These are the passing questions for Netreads W'15 term. You will find those for S'14 (the former contents of this file) in passing-S14.txt Submit your command line scripts and packet captures. Add screenshots as needed. Please note that I will _not_ accept MS Word files (.doc, .docx), only plain text, Markdown, LaTeX, or PDF. 0. Get yourself some kind of IPv6 connectivity. Hurricane Electric's tunnelbroker.net would work best with a public routable IP or a NAT box that supports protocol 41, otherwise a Miredo IPv6 tunnel should work for you. 1. Ping the IPv6 address of test6.dartmouth.edu as described in the passing-S14.txt exercises 1 and 2. That way, I will have your name and the IP address you are working from. 2. Look at the IPv6 address that you get in the response for the DNS transaction ID of 9999 in (1). At that address, you will find a DNS server. If you ask that DNS server for the address of a.ns.test6.dartmouth.edu, you should get the same as that of test6.dartmouth.edu, and gw.test6.dartmouth.edu should give you the router that you are reaching this IPv6 network through. Test these with dig(1), e.g.: "dig @ aaaa a.ns.test6.dartmouth.edu" "dig @ aaaa gw.test6.dartmouth.edu" 3. Your next task will be to look up the IPv6 address of awesome.test6.dartmouth.edu on the DNS server discovered in (2). This should be easy with "dig" as above---except there is a problem. There is a firewall between you and that system that hates the word "awesome" and will drop _any incoming UDP or TCP packet_ that contains the word "awesome". So your normal DNS query will time out and fail. So you will need to do something special to that UDP request to go through.(*) 4. In (3), you get an IPv6 address of an HTTP server. On that server, there is a picture at the URL that looks like http://[HTTP_SERVER_IPv6_ADDRESS]/awesome/ . Get it. Again, it should be easy to do by just typing that address into your browser's URL bar (remember that [] around an IPv6 address are needed in Firefox; you can check that you can access the site by going to http://[HTTP_SERVER_IPv6_ADDRESS]/ -- you should see a blank page with "Nothing special here".) Except there's still that firewall that hates the word 'awesome' and drops any packet in which this word occurs. So you will need to do something special with your HTTP request. -------- (*) Hint: Chapter 3 of the paper http://insecure.org/stf/secnet_ids/secnet_ids.html should give you some ideas---if your previous exercises didn't already.