https://ipv6.chappell-family.com/ipv6tcptest/ my IPv6 portscanner.]&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Test Server Source IPv6 Addresses ===&lt;br /&gt;
&lt;br /&gt;
Tests performed from my www64.chappell-family.co.uk host will be sourced from IPv6 address: &amp;#039;&amp;#039;&amp;#039;2001:470:971f:6::4&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
Note: during periods of planned server maintenance, a reduced service supporting only TCP testing may be offered, which will be sourced from an IPv6 address in the following range: &amp;#039;&amp;#039;&amp;#039;2001:8d8:100f::/48&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
=== Raspberry Pi Powered IPv6 Firewall Tester ===&lt;br /&gt;
&lt;br /&gt;
Outline details of my Raspberry Pi Powered IPv6 firewall tester can be found here [[Raspberry_Pi_IPv6_firewall_tester]], along with more complete [[Raspberry_Pi_IPv6_firewall_tester_installation]] details. &lt;br /&gt;
&lt;br /&gt;
All tests performed during non-maintenance periods are now handled by a Raspberry Pi powered host.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Issues - Debugging ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re having trouble accessing the landing page via IPv6 (i.e. your IP address is reported as IPv4) then please see the following &amp;#039;&amp;#039;&amp;#039;[[IPv6_DEBUG]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Observations on IPv6 firewalls and IPv6 Address Selection ===&lt;br /&gt;
&lt;br /&gt;
For some general observations on IPv6 firewalls, as well as some useful references, please see the &amp;#039;&amp;#039;&amp;#039;[[IPv6_Firewalls]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Getting an IPv6 connection ===&lt;br /&gt;
&lt;br /&gt;
If you don&amp;#039;t already have an IPv6 connection but wish to get involved, then try a tunnel-broker such as [http://tunnelbroker.net Hurricane Electric].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Source code ===&lt;br /&gt;
&lt;br /&gt;
If you would like to view or download the IPv6 firewall scanner source code then please visit my &amp;#039;&amp;#039;&amp;#039;[https://github.com/timsgit/ipscan github]&amp;#039;&amp;#039;&amp;#039; page. If you deploy the scanner on an internet facing machine then &amp;#039;&amp;#039;please&amp;#039;&amp;#039; ensure that you protect users&amp;#039; privacy by following the instructions given in point 10 of the embedded [https://github.com/timsgit/ipscan/blob/master/README README] file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Automation ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;d like to automate IPv6 firewall testing, or run the same test a number of times on different hosts then please see the &amp;#039;&amp;#039;&amp;#039;[[ScanAutomation]]&amp;#039;&amp;#039;&amp;#039; and HTML &amp;#039;&amp;#039;&amp;#039;[[ResultScraping]]&amp;#039;&amp;#039;&amp;#039; sections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== URL for Sharing ===&lt;br /&gt;
&lt;br /&gt;
If you find this utility useful then please feel free to share the following URL with new users:&lt;br /&gt;
&lt;br /&gt;
   &amp;#039;&amp;#039;&amp;#039;https://ipv6.chappell-family.com/ipv6tcptest/&amp;#039;&amp;#039;&amp;#039; IPv6 Firewall Tester&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy. All other registered trademarks are the property of their respective owners.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=Main_Page&amp;diff=580</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=Main_Page&amp;diff=580"/>
		<updated>2022-07-09T17:06:02Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; 	&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
Welcome to the IPscan wiki, for the online, [https://www.github.com/timsgit/ipscan opensource], IPv6 Port Scanner. This service supports testing of multiple IPv6 UDP and TCP ports on any internet connected host with a global IPv6 unicast address (2000::/3), irrespective of your IPv6 provider or device operating system. In order to be as flexible as possible the tested TCP ports are selectable from a mix of commonly-used ports and/or user-defined ports.&lt;br /&gt;
&lt;br /&gt;
==IPv6 Port Scanner Related==&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[IPv6]] Firewall tester&amp;#039;&amp;#039;&amp;#039; - an overview of the [https://github.com/timsgit/ipscan Opensource] IPscan IPv6 Port Scanner&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[IPv6_Firewalls]]&amp;#039;&amp;#039;&amp;#039; - some observations on IPv6 firewalls and address selections&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;IPv6 Firewall tester default [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039;  - list of default TCP/IP and UDP/IP ports which the IPscan IPv6 Firewall Scanner will test&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;IPv6 firewall tester [[ScanStatus]]&amp;#039;&amp;#039;&amp;#039;  - a description of the reportable states for each tested TCP/IP or UDP/IP port&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[IPv6_SpecialTests]]&amp;#039;&amp;#039;&amp;#039; - a description of specific protocol tests which IPscan performs&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;IPv6 firewall [[ScanAutomation]]&amp;#039;&amp;#039;&amp;#039; - a quick overview of IPv6 TCP/UDP port-scan automation using wget   &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[IPv6_DEBUG]]&amp;#039;&amp;#039;&amp;#039;  - some steps for debugging IPv6 access to the IPscan IPv6 Port Scanner&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[IPv6_Windows7]]&amp;#039;&amp;#039;&amp;#039; - some useful Win7 IPv6-related commands&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[Raspberry_Pi_IPv6_firewall_tester]]&amp;#039;&amp;#039;&amp;#039; - a quick HowTo describing the steps to make your own IPv6 firewall tester.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[Security_reporting_and_acknowledgements]]&amp;#039;&amp;#039;&amp;#039; - a page describing our security policy and researcher acknowledgements&lt;br /&gt;
&lt;br /&gt;
For those in a rush please follow the &amp;#039;&amp;#039;&amp;#039;[https://ipv6.chappell-family.com/ipv6tcptest/ IPscan IPv6 firewall tester link]&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
==Articles and Linux related==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[Articles]]&amp;#039;&amp;#039;&amp;#039;    - including topics like [https://ipv6.chappell-family.com/docs/ipsec_v01.pdf practical Linux IPsec] and ARM floating point programming&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[https://ipv6.chappell-family.com/docs/IPv6_Squid_v01.pdf Squid Proxy as an IPv4/IPv6 translator]&amp;#039;&amp;#039;&amp;#039; - Allow &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;ALL&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; your client devices to access IPv4-only, IPv4/IPv6 dual-stacked and IPv6-only websites&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[Linux]]&amp;#039;&amp;#039;&amp;#039;       - Linux related information&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[Zyxel]]&amp;#039;&amp;#039;&amp;#039;       - Zyxel Prestige Modem commands&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[Munin]] Printer Plugins&amp;#039;&amp;#039;&amp;#039;   - Plugins for HP [[DJ6840]], [[C309a]] and [[e710]] printers and AIO devices&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[Munin]] Motherboard Plugins&amp;#039;&amp;#039;&amp;#039;   - Plugins for Intel [[D945GCLF2]] and [[DH67CF]] Motherboards&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[Munin]] UPS Plugins&amp;#039;&amp;#039;&amp;#039;   - APC [[UPS]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=Main_Page&amp;diff=579</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=Main_Page&amp;diff=579"/>
		<updated>2022-07-09T17:04:36Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: /* IPv6 Port Scanner Related */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; 	&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
Welcome to the site of my online, [https://www.github.com/timsgit/ipscan opensource], IPv6 Port Scanner. This service supports testing of multiple IPv6 UDP and TCP ports on any internet connected host with a global IPv6 unicast address (2000::/3), irrespective of your IPv6 provider or device operating system. In order to be as flexible as possible the tested TCP ports are selectable from a mix of commonly-used ports and/or user-defined ports.&lt;br /&gt;
&lt;br /&gt;
==IPv6 Port Scanner Related==&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[IPv6]] Firewall tester&amp;#039;&amp;#039;&amp;#039; - an overview of the [https://github.com/timsgit/ipscan Opensource] IPscan IPv6 Port Scanner&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[IPv6_Firewalls]]&amp;#039;&amp;#039;&amp;#039; - some observations on IPv6 firewalls and address selections&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;IPv6 Firewall tester default [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039;  - list of default TCP/IP and UDP/IP ports which the IPscan IPv6 Firewall Scanner will test&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;IPv6 firewall tester [[ScanStatus]]&amp;#039;&amp;#039;&amp;#039;  - a description of the reportable states for each tested TCP/IP or UDP/IP port&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[IPv6_SpecialTests]]&amp;#039;&amp;#039;&amp;#039; - a description of specific protocol tests which IPscan performs&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;IPv6 firewall [[ScanAutomation]]&amp;#039;&amp;#039;&amp;#039; - a quick overview of IPv6 TCP/UDP port-scan automation using wget   &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[IPv6_DEBUG]]&amp;#039;&amp;#039;&amp;#039;  - some steps for debugging IPv6 access to the IPscan IPv6 Port Scanner&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[IPv6_Windows7]]&amp;#039;&amp;#039;&amp;#039; - some useful Win7 IPv6-related commands&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[Raspberry_Pi_IPv6_firewall_tester]]&amp;#039;&amp;#039;&amp;#039; - a quick HowTo describing the steps to make your own IPv6 firewall tester.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[Security_reporting_and_acknowledgements]]&amp;#039;&amp;#039;&amp;#039; - a page describing our security policy and researcher acknowledgements&lt;br /&gt;
&lt;br /&gt;
For those in a rush please follow the &amp;#039;&amp;#039;&amp;#039;[https://ipv6.chappell-family.com/ipv6tcptest/ IPscan IPv6 firewall tester link]&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
==Articles and Linux related==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[Articles]]&amp;#039;&amp;#039;&amp;#039;    - including topics like [https://ipv6.chappell-family.com/docs/ipsec_v01.pdf practical Linux IPsec] and ARM floating point programming&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[https://ipv6.chappell-family.com/docs/IPv6_Squid_v01.pdf Squid Proxy as an IPv4/IPv6 translator]&amp;#039;&amp;#039;&amp;#039; - Allow &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;ALL&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; your client devices to access IPv4-only, IPv4/IPv6 dual-stacked and IPv6-only websites&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[Linux]]&amp;#039;&amp;#039;&amp;#039;       - Linux related information&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[Zyxel]]&amp;#039;&amp;#039;&amp;#039;       - Zyxel Prestige Modem commands&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[Munin]] Printer Plugins&amp;#039;&amp;#039;&amp;#039;   - Plugins for HP [[DJ6840]], [[C309a]] and [[e710]] printers and AIO devices&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[Munin]] Motherboard Plugins&amp;#039;&amp;#039;&amp;#039;   - Plugins for Intel [[D945GCLF2]] and [[DH67CF]] Motherboards&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[Munin]] UPS Plugins&amp;#039;&amp;#039;&amp;#039;   - APC [[UPS]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=578</id>
		<title>IPv6</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=578"/>
		<updated>2022-07-09T17:02:22Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: /* Tim&amp;#039;s IPv6 Firewall Tester (ICMPv6, IPv6 TCP and UDP Port Scanner) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==The IPscan IPv6 Firewall Tester (ICMPv6, IPv6 TCP and UDP Port Scanner)==&lt;br /&gt;
&lt;br /&gt;
IPscan offers much of the functionality you might hope to find in an IPv6 version of [https://www.grc.com/ GRC&amp;#039;s ShieldsUp®] utility.&lt;br /&gt;
&lt;br /&gt;
=== Introduction ===&lt;br /&gt;
&lt;br /&gt;
Recent web-browsers request IPv6 DNS lookups in preference to IPv4 if they are running on a host with IPv6 enabled. My domain (ipv6.chappell-family.com) has DNS entries for both IPv4 and IPv6 addresses. This makes it safe for IPv4-only hosts, which make up most of the current web traffic, including search engines, to use the same URL. Browsers running on IPv4-only hosts will not request an IPv6 address and will therefore access the website entirely using IPv4. The landing page, as linked below, attempts to determine whether your machine has a valid globally routable IPv6 address (2000::/3) and whether it is behind an HTTP proxy, by looking for well known HTTP header variables which indicate that this may be the case. Only if the hosts&amp;#039; IP address is determined to be globally-routable unicast IPv6 and there are no tell-tale HTTP proxy variables will the landing page offer links to initiate the scan, as shown in the figure below.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_Landing_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) landing page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The tester is made available in two basic versions - one for browsers supporting javascript and the other suitable for text-only browsers such as Lynx, w3m and ELinks. The lightweight text-only browser version can be used on hosts which do not sport their own GUI environment (e.g. servers and embedded devices like routers). The original javascript browser version supports ongoing updates of the test status, whereas the text-only version only produces a results page once all the selected ports have been tested. Additionally, a fast and standard version of both of these testers is provided. The fast version tests multiple TCP or UDP ports in parallel, whereas the standard version tests only 1 port at a time, at a default rate of 1 port per second. Please be aware that some operating systems and firewalls apply rate-limiting to their generation, or passing, of ICMPv6 responses on the basis that this behaviour is indicative of a port scan being performed. Consequently such rate-limiting might cause a port which would normally generate an ICMPv6 response (e.g. PHBTD) to send no response at all, which IPscan would report as STEALTHed. If you are testing a host or firewall (whether on the client under test or elsewhere in the path between your client and the test server) which implements such rate-limiting then you are advised to use the standard, slower versions of IPscan which should not trigger the rate-limiting behaviour. If you&amp;#039;re unsure which version is appropriate for you, then try both and compare the results. Some Linux distributions and some ISP firewalls are known to implement such rate-limiting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please do NOT attempt to test hosts which are located behind HTTP proxies. Such proxies are very common in both corporate environments and on commercially-operated free wifi networks. The landing page for IPscan attempts to detect the common headers which such proxies insert, but it cannot detect truly transparent proxies. An HTTP Proxy is typically used by corporate networks to ensure employees are using their PCs in line with corporate computer-use policies. If you are interested in deploying your own HTTP proxy then [http://www.squid-cache.org/ Squid] is highly recommended as a proxy able to perform not only the usual access control and content-caching tasks but also offering IPv4 and IPv6 inter-working between single and dual-stack clients and web-sites. For further details please read my [https://ipv6.chappell-family.com/docs/IPv6_Squid_v01.pdf IPv6 Squid Proxy article.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== The Test ===&lt;br /&gt;
&lt;br /&gt;
The tester allows a user to choose whether to include a commonly used set of &amp;#039;&amp;#039;&amp;#039;TCP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039; in their scan, as well as the ability to specify a number of their own specifically interesting TCP ports (this is intended to cover setups where you run services on non IANA-assigned ports, or just run less-common services). If you would like to see the list of commonly used ports expanded, or just changed, then please contact me.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_kickoff_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) original kickoff page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
The test begins by sending an ICMPv6 ECHO-REQUEST (an IPv6 ping) towards the host under test (HUT). The tester checks for related ICMPv6 responses from either the HUT or other hosts (e.g. routers and/or firewall devices protecting the HUT). If a response is detected from an host other than the HUT then the IPv6 address of this third-party is reported.   &lt;br /&gt;
 &lt;br /&gt;
The test continues by scanning a fixed set of commonly used &amp;#039;&amp;#039;&amp;#039;UDP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039;. The IPv6 UDP port test sets its&amp;#039; socket tx/rx timeouts to be 2 seconds - consequently the results can take up to 2s per tested UDP port - although the actual time depends heavily upon the filtering that your system employs (e.g. firewalls which mark protected ports as &amp;#039;unreachable&amp;#039; will resolve in much less than the allowed 2 second timeout assuming that your firewall sends the appropriate ICMPv6 packet in response).&lt;br /&gt;
&lt;br /&gt;
The test finishes by scanning the user-selected IPv6 TCP ports. The IPv6 TCP port test sets its&amp;#039; socket Tx/Rx timeouts to be 1 second - consequently the results can take up to 1s per tested port - although this depends heavily upon the filtering your system employs (e.g. firewalls which mark protected ports as &amp;#039;administratively prohibited&amp;#039; will resolve as PHBTD in much less than the allowed 1 second timeout assuming that your firewall sends an ICMPv6 type 1 code 1 packet in response).&lt;br /&gt;
&lt;br /&gt;
The tester will indicate the status of the tested UDP and TCP ports as either OPEN, STEALTHed or one of a series of other states depending on the positive or negative feedback received from your machine. A typical result is shown in the figures below. Note that if you run the test using an interactive gui-based browser then hovering over specific port numbers produces a pop-up describing the service run on that specific port. For a more detailed explanation of the reported states please read &amp;#039;&amp;#039;&amp;#039;[[ScanStatus]]&amp;#039;&amp;#039;&amp;#039;. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_results_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) IPscan results page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:IPscan_results_key1.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) IPscan results key (1 of 2) viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:IPscan_results_key2.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) IPscan results key (2 of 2) viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;&amp;#039;&amp;#039;&amp;#039;IMPORTANT:&amp;#039;&amp;#039;&amp;#039; this scanner will direct IPv6 TCP, UDP and ICMPv6 traffic towards the IP address that my webserver determines the request originates from. Please do NOT attempt to test machines that are operating behind transparent HTTP proxies, unless you also administer the proxy and specifically intend that machine to be tested.&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you wish to test your host now then please point your browser towards [https://ipv6.chappell-family.com/ipv6tcptest/ my IPv6 portscanner.]&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Test Server Source IPv6 Addresses ===&lt;br /&gt;
&lt;br /&gt;
Tests performed from my www64.chappell-family.co.uk host will be sourced from IPv6 address: &amp;#039;&amp;#039;&amp;#039;2001:470:971f:6::4&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
Note: during periods of planned server maintenance, a reduced service supporting only TCP testing may be offered, which will be sourced from an IPv6 address in the following range: &amp;#039;&amp;#039;&amp;#039;2001:8d8:100f::/48&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
=== Raspberry Pi Powered IPv6 Firewall Tester ===&lt;br /&gt;
&lt;br /&gt;
Outline details of my Raspberry Pi Powered IPv6 firewall tester can be found here [[Raspberry_Pi_IPv6_firewall_tester]], along with more complete [[Raspberry_Pi_IPv6_firewall_tester_installation]] details. &lt;br /&gt;
&lt;br /&gt;
All tests performed during non-maintenance periods are now handled by a Raspberry Pi powered host.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Issues - Debugging ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re having trouble accessing the landing page via IPv6 (i.e. your IP address is reported as IPv4) then please see the following &amp;#039;&amp;#039;&amp;#039;[[IPv6_DEBUG]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Observations on IPv6 firewalls and IPv6 Address Selection ===&lt;br /&gt;
&lt;br /&gt;
For some general observations on IPv6 firewalls, as well as some useful references, please see the &amp;#039;&amp;#039;&amp;#039;[[IPv6_Firewalls]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Getting an IPv6 connection ===&lt;br /&gt;
&lt;br /&gt;
If you don&amp;#039;t already have an IPv6 connection but wish to get involved, then try a tunnel-broker such as [http://tunnelbroker.net Hurricane Electric].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Source code ===&lt;br /&gt;
&lt;br /&gt;
If you would like to view or download the IPv6 firewall scanner source code then please visit my &amp;#039;&amp;#039;&amp;#039;[https://github.com/timsgit/ipscan github]&amp;#039;&amp;#039;&amp;#039; page. If you deploy the scanner on an internet facing machine then &amp;#039;&amp;#039;please&amp;#039;&amp;#039; ensure that you protect users&amp;#039; privacy by following the instructions given in point 10 of the embedded [https://github.com/timsgit/ipscan/blob/master/README README] file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Automation ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;d like to automate IPv6 firewall testing, or run the same test a number of times on different hosts then please see the &amp;#039;&amp;#039;&amp;#039;[[ScanAutomation]]&amp;#039;&amp;#039;&amp;#039; and HTML &amp;#039;&amp;#039;&amp;#039;[[ResultScraping]]&amp;#039;&amp;#039;&amp;#039; sections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== URL for Sharing ===&lt;br /&gt;
&lt;br /&gt;
If you find this utility useful then please feel free to share the following URL with new users:&lt;br /&gt;
&lt;br /&gt;
   &amp;#039;&amp;#039;&amp;#039;https://ipv6.chappell-family.com/ipv6tcptest/&amp;#039;&amp;#039;&amp;#039; IPv6 Firewall Tester&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy. All other registered trademarks are the property of their respective owners.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=Security_reporting_and_acknowledgements&amp;diff=576</id>
