This document discusses the Teredo protocol, which enables IPv6 connectivity for nodes located behind IPv4 NAT devices. It explains how Teredo works by tunneling IPv6 packets over UDP through NATs. While Teredo allows IPv6 connectivity, it also raises security concerns by bypassing security controls and allowing unsolicited traffic. The document analyzes attacks that could exploit vulnerabilities in Teredo tunnels, such as a denial of service attack against a Teredo server using a single packet. It investigates whether Teredo represents a security risk or is a worthwhile transition mechanism from IPv4 to IPv6.