noticed a steady flow of unsolicited network scans
Most often, a computer will use NTP to synchronize its clock to a public NTP server.
NTP uses a concept of pools or groups of servers.
Ntp.org aggregates the public pools and makes them available with names such as 0.Debian.pool.ntp.org
IPv6 and NTP Debian users have probably been scanned
lets the user find specific types of computers (routers, servers, etc.) connected to the internet using a variety of filters
Provides randomized addressing : an IP address that is half home/network prefix and half random bits.
Supposed to make a device address nearly unguessable.
privacy addresses are still exposed any time the device makes an outgoing connection (such as setting its clock to an NTP server).
2604:a880:0800:0010:0000:0000:0970:a001 = thor.scan6.shodan.io.
2604:a880:0800:0010:0000:0000:00fe:d001 = gateway.scan6.shodan.io.
2604:a880:0800:0010:0000:0000:0092:2001 = bone.scan6.shodan.io.
2604:a880:0800:0010:0000:0000:00fd:7001 = burger.scan6.shodan.io.
2604:a880:0800:0010:0000:0000:0089:c001 = rock.scan6.shodan.io.
sysctl.conf
# BH - for testing. Turn off SLAAC.
net.ipv6.conf.all.autoconf=0
net.ipv6.conf.default.autoconf=0
# BH - privacy extensions - override the default 1-day long tempaddr validity time
# with something much smaller.
# This should help narrow down ipv6 address harvesting servers, among other things.
net.ipv6.conf.all.use_tempaddr=2
net.ipv6.conf.default.use_tempaddr=2
net.ipv6.conf.eth0.use_tempaddr=2
net.ipv6.conf.all.temp_prefered_lft=1200
net.ipv6.conf.all.temp_valid_lft=2400
net.ipv6.conf.default.temp_prefered_lft=1200
net.ipv6.conf.default.temp_valid_lft=2400
net.ipv6.conf.eth0.temp_prefered_lft=1200
net.ipv6.conf.eth0.temp_valid_lft=2400
$ host 2.debian.pool.ntp.org
<snip>
2.debian.pool.ntp.org has IPv6 address 2604:a880:400:d0::9:b002
2.debian.pool.ntp.org has IPv6 address 2604:a880:400:d0::9:b00e
2.debian.pool.ntp.org has IPv6 address 2001:470:e949:a::1
2.debian.pool.ntp.org has IPv6 address 2604:a880:1:20::a7:f004
SCAN DETECTED: startTime=2016-01-13T19:33:10.000+00:00 numPortsScanned=117
SRC=2604:a880:0800:0010:0000:0000:0970:a001 DST=my:prefix:my:prefix:7c0d:e6cb:8719:7d94
durationSeconds=0.0 startTimeEpoch=1452713590.0
One or more of these packets may have triggered the scan...
lag=47.0s @2016-01-13T19:32:25.000+00:00 epoch=1452713545
my:prefix:my:prefix:7c0d:e6cb:8719:7d94:42539 -> 2604:a880:0001:0020:0000:0000:00a7:f007:123
lag=7.0s @2016-01-13T19:33:05.000+00:00 epoch=1452713585
my:prefix:my:prefix:7c0d:e6cb:8719:7d94:59081 -> 2604:a880:0001:0020:0000:0000:00a7:f009:123
2604:a880:0400:00d0:0000:0000:0009:b001 (DNS: robot.data.shodan.io)
2604:a880:0400:00d0:0000:0000:0009:b002
...
2604:a880:0400:00d0:0000:0000:0009:b00f
2604:a880:0001:0020:0000:0000:00a7:f001 (DNS: abend.data.shodan.io)
2604:a880:0001:0020:0000:0000:00a7:f002
...
2604:a880:0001:0020:0000:0000:00a7:f00f