		<title>Security reporting and acknowledgements</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=Security_reporting_and_acknowledgements&amp;diff=576"/>
		<updated>2022-05-25T19:25:26Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: /* IPv6 Firewall Tester Security Reporting Policy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= IPv6 Firewall Tester Security Reporting Policy =&lt;br /&gt;
&lt;br /&gt;
Vulnerability researchers should securely and responsibly report discovered vulnerabilities relating to the [https://ipv6.chappell-family.com/ipv6tcptest IPv6 firewall tester website] using the email address and PGP key specified in the [https://ipv6.chappell-family.com/.well-known/security.txt .well-known/security.txt] file.&lt;br /&gt;
&lt;br /&gt;
= IPv6 Firewall Tester Security Reporting Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
All researchers who responsibly report vulnerabilities will be credited here.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=Security_reporting_and_acknowledgements&amp;diff=575</id>
		<title>Security reporting and acknowledgements</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=Security_reporting_and_acknowledgements&amp;diff=575"/>
		<updated>2022-05-25T19:24:41Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: /* IPv6 Firewall Tester Security Reporting Policy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= IPv6 Firewall Tester Security Reporting Policy =&lt;br /&gt;
&lt;br /&gt;
Vulnerability researchers should securely and responsibly report discovered vulnerabilities related to the [https://ipv6.chappell-family.com/ipv6tcptest IPv6 firewall tester website] using the email address and PGP key specified in the [https://ipv6.chappell-family.com/.well-known/security.txt .well-known/security.txt] file.&lt;br /&gt;
&lt;br /&gt;
= IPv6 Firewall Tester Security Reporting Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
All researchers who responsibly report vulnerabilities will be credited here.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=Security_reporting_and_acknowledgements&amp;diff=574</id>
		<title>Security reporting and acknowledgements</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=Security_reporting_and_acknowledgements&amp;diff=574"/>
		<updated>2022-05-25T19:23:26Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: Security policy and acknowledgements page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= IPv6 Firewall Tester Security Reporting Policy =&lt;br /&gt;
&lt;br /&gt;
Vulnerability researchers should securely and responsibly report discovered vulnerabilities related to the ipv6.chappell-family.com website using the email address and PGP key specified in the [https://ipv6.chappell-family.com/.well-known/security.txt .well-known/security.txt] file.&lt;br /&gt;
&lt;br /&gt;
= IPv6 Firewall Tester Security Reporting Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
All researchers who responsibly report vulnerabilities will be credited here.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=Main_Page&amp;diff=573</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=Main_Page&amp;diff=573"/>
		<updated>2022-05-25T19:13:30Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: /* IPv6 Port Scanner Related */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; 	&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
Welcome to the site of my online, [https://www.github.com/timsgit/ipscan opensource], IPv6 Port Scanner. This service supports testing of multiple IPv6 UDP and TCP ports on any internet connected host with a global IPv6 unicast address (2000::/3), irrespective of your IPv6 provider or device operating system. In order to be as flexible as possible the tested TCP ports are selectable from a mix of commonly-used ports and/or user-defined ports.&lt;br /&gt;
&lt;br /&gt;
==IPv6 Port Scanner Related==&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[IPv6]] Firewall tester&amp;#039;&amp;#039;&amp;#039; - an overview of my [https://github.com/timsgit/ipscan Opensource] IPv6 Port Scanner&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[IPv6_Firewalls]]&amp;#039;&amp;#039;&amp;#039; - some observations on IPv6 firewalls and address selections&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;IPv6 Firewall tester default [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039;  - list of default TCP/IP and UDP/IP ports which my IPv6 Firewall Scanner will test&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;IPv6 firewall tester [[ScanStatus]]&amp;#039;&amp;#039;&amp;#039;  - a description of the reportable states for each tested TCP/IP or UDP/IP port&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[IPv6_SpecialTests]]&amp;#039;&amp;#039;&amp;#039; - a description of specific protocol tests which IPscan performs&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;IPv6 firewall [[ScanAutomation]]&amp;#039;&amp;#039;&amp;#039; - a quick overview of IPv6 TCP/UDP port scan automation using wget   &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[IPv6_DEBUG]]&amp;#039;&amp;#039;&amp;#039;  - some steps for debugging IPv6 access to my IPv6 Port Scanner&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[IPv6_Windows7]]&amp;#039;&amp;#039;&amp;#039; - some useful Win7 IPv6-related commands&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[Raspberry_Pi_IPv6_firewall_tester]]&amp;#039;&amp;#039;&amp;#039; - a quick HowTo describing the steps to make your own IPv6 firewall tester.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[Security_reporting_and_acknowledgements]]&amp;#039;&amp;#039;&amp;#039; - a page describing our security policy and researcher acknowledgements&lt;br /&gt;
&lt;br /&gt;
For those in a rush please follow the &amp;#039;&amp;#039;&amp;#039;[https://ipv6.chappell-family.com/ipv6tcptest/ IPv6 firewall tester link]&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
==Articles and Linux related==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[Articles]]&amp;#039;&amp;#039;&amp;#039;    - including topics like [https://ipv6.chappell-family.com/docs/ipsec_v01.pdf practical Linux IPsec] and ARM floating point programming&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[https://ipv6.chappell-family.com/docs/IPv6_Squid_v01.pdf Squid Proxy as an IPv4/IPv6 translator]&amp;#039;&amp;#039;&amp;#039; - Allow &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;ALL&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; your client devices to access IPv4-only, IPv4/IPv6 dual-stacked and IPv6-only websites&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[Linux]]&amp;#039;&amp;#039;&amp;#039;       - Linux related information&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[Zyxel]]&amp;#039;&amp;#039;&amp;#039;       - Zyxel Prestige Modem commands&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[Munin]] Printer Plugins&amp;#039;&amp;#039;&amp;#039;   - Plugins for HP [[DJ6840]], [[C309a]] and [[e710]] printers and AIO devices&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[Munin]] Motherboard Plugins&amp;#039;&amp;#039;&amp;#039;   - Plugins for Intel [[D945GCLF2]] and [[DH67CF]] Motherboards&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[Munin]] UPS Plugins&amp;#039;&amp;#039;&amp;#039;   - APC [[UPS]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=File:IPscan_results_2019.png&amp;diff=572</id>
		<title>File:IPscan results 2019.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=File:IPscan_results_2019.png&amp;diff=572"/>
		<updated>2019-09-26T19:30:35Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: Wikiadmin uploaded a new version of File:IPscan results 2019.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
IPscan typical results 2019&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=File:IPscan_results_2019.png&amp;diff=571</id>
		<title>File:IPscan results 2019.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=File:IPscan_results_2019.png&amp;diff=571"/>
		<updated>2019-09-26T19:06:12Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: Wikiadmin uploaded a new version of File:IPscan results 2019.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
IPscan typical results 2019&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=File:IPscan_results_2019.png&amp;diff=570</id>
		<title>File:IPscan results 2019.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=File:IPscan_results_2019.png&amp;diff=570"/>
		<updated>2019-09-26T19:02:33Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: Wikiadmin uploaded a new version of File:IPscan results 2019.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
IPscan typical results 2019&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=File:IPscan_results_key1.png&amp;diff=569</id>
		<title>File:IPscan results key1.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=File:IPscan_results_key1.png&amp;diff=569"/>
		<updated>2019-09-26T18:59:35Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: Wikiadmin uploaded a new version of File:IPscan results key1.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
IPscan key results page 1, 2019&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=568</id>
		<title>IPv6</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=568"/>
		<updated>2019-09-25T19:22:48Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Tim&amp;#039;s IPv6 Firewall Tester (ICMPv6, IPv6 TCP and UDP Port Scanner)==&lt;br /&gt;
&lt;br /&gt;
IPscan offers much of the functionality you might hope to find in an IPv6 version of [https://www.grc.com/ GRC&amp;#039;s ShieldsUp®] utility.&lt;br /&gt;
&lt;br /&gt;
=== Introduction ===&lt;br /&gt;
&lt;br /&gt;
Recent web-browsers request IPv6 DNS lookups in preference to IPv4 if they are running on a host with IPv6 enabled. My domain (ipv6.chappell-family.com) has DNS entries for both IPv4 and IPv6 addresses, but defaults to IPv4. This makes it safe for IPv4-only hosts, which make up most of the current web traffic, including search engines, to use the same URL. Browsers running on IPv4-only hosts will not request an IPv6 address and will therefore access the website entirely using IPv4. The landing page, as linked below, attempts to determine whether your machine has a valid globally routable IPv6 address (2000::/3) and whether it is behind an HTTP proxy, by looking for well known HTTP header variables which indicate that this may be the case. Only if the hosts&amp;#039; IP address is determined to be globally routable unicast IPv6 and there are no tell-tale HTTP proxy variables will the landing page offer links to initiate the scan, as shown in the figure below.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_Landing_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) landing page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The tester is made available in two basic versions - one for browsers supporting javascript and the other suitable for text-only browsers such as Lynx, w3m and ELinks. The lightweight text-only browser version can be used on hosts which do not sport their own GUI environment (e.g. servers and embedded devices like routers). The original javascript browser version supports ongoing updates of the test status, whereas the text-only version only produces a results page once all the selected ports have been tested. Additionally, a fast and standard version of both of these testers is provided. The fast version tests multiple TCP or UDP ports in parallel, whereas the standard version tests only 1 port at a time, at a default rate of 1 port per second. Please be aware that some operating systems and firewalls apply rate-limiting to their generation, or passing, of ICMPv6 responses on the basis that this behaviour is indicative of a port scan being performed. Consequently such rate-limiting might cause a port which would normally generate an ICMPv6 response (e.g. PHBTD) to send no response at all, which IPscan would report as STEALTHed. If you are testing a host or firewall (whether on the client under test or elsewhere in the path between your client and the test server) which implements such rate-limiting then you are advised to use the standard, slower versions of IPscan which should not trigger the rate-limiting behaviour. If you&amp;#039;re unsure which version is appropriate for you, then try both and compare the results. Some Linux distributions and some ISP firewalls are known to implement such rate-limiting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please do NOT attempt to test hosts which are located behind HTTP proxies. Such proxies are very common in both corporate environments and on commercially-operated free wifi networks. The landing page for IPscan attempts to detect the common headers which such proxies insert, but it cannot detect truly transparent proxies. An HTTP Proxy is typically used by corporate networks to ensure employees are using their PCs in line with corporate computer-use policies. If you are interested in deploying your own HTTP proxy then [http://www.squid-cache.org/ Squid] is highly recommended as a proxy able to perform not only the usual access control and content-caching tasks but also offering IPv4 and IPv6 inter-working between single and dual-stack clients and web-sites. For further details please read my [https://ipv6.chappell-family.com/docs/IPv6_Squid_v01.pdf IPv6 Squid Proxy article.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== The Test ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
The tester allows a user to choose whether to include a commonly used set of &amp;#039;&amp;#039;&amp;#039;TCP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039; in their scan, as well as the ability to specify a number of their own specifically interesting TCP ports (this is intended to cover setups where you run services on non IANA-assigned ports, or just run less-common services). If you would like to see the list of commonly used ports expanded, or just changed, then please contact me.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_kickoff_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) original kickoff page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
The test begins by sending an ICMPv6 ECHO-REQUEST (an IPv6 ping) towards the host under test (HUT). The tester checks for related ICMPv6 responses from either the HUT or other hosts (e.g. routers and/or firewall devices protecting the HUT). If a response is detected from an host other than the HUT then the IPv6 address of this third-party is reported.   &lt;br /&gt;
 &lt;br /&gt;
The test continues by scanning a fixed set of commonly used &amp;#039;&amp;#039;&amp;#039;UDP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039;. The IPv6 UDP port test sets its&amp;#039; socket tx/rx timeouts to be 2 seconds - consequently the results can take up to 2s per tested UDP port - although the actual time depends heavily upon the filtering that your system employs (e.g. firewalls which mark protected ports as &amp;#039;unreachable&amp;#039; will resolve in much less than the allowed 2 second timeout assuming that your firewall sends the appropriate ICMPv6 packet in response).&lt;br /&gt;
&lt;br /&gt;
The test finishes by scanning the user-selected IPv6 TCP ports. The IPv6 TCP port test sets its&amp;#039; socket Tx/Rx timeouts to be 1 second - consequently the results can take up to 1s per tested port - although this depends heavily upon the filtering your system employs (e.g. firewalls which mark protected ports as &amp;#039;administratively prohibited&amp;#039; will resolve as PHBTD in much less than the allowed 1 second timeout assuming that your firewall sends an ICMPv6 type 1 code 1 packet in response).&lt;br /&gt;
&lt;br /&gt;
The tester will indicate the status of the tested UDP and TCP ports as either OPEN, STEALTHed or one of a series of other states depending on the positive or negative feedback received from your machine. A typical result is shown in the figures below. Note that if you run the test using an interactive gui-based browser then hovering over specific port numbers produces a pop-up describing the service run on that specific port. For a more detailed explanation of the reported states please read &amp;#039;&amp;#039;&amp;#039;[[ScanStatus]]&amp;#039;&amp;#039;&amp;#039;. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_results_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) IPscan results page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:IPscan_results_key1.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) IPscan results key (1 of 2) viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:IPscan_results_key2.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) IPscan results key (2 of 2) viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;&amp;#039;&amp;#039;&amp;#039;IMPORTANT:&amp;#039;&amp;#039;&amp;#039; this scanner will direct IPv6 TCP, UDP and ICMPv6 traffic towards the IP address that my webserver determines the request originates from. Please do NOT attempt to test machines that are operating behind transparent HTTP proxies, unless you also administer the proxy and specifically intend that machine to be tested.&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you wish to test your host now then please point your browser towards [https://ipv6.chappell-family.com/ipv6tcptest/ my IPv6 portscanner.]&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Test Server Source IPv6 Addresses ===&lt;br /&gt;
&lt;br /&gt;
Tests performed from my www64.chappell-family.co.uk host will be sourced from IPv6 address: &amp;#039;&amp;#039;&amp;#039;2001:470:971f:6::4&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
Note: during periods of planned server maintenance, a reduced service supporting only TCP testing will be offered, which will be sourced from an IPv6 address in the following range: &amp;#039;&amp;#039;&amp;#039;2001:8d8:100f::/48&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
=== Raspberry Pi Powered IPv6 Firewall Tester ===&lt;br /&gt;
&lt;br /&gt;
Outline details of my Raspberry Pi Powered IPv6 firewall tester can be found here [[Raspberry_Pi_IPv6_firewall_tester]], along with more complete [[Raspberry_Pi_IPv6_firewall_tester_installation]] details. &lt;br /&gt;
&lt;br /&gt;
All tests performed during non-maintenance periods are now handled by a Raspberry Pi powered host.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Issues - Debugging ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re having trouble accessing the landing page via IPv6 (i.e. your IP address is reported as IPv4) then please see the following &amp;#039;&amp;#039;&amp;#039;[[IPv6_DEBUG]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Observations on IPv6 firewalls and IPv6 Address Selection ===&lt;br /&gt;
&lt;br /&gt;
For some general observations on IPv6 firewalls, as well as some useful references, please see the &amp;#039;&amp;#039;&amp;#039;[[IPv6_Firewalls]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Getting an IPv6 connection ===&lt;br /&gt;
&lt;br /&gt;
If you don&amp;#039;t already have an IPv6 connection but wish to get involved, then try a tunnel-broker such as [http://tunnelbroker.net Hurricane Electric].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Source code ===&lt;br /&gt;
&lt;br /&gt;
If you would like to view or download the IPv6 firewall scanner source code then please visit my &amp;#039;&amp;#039;&amp;#039;[https://github.com/timsgit/ipscan github]&amp;#039;&amp;#039;&amp;#039; page. If you deploy the scanner on an internet facing machine then &amp;#039;&amp;#039;please&amp;#039;&amp;#039; ensure that you protect users&amp;#039; privacy by following the instructions given in point 10 of the embedded [https://github.com/timsgit/ipscan/blob/master/README README] file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Automation ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;d like to automate IPv6 firewall testing, or run the same test a number of times on different hosts then please see my &amp;#039;&amp;#039;&amp;#039;[[ScanAutomation]]&amp;#039;&amp;#039;&amp;#039; section and HTML &amp;#039;&amp;#039;&amp;#039;[[ResultScraping]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== URL for Sharing ===&lt;br /&gt;
&lt;br /&gt;
If you find this utility useful then please feel free to share the following URL with new users:&lt;br /&gt;
&lt;br /&gt;
   &amp;#039;&amp;#039;&amp;#039;https://ipv6.chappell-family.com/ipv6tcptest/&amp;#039;&amp;#039;&amp;#039; IPv6 Firewall Tester&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy. All other registered trademarks are the property of their respective owners.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=567</id>
		<title>IPv6</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=567"/>
		<updated>2019-09-25T19:17:01Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Tim&amp;#039;s IPv6 Firewall Tester (ICMPv6, IPv6 TCP and UDP Port Scanner)==&lt;br /&gt;
&lt;br /&gt;
IPscan offers much of the functionality you might hope to find in an IPv6 version of [https://www.grc.com/ GRC&amp;#039;s ShieldsUp®] utility.&lt;br /&gt;
&lt;br /&gt;
=== Introduction ===&lt;br /&gt;
&lt;br /&gt;
Recent web-browsers request IPv6 DNS lookups in preference to IPv4 if they are running on a host with IPv6 enabled. My domain (ipv6.chappell-family.com) has DNS entries for both IPv4 and IPv6 addresses, but defaults to IPv4. This makes it safe for IPv4-only hosts, which make up most of the current web traffic, including search engines, to use the same URL. Browsers running on IPv4-only hosts will not request an IPv6 address and will therefore access the website entirely using IPv4. The landing page, as linked below, attempts to determine whether your machine has a valid globally routable IPv6 address (2000::/3) and whether it is behind an HTTP proxy, by looking for well known HTTP header variables which indicate that this may be the case. Only if the hosts&amp;#039; IP address is determined to be globally routable unicast IPv6 and there are no tell-tale HTTP proxy variables will the landing page offer links to initiate the scan, as shown in the figure below.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_Landing_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) landing page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The tester is made available in two basic versions - one for browsers supporting javascript and the other suitable for text-only browsers such as Lynx, w3m and ELinks. The lightweight text-only browser version can be used on hosts which do not sport their own GUI environment (e.g. servers and embedded devices like routers). The original javascript browser version supports ongoing updates of the test status, whereas the text-only version only produces a results page once all the selected ports have been tested. Additionally, a fast and standard version of both of these testers is provided. The fast version tests multiple TCP or UDP ports in parallel, whereas the standard version tests only 1 port at a time, at a default rate of 1 port per second. Please be aware that some operating systems and firewalls apply rate-limiting to their generation, or passing, of ICMPv6 responses on the basis that this behaviour is indicative of a port scan being performed. Consequently such rate-limiting might cause a port which would normally generate an ICMPv6 response (e.g. PHBTD) to send no response at all, which IPscan would report as STEALTHed. If you are testing a host or firewall (whether on the client under test or elsewhere in the path between your client and the test server) which implements such rate-limiting then you are advised to use the standard, slower versions of IPscan which should not trigger the rate-limiting behaviour. If you&amp;#039;re unsure which version is appropriate for you, then try both and compare the results. Some Linux distributions and some ISP firewalls are known to implement such rate-limiting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please do NOT attempt to test hosts which are located behind HTTP proxies. Such proxies are very common in both corporate environments and on commercially-operated free wifi networks. The landing page for IPscan attempts to detect the common headers which such proxies insert, but it cannot detect truly transparent proxies. An HTTP Proxy is typically used by corporate networks to ensure employees are using their PCs in line with corporate computer-use policies. If you are interested in deploying your own HTTP proxy then [http://www.squid-cache.org/ Squid] is highly recommended as a proxy able to perform not only the usual access control and content-caching tasks but also offering IPv4 and IPv6 inter-working between single and dual-stack clients and web-sites. For further details please read my [https://ipv6.chappell-family.com/docs/IPv6_Squid_v01.pdf IPv6 Squid Proxy article.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== The Test ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
The tester allows a user to choose whether to include a commonly used set of &amp;#039;&amp;#039;&amp;#039;TCP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039; in their scan, as well as the ability to specify a number of their own specifically interesting TCP ports (this is intended to cover setups where you run services on non IANA-assigned ports, or just run less-common services). If you would like to see the list of commonly used ports expanded, or just changed, then please contact me.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_kickoff_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) original kickoff page viewed using Safari. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
The test begins by sending an ICMPv6 ECHO-REQUEST (an IPv6 ping) towards the host under test (HUT). The tester checks for related ICMPv6 responses from either the HUT or other hosts (e.g. routers and/or firewall devices protecting the HUT). If a response is detected from an host other than the HUT then the IPv6 address of this third-party is reported.   &lt;br /&gt;
 &lt;br /&gt;
The test continues by scanning a fixed set of commonly used &amp;#039;&amp;#039;&amp;#039;UDP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039;. The IPv6 UDP port test sets its&amp;#039; socket tx/rx timeouts to be 2 seconds - consequently the results can take up to 2s per tested UDP port - although the actual time depends heavily upon the filtering that your system employs (e.g. firewalls which mark protected ports as &amp;#039;unreachable&amp;#039; will resolve in much less than the allowed 2 second timeout assuming that your firewall sends the appropriate ICMPv6 packet in response).&lt;br /&gt;
&lt;br /&gt;
The test finishes by scanning the user-selected IPv6 TCP ports. The IPv6 TCP port test sets its&amp;#039; socket tx/rx timeouts to be 1 second - consequently the results can take up to 1s per tested port - although this depends heavily upon the filtering your system employs (e.g. firewalls which mark protected ports as &amp;#039;administratively prohibited&amp;#039; will resolve as PHBTD in much less than the allowed 1 second timeout assuming that your firewall sends an ICMPv6 type 1 code 1 packet in response).&lt;br /&gt;
&lt;br /&gt;
The tester will indicate the status of the tested UDP and TCP ports as either OPEN, STEALTHed or one of a series of other states depending on the positive or negative feedback received from your machine. A typical result is shown in the figures below. Note that if you run the test using an interactive gui-based browser then hovering over specific port numbers produces a pop-up describing the service run on that specific port. For a more detailed explanation of the reported states please read &amp;#039;&amp;#039;&amp;#039;[[ScanStatus]]&amp;#039;&amp;#039;&amp;#039;. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_results_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) original results page viewed using IE9. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:IPscan_results_key1.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) lightweight results page viewed using w3m. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:IPscan_results_key2.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) lightweight results page viewed using w3m. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;&amp;#039;&amp;#039;&amp;#039;IMPORTANT:&amp;#039;&amp;#039;&amp;#039; this scanner will direct IPv6 TCP, UDP and ICMPv6 traffic towards the IP address that my webserver determines the request originates from. Please do NOT attempt to test machines that are operating behind transparent HTTP proxies, unless you also administer the proxy and specifically intend that machine to be tested.&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you wish to test your host now then please point your browser towards [https://ipv6.chappell-family.com/ipv6tcptest/ my IPv6 portscanner.]&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Test Server Source IPv6 Addresses ===&lt;br /&gt;
&lt;br /&gt;
Tests performed from my www64.chappell-family.co.uk host will be sourced from IPv6 address: &amp;#039;&amp;#039;&amp;#039;2001:470:971f:6::4&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
Note: during periods of planned server maintenance, a reduced service supporting only TCP testing will be offered, which will be sourced from an IPv6 address in the following range: &amp;#039;&amp;#039;&amp;#039;2001:8d8:100f::/48&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
=== Raspberry Pi Powered IPv6 Firewall Tester ===&lt;br /&gt;
&lt;br /&gt;
Outline details of my Raspberry Pi Powered IPv6 firewall tester can be found here [[Raspberry_Pi_IPv6_firewall_tester]], along with more complete [[Raspberry_Pi_IPv6_firewall_tester_installation]] details. &lt;br /&gt;
&lt;br /&gt;
All tests performed during non-maintenance periods are now handled by a Raspberry Pi powered host.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Issues - Debugging ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re having trouble accessing the landing page via IPv6 (i.e. your IP address is reported as IPv4) then please see the following &amp;#039;&amp;#039;&amp;#039;[[IPv6_DEBUG]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Observations on IPv6 firewalls and IPv6 Address Selection ===&lt;br /&gt;
&lt;br /&gt;
For some general observations on IPv6 firewalls, as well as some useful references, please see the &amp;#039;&amp;#039;&amp;#039;[[IPv6_Firewalls]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Getting an IPv6 connection ===&lt;br /&gt;
&lt;br /&gt;
If you don&amp;#039;t already have an IPv6 connection but wish to get involved, then try a tunnel-broker such as [http://tunnelbroker.net Hurricane Electric].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Source code ===&lt;br /&gt;
&lt;br /&gt;
If you would like to view or download the IPv6 firewall scanner source code then please visit my &amp;#039;&amp;#039;&amp;#039;[https://github.com/timsgit/ipscan github]&amp;#039;&amp;#039;&amp;#039; page. If you deploy the scanner on an internet facing machine then &amp;#039;&amp;#039;please&amp;#039;&amp;#039; ensure that you protect users&amp;#039; privacy by following the instructions given in point 10 of the embedded [https://github.com/timsgit/ipscan/blob/master/README README] file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Automation ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;d like to automate IPv6 firewall testing, or run the same test a number of times on different hosts then please see my &amp;#039;&amp;#039;&amp;#039;[[ScanAutomation]]&amp;#039;&amp;#039;&amp;#039; section and HTML &amp;#039;&amp;#039;&amp;#039;[[ResultScraping]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== URL for Sharing ===&lt;br /&gt;
&lt;br /&gt;
If you find this utility useful then please feel free to share the following URL with new users:&lt;br /&gt;
&lt;br /&gt;
   &amp;#039;&amp;#039;&amp;#039;https://ipv6.chappell-family.com/ipv6tcptest/&amp;#039;&amp;#039;&amp;#039; IPv6 Firewall Tester&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy. All other registered trademarks are the property of their respective owners.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=566</id>
		<title>IPv6</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=566"/>
		<updated>2019-09-25T19:11:49Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Tim&amp;#039;s IPv6 Firewall Tester (ICMPv6, IPv6 TCP and UDP Port Scanner)==&lt;br /&gt;
&lt;br /&gt;
IPscan offers much of the functionality you might hope to find in an IPv6 version of [https://www.grc.com/ GRC&amp;#039;s ShieldsUp®] utility.&lt;br /&gt;
&lt;br /&gt;
=== Introduction ===&lt;br /&gt;
&lt;br /&gt;
Recent web-browsers request IPv6 DNS lookups in preference to IPv4 if they are running on a host with IPv6 enabled. My domain (ipv6.chappell-family.com) has DNS entries for both IPv4 and IPv6 addresses, but defaults to IPv4. This makes it safe for IPv4-only hosts, which make up most of the current web traffic, including search engines, to use the same URL. Browsers running on IPv4-only hosts will not request an IPv6 address and will therefore access the website entirely using IPv4. The landing page, as linked below, attempts to determine whether your machine has a valid globally routable IPv6 address (2000::/3) and whether it is behind an HTTP proxy, by looking for well known HTTP header variables which indicate that this may be the case. Only if the hosts&amp;#039; IP address is determined to be globally routable unicast IPv6 and there are no tell-tale HTTP proxy variables will the landing page offer links to initiate the scan, as shown in the figure below.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_Landing_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) landing page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The tester is made available in two basic versions - one for browsers supporting javascript and the other suitable for text-only browsers such as Lynx, w3m and ELinks. The lightweight text-only browser version can be used on hosts which do not sport their own GUI environment (e.g. servers and embedded devices like routers). The original javascript browser version supports ongoing updates of the test status, whereas the text-only version only produces a results page once all the selected ports have been tested. Additionally, a fast and standard version of both of these testers is provided. The fast version tests multiple TCP or UDP ports in parallel, whereas the standard version tests only 1 port at a time, at a default rate of 1 port per second. Please be aware that some operating systems and firewalls apply rate-limiting to their generation, or passing, of ICMPv6 responses on the basis that this behaviour is indicative of a port scan being performed. Consequently such rate-limiting might cause a port which would normally generate an ICMPv6 response (e.g. PHBTD) to send no response at all, which IPscan would report as STEALTHed. If you are testing a host or firewall (whether on the client under test or elsewhere in the path between your client and the test server) which implements such rate-limiting then you are advised to use the standard, slower versions of IPscan which should not trigger the rate-limiting behaviour. If you&amp;#039;re unsure which version is appropriate for you, then try both and compare the results. Some Linux distributions and some ISP firewalls are known to implement such rate-limiting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please do NOT attempt to test hosts which are located behind HTTP proxies. Such proxies are very common in both corporate environments and on commercially-operated free wifi networks. The landing page for IPscan attempts to detect the common headers which such proxies insert, but it cannot detect truly transparent proxies. An HTTP Proxy is typically used by corporate networks to ensure employees are using their PCs in line with corporate computer-use policies. If you are interested in deploying your own HTTP proxy then [http://www.squid-cache.org/ Squid] is highly recommended as a proxy able to perform not only the usual access control and content-caching tasks but also offering IPv4 and IPv6 inter-working between single and dual-stack clients and web-sites. For further details please read my [https://ipv6.chappell-family.com/docs/IPv6_Squid_v01.pdf IPv6 Squid Proxy article.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== The Test ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
The tester allows a user to choose whether to include a commonly used set of &amp;#039;&amp;#039;&amp;#039;TCP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039; in their scan, as well as the ability to specify a number of their own specifically interesting TCP ports (this is intended to cover setups where you run services on non IANA-assigned ports, or just run less-common services). If you would like to see the list of commonly used ports expanded, or just changed, then please contact me.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_kickoff_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) original kickoff page viewed using Safari. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
The test begins by sending an ICMPv6 ECHO-REQUEST (an IPv6 ping) towards the host under test (HUT). The tester checks for related ICMPv6 responses from either the HUT or other hosts (e.g. routers and/or firewall devices protecting the HUT). If a response is detected from an host other than the HUT then the IPv6 address of this third-party is reported.   &lt;br /&gt;
 &lt;br /&gt;
The test continues by scanning a fixed set of commonly used &amp;#039;&amp;#039;&amp;#039;UDP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039;. The IPv6 UDP port test sets its&amp;#039; socket tx/rx timeouts to be 2 seconds - consequently the results can take up to 2s per tested UDP port - although the actual time depends heavily upon the filtering that your system employs (e.g. firewalls which mark protected ports as &amp;#039;unreachable&amp;#039; will resolve in much less than the allowed 2 second timeout assuming that your firewall sends the appropriate ICMPv6 packet in response).&lt;br /&gt;
&lt;br /&gt;
The test finishes by scanning the user-selected IPv6 TCP ports. The IPv6 TCP port test sets its&amp;#039; socket tx/rx timeouts to be 1 second - consequently the results can take up to 1s per tested port - although this depends heavily upon the filtering your system employs (e.g. firewalls which mark protected ports as &amp;#039;administratively prohibited&amp;#039; will resolve as PHBTD in much less than the allowed 1 second timeout assuming that your firewall sends an ICMPv6 type 1 code 1 packet in response).&lt;br /&gt;
&lt;br /&gt;
The tester will indicate the status of the tested UDP and TCP ports as either OPEN, STEALTHed or one of a series of other states depending on the positive or negative feedback received from your machine. A typical result is shown in the figure below. Note that if you run the test using an interactive gui-based browser then hovering over specific port numbers produces a pop-up describing the service run on that specific port. For a more detailed explanation of the reported states please read &amp;#039;&amp;#039;&amp;#039;[[ScanStatus]]&amp;#039;&amp;#039;&amp;#039;. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Results12.jpg|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) original results page viewed using IE9. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:W3m_results_LR.jpg|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) lightweight results page viewed using w3m. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;&amp;#039;&amp;#039;&amp;#039;IMPORTANT:&amp;#039;&amp;#039;&amp;#039; this scanner will direct IPv6 TCP, UDP and ICMPv6 traffic towards the IP address that my webserver determines the request originates from. Please do NOT attempt to test machines that are operating behind transparent HTTP proxies, unless you also administer the proxy and specifically intend that machine to be tested.&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you wish to test your host now then please point your browser towards [https://ipv6.chappell-family.com/ipv6tcptest/ my IPv6 portscanner.]&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Test Server Source IPv6 Addresses ===&lt;br /&gt;
&lt;br /&gt;
Tests performed from my www6.chappell-family.co.uk host will be sourced from IPv6 address: &amp;#039;&amp;#039;&amp;#039;2001:470:971f:6::3&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
Note: during periods of planned server maintenance, a reduced service supporting only TCP testing will be offered, which will be sourced from an IPv6 address in the following range: &amp;#039;&amp;#039;&amp;#039;2001:8d8:100f::/48&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
=== Raspberry Pi Powered IPv6 Firewall Tester ===&lt;br /&gt;
&lt;br /&gt;
Outline details of my Raspberry Pi Powered IPv6 firewall tester can be found here [[Raspberry_Pi_IPv6_firewall_tester]], along with more complete [[Raspberry_Pi_IPv6_firewall_tester_installation]] details. &lt;br /&gt;
&lt;br /&gt;
Tests performed from my Raspberry Pi host will be sourced from IPv6 address: &amp;#039;&amp;#039;&amp;#039;2001:470:971f:6::3&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Issues - Debugging ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re having trouble accessing the landing page via IPv6 (i.e. your IP address is reported as IPv4) then please see the following &amp;#039;&amp;#039;&amp;#039;[[IPv6_DEBUG]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Observations on IPv6 firewalls and IPv6 Address Selection ===&lt;br /&gt;
&lt;br /&gt;
For some general observations on IPv6 firewalls, as well as some useful references, please see the &amp;#039;&amp;#039;&amp;#039;[[IPv6_Firewalls]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Getting an IPv6 connection ===&lt;br /&gt;
&lt;br /&gt;
If you don&amp;#039;t already have an IPv6 connection but wish to get involved, then try a tunnel-broker such as [http://tunnelbroker.net Hurricane Electric].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Source code ===&lt;br /&gt;
&lt;br /&gt;
If you would like to view or download the IPv6 firewall scanner source code then please visit my &amp;#039;&amp;#039;&amp;#039;[https://github.com/timsgit/ipscan github]&amp;#039;&amp;#039;&amp;#039; page. If you deploy the scanner on an internet facing machine then &amp;#039;&amp;#039;please&amp;#039;&amp;#039; ensure that you protect users&amp;#039; privacy by following the instructions given in point 10 of the embedded [https://github.com/timsgit/ipscan/blob/master/README README] file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Automation ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;d like to automate IPv6 firewall testing, or run the same test a number of times on different hosts then please see my &amp;#039;&amp;#039;&amp;#039;[[ScanAutomation]]&amp;#039;&amp;#039;&amp;#039; section and HTML &amp;#039;&amp;#039;&amp;#039;[[ResultScraping]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== URL for Sharing ===&lt;br /&gt;
&lt;br /&gt;
If you find this utility useful then please feel free to share the following URL with new users:&lt;br /&gt;
&lt;br /&gt;
   &amp;#039;&amp;#039;&amp;#039;https://ipv6.chappell-family.com/ipv6tcptest/&amp;#039;&amp;#039;&amp;#039; IPv6 Firewall Tester&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy. All other registered trademarks are the property of their respective owners.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=565</id>
		<title>IPv6</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=565"/>
		<updated>2019-09-25T19:08:12Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Tim&amp;#039;s IPv6 Firewall Tester (ICMPv6, IPv6 TCP and UDP Port Scanner)==&lt;br /&gt;
&lt;br /&gt;
IPscan offers much of the functionality you might hope to find in an IPv6 version of [https://www.grc.com/ GRC&amp;#039;s ShieldsUp®] utility.&lt;br /&gt;
&lt;br /&gt;
=== Introduction ===&lt;br /&gt;
&lt;br /&gt;
Recent web-browsers request IPv6 DNS lookups in preference to IPv4 if they are running on a host with IPv6 enabled. My domain (ipv6.chappell-family.com) has DNS entries for both IPv4 and IPv6 addresses, but defaults to IPv4. This makes it safe for IPv4-only hosts, which make up most of the current web traffic, including search engines, to use the same URL. Browsers running on IPv4-only hosts will not request an IPv6 address and will therefore access the website entirely using IPv4. The landing page, as linked below, attempts to determine whether your machine has a valid globally routable IPv6 address (2000::/3) and whether it is behind an HTTP proxy, by looking for well known HTTP header variables which indicate that this may be the case. Only if the hosts&amp;#039; IP address is determined to be globally routable unicast IPv6 and there are no tell-tale HTTP proxy variables will the landing page offer links to initiate the scan, as encircled in the figure below.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_Landing_2019.png|border|alt=IPv6 Port Scanner (Firewall tester) landing page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The tester is made available in two basic versions - one for browsers supporting javascript and the other suitable for text-only browsers such as Lynx, w3m and ELinks. The lightweight text-only browser version (right-hand figures) can be used on hosts which do not sport their own GUI environment (e.g. servers and embedded devices like routers). The original javascript browser version (left-hand figures) supports ongoing updates of the test status, whereas the text-only version only produces a results page once all the selected ports have been tested. Additionally, a fast and standard version of both of these testers is provided. The fast version tests multiple TCP or UDP ports in parallel, whereas the standard version tests only 1 port at a time, at a default rate of 1 port per second. Please be aware that some OS and firewalls apply rate-limiting to their generation, or passing, of ICMPv6 responses on the basis that this behaviour is indicative of a port scan being performed. Consequently such rate-limiting might cause a port which would normally generate an ICMPv6 response (e.g. PHBTD) to send no response at all, which IPscan would report as STEALTHed. If you are testing a host or firewall (whether on the client under test or elsewhere in the path between your client and the test server) which implements such rate-limiting then you are advised to use the standard, slower versions of IPscan which should not trigger the rate-limiting behaviour. If you&amp;#039;re unsure which version is appropriate for you, then try both and compare the results. Some Linux distributions and some ISP firewalls are known to implement such rate-limiting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please do NOT attempt to test hosts which are located behind HTTP proxies. Such proxies are very common in both corporate environments and on commercially-operated free wifi networks. The landing page for IPscan attempts to detect the common headers which such proxies insert, but it cannot detect truly transparent proxies. An HTTP Proxy is typically used by corporate networks to ensure employees are using their PCs in line with corporate computer-use policies. If you are interested in deploying your own HTTP proxy then [http://www.squid-cache.org/ Squid] is highly recommended as a proxy able to perform not only the usual access control and content-caching tasks but also offering IPv4 and IPv6 inter-working between single and dual-stack clients and web-sites. For further details please read my [https://ipv6.chappell-family.com/docs/IPv6_Squid_v01.pdf IPv6 Squid Proxy article.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== The Test ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
The tester allows a user to choose whether to include a commonly used set of &amp;#039;&amp;#039;&amp;#039;TCP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039; in their scan, as well as the ability to specify a number of their own specifically interesting TCP ports (this is intended to cover setups where you run services on non IANA-assigned ports, or just run less-common services). If you would like to see the list of commonly used ports expanded, or just changed, then please contact me.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Kickoff12.jpg|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) original kickoff page viewed using Safari. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:W3m_kickoff_LR.jpg |320x480px|border|alt=IPv6 Port Scanner (Firewall tester) lightweight kickoff page viewed using w3m. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
The test begins by sending an ICMPv6 ECHO-REQUEST (an IPv6 ping) towards the host under test (HUT). The tester checks for related ICMPv6 responses from either the HUT or other hosts (e.g. routers and/or firewall devices protecting the HUT). If a response is detected from an host other than the HUT then the IPv6 address of this third-party is reported.   &lt;br /&gt;
 &lt;br /&gt;
The test continues by scanning a fixed set of commonly used &amp;#039;&amp;#039;&amp;#039;UDP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039;. The IPv6 UDP port test sets its&amp;#039; socket tx/rx timeouts to be 2 seconds - consequently the results can take up to 2s per tested UDP port - although the actual time depends heavily upon the filtering that your system employs (e.g. firewalls which mark protected ports as &amp;#039;unreachable&amp;#039; will resolve in much less than the allowed 2 second timeout assuming that your firewall sends the appropriate ICMPv6 packet in response).&lt;br /&gt;
&lt;br /&gt;
The test finishes by scanning the user-selected IPv6 TCP ports. The IPv6 TCP port test sets its&amp;#039; socket tx/rx timeouts to be 1 second - consequently the results can take up to 1s per tested port - although this depends heavily upon the filtering your system employs (e.g. firewalls which mark protected ports as &amp;#039;administratively prohibited&amp;#039; will resolve as PHBTD in much less than the allowed 1 second timeout assuming that your firewall sends an ICMPv6 type 1 code 1 packet in response).&lt;br /&gt;
&lt;br /&gt;
The tester will indicate the status of the tested UDP and TCP ports as either OPEN, STEALTHed or one of a series of other states depending on the positive or negative feedback received from your machine. A typical result is shown in the figure below. Note that if you run the test using an interactive gui-based browser then hovering over specific port numbers produces a pop-up describing the service run on that specific port. For a more detailed explanation of the reported states please read &amp;#039;&amp;#039;&amp;#039;[[ScanStatus]]&amp;#039;&amp;#039;&amp;#039;. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Results12.jpg|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) original results page viewed using IE9. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:W3m_results_LR.jpg|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) lightweight results page viewed using w3m. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;&amp;#039;&amp;#039;&amp;#039;IMPORTANT:&amp;#039;&amp;#039;&amp;#039; this scanner will direct IPv6 TCP, UDP and ICMPv6 traffic towards the IP address that my webserver determines the request originates from. Please do NOT attempt to test machines that are operating behind transparent HTTP proxies, unless you also administer the proxy and specifically intend that machine to be tested.&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you wish to test your host now then please point your browser towards [https://ipv6.chappell-family.com/ipv6tcptest/ my IPv6 portscanner.]&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Test Server Source IPv6 Addresses ===&lt;br /&gt;
&lt;br /&gt;
Tests performed from my www6.chappell-family.co.uk host will be sourced from IPv6 address: &amp;#039;&amp;#039;&amp;#039;2001:470:971f:6::3&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
Note: during periods of planned server maintenance, a reduced service supporting only TCP testing will be offered, which will be sourced from an IPv6 address in the following range: &amp;#039;&amp;#039;&amp;#039;2001:8d8:100f::/48&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
=== Raspberry Pi Powered IPv6 Firewall Tester ===&lt;br /&gt;
&lt;br /&gt;
Outline details of my Raspberry Pi Powered IPv6 firewall tester can be found here [[Raspberry_Pi_IPv6_firewall_tester]], along with more complete [[Raspberry_Pi_IPv6_firewall_tester_installation]] details. &lt;br /&gt;
&lt;br /&gt;
Tests performed from my Raspberry Pi host will be sourced from IPv6 address: &amp;#039;&amp;#039;&amp;#039;2001:470:971f:6::3&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Issues - Debugging ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re having trouble accessing the landing page via IPv6 (i.e. your IP address is reported as IPv4) then please see the following &amp;#039;&amp;#039;&amp;#039;[[IPv6_DEBUG]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Observations on IPv6 firewalls and IPv6 Address Selection ===&lt;br /&gt;
&lt;br /&gt;
For some general observations on IPv6 firewalls, as well as some useful references, please see the &amp;#039;&amp;#039;&amp;#039;[[IPv6_Firewalls]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Getting an IPv6 connection ===&lt;br /&gt;
&lt;br /&gt;
If you don&amp;#039;t already have an IPv6 connection but wish to get involved, then try a tunnel-broker such as [http://tunnelbroker.net Hurricane Electric].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Source code ===&lt;br /&gt;
&lt;br /&gt;
If you would like to view or download the IPv6 firewall scanner source code then please visit my &amp;#039;&amp;#039;&amp;#039;[https://github.com/timsgit/ipscan github]&amp;#039;&amp;#039;&amp;#039; page. If you deploy the scanner on an internet facing machine then &amp;#039;&amp;#039;please&amp;#039;&amp;#039; ensure that you protect users&amp;#039; privacy by following the instructions given in point 10 of the embedded [https://github.com/timsgit/ipscan/blob/master/README README] file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Automation ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;d like to automate IPv6 firewall testing, or run the same test a number of times on different hosts then please see my &amp;#039;&amp;#039;&amp;#039;[[ScanAutomation]]&amp;#039;&amp;#039;&amp;#039; section and HTML &amp;#039;&amp;#039;&amp;#039;[[ResultScraping]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== URL for Sharing ===&lt;br /&gt;
&lt;br /&gt;
If you find this utility useful then please feel free to share the following URL with new users:&lt;br /&gt;
&lt;br /&gt;
   &amp;#039;&amp;#039;&amp;#039;https://ipv6.chappell-family.com/ipv6tcptest/&amp;#039;&amp;#039;&amp;#039; IPv6 Firewall Tester&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy. All other registered trademarks are the property of their respective owners.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=564</id>
		<title>IPv6</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=564"/>
		<updated>2019-09-25T19:07:13Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Tim&amp;#039;s IPv6 Firewall Tester (ICMPv6, IPv6 TCP and UDP Port Scanner)==&lt;br /&gt;
&lt;br /&gt;
IPscan offers much of the functionality you might hope to find in an IPv6 version of [https://www.grc.com/ GRC&amp;#039;s ShieldsUp®] utility.&lt;br /&gt;
&lt;br /&gt;
=== Introduction ===&lt;br /&gt;
&lt;br /&gt;
Recent web-browsers request IPv6 DNS lookups in preference to IPv4 if they are running on a host with IPv6 enabled. My domain (ipv6.chappell-family.com) has DNS entries for both IPv4 and IPv6 addresses, but defaults to IPv4. This makes it safe for IPv4-only hosts, which make up most of the current web traffic, including search engines, to use the same URL. Browsers running on IPv4-only hosts will not request an IPv6 address and will therefore access the website entirely using IPv4. The landing page, as linked below, attempts to determine whether your machine has a valid globally routable IPv6 address (2000::/3) and whether it is behind an HTTP proxy, by looking for well known HTTP header variables which indicate that this may be the case. Only if the hosts&amp;#039; IP address is determined to be globally routable unicast IPv6 and there are no tell-tale HTTP proxy variables will the landing page offer links to initiate the scan, as encircled in the figure below.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:IPscan_Landing_2019.png|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) landing page viewed using Firefox. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:W3m_landing_LR.jpg|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) landing page viewed using w3m. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The tester is made available in two basic versions - one for browsers supporting javascript and the other suitable for text-only browsers such as Lynx, w3m and ELinks. The lightweight text-only browser version (right-hand figures) can be used on hosts which do not sport their own GUI environment (e.g. servers and embedded devices like routers). The original javascript browser version (left-hand figures) supports ongoing updates of the test status, whereas the text-only version only produces a results page once all the selected ports have been tested. Additionally, a fast and standard version of both of these testers is provided. The fast version tests multiple TCP or UDP ports in parallel, whereas the standard version tests only 1 port at a time, at a default rate of 1 port per second. Please be aware that some OS and firewalls apply rate-limiting to their generation, or passing, of ICMPv6 responses on the basis that this behaviour is indicative of a port scan being performed. Consequently such rate-limiting might cause a port which would normally generate an ICMPv6 response (e.g. PHBTD) to send no response at all, which IPscan would report as STEALTHed. If you are testing a host or firewall (whether on the client under test or elsewhere in the path between your client and the test server) which implements such rate-limiting then you are advised to use the standard, slower versions of IPscan which should not trigger the rate-limiting behaviour. If you&amp;#039;re unsure which version is appropriate for you, then try both and compare the results. Some Linux distributions and some ISP firewalls are known to implement such rate-limiting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please do NOT attempt to test hosts which are located behind HTTP proxies. Such proxies are very common in both corporate environments and on commercially-operated free wifi networks. The landing page for IPscan attempts to detect the common headers which such proxies insert, but it cannot detect truly transparent proxies. An HTTP Proxy is typically used by corporate networks to ensure employees are using their PCs in line with corporate computer-use policies. If you are interested in deploying your own HTTP proxy then [http://www.squid-cache.org/ Squid] is highly recommended as a proxy able to perform not only the usual access control and content-caching tasks but also offering IPv4 and IPv6 inter-working between single and dual-stack clients and web-sites. For further details please read my [https://ipv6.chappell-family.com/docs/IPv6_Squid_v01.pdf IPv6 Squid Proxy article.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== The Test ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
The tester allows a user to choose whether to include a commonly used set of &amp;#039;&amp;#039;&amp;#039;TCP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039; in their scan, as well as the ability to specify a number of their own specifically interesting TCP ports (this is intended to cover setups where you run services on non IANA-assigned ports, or just run less-common services). If you would like to see the list of commonly used ports expanded, or just changed, then please contact me.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Kickoff12.jpg|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) original kickoff page viewed using Safari. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:W3m_kickoff_LR.jpg |320x480px|border|alt=IPv6 Port Scanner (Firewall tester) lightweight kickoff page viewed using w3m. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
The test begins by sending an ICMPv6 ECHO-REQUEST (an IPv6 ping) towards the host under test (HUT). The tester checks for related ICMPv6 responses from either the HUT or other hosts (e.g. routers and/or firewall devices protecting the HUT). If a response is detected from an host other than the HUT then the IPv6 address of this third-party is reported.   &lt;br /&gt;
 &lt;br /&gt;
The test continues by scanning a fixed set of commonly used &amp;#039;&amp;#039;&amp;#039;UDP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039;. The IPv6 UDP port test sets its&amp;#039; socket tx/rx timeouts to be 2 seconds - consequently the results can take up to 2s per tested UDP port - although the actual time depends heavily upon the filtering that your system employs (e.g. firewalls which mark protected ports as &amp;#039;unreachable&amp;#039; will resolve in much less than the allowed 2 second timeout assuming that your firewall sends the appropriate ICMPv6 packet in response).&lt;br /&gt;
&lt;br /&gt;
The test finishes by scanning the user-selected IPv6 TCP ports. The IPv6 TCP port test sets its&amp;#039; socket tx/rx timeouts to be 1 second - consequently the results can take up to 1s per tested port - although this depends heavily upon the filtering your system employs (e.g. firewalls which mark protected ports as &amp;#039;administratively prohibited&amp;#039; will resolve as PHBTD in much less than the allowed 1 second timeout assuming that your firewall sends an ICMPv6 type 1 code 1 packet in response).&lt;br /&gt;
&lt;br /&gt;
The tester will indicate the status of the tested UDP and TCP ports as either OPEN, STEALTHed or one of a series of other states depending on the positive or negative feedback received from your machine. A typical result is shown in the figure below. Note that if you run the test using an interactive gui-based browser then hovering over specific port numbers produces a pop-up describing the service run on that specific port. For a more detailed explanation of the reported states please read &amp;#039;&amp;#039;&amp;#039;[[ScanStatus]]&amp;#039;&amp;#039;&amp;#039;. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Results12.jpg|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) original results page viewed using IE9. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:W3m_results_LR.jpg|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) lightweight results page viewed using w3m. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;&amp;#039;&amp;#039;&amp;#039;IMPORTANT:&amp;#039;&amp;#039;&amp;#039; this scanner will direct IPv6 TCP, UDP and ICMPv6 traffic towards the IP address that my webserver determines the request originates from. Please do NOT attempt to test machines that are operating behind transparent HTTP proxies, unless you also administer the proxy and specifically intend that machine to be tested.&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you wish to test your host now then please point your browser towards [https://ipv6.chappell-family.com/ipv6tcptest/ my IPv6 portscanner.]&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Test Server Source IPv6 Addresses ===&lt;br /&gt;
&lt;br /&gt;
Tests performed from my www6.chappell-family.co.uk host will be sourced from IPv6 address: &amp;#039;&amp;#039;&amp;#039;2001:470:971f:6::3&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
Note: during periods of planned server maintenance, a reduced service supporting only TCP testing will be offered, which will be sourced from an IPv6 address in the following range: &amp;#039;&amp;#039;&amp;#039;2001:8d8:100f::/48&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
=== Raspberry Pi Powered IPv6 Firewall Tester ===&lt;br /&gt;
&lt;br /&gt;
Outline details of my Raspberry Pi Powered IPv6 firewall tester can be found here [[Raspberry_Pi_IPv6_firewall_tester]], along with more complete [[Raspberry_Pi_IPv6_firewall_tester_installation]] details. &lt;br /&gt;
&lt;br /&gt;
Tests performed from my Raspberry Pi host will be sourced from IPv6 address: &amp;#039;&amp;#039;&amp;#039;2001:470:971f:6::3&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Issues - Debugging ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re having trouble accessing the landing page via IPv6 (i.e. your IP address is reported as IPv4) then please see the following &amp;#039;&amp;#039;&amp;#039;[[IPv6_DEBUG]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Observations on IPv6 firewalls and IPv6 Address Selection ===&lt;br /&gt;
&lt;br /&gt;
For some general observations on IPv6 firewalls, as well as some useful references, please see the &amp;#039;&amp;#039;&amp;#039;[[IPv6_Firewalls]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Getting an IPv6 connection ===&lt;br /&gt;
&lt;br /&gt;
If you don&amp;#039;t already have an IPv6 connection but wish to get involved, then try a tunnel-broker such as [http://tunnelbroker.net Hurricane Electric].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Source code ===&lt;br /&gt;
&lt;br /&gt;
If you would like to view or download the IPv6 firewall scanner source code then please visit my &amp;#039;&amp;#039;&amp;#039;[https://github.com/timsgit/ipscan github]&amp;#039;&amp;#039;&amp;#039; page. If you deploy the scanner on an internet facing machine then &amp;#039;&amp;#039;please&amp;#039;&amp;#039; ensure that you protect users&amp;#039; privacy by following the instructions given in point 10 of the embedded [https://github.com/timsgit/ipscan/blob/master/README README] file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Automation ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;d like to automate IPv6 firewall testing, or run the same test a number of times on different hosts then please see my &amp;#039;&amp;#039;&amp;#039;[[ScanAutomation]]&amp;#039;&amp;#039;&amp;#039; section and HTML &amp;#039;&amp;#039;&amp;#039;[[ResultScraping]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== URL for Sharing ===&lt;br /&gt;
&lt;br /&gt;
If you find this utility useful then please feel free to share the following URL with new users:&lt;br /&gt;
&lt;br /&gt;
   &amp;#039;&amp;#039;&amp;#039;https://ipv6.chappell-family.com/ipv6tcptest/&amp;#039;&amp;#039;&amp;#039; IPv6 Firewall Tester&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy. All other registered trademarks are the property of their respective owners.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=File:IPscan_results_key2.png&amp;diff=563</id>
		<title>File:IPscan results key2.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=File:IPscan_results_key2.png&amp;diff=563"/>
		<updated>2019-09-25T19:03:15Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: IPscan key results page 2, 2019&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
IPscan key results page 2, 2019&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=File:IPscan_results_key1.png&amp;diff=562</id>
		<title>File:IPscan results key1.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=File:IPscan_results_key1.png&amp;diff=562"/>
		<updated>2019-09-25T19:00:16Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: IPscan key results page 1, 2019&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
IPscan key results page 1, 2019&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=File:IPscan_results_2019.png&amp;diff=561</id>
		<title>File:IPscan results 2019.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=File:IPscan_results_2019.png&amp;diff=561"/>
		<updated>2019-09-25T18:58:37Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: IPscan typical results 2019&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
IPscan typical results 2019&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=File:IPscan_kickoff_2019.png&amp;diff=560</id>
		<title>File:IPscan kickoff 2019.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=File:IPscan_kickoff_2019.png&amp;diff=560"/>
		<updated>2019-09-25T18:56:52Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: IPscan kickoff page 2019.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
IPscan kickoff page 2019.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=File:IPscan_Landing_2019.png&amp;diff=559</id>
		<title>File:IPscan Landing 2019.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=File:IPscan_Landing_2019.png&amp;diff=559"/>
		<updated>2019-09-25T18:51:49Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: IPscan Landing Page 2019.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
IPscan Landing Page 2019.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=558</id>
		<title>ScanAutomation</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=558"/>
		<updated>2019-09-25T18:31:50Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: Changes to reflect new server.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==IPv6 Port Scan Automation==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of automated IPv6 firewall testing (IPv6 TCP and UDP port scans) using wget and IPscan. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Terms of Use===&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Please ensure that you accept the &amp;#039;&amp;#039;[https://wiki.chappell-family.com/wiki/index.php?title=Timswiki:About terms of use]&amp;#039;&amp;#039; and are authorised to perform IPv6 port scans against the machine that you wish to test &amp;#039;&amp;#039;BEFORE&amp;#039;&amp;#039; attempting any of the steps outlined below. Please also ensure that you are not accessing web pages using an HTTP proxy. If in doubt then a web proxy can be disabled by following the command-line examples shown below.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a [[Timswiki:Privacy_policy]]. Continued use of this website implies your consent to the storage of data outlined in the policy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Rules for Forming the URL===&lt;br /&gt;
&lt;br /&gt;
It is possible to request automatic scans using &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;wget&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; but the URLs must be constructed as shown below. In each case you &amp;#039;&amp;#039;&amp;#039;MUST:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* target my IPv6 host and IPv6 cgi-bin directory (www64.chappell-family.co.uk/cgi-bin6/)&lt;br /&gt;
* use the text-browser compatible cgi target (ipscan-txt.cgi)&lt;br /&gt;
* include an includeexisting query term, setting it to either 1 (include default ports [[IPv6_Ports]]) or -1 (exclude default ports)&lt;br /&gt;
* include all 4 customport terms (numbered 0 to 3), setting them equal to nothing if they are unused&lt;br /&gt;
* include the termsaccepted term, setting it to 1 to indicate your acceptance of the terms and conditions&lt;br /&gt;
* ensure that there are no spaces in the query string, particularly if using cut&amp;#039;n&amp;#039;paste&lt;br /&gt;
* wrap the resulting URL in quotes to ensure that the ampersand characters are not mis-interpreted&lt;br /&gt;
&lt;br /&gt;
Failure to follow all of the above rules will result in a failure to scan your host. I&amp;#039;d also suggest that you specify a desired output document in the wget command-line - otherwise the filename will be based on the called URL and so will be somewhat convoluted!&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you include the default ports (includeexisting=1) then the scan will take up to approximately 15 seconds to complete - please be patient!&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===Windows Users - please READ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re intending to test a windows PC, then you need to be careful which pre-compiled version of wget you have installed. Some of the available versions do not include IPv6 support. The download at the following link is known to work on windows 7:&lt;br /&gt;
&lt;br /&gt;
* [http://gnuwin32.sourceforge.net/packages/wget.htm http://gnuwin32.sourceforge.net/packages/wget.htm]&lt;br /&gt;
&lt;br /&gt;
Another good solution for PC users can be found within the [http://www.cygwin.com/ Cygwin] tool. Wget on Cygwin is built with the following options:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ wget -V&lt;br /&gt;
GNU Wget 1.13.4 built on cygwin.&lt;br /&gt;
&lt;br /&gt;
+digest +https +ipv6 +iri +large-file +nls -ntlm +opie +ssl/gnutls&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Example Scans==&lt;br /&gt;
&lt;br /&gt;
Now for some concrete examples:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing just the UDP and TCP default port list===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www64.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;  &lt;br /&gt;
  --2012-01-28 14:28:03--  https://www64.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&lt;br /&gt;
  Resolving www64.chappell-family.co.uk... 2001:470:971f:6::4&lt;br /&gt;
  Connecting to www64.chappell-family.co.uk|2001:470:971f:6::4|:443... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10147 (9.9K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039; &lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,147      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:28:03 (165 MB/s) - `ipv6.html&amp;#039; saved [10147/10147]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports and a single TCP port, e.g. 8080===&lt;br /&gt;
  &lt;br /&gt;
  &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www64.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:37:21--  https://www64.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&lt;br /&gt;
  Resolving www64.chappell-family.co.uk... 2001:470:971f:6::4&lt;br /&gt;
  Connecting to www64.chappell-family.co.uk|2001:470:971f:6::4|:443... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 7323 (7.2K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 7,323       --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:37:21 (112 MB/s) - `ipv6.html&amp;#039; saved [7323/7323]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports, the default TCP ports list and 3 custom TCP ports===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www64.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:39:53--  https://www64.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&amp;amp;termsaccepted=1&lt;br /&gt;
  Resolving www64.chappell-family.co.uk... 2001:470:971f:6::4&lt;br /&gt;
  Connecting to www64.chappell-family.co.uk|2001:470:971f:6::4|:443... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10263 (10K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,263      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:39:54 (222 MB/s) - `ipv6.html&amp;#039; saved [10263/10263]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Testing on Ubiquity ERlite Routers===&lt;br /&gt;
&lt;br /&gt;
On the router:&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo /usr/bin/curl -G &amp;lt;nowiki&amp;gt;&amp;#039;https://www64.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039;&amp;lt;/nowiki&amp;gt; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/ipv6.html&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo scp /tmp/ipv6.html &amp;lt;user&amp;gt;@&amp;lt;host&amp;gt;:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo rm -f /tmp/ipv6.html&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Exchange &amp;lt;user&amp;gt; and &amp;lt;host&amp;gt; for an applicable account and machine name to transfer the results file to.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;sudo /usr/bin/curl -G &amp;lt;nowiki&amp;gt;&amp;#039;https://www64.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039;&amp;lt;/nowiki&amp;gt; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/ipv6.html&lt;br /&gt;
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current&lt;br /&gt;
                                 Dload  Upload   Total   Spent    Left  Speed&lt;br /&gt;
100  2844  100  2844    0     0     30      0  0:01:34  0:01:33  0:00:01   627&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===HTML Results Scraping===&lt;br /&gt;
&lt;br /&gt;
It is possible to open the resulting ipv6.html file in a local web-browser, however you may prefer to summarise the results for easier checking. Here is a very quick and inelegant example of [[ResultScraping]] the returned html file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=IPv6_Ports&amp;diff=557</id>
		<title>IPv6 Ports</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=IPv6_Ports&amp;diff=557"/>
		<updated>2019-07-20T16:12:16Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== IPv6 Firewall Tester Default Port List ==&lt;br /&gt;
&lt;br /&gt;
IPscan tests a selection of the most commonly used service ports.&lt;br /&gt;
&lt;br /&gt;
If you wish to test the firewall of your IPv6 host then please point your browser towards my &amp;#039;&amp;#039;&amp;#039;[https://ipv6.chappell-family.com/ipv6tcptest/ IPv6 tester]&amp;#039;&amp;#039;&amp;#039;. For an overview of the tester please see &amp;#039;&amp;#039;&amp;#039;[[IPv6]]&amp;#039;&amp;#039;&amp;#039;. For an explanation of test automation please see &amp;#039;&amp;#039;&amp;#039;[[ScanAutomation]]&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The list of default IPv6 TCP ports which can be tested, and their common usage is defined in the table below:&lt;br /&gt;
&lt;br /&gt;
==TCP Ports==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th scope=&amp;quot;col&amp;quot;&amp;gt;Port Number&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th scope=&amp;quot;col&amp;quot;&amp;gt;Description of the traffic usually assigned to this port&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;7&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Echo - often used for test/development purposes.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;21&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;File Transfer (FTP) control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;22&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Secure Shell (SSH) Protocol&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;23&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Telnet&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;25&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Simple Mail Transfer Protocol (SMTP)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;37&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Time&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;53&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Domain Name Server (DNS)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;79&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Finger&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;80&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;World Wide Web (HTTP)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;88&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Kerberos&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;110&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Post Office Protocol - Version 3 (POP3)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;111&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Sun Remote Procedure Call (RPC)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;113&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Authentication Service (ident, auth)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;119&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Network News Transfer Protocol (NNTP)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;135&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;DCE endpoint resolution (epmap), Microsoft EPMAP RPCs, Messenger services&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;137&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;NETBIOS Name Service&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;138&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;NETBIOS Datagram Service&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;139&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;NETBIOS Session Service&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;143&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Internet Message Access Protocol (IMAP)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;311&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AppleShare IP WebAdmin, MAC OSX server admin&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;389&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Lightweight Directory Access Protocol (LDAP)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;427&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Server Location (SLP)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;443&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;HTTP Protocol over TLS/SSL (HTTPS)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;445&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Microsoft-DS (SMB, Samba)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;514&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Shell&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;543&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Kerberos login&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;544&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Kerberos remote shell&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;548&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Apple Filing Protocol over TCP&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;631&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Internet Printing Protocol (IPP)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;749&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Kerberos Administration&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;873&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Rsync&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;993&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;IMAP4 Protocol over TLS/SSL (IMAPS)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1025&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Network Blackjack, sometimes NFS, IIS or RFS&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1026&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Calendar Access Protocol (CAP), Microsoft DCOM&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1029&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Solid Mux Server, Microsoft DCOM&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1030&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;BBN IAD&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1080&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SOCKS&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1720&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;H.323 Hostcall - including Microsoft Netmeeting&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2869&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SSDP event notification&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;3128&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Active API Server Port (also default for Squid proxy)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;3306&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MySQL&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;3389&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MS Windows Based Terminal Server (RDP)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;3689&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Digital Audio Access Protocol (DAAP, iTunes)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;5000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Commplex-main (Windows Universal Plug and Play service - UPNP)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;5100&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Socalia service mux, Yahoo Messenger, Webcams&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;5357&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;WSDAPI HTTP&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;5900&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Remote Framebuffer (VNC Server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;8080&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;HTTP alternate&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;9090&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;WebSM&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;10243&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;WMP HTTP&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;11211&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;memcache&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;16992-4&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Intel AMT&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;32764&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Common Router backdoor&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==UDP Ports==&lt;br /&gt;
&lt;br /&gt;
The list of IPv6 UDP ports which will always be tested, and their common usage is defined in the table below:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th scope=&amp;quot;col&amp;quot;&amp;gt;Port Number&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th scope=&amp;quot;col&amp;quot;&amp;gt;Description of the traffic usually assigned to this port&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;53&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;DNS&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;69&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;TFTP&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;123&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;NTP&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;161&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SNMP&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;500&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;IKE&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;521&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RIPng&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;547&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;DHCPv6&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1900&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;UPnP (SSDP)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;3503&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;LSP Ping&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;4500&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;IKE-NATT&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;11211&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;memcache (ASCII and binary)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=Timswiki:Privacy_policy&amp;diff=556</id>
		<title>Timswiki:Privacy policy</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=Timswiki:Privacy_policy&amp;diff=556"/>
		<updated>2019-07-20T16:08:55Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: Update to reflect introduction of CloudFlare CDN and session cookies on the wiki.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
In line with recent changes to the Privacy and Electronic Communications Regulations and the introduction of the General Data Protection Regulations (GPDR) please be aware of the following related to both this wiki and the associated [https://ipv6.chappell-family.com/ipv6tcptest/ IPv6 Port Scanner]:&lt;br /&gt;
&lt;br /&gt;
*&amp;#039;&amp;#039;&amp;#039;All scan results are deleted shortly after your scan completes.&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
&lt;br /&gt;
*&amp;#039;&amp;#039;&amp;#039;The only retained statistic is the total number of initiated scans.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
*&amp;#039;&amp;#039;&amp;#039;The IPv6 Port Scanner facility makes no use of cookies.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
*&amp;#039;&amp;#039;&amp;#039;This wiki website makes use of the CloudFlare CDN to improve performance and consequently 3rd party session cookies are used.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
*&amp;#039;&amp;#039;&amp;#039;These websites make no use of 3rd party advertising or analytics facilities.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
*&amp;#039;&amp;#039;&amp;#039;All webserver logs for the IPv6 port scanner are purged on a daily basis.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
*&amp;#039;&amp;#039;&amp;#039;If you ask for support to debug unexpected IPv6 port scan results then I may temporarily offer you the use of separate, debug-only, URLs. In order for such support to be offered, some debug-related logging may occur. This may include the summary of port scan results and partial (/48 only) IPv6 addresses.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
	&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=555</id>
		<title>ScanAutomation</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=555"/>
		<updated>2019-02-09T16:51:12Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==IPv6 Port Scan Automation==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of automated IPv6 firewall testing (IPv6 TCP and UDP port scans) using wget and IPscan. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Terms of Use===&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Please ensure that you accept the &amp;#039;&amp;#039;[https://wiki.chappell-family.com/wiki/index.php?title=Timswiki:About terms of use]&amp;#039;&amp;#039; and are authorised to perform IPv6 port scans against the machine that you wish to test &amp;#039;&amp;#039;BEFORE&amp;#039;&amp;#039; attempting any of the steps outlined below. Please also ensure that you are not accessing web pages using an HTTP proxy. If in doubt then a web proxy can be disabled by following the command-line examples shown below.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a [[Timswiki:Privacy_policy]]. Continued use of this website implies your consent to the storage of data outlined in the policy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Rules for Forming the URL===&lt;br /&gt;
&lt;br /&gt;
It is possible to request automatic scans using &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;wget&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; but the URLs must be constructed as shown below. In each case you &amp;#039;&amp;#039;&amp;#039;MUST:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* target my IPv6 host and IPv6 cgi-bin directory (www6.chappell-family.co.uk/cgi-bin6/)&lt;br /&gt;
* use the text-browser compatible cgi target (ipscan-txt.cgi)&lt;br /&gt;
* include an includeexisting query term, setting it to either 1 (include default ports [[IPv6_Ports]]) or -1 (exclude default ports)&lt;br /&gt;
* include all 4 customport terms (numbered 0 to 3), setting them equal to nothing if they are unused&lt;br /&gt;
* include the termsaccepted term, setting it to 1 to indicate your acceptance of the terms and conditions&lt;br /&gt;
* ensure that there are no spaces in the query string, particularly if using cut&amp;#039;n&amp;#039;paste&lt;br /&gt;
* wrap the resulting URL in quotes to ensure that the ampersand characters are not mis-interpreted&lt;br /&gt;
&lt;br /&gt;
Failure to follow all of the above rules will result in a failure to scan your host. I&amp;#039;d also suggest that you specify a desired output document in the wget command-line - otherwise the filename will be based on the called URL and so will be somewhat convoluted!&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you include the default ports (includeexisting=1) then the scan will take up to approximately 15 seconds to complete - please be patient!&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===Windows Users - please READ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re intending to test a windows PC, then you need to be careful which pre-compiled version of wget you have installed. Some of the available versions do not include IPv6 support. The download at the following link is known to work on windows 7:&lt;br /&gt;
&lt;br /&gt;
* [http://gnuwin32.sourceforge.net/packages/wget.htm http://gnuwin32.sourceforge.net/packages/wget.htm]&lt;br /&gt;
&lt;br /&gt;
Another good solution for PC users can be found within the [http://www.cygwin.com/ Cygwin] tool. Wget on Cygwin is built with the following options:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ wget -V&lt;br /&gt;
GNU Wget 1.13.4 built on cygwin.&lt;br /&gt;
&lt;br /&gt;
+digest +https +ipv6 +iri +large-file +nls -ntlm +opie +ssl/gnutls&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Example Scans==&lt;br /&gt;
&lt;br /&gt;
Now for some concrete examples:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing just the UDP and TCP default port list===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;  &lt;br /&gt;
  --2012-01-28 14:28:03--  https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&lt;br /&gt;
  Resolving www6.chappell-family.co.uk... 2001:470:1f08:185c::2&lt;br /&gt;
  Connecting to www6.chappell-family.co.uk|2001:470:1f08:185c::2|:80... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10147 (9.9K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039; &lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,147      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:28:03 (165 MB/s) - `ipv6.html&amp;#039; saved [10147/10147]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports and a single TCP port, e.g. 8080===&lt;br /&gt;
  &lt;br /&gt;
  &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:37:21--  https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&lt;br /&gt;
  Resolving www6.chappell-family.co.uk... 2001:470:1f08:185c::2&lt;br /&gt;
  Connecting to www6.chappell-family.co.uk|2001:470:1f08:185c::2|:80... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 7323 (7.2K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 7,323       --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:37:21 (112 MB/s) - `ipv6.html&amp;#039; saved [7323/7323]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports, the default TCP ports list and 3 custom TCP ports===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:39:53--  https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&lt;br /&gt;
  Resolving www6.chappell-family.co.uk... 2001:470:1f08:185c::2&lt;br /&gt;
  Connecting to www6.chappell-family.co.uk|2001:470:1f08:185c::2|:80... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10263 (10K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,263      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:39:54 (222 MB/s) - `ipv6.html&amp;#039; saved [10263/10263]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Testing on Ubiquity ERlite Routers===&lt;br /&gt;
&lt;br /&gt;
On the router:&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo /usr/bin/curl -G &amp;lt;nowiki&amp;gt;&amp;#039;https://www6.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039;&amp;lt;/nowiki&amp;gt; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/ipv6.html&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo scp /tmp/ipv6.html &amp;lt;user&amp;gt;@&amp;lt;host&amp;gt;:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo rm -f /tmp/ipv6.html&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Exchange &amp;lt;user&amp;gt; and &amp;lt;host&amp;gt; for an applicable account and machine name to transfer the results file to.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;sudo /usr/bin/curl -G &amp;lt;nowiki&amp;gt;&amp;#039;https://www6.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039;&amp;lt;/nowiki&amp;gt; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/ipv6.html&lt;br /&gt;
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current&lt;br /&gt;
                                 Dload  Upload   Total   Spent    Left  Speed&lt;br /&gt;
100  2844  100  2844    0     0     30      0  0:01:34  0:01:33  0:00:01   627&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===HTML Results Scraping===&lt;br /&gt;
&lt;br /&gt;
It is possible to open the resulting ipv6.html file in a local web-browser, however you may prefer to summarise the results for easier checking. Here is a very quick and inelegant example of [[ResultScraping]] the returned html file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=554</id>
		<title>ScanAutomation</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=554"/>
		<updated>2019-02-09T16:48:20Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==IPv6 Port Scan Automation==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of automated IPv6 firewall testing (IPv6 TCP and UDP port scans) using wget and IPscan. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Terms of Use===&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Please ensure that you accept the &amp;#039;&amp;#039;[https://wiki.chappell-family.com/wiki/index.php?title=Timswiki:About terms of use]&amp;#039;&amp;#039; and are authorised to perform IPv6 port scans against the machine that you wish to test &amp;#039;&amp;#039;BEFORE&amp;#039;&amp;#039; attempting any of the steps outlined below. Please also ensure that you are not accessing web pages using an HTTP proxy. If in doubt then a web proxy can be disabled by following the command-line examples shown below.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a [[Timswiki:Privacy_policy]]. Continued use of this website implies your consent to the storage of data outlined in the policy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Rules for Forming the URL===&lt;br /&gt;
&lt;br /&gt;
It is possible to request automatic scans using &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;wget&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; but the URLs must be constructed as shown below. In each case you &amp;#039;&amp;#039;&amp;#039;MUST:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* target my IPv6 host and IPv6 cgi-bin directory (www6.chappell-family.co.uk/cgi-bin6/)&lt;br /&gt;
* use the text-browser compatible cgi target (ipscan-txt.cgi)&lt;br /&gt;
* include an includeexisting query term, setting it to either 1 (include default ports [[IPv6_Ports]]) or -1 (exclude default ports)&lt;br /&gt;
* include all 4 customport terms (numbered 0 to 3), setting them equal to nothing if they are unused&lt;br /&gt;
* include the termsaccepted term, setting it to 1 to indicate your acceptance of the terms and conditions&lt;br /&gt;
* ensure that there are no spaces in the query string, particularly if using cut&amp;#039;n&amp;#039;paste&lt;br /&gt;
* wrap the resulting URL in quotes to ensure that the ampersand characters are not mis-interpreted&lt;br /&gt;
&lt;br /&gt;
Failure to follow all of the above rules will result in a failure to scan your host. I&amp;#039;d also suggest that you specify a desired output document in the wget command-line - otherwise the filename will be based on the called URL and so will be somewhat convoluted!&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you include the default ports (includeexisting=1) then the scan will take up to approximately 15 seconds to complete - please be patient!&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===Windows Users - please READ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re intending to test a windows PC, then you need to be careful which pre-compiled version of wget you have installed. Some of the available versions do not include IPv6 support. The download at the following link is known to work on windows 7:&lt;br /&gt;
&lt;br /&gt;
* [http://gnuwin32.sourceforge.net/packages/wget.htm http://gnuwin32.sourceforge.net/packages/wget.htm]&lt;br /&gt;
&lt;br /&gt;
Another good solution for PC users can be found within the [http://www.cygwin.com/ Cygwin] tool. Wget on Cygwin is built with the following options:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ wget -V&lt;br /&gt;
GNU Wget 1.13.4 built on cygwin.&lt;br /&gt;
&lt;br /&gt;
+digest +https +ipv6 +iri +large-file +nls -ntlm +opie +ssl/gnutls&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Example Scans==&lt;br /&gt;
&lt;br /&gt;
Now for some concrete examples:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing just the UDP and TCP default port list===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;  &lt;br /&gt;
  --2012-01-28 14:28:03--  https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&lt;br /&gt;
  Resolving www6.chappell-family.co.uk... 2001:470:1f08:185c::2&lt;br /&gt;
  Connecting to www6.chappell-family.co.uk|2001:470:1f08:185c::2|:80... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10147 (9.9K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039; &lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,147      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:28:03 (165 MB/s) - `ipv6.html&amp;#039; saved [10147/10147]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports and a single TCP port, e.g. 8080===&lt;br /&gt;
  &lt;br /&gt;
  &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:37:21--  https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&lt;br /&gt;
  Resolving www6.chappell-family.co.uk... 2001:470:1f08:185c::2&lt;br /&gt;
  Connecting to www6.chappell-family.co.uk|2001:470:1f08:185c::2|:80... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 7323 (7.2K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 7,323       --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:37:21 (112 MB/s) - `ipv6.html&amp;#039; saved [7323/7323]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports, the default TCP ports list and 3 custom TCP ports===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:39:53--  https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&lt;br /&gt;
  Resolving www6.chappell-family.co.uk... 2001:470:1f08:185c::2&lt;br /&gt;
  Connecting to www6.chappell-family.co.uk|2001:470:1f08:185c::2|:80... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10263 (10K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,263      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:39:54 (222 MB/s) - `ipv6.html&amp;#039; saved [10263/10263]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Testing on Ubiquity ERlite Routers===&lt;br /&gt;
&lt;br /&gt;
On the router:&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo /usr/bin/curl -G &amp;lt;nowiki&amp;gt;&amp;#039;https://www6.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039;&amp;lt;/nowiki&amp;gt; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/ipv6.html&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo scp /tmp/ipv6.html &amp;lt;user&amp;gt;@&amp;lt;host&amp;gt;:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo rm -f /tmp/ipv6.html&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Exchange &amp;lt;user&amp;gt; and &amp;lt;host&amp;gt; for an applicable account and machine name to transfer the results file to.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;sudo /usr/bin/curl -G &amp;lt;nowiki&amp;gt;&amp;#039;https://www6.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039;&amp;lt;/nowiki&amp;gt; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/result.txt&lt;br /&gt;
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current&lt;br /&gt;
                                 Dload  Upload   Total   Spent    Left  Speed&lt;br /&gt;
100  2844  100  2844    0     0     30      0  0:01:34  0:01:33  0:00:01   627&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===HTML Results Scraping===&lt;br /&gt;
&lt;br /&gt;
It is possible to open the resulting ipv6.html file in a local web-browser, however you may prefer to summarise the results for easier checking. Here is a very quick and inelegant example of [[ResultScraping]] the returned html file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=553</id>
		<title>ScanAutomation</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=553"/>
		<updated>2019-02-09T16:47:33Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==IPv6 Port Scan Automation==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of automated IPv6 firewall testing (IPv6 TCP and UDP port scans) using wget and IPscan. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Terms of Use===&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Please ensure that you accept the &amp;#039;&amp;#039;[https://wiki.chappell-family.com/wiki/index.php?title=Timswiki:About terms of use]&amp;#039;&amp;#039; and are authorised to perform IPv6 port scans against the machine that you wish to test &amp;#039;&amp;#039;BEFORE&amp;#039;&amp;#039; attempting any of the steps outlined below. Please also ensure that you are not accessing web pages using an HTTP proxy. If in doubt then a web proxy can be disabled by following the command-line examples shown below.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a [[Timswiki:Privacy_policy]]. Continued use of this website implies your consent to the storage of data outlined in the policy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Rules for Forming the URL===&lt;br /&gt;
&lt;br /&gt;
It is possible to request automatic scans using &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;wget&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; but the URLs must be constructed as shown below. In each case you &amp;#039;&amp;#039;&amp;#039;MUST:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* target my IPv6 host and IPv6 cgi-bin directory (www6.chappell-family.co.uk/cgi-bin6/)&lt;br /&gt;
* use the text-browser compatible cgi target (ipscan-txt.cgi)&lt;br /&gt;
* include an includeexisting query term, setting it to either 1 (include default ports [[IPv6_Ports]]) or -1 (exclude default ports)&lt;br /&gt;
* include all 4 customport terms (numbered 0 to 3), setting them equal to nothing if they are unused&lt;br /&gt;
* include the termsaccepted term, setting it to 1 to indicate your acceptance of the terms and conditions&lt;br /&gt;
* ensure that there are no spaces in the query string, particularly if using cut&amp;#039;n&amp;#039;paste&lt;br /&gt;
* wrap the resulting URL in quotes to ensure that the ampersand characters are not mis-interpreted&lt;br /&gt;
&lt;br /&gt;
Failure to follow all of the above rules will result in a failure to scan your host. I&amp;#039;d also suggest that you specify a desired output document in the wget command-line - otherwise the filename will be based on the called URL and so will be somewhat convoluted!&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you include the default ports (includeexisting=1) then the scan will take up to approximately 15 seconds to complete - please be patient!&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===Windows Users - please READ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re intending to test a windows PC, then you need to be careful which pre-compiled version of wget you have installed. Some of the available versions do not include IPv6 support. The download at the following link is known to work on windows 7:&lt;br /&gt;
&lt;br /&gt;
* [http://gnuwin32.sourceforge.net/packages/wget.htm http://gnuwin32.sourceforge.net/packages/wget.htm]&lt;br /&gt;
&lt;br /&gt;
Another good solution for PC users can be found within the [http://www.cygwin.com/ Cygwin] tool. Wget on Cygwin is built with the following options:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ wget -V&lt;br /&gt;
GNU Wget 1.13.4 built on cygwin.&lt;br /&gt;
&lt;br /&gt;
+digest +https +ipv6 +iri +large-file +nls -ntlm +opie +ssl/gnutls&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Example Scans==&lt;br /&gt;
&lt;br /&gt;
Now for some concrete examples:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing just the UDP and TCP default port list===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;  &lt;br /&gt;
  --2012-01-28 14:28:03--  https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&lt;br /&gt;
  Resolving www6.chappell-family.co.uk... 2001:470:1f08:185c::2&lt;br /&gt;
  Connecting to www6.chappell-family.co.uk|2001:470:1f08:185c::2|:80... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10147 (9.9K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039; &lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,147      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:28:03 (165 MB/s) - `ipv6.html&amp;#039; saved [10147/10147]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports and a single TCP port, e.g. 8080===&lt;br /&gt;
  &lt;br /&gt;
  &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:37:21--  https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&lt;br /&gt;
  Resolving www6.chappell-family.co.uk... 2001:470:1f08:185c::2&lt;br /&gt;
  Connecting to www6.chappell-family.co.uk|2001:470:1f08:185c::2|:80... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 7323 (7.2K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 7,323       --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:37:21 (112 MB/s) - `ipv6.html&amp;#039; saved [7323/7323]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports, the default TCP ports list and 3 custom TCP ports===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:39:53--  https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&lt;br /&gt;
  Resolving www6.chappell-family.co.uk... 2001:470:1f08:185c::2&lt;br /&gt;
  Connecting to www6.chappell-family.co.uk|2001:470:1f08:185c::2|:80... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10263 (10K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,263      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:39:54 (222 MB/s) - `ipv6.html&amp;#039; saved [10263/10263]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Testing on Ubiquity ERlite Routers===&lt;br /&gt;
&lt;br /&gt;
On the router:&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo /usr/bin/curl -G &amp;lt;nowiki&amp;gt;&amp;#039;https://www6.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039;&amp;lt;/nowiki&amp;gt; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/ipv6.html&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo scp /tmp/ipv6.html &amp;lt;user&amp;gt;@&amp;lt;host&amp;gt;:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo rm -f /tmp/ipv6.html&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Exchange &amp;lt;user&amp;gt; and &amp;lt;host&amp;gt; for an applicable account and machine name to transfer the results file to.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;sudo /usr/bin/curl -G &amp;lt;nowiki&amp;gt;&amp;#039;https://www6.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039;&amp;lt;/nowiki&amp;gt; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/result.txt&lt;br /&gt;
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current&lt;br /&gt;
                                 Dload  Upload   Total   Spent    Left  Speed&lt;br /&gt;
100  2844  100  2844    0     0     30      0  0:01:34  0:01:33  0:00:01   627&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===HTML Results Scraping===&lt;br /&gt;
&lt;br /&gt;
It is possible to open the resulting ipv6.html file in a local web-browser, however you may prefer to summarise the results for easier checking. Here is a very quick and inelegant example of [[ResultScraping]] the returned html file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=552</id>
		<title>ScanAutomation</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=552"/>
		<updated>2019-02-09T16:45:59Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==IPv6 Port Scan Automation==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of automated IPv6 firewall testing (IPv6 TCP and UDP port scans) using wget and IPscan. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Terms of Use===&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Please ensure that you accept the &amp;#039;&amp;#039;[https://wiki.chappell-family.com/wiki/index.php?title=Timswiki:About terms of use]&amp;#039;&amp;#039; and are authorised to perform IPv6 port scans against the machine that you wish to test &amp;#039;&amp;#039;BEFORE&amp;#039;&amp;#039; attempting any of the steps outlined below. Please also ensure that you are not accessing web pages using an HTTP proxy. If in doubt then a web proxy can be disabled by following the command-line examples shown below.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a [[Timswiki:Privacy_policy]]. Continued use of this website implies your consent to the storage of data outlined in the policy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Rules for Forming the URL===&lt;br /&gt;
&lt;br /&gt;
It is possible to request automatic scans using &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;wget&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; but the URLs must be constructed as shown below. In each case you &amp;#039;&amp;#039;&amp;#039;MUST:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* target my IPv6 host and IPv6 cgi-bin directory (www6.chappell-family.co.uk/cgi-bin6/)&lt;br /&gt;
* use the text-browser compatible cgi target (ipscan-txt.cgi)&lt;br /&gt;
* include an includeexisting query term, setting it to either 1 (include default ports [[IPv6_Ports]]) or -1 (exclude default ports)&lt;br /&gt;
* include all 4 customport terms (numbered 0 to 3), setting them equal to nothing if they are unused&lt;br /&gt;
* include the termsaccepted term, setting it to 1 to indicate your acceptance of the terms and conditions&lt;br /&gt;
* ensure that there are no spaces in the query string, particularly if using cut&amp;#039;n&amp;#039;paste&lt;br /&gt;
* wrap the resulting URL in quotes to ensure that the ampersand characters are not mis-interpreted&lt;br /&gt;
&lt;br /&gt;
Failure to follow all of the above rules will result in a failure to scan your host. I&amp;#039;d also suggest that you specify a desired output document in the wget command-line - otherwise the filename will be based on the called URL and so will be somewhat convoluted!&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you include the default ports (includeexisting=1) then the scan will take up to approximately 15 seconds to complete - please be patient!&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===Windows Users - please READ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re intending to test a windows PC, then you need to be careful which pre-compiled version of wget you have installed. Some of the available versions do not include IPv6 support. The download at the following link is known to work on windows 7:&lt;br /&gt;
&lt;br /&gt;
* [http://gnuwin32.sourceforge.net/packages/wget.htm http://gnuwin32.sourceforge.net/packages/wget.htm]&lt;br /&gt;
&lt;br /&gt;
Another good solution for PC users can be found within the [http://www.cygwin.com/ Cygwin] tool. Wget on Cygwin is built with the following options:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ wget -V&lt;br /&gt;
GNU Wget 1.13.4 built on cygwin.&lt;br /&gt;
&lt;br /&gt;
+digest +https +ipv6 +iri +large-file +nls -ntlm +opie +ssl/gnutls&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Example Scans==&lt;br /&gt;
&lt;br /&gt;
Now for some concrete examples:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing just the UDP and TCP default port list===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;  &lt;br /&gt;
  --2012-01-28 14:28:03--  https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&lt;br /&gt;
  Resolving www6.chappell-family.co.uk... 2001:470:1f08:185c::2&lt;br /&gt;
  Connecting to www6.chappell-family.co.uk|2001:470:1f08:185c::2|:80... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10147 (9.9K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039; &lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,147      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:28:03 (165 MB/s) - `ipv6.html&amp;#039; saved [10147/10147]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports and a single TCP port, e.g. 8080===&lt;br /&gt;
  &lt;br /&gt;
  &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:37:21--  https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&lt;br /&gt;
  Resolving www6.chappell-family.co.uk... 2001:470:1f08:185c::2&lt;br /&gt;
  Connecting to www6.chappell-family.co.uk|2001:470:1f08:185c::2|:80... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 7323 (7.2K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 7,323       --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:37:21 (112 MB/s) - `ipv6.html&amp;#039; saved [7323/7323]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports, the default TCP ports list and 3 custom TCP ports===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:39:53--  https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&lt;br /&gt;
  Resolving www6.chappell-family.co.uk... 2001:470:1f08:185c::2&lt;br /&gt;
  Connecting to www6.chappell-family.co.uk|2001:470:1f08:185c::2|:80... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10263 (10K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,263      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:39:54 (222 MB/s) - `ipv6.html&amp;#039; saved [10263/10263]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Testing on Ubiquity ERlite Routers===&lt;br /&gt;
&lt;br /&gt;
On the router:&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo /usr/bin/curl -G &amp;#039;https://www6.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/ipv6.html&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo scp /tmp/ipv6.html &amp;lt;user&amp;gt;@&amp;lt;host&amp;gt;:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo rm -f /tmp/ipv6.html&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Exchange &amp;lt;user&amp;gt; and &amp;lt;host&amp;gt; for an applicable account and machine name to transfer the results file to.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;sudo /usr/bin/curl -G &amp;#039;https://www6.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/result.txt&lt;br /&gt;
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current&lt;br /&gt;
                                 Dload  Upload   Total   Spent    Left  Speed&lt;br /&gt;
100  2844  100  2844    0     0     30      0  0:01:34  0:01:33  0:00:01   627&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===HTML Results Scraping===&lt;br /&gt;
&lt;br /&gt;
It is possible to open the resulting ipv6.html file in a local web-browser, however you may prefer to summarise the results for easier checking. Here is a very quick and inelegant example of [[ResultScraping]] the returned html file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=551</id>
		<title>ScanAutomation</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=551"/>
		<updated>2019-02-09T16:42:27Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==IPv6 Port Scan Automation==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of automated IPv6 firewall testing (IPv6 TCP and UDP port scans) using wget and IPscan. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Terms of Use===&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Please ensure that you accept the &amp;#039;&amp;#039;[https://wiki.chappell-family.com/wiki/index.php?title=Timswiki:About terms of use]&amp;#039;&amp;#039; and are authorised to perform IPv6 port scans against the machine that you wish to test &amp;#039;&amp;#039;BEFORE&amp;#039;&amp;#039; attempting any of the steps outlined below. Please also ensure that you are not accessing web pages using an HTTP proxy. If in doubt then a web proxy can be disabled by following the command-line examples shown below.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a [[Timswiki:Privacy_policy]]. Continued use of this website implies your consent to the storage of data outlined in the policy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Rules for Forming the URL===&lt;br /&gt;
&lt;br /&gt;
It is possible to request automatic scans using &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;wget&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; but the URLs must be constructed as shown below. In each case you &amp;#039;&amp;#039;&amp;#039;MUST:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* target my IPv6 host and IPv6 cgi-bin directory (www6.chappell-family.co.uk/cgi-bin6/)&lt;br /&gt;
* use the text-browser compatible cgi target (ipscan-txt.cgi)&lt;br /&gt;
* include an includeexisting query term, setting it to either 1 (include default ports [[IPv6_Ports]]) or -1 (exclude default ports)&lt;br /&gt;
* include all 4 customport terms (numbered 0 to 3), setting them equal to nothing if they are unused&lt;br /&gt;
* include the termsaccepted term, setting it to 1 to indicate your acceptance of the terms and conditions&lt;br /&gt;
* ensure that there are no spaces in the query string, particularly if using cut&amp;#039;n&amp;#039;paste&lt;br /&gt;
* wrap the resulting URL in quotes to ensure that the ampersand characters are not mis-interpreted&lt;br /&gt;
&lt;br /&gt;
Failure to follow all of the above rules will result in a failure to scan your host. I&amp;#039;d also suggest that you specify a desired output document in the wget command-line - otherwise the filename will be based on the called URL and so will be somewhat convoluted!&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you include the default ports (includeexisting=1) then the scan will take up to approximately 15 seconds to complete - please be patient!&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===Windows Users - please READ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re intending to test a windows PC, then you need to be careful which pre-compiled version of wget you have installed. Some of the available versions do not include IPv6 support. The download at the following link is known to work on windows 7:&lt;br /&gt;
&lt;br /&gt;
* [http://gnuwin32.sourceforge.net/packages/wget.htm http://gnuwin32.sourceforge.net/packages/wget.htm]&lt;br /&gt;
&lt;br /&gt;
Another good solution for PC users can be found within the [http://www.cygwin.com/ Cygwin] tool. Wget on Cygwin is built with the following options:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ wget -V&lt;br /&gt;
GNU Wget 1.13.4 built on cygwin.&lt;br /&gt;
&lt;br /&gt;
+digest +https +ipv6 +iri +large-file +nls -ntlm +opie +ssl/gnutls&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Example Scans==&lt;br /&gt;
&lt;br /&gt;
Now for some concrete examples:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing just the UDP and TCP default port list===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;  &lt;br /&gt;
  --2012-01-28 14:28:03--  https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&lt;br /&gt;
  Resolving www6.chappell-family.co.uk... 2001:470:1f08:185c::2&lt;br /&gt;
  Connecting to www6.chappell-family.co.uk|2001:470:1f08:185c::2|:80... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10147 (9.9K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039; &lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,147      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:28:03 (165 MB/s) - `ipv6.html&amp;#039; saved [10147/10147]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports and a single TCP port, e.g. 8080===&lt;br /&gt;
  &lt;br /&gt;
  &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:37:21--  https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&lt;br /&gt;
  Resolving www6.chappell-family.co.uk... 2001:470:1f08:185c::2&lt;br /&gt;
  Connecting to www6.chappell-family.co.uk|2001:470:1f08:185c::2|:80... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 7323 (7.2K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 7,323       --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:37:21 (112 MB/s) - `ipv6.html&amp;#039; saved [7323/7323]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports, the default TCP ports list and 3 custom TCP ports===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:39:53--  https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&lt;br /&gt;
  Resolving www6.chappell-family.co.uk... 2001:470:1f08:185c::2&lt;br /&gt;
  Connecting to www6.chappell-family.co.uk|2001:470:1f08:185c::2|:80... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10263 (10K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,263      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:39:54 (222 MB/s) - `ipv6.html&amp;#039; saved [10263/10263]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Testing on Ubiquity ERlite Routers===&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;&amp;lt;pre&amp;gt;sudo /usr/bin/curl -G &amp;#039;https://www6.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/ipv6.html&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo scp /tmp/ipv6.html user@host:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;sudo rm -f /tmp/ipv6.html&amp;lt;/pre&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===HTML Results Scraping===&lt;br /&gt;
&lt;br /&gt;
It is possible to open the resulting ipv6.html file in a local web-browser, however you may prefer to summarise the results for easier checking. Here is a very quick and inelegant example of [[ResultScraping]] the returned html file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=550</id>
		<title>ScanAutomation</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=ScanAutomation&amp;diff=550"/>
		<updated>2019-02-09T16:40:58Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==IPv6 Port Scan Automation==&lt;br /&gt;
&lt;br /&gt;
This section provides an overview of automated IPv6 firewall testing (IPv6 TCP and UDP port scans) using wget and IPscan. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Terms of Use===&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Please ensure that you accept the &amp;#039;&amp;#039;[https://wiki.chappell-family.com/wiki/index.php?title=Timswiki:About terms of use]&amp;#039;&amp;#039; and are authorised to perform IPv6 port scans against the machine that you wish to test &amp;#039;&amp;#039;BEFORE&amp;#039;&amp;#039; attempting any of the steps outlined below. Please also ensure that you are not accessing web pages using an HTTP proxy. If in doubt then a web proxy can be disabled by following the command-line examples shown below.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a [[Timswiki:Privacy_policy]]. Continued use of this website implies your consent to the storage of data outlined in the policy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Rules for Forming the URL===&lt;br /&gt;
&lt;br /&gt;
It is possible to request automatic scans using &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;wget&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; but the URLs must be constructed as shown below. In each case you &amp;#039;&amp;#039;&amp;#039;MUST:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* target my IPv6 host and IPv6 cgi-bin directory (www6.chappell-family.co.uk/cgi-bin6/)&lt;br /&gt;
* use the text-browser compatible cgi target (ipscan-txt.cgi)&lt;br /&gt;
* include an includeexisting query term, setting it to either 1 (include default ports [[IPv6_Ports]]) or -1 (exclude default ports)&lt;br /&gt;
* include all 4 customport terms (numbered 0 to 3), setting them equal to nothing if they are unused&lt;br /&gt;
* include the termsaccepted term, setting it to 1 to indicate your acceptance of the terms and conditions&lt;br /&gt;
* ensure that there are no spaces in the query string, particularly if using cut&amp;#039;n&amp;#039;paste&lt;br /&gt;
* wrap the resulting URL in quotes to ensure that the ampersand characters are not mis-interpreted&lt;br /&gt;
&lt;br /&gt;
Failure to follow all of the above rules will result in a failure to scan your host. I&amp;#039;d also suggest that you specify a desired output document in the wget command-line - otherwise the filename will be based on the called URL and so will be somewhat convoluted!&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you include the default ports (includeexisting=1) then the scan will take up to approximately 15 seconds to complete - please be patient!&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===Windows Users - please READ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re intending to test a windows PC, then you need to be careful which pre-compiled version of wget you have installed. Some of the available versions do not include IPv6 support. The download at the following link is known to work on windows 7:&lt;br /&gt;
&lt;br /&gt;
* [http://gnuwin32.sourceforge.net/packages/wget.htm http://gnuwin32.sourceforge.net/packages/wget.htm]&lt;br /&gt;
&lt;br /&gt;
Another good solution for PC users can be found within the [http://www.cygwin.com/ Cygwin] tool. Wget on Cygwin is built with the following options:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ wget -V&lt;br /&gt;
GNU Wget 1.13.4 built on cygwin.&lt;br /&gt;
&lt;br /&gt;
+digest +https +ipv6 +iri +large-file +nls -ntlm +opie +ssl/gnutls&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Example Scans==&lt;br /&gt;
&lt;br /&gt;
Now for some concrete examples:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing just the UDP and TCP default port list===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;  &lt;br /&gt;
  --2012-01-28 14:28:03--  https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&lt;br /&gt;
  Resolving www6.chappell-family.co.uk... 2001:470:1f08:185c::2&lt;br /&gt;
  Connecting to www6.chappell-family.co.uk|2001:470:1f08:185c::2|:80... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10147 (9.9K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039; &lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,147      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:28:03 (165 MB/s) - `ipv6.html&amp;#039; saved [10147/10147]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports and a single TCP port, e.g. 8080===&lt;br /&gt;
  &lt;br /&gt;
  &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:37:21--  https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=-1&amp;amp;customport0=8080&amp;amp;customport1=&amp;amp;customport2=&amp;amp;customport3=&lt;br /&gt;
  Resolving www6.chappell-family.co.uk... 2001:470:1f08:185c::2&lt;br /&gt;
  Connecting to www6.chappell-family.co.uk|2001:470:1f08:185c::2|:80... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 7323 (7.2K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 7,323       --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:37:21 (112 MB/s) - `ipv6.html&amp;#039; saved [7323/7323]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing the UDP ports, the default TCP ports list and 3 custom TCP ports===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;wget --no-proxy --output-document=ipv6.html &amp;lt;nowiki&amp;gt;&amp;quot;https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&amp;amp;termsaccepted=1&amp;quot;&amp;lt;/nowiki&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  --2012-01-28 14:39:53--  https://www6.chappell-family.co.uk/cgi-bin6/ipscan-txt.cgi?includeexisting=1&amp;amp;customport0=8080&amp;amp;customport1=33452&amp;amp;customport2=65535&amp;amp;customport3=&lt;br /&gt;
  Resolving www6.chappell-family.co.uk... 2001:470:1f08:185c::2&lt;br /&gt;
  Connecting to www6.chappell-family.co.uk|2001:470:1f08:185c::2|:80... connected.&lt;br /&gt;
  HTTP request sent, awaiting response... 200 OK&lt;br /&gt;
  Length: 10263 (10K) [text/html]&lt;br /&gt;
  Saving to: `ipv6.html&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  100%[======================================&amp;gt;] 10,263      --.-K/s   in 0s&lt;br /&gt;
  &lt;br /&gt;
  2012-01-28 14:39:54 (222 MB/s) - `ipv6.html&amp;#039; saved [10263/10263]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Testing on Ubiquity ERlite Routers===&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;&amp;lt;pre&amp;gt;sudo /usr/bin/curl -G &amp;#039;https://www6.chappell-family.co.uk/cgi-bin6/ipscantxt.cgi&amp;#039; --data-urlencode &amp;#039;includeexisting=1&amp;#039; --data-urlencode &amp;#039;customport0=&amp;#039; --data-urlencode &amp;#039;customport1=&amp;#039; --data-urlencode &amp;#039;customport2=&amp;#039; --data-urlencode &amp;#039;customport3=&amp;#039; --data-urlencode &amp;#039;termsaccepted=1&amp;#039; -H &amp;#039;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;#039; -H &amp;#039;Accept-Language: en-US,en;q=0.5&amp;#039; --compressed -H &amp;#039;Connection: keep-alive&amp;#039; 2&amp;gt;&amp;amp;1 &amp;gt;/tmp/ipv6.html&amp;lt;/pre&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;&amp;lt;pre&amp;gt;sudo scp /tmp/ipv6.html user@host:&amp;lt;/pre&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;&amp;lt;pre&amp;gt;sudo rm -f /tmp/ipv6.html&amp;lt;/pre&amp;gt;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===HTML Results Scraping===&lt;br /&gt;
&lt;br /&gt;
It is possible to open the resulting ipv6.html file in a local web-browser, however you may prefer to summarise the results for easier checking. Here is a very quick and inelegant example of [[ResultScraping]] the returned html file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=IPv6_DEBUG&amp;diff=549</id>
		<title>IPv6 DEBUG</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=IPv6_DEBUG&amp;diff=549"/>
		<updated>2019-01-22T19:36:46Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== IPv6 DEBUG ==&lt;br /&gt;
&lt;br /&gt;
Debug suggestions related to IPv6 configuration issues that might be encountered when accessing my [https://ipv6.chappell-family.com/ipv6tcptest/ IPv6 firewall tester.]&lt;br /&gt;
&lt;br /&gt;
For general IPv6 debug please see:&lt;br /&gt;
&lt;br /&gt;
* [http://www.getipv6.info/index.php/Troubleshoot_IPv6_Issues Arin IPv6 debug - many useful links]&lt;br /&gt;
* [http://www.tldp.org/HOWTO/Linux+IPv6-HOWTO/index.html Linux IPv6 HOWTO] &lt;br /&gt;
* [http://technet.microsoft.com/en-us/library/cc737698%28WS.10%29.aspx Microsoft IPv6 Howto.]&lt;br /&gt;
* [http://n1.netalyzr.icsi.berkeley.edu/analysis/ Berkeley University Network analysis tool - very thorough, but requires Java]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== General IPv6 Connectivity ===&lt;br /&gt;
First check your general IPv6 connectivity. At a command prompt or terminal check that your machine has a global unicast IPv6 address allocated (i.e. 2000::/3, so begins either 2XXX or 3XXX) as shown in these examples:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  C:\Users&amp;gt;ipconfig&lt;br /&gt;
  &lt;br /&gt;
  Windows IP Configuration&lt;br /&gt;
  &lt;br /&gt;
  &lt;br /&gt;
  Ethernet adapter Local Area Connection:&lt;br /&gt;
  &lt;br /&gt;
     Connection-specific DNS Suffix  . : home.example.com&lt;br /&gt;
     &amp;#039;&amp;#039;&amp;#039;IPv6 Address. . . . . . . . . . . : 2xxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
     Temporary IPv6 Address. . . . . . : 2xxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx&lt;br /&gt;
     Link-local IPv6 Address . . . . . : fe80::xxxx:xxxx:xxxx:xxxx%10&lt;br /&gt;
     IPv4 Address. . . . . . . . . . . : 192.168.33.3&lt;br /&gt;
     Subnet Mask . . . . . . . . . . . : 255.255.255.0&lt;br /&gt;
     Default Gateway . . . . . . . . . : fe80::xxxx:xxxx:xxxx:xxxx%10&lt;br /&gt;
                                         192.168.33.1&lt;br /&gt;
  &lt;br /&gt;
&lt;br /&gt;
On a Linux machine, or similar, then when queried as root, the response would look similar to:&lt;br /&gt;
&lt;br /&gt;
  machine:/home/user1 # ifconfig&lt;br /&gt;
  &lt;br /&gt;
  eth0      Link encap:Ethernet  HWaddr XX:XX:XX:XX:XX:XX&lt;br /&gt;
            inet addr:192.168.33.254  Bcast:192.168.33.255  Mask:255.255.255.0&lt;br /&gt;
            &amp;#039;&amp;#039;&amp;#039;inet6 addr: 2XXX:XXXX:XXXX:XXXX::XXXX/64 Scope:Global&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
            inet6 addr: fe80::abc:c0ff:fede:xxxx/64 Scope:Link&lt;br /&gt;
            UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1&lt;br /&gt;
            RX packets:225635003 errors:0 dropped:0 overruns:0 frame:0&lt;br /&gt;
            TX packets:268102245 errors:0 dropped:0 overruns:0 carrier:0&lt;br /&gt;
            collisions:0 txqueuelen:1000&lt;br /&gt;
            RX bytes:1533376458 (1462.3 Mb)  TX bytes:1466607126 (1398.6 Mb)&lt;br /&gt;
            Interrupt:220&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note: The output will differ from the above examples if you are using a tunneled approach, although it would still be useful to check that a valid IPv6 address is being allocated to your machine. &lt;br /&gt;
 &lt;br /&gt;
If you do NOT have a global unicast IPv6 address allocated then you need to determine the reason (which address allocation method are you using? DHCPv6, SLAAC or statically assigned addresses? If you&amp;#039;re using SLAAC then can you detect router advertisements (ICMPv6) being broadcast? Use Wireshark/tcpdump to determine this.) &lt;br /&gt;
&lt;br /&gt;
If you DO have a global unicast address, then you can check basic IPv6 connectivity using either ping (Windows) or ping6 (Linux). If you are using a tunnel then verify that you can ping/ping6 the distant end of the tunnel.&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
  ping6 ipv6.google.com&lt;br /&gt;
  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
you should see a response similar to:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  ping6 ipv6.google.com&lt;br /&gt;
   &lt;br /&gt;
  PING ipv6.google.com(fx-in-x63.1e100.net) 56 data bytes&lt;br /&gt;
  64 bytes from fx-in-x63.1e100.net: icmp_seq=1 ttl=56 time=24.7 ms&lt;br /&gt;
  64 bytes from fx-in-x63.1e100.net: icmp_seq=2 ttl=56 time=25.6 ms&lt;br /&gt;
  ...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If this is NOT successful then either your DNS AAAA lookups or general IPv6 connectivity is broken (determine which based on your error messages).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you have a name lookup error then it is possible to bypass the DNS lookups and ping google&amp;#039;s IPv6 host directly:&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
  ping6 -c 3 2a00:1450:400c:c01::67&lt;br /&gt;
  &lt;br /&gt;
  PING 2a00:1450:400c:c01::67(2a00:1450:400c:c01::67) 56 data bytes&lt;br /&gt;
  64 bytes from 2a00:1450:400c:c01::67: icmp_seq=1 ttl=56 time=19.0 ms&lt;br /&gt;
  64 bytes from 2a00:1450:400c:c01::67: icmp_seq=2 ttl=56 time=18.3 ms&lt;br /&gt;
  64 bytes from 2a00:1450:400c:c01::67: icmp_seq=3 ttl=56 time=18.3 ms&lt;br /&gt;
  &lt;br /&gt;
  &amp;#039;&amp;#039;&amp;#039;Caution: google&amp;#039;s ipv6 address changes frequently - this was correct in Jan 2012, it may not be now!&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
If this fails to work then your general IPv6 connectivity is broken! A few things to check if this is the case:&lt;br /&gt;
&lt;br /&gt;
* Can successfully ping your router? &lt;br /&gt;
* Check your IPv6 routing table:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  C:\Users\user1&amp;gt;route print&lt;br /&gt;
  ===========================================================================&lt;br /&gt;
  Interface List&lt;br /&gt;
   11...XX XX XX XX XX XX ......Intel(R) Centrino(R) Advanced-N 6200 AGN&lt;br /&gt;
   10...YY YY YY YY YY YY ......Atheros AR8131 PCI-E Gigabit Ethernet Controller&lt;br /&gt;
    1...........................Software Loopback Interface 1&lt;br /&gt;
   17...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter&lt;br /&gt;
   15...00 00 00 00 00 00 00 e0 Teredo Tunneling Pseudo-Interface&lt;br /&gt;
  ===========================================================================   &lt;br /&gt;
  IPv4 Route Table&lt;br /&gt;
  ===========================================================================&lt;br /&gt;
  removed for clarity&lt;br /&gt;
  ...&lt;br /&gt;
  ===========================================================================&lt;br /&gt;
  Persistent Routes:&lt;br /&gt;
    None &lt;br /&gt;
  &lt;br /&gt;
  IPv6 Route Table&lt;br /&gt;
  ===========================================================================&lt;br /&gt;
  Active Routes:&lt;br /&gt;
   If Metric Network Destination      Gateway&lt;br /&gt;
   &amp;#039;&amp;#039;&amp;#039;11    281 ::/0                     fe80::XXXX:XXXX:XXXX:XXXX&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
    1    306 ::1/128                  On-link&lt;br /&gt;
   15     58 2XXX::/32                On-link&lt;br /&gt;
   15    306 2XXX:X:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX/128&lt;br /&gt;
                                      On-link&lt;br /&gt;
   11     33 2XXX:XXXX:XXXX:XXXX::/64 On-link&lt;br /&gt;
   11    281 2XXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX/128&lt;br /&gt;
                                      On-link&lt;br /&gt;
   11    281 2XXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX/128&lt;br /&gt;
                                      On-link&lt;br /&gt;
   11    281 fe80::/64                On-link&lt;br /&gt;
   15    306 fe80::/64                On-link&lt;br /&gt;
   15    306 fe80::XXXX:XXXX:XXXX:XXXX/128&lt;br /&gt;
                                      On-link&lt;br /&gt;
   11    281 fe80::XXXX:XXXX:XXXX:XXXX/128&lt;br /&gt;
                                      On-link&lt;br /&gt;
    1    306 ff00::/8                 On-link&lt;br /&gt;
   15    306 ff00::/8                 On-link&lt;br /&gt;
   11    281 ff00::/8                 On-link&lt;br /&gt;
  ===========================================================================&lt;br /&gt;
  Persistent Routes:&lt;br /&gt;
    None&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Or for a linux host:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  machine:/home/user1 # &amp;#039;&amp;#039;&amp;#039;ip -6 route show&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
  2XXX:XXXX:XXXX:XXXX::/64 via :: dev tun-ipv6  proto kernel  metric 256  mtu 1280 advmss 1220 hoplimit 4294967295&lt;br /&gt;
  2XXX:XXXX:XXXX:XX::/64 dev eth0 proto kernel  metric 256  mtu 1500 advmss 1440 hoplimit 4294967295&lt;br /&gt;
  fe80::/64 dev eth0  proto kernel  metric 256  mtu 1500 advmss 1440 hoplimit 4294967295&lt;br /&gt;
  fe80::/64 via :: dev tun-ipv6  proto kernel  metric 256  mtu 1280 advmss 1220 hoplimit 4294967295&lt;br /&gt;
  &amp;#039;&amp;#039;&amp;#039;default via 2XXX:XXXX:XXXX:XXXX::X dev tun-ipv6  metric 1024  mtu 1280 advmss 1220 hoplimit 4294967295&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== DNS Related Issues ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If the direct ping6 does work then your DNS AAAA-record lookups may be broken. To check whether you can perform IPv6 AAAA lookups, at a command prompt try:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  nslookup -type=aaaa ipv6.chappell-family.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
you should see a response similar to:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  Server:         ::1&lt;br /&gt;
  Address:        ::1#53&lt;br /&gt;
  &lt;br /&gt;
  Non-authoritative answer:&lt;br /&gt;
  ipv6.chappell-family.com        has AAAA address 2001:470:1f08:185c::2&lt;br /&gt;
  &lt;br /&gt;
  Authoritative answers can be found from:&lt;br /&gt;
  ipv6.chappell-family.com        nameserver = ns4.he.net.&lt;br /&gt;
  ipv6.chappell-family.com        nameserver = ns2.he.net.&lt;br /&gt;
  ipv6.chappell-family.com        nameserver = ns1.he.net.&lt;br /&gt;
  ipv6.chappell-family.com        nameserver = ns3.he.net.&lt;br /&gt;
  ns1.he.net      internet address = 216.218.130.2&lt;br /&gt;
  ns2.he.net      internet address = 216.218.131.2&lt;br /&gt;
  ns2.he.net      has AAAA address 2001:470:200::2&lt;br /&gt;
  ns3.he.net      internet address = 216.218.132.2&lt;br /&gt;
  ns3.he.net      has AAAA address 2001:470:300::2&lt;br /&gt;
  ns4.he.net      internet address = 216.66.1.2&lt;br /&gt;
  ns4.he.net      has AAAA address 2001:470:400::2&lt;br /&gt;
  &lt;br /&gt;
&lt;br /&gt;
Based on the fact that must have already accessed my server using IPv4, in order to be reading this, then the following IPv4 A-record lookup should work:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  &amp;#039;&amp;#039;&amp;#039;nslookup ipv6.chappell-family.com&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
    &lt;br /&gt;
  &lt;br /&gt;
  Server:         ::1&lt;br /&gt;
  Address:        ::1#53&lt;br /&gt;
  &lt;br /&gt;
  Non-authoritative answer:&lt;br /&gt;
  Name:   ipv6.chappell-family.com&lt;br /&gt;
  Address: 212.159.122.74&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you don&amp;#039;t get a similar response then you need to investigate your DNS setup, or perhaps your ISP&amp;#039;s.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== DNS Resolver Issues ===&lt;br /&gt;
&lt;br /&gt;
Some DNS services don&amp;#039;t seem to reliably resolve AAAA lookups. In particular, some appear to resolve A and AAAA records with different delays, and/or reliability, which sometimes causes web browsers to determine that only an IPv4 address exists since the IPv6 lookup resolves too slowly/unreliably. You can try one of the publicly accessible DNS resolvers as an alternative to your current providers&amp;#039; if you believe that this might be the case. For those using a tunneled IPv6 connection then it is likely that your tunnel provider also offers a DNS resolver:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Hurricane Electric - see Available DNS resolvers section of your tunnel setup (may be 2001:470:20::2 and 74.82.42.42)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Other public IPv6 DNS resolvers:&lt;br /&gt;
&lt;br /&gt;
* [https://developers.google.com/speed/public-dns/docs/using Google DNS Servers]&lt;br /&gt;
* [https://support.opendns.com/hc/en-us/articles/227986667-Does-OpenDNS-Support-IPv6- OpenDNS IPv6]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The order in which you list the resolvers in your DNS search list is important - so when trying a new resolver ensure that you place it at the front of your resolver list. Note that it is worth checking that you can communicate with the resolver &amp;#039;&amp;#039;&amp;#039;before&amp;#039;&amp;#039;&amp;#039; modifying your resolver list - if the resolver fails to respond then you may encounter significant delays when attempting to lookup a host. In a linux environment this can be checked using a command similar to:&lt;br /&gt;
&lt;br /&gt;
  machine:/home/user1 # &amp;#039;&amp;#039;&amp;#039;host ipv6.chappell-family.com 2001:4860:4860::8888&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
  Using domain server:&lt;br /&gt;
  Name: 2001:4860:4860::8888&lt;br /&gt;
  Address: 2001:4860:4860::8888#53&lt;br /&gt;
  Aliases:&lt;br /&gt;
  &lt;br /&gt;
  ipv6.chappell-family.com has address 212.159.122.74&lt;br /&gt;
  ipv6.chappell-family.com has IPv6 address 2001:470:1f08:185c::2&lt;br /&gt;
  ipv6.chappell-family.com mail is handled by 10 mail.ipv6.chappell-family.com.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Note that it isn&amp;#039;t necessary to access your DNS resolver using IPv6 if you don&amp;#039;t want to - as long as the DNS server supports AAAA queries then this is sufficient. The same query, but on a windows machine, using Google&amp;#039;s IPv4 resolver:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  C:\Users\user1&amp;gt;&amp;#039;&amp;#039;&amp;#039;nslookup ipv6.chappell-family.com 8.8.4.4&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
  Server:  google-public-dns-b.google.com&lt;br /&gt;
  Address:  8.8.4.4&lt;br /&gt;
  &lt;br /&gt;
  Non-authoritative answer:&lt;br /&gt;
  Name:    ipv6.chappell-family.com&lt;br /&gt;
  Addresses:  2001:470:1f08:185c::2&lt;br /&gt;
            212.159.122.74&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== WINDOWS 7 RESPONSES ===&lt;br /&gt;
&lt;br /&gt;
A correctly configured Windows 7 machine shows the following responses:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
ipv6.chappell-family.com has two DNS entries (AAAA and A records) and consequently returns two addresses:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  nslookup ipv6.chappell-family.com&lt;br /&gt;
  &lt;br /&gt;
  Server:  server.example.com&lt;br /&gt;
  Address:  192.168.33.1&lt;br /&gt;
  &lt;br /&gt;
  Non-authoritative answer:&lt;br /&gt;
  Name:    ipv6.chappell-family.com&lt;br /&gt;
  Addresses:  2001:470:1f08:185c::2&lt;br /&gt;
              212.159.122.74&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
www6.ipv6.chappell-family.co.uk has a single AAAA DNS record:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  nslookup www6.ipv6.chappell-family.co.uk&lt;br /&gt;
    &lt;br /&gt;
  Server:  server.example.com&lt;br /&gt;
  Address:  192.168.33.1&lt;br /&gt;
  &lt;br /&gt;
  Name:    www6.ipv6.chappell-family.co.uk&lt;br /&gt;
  Address:  2001:470:1f08:185c::2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Assuming these work correctly then a ping should also resolve:&lt;br /&gt;
&lt;br /&gt;
  ping www6.ipv6.chappell-family.co.uk&lt;br /&gt;
  &lt;br /&gt;
  Pinging www6.ipv6.chappell-family.co.uk [2001:470:1f08:185c::2] with 32 bytes of data:&lt;br /&gt;
  Reply from 2001:470:1f08:185c::2: time&amp;lt;1ms&lt;br /&gt;
  Reply from 2001:470:1f08:185c::2: time&amp;lt;1ms&lt;br /&gt;
  Reply from 2001:470:1f08:185c::2: time&amp;lt;1ms&lt;br /&gt;
  Reply from 2001:470:1f08:185c::2: time&amp;lt;1ms&lt;br /&gt;
  &lt;br /&gt;
  Ping statistics for 2001:470:1f08:185c::2:&lt;br /&gt;
      Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),&lt;br /&gt;
  Approximate round trip times in milli-seconds:&lt;br /&gt;
      Minimum = 0ms, Maximum = 0ms, Average = 0ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Browser IPv6 Prioritisation ===&lt;br /&gt;
&lt;br /&gt;
If all of the above was successful then your browser may not be prioritising IPv6 DNS requests. The following browsers are known to support IPv6 prioritisation:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Microsoft&amp;#039;s Internet Explorer, &lt;br /&gt;
* Google&amp;#039;s Chrome&lt;br /&gt;
* Apple&amp;#039;s Safari&lt;br /&gt;
* Mozilla&amp;#039;s Firefox (but see the section below) &lt;br /&gt;
* w3m &lt;br /&gt;
* lynx &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you believe your browser is not prioritising IPv6 then check whether you can access the following URLs:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [http://ipv6.google.com Google&amp;#039;s IPv6-only-URL]&lt;br /&gt;
* [http://www6.chappell-family.co.uk/ An IPv6-only-URL]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Both of the above links are for IPv6-only websites - i.e. they have no IPv4 DNS entry - so if you get an error accessing these websites despite being able to perform the DNS lookups correctly then your browser is not prioritising IPv6.&lt;br /&gt;
&lt;br /&gt;
At this point it would be worthwhile checking whether another browser (from the list above) gives the same result.&lt;br /&gt;
&lt;br /&gt;
=== Firefox IPv6 DNS Prioritisation Specific ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Firefox has a specific configuration option with which to disable IPv6 DNS queries (I recently came across Firefox on Linux Mint v12 being configured this way). The option can be displayed by entering the following url into firefox:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  about:config&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Accept the warning about dragons, and then in the filter bar enter:&lt;br /&gt;
&lt;br /&gt;
  ipv6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The resulting list should now show an entry:&lt;br /&gt;
  &lt;br /&gt;
  network.dns.disableIPv6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If this entry is set to &amp;#039;&amp;#039;&amp;#039;true&amp;#039;&amp;#039;&amp;#039; then double click on the entry to change its sense to &amp;#039;&amp;#039;&amp;#039;FALSE&amp;#039;&amp;#039;&amp;#039;. Then try again!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== IPv6-only URL Test ===&lt;br /&gt;
&lt;br /&gt;
and finally pointing your web browser towards my [http://www6.chappell-family.co.uk/ IPv6-only Raspberry Pi Powered port scanner] should also work.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
	<entry>
		<id>https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=548</id>
		<title>IPv6</title>
		<link rel="alternate" type="text/html" href="https://wiki.chappell-family.com/wiki/index.php?title=IPv6&amp;diff=548"/>
		<updated>2019-01-22T19:33:24Z</updated>

		<summary type="html">&lt;p&gt;Wikiadmin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Tim&amp;#039;s IPv6 Firewall Tester (ICMPv6, IPv6 TCP and UDP Port Scanner)==&lt;br /&gt;
&lt;br /&gt;
IPscan offers much of the functionality you might hope to find in an IPv6 version of [https://www.grc.com/ GRC&amp;#039;s ShieldsUp®] utility.&lt;br /&gt;
&lt;br /&gt;
=== Introduction ===&lt;br /&gt;
&lt;br /&gt;
Recent web-browsers request IPv6 DNS lookups in preference to IPv4 if they are running on a host with IPv6 enabled. My domain (ipv6.chappell-family.com) has DNS entries for both IPv4 and IPv6 addresses, but defaults to IPv4. This makes it safe for IPv4-only hosts, which make up most of the current web traffic, including search engines, to use the same URL. Browsers running on IPv4-only hosts will not request an IPv6 address and will therefore access the website entirely using IPv4. The landing page, as linked below, attempts to determine whether your machine has a valid globally routable IPv6 address (2000::/3) and whether it is behind an HTTP proxy, by looking for well known HTTP header variables which indicate that this may be the case. Only if the hosts&amp;#039; IP address is determined to be globally routable unicast IPv6 and there are no tell-tale HTTP proxy variables will the landing page offer links to initiate the scan, as encircled in the figure below.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Landing12_selection.jpg|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) landing page viewed using Chrome. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:W3m_landing_LR.jpg|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) landing page viewed using w3m. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The tester is made available in two basic versions - one for browsers supporting javascript and the other suitable for text-only browsers such as Lynx, w3m and ELinks. The lightweight text-only browser version (right-hand figures) can be used on hosts which do not sport their own GUI environment (e.g. servers and embedded devices like routers). The original javascript browser version (left-hand figures) supports ongoing updates of the test status, whereas the text-only version only produces a results page once all the selected ports have been tested. Additionally, a fast and standard version of both of these testers is provided. The fast version tests multiple TCP or UDP ports in parallel, whereas the standard version tests only 1 port at a time, at a default rate of 1 port per second. Please be aware that some OS and firewalls apply rate-limiting to their generation, or passing, of ICMPv6 responses on the basis that this behaviour is indicative of a port scan being performed. Consequently such rate-limiting might cause a port which would normally generate an ICMPv6 response (e.g. PHBTD) to send no response at all, which IPscan would report as STEALTHed. If you are testing a host or firewall (whether on the client under test or elsewhere in the path between your client and the test server) which implements such rate-limiting then you are advised to use the standard, slower versions of IPscan which should not trigger the rate-limiting behaviour. If you&amp;#039;re unsure which version is appropriate for you, then try both and compare the results. Some Linux distributions and some ISP firewalls are known to implement such rate-limiting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please do NOT attempt to test hosts which are located behind HTTP proxies. Such proxies are very common in both corporate environments and on commercially-operated free wifi networks. The landing page for IPscan attempts to detect the common headers which such proxies insert, but it cannot detect truly transparent proxies. An HTTP Proxy is typically used by corporate networks to ensure employees are using their PCs in line with corporate computer-use policies. If you are interested in deploying your own HTTP proxy then [http://www.squid-cache.org/ Squid] is highly recommended as a proxy able to perform not only the usual access control and content-caching tasks but also offering IPv4 and IPv6 inter-working between single and dual-stack clients and web-sites. For further details please read my [https://ipv6.chappell-family.com/docs/IPv6_Squid_v01.pdf IPv6 Squid Proxy article.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== The Test ===&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
The tester allows a user to choose whether to include a commonly used set of &amp;#039;&amp;#039;&amp;#039;TCP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039; in their scan, as well as the ability to specify a number of their own specifically interesting TCP ports (this is intended to cover setups where you run services on non IANA-assigned ports, or just run less-common services). If you would like to see the list of commonly used ports expanded, or just changed, then please contact me.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Kickoff12.jpg|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) original kickoff page viewed using Safari. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:W3m_kickoff_LR.jpg |320x480px|border|alt=IPv6 Port Scanner (Firewall tester) lightweight kickoff page viewed using w3m. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
The test begins by sending an ICMPv6 ECHO-REQUEST (an IPv6 ping) towards the host under test (HUT). The tester checks for related ICMPv6 responses from either the HUT or other hosts (e.g. routers and/or firewall devices protecting the HUT). If a response is detected from an host other than the HUT then the IPv6 address of this third-party is reported.   &lt;br /&gt;
 &lt;br /&gt;
The test continues by scanning a fixed set of commonly used &amp;#039;&amp;#039;&amp;#039;UDP [[IPv6_Ports]]&amp;#039;&amp;#039;&amp;#039;. The IPv6 UDP port test sets its&amp;#039; socket tx/rx timeouts to be 2 seconds - consequently the results can take up to 2s per tested UDP port - although the actual time depends heavily upon the filtering that your system employs (e.g. firewalls which mark protected ports as &amp;#039;unreachable&amp;#039; will resolve in much less than the allowed 2 second timeout assuming that your firewall sends the appropriate ICMPv6 packet in response).&lt;br /&gt;
&lt;br /&gt;
The test finishes by scanning the user-selected IPv6 TCP ports. The IPv6 TCP port test sets its&amp;#039; socket tx/rx timeouts to be 1 second - consequently the results can take up to 1s per tested port - although this depends heavily upon the filtering your system employs (e.g. firewalls which mark protected ports as &amp;#039;administratively prohibited&amp;#039; will resolve as PHBTD in much less than the allowed 1 second timeout assuming that your firewall sends an ICMPv6 type 1 code 1 packet in response).&lt;br /&gt;
&lt;br /&gt;
The tester will indicate the status of the tested UDP and TCP ports as either OPEN, STEALTHed or one of a series of other states depending on the positive or negative feedback received from your machine. A typical result is shown in the figure below. Note that if you run the test using an interactive gui-based browser then hovering over specific port numbers produces a pop-up describing the service run on that specific port. For a more detailed explanation of the reported states please read &amp;#039;&amp;#039;&amp;#039;[[ScanStatus]]&amp;#039;&amp;#039;&amp;#039;. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Results12.jpg|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) original results page viewed using IE9. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
[[File:W3m_results_LR.jpg|320x480px|border|alt=IPv6 Port Scanner (Firewall tester) lightweight results page viewed using w3m. See https://ipv6.chappell-family.com/ipv6tcptest/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;&amp;#039;&amp;#039;&amp;#039;IMPORTANT:&amp;#039;&amp;#039;&amp;#039; this scanner will direct IPv6 TCP, UDP and ICMPv6 traffic towards the IP address that my webserver determines the request originates from. Please do NOT attempt to test machines that are operating behind transparent HTTP proxies, unless you also administer the proxy and specifically intend that machine to be tested.&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;If you wish to test your host now then please point your browser towards [https://ipv6.chappell-family.com/ipv6tcptest/ my IPv6 portscanner.]&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Test Server Source IPv6 Addresses ===&lt;br /&gt;
&lt;br /&gt;
Tests performed from my www6.chappell-family.co.uk host will be sourced from IPv6 address: &amp;#039;&amp;#039;&amp;#039;2001:470:971f:6::3&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
Note: during periods of planned server maintenance, a reduced service supporting only TCP testing will be offered, which will be sourced from an IPv6 address in the following range: &amp;#039;&amp;#039;&amp;#039;2001:8d8:100f::/48&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
=== Raspberry Pi Powered IPv6 Firewall Tester ===&lt;br /&gt;
&lt;br /&gt;
Outline details of my Raspberry Pi Powered IPv6 firewall tester can be found here [[Raspberry_Pi_IPv6_firewall_tester]], along with more complete [[Raspberry_Pi_IPv6_firewall_tester_installation]] details. &lt;br /&gt;
&lt;br /&gt;
Tests performed from my Raspberry Pi host will be sourced from IPv6 address: &amp;#039;&amp;#039;&amp;#039;2001:470:971f:6::3&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Issues - Debugging ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;re having trouble accessing the landing page via IPv6 (i.e. your IP address is reported as IPv4) then please see the following &amp;#039;&amp;#039;&amp;#039;[[IPv6_DEBUG]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Observations on IPv6 firewalls and IPv6 Address Selection ===&lt;br /&gt;
&lt;br /&gt;
For some general observations on IPv6 firewalls, as well as some useful references, please see the &amp;#039;&amp;#039;&amp;#039;[[IPv6_Firewalls]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Getting an IPv6 connection ===&lt;br /&gt;
&lt;br /&gt;
If you don&amp;#039;t already have an IPv6 connection but wish to get involved, then try a tunnel-broker such as [http://tunnelbroker.net Hurricane Electric].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Source code ===&lt;br /&gt;
&lt;br /&gt;
If you would like to view or download the IPv6 firewall scanner source code then please visit my &amp;#039;&amp;#039;&amp;#039;[https://github.com/timsgit/ipscan github]&amp;#039;&amp;#039;&amp;#039; page. If you deploy the scanner on an internet facing machine then &amp;#039;&amp;#039;please&amp;#039;&amp;#039; ensure that you protect users&amp;#039; privacy by following the instructions given in point 10 of the embedded [https://github.com/timsgit/ipscan/blob/master/README README] file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Automation ===&lt;br /&gt;
&lt;br /&gt;
If you&amp;#039;d like to automate IPv6 firewall testing, or run the same test a number of times on different hosts then please see my &amp;#039;&amp;#039;&amp;#039;[[ScanAutomation]]&amp;#039;&amp;#039;&amp;#039; section and HTML &amp;#039;&amp;#039;&amp;#039;[[ResultScraping]]&amp;#039;&amp;#039;&amp;#039; section.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== URL for Sharing ===&lt;br /&gt;
&lt;br /&gt;
If you find this utility useful then please feel free to share the following URL with new users:&lt;br /&gt;
&lt;br /&gt;
   &amp;#039;&amp;#039;&amp;#039;https://ipv6.chappell-family.com/ipv6tcptest/&amp;#039;&amp;#039;&amp;#039; IPv6 Firewall Tester&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This website publishes a Privacy Policy (link at the bottom of every page). Continued use of this website implies your consent to the use of data outlined in the policy. All other registered trademarks are the property of their respective owners.&lt;/div&gt;</summary>
		<author><name>Wikiadmin</name></author>
	</entry>
</feed>