[90792] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Interesting new spam technique - getting a lot more popular.

daemon@ATHENA.MIT.EDU (Florian Weimer)
Wed Jun 14 12:45:03 2006

From: Florian Weimer <fw@deneb.enyo.de>
To: "Christopher L. Morrow" <christopher.morrow@verizonbusiness.com>
Cc: Suresh Ramasubramanian <ops.lists@gmail.com>,
	NANOG <nanog@merit.edu>
Date: Wed, 14 Jun 2006 17:49:15 +0200
In-Reply-To: <Pine.GSO.4.58.0606140410060.19686@marvin.argfrp.us.uu.net>
	(Christopher L. Morrow's message of "Wed, 14 Jun 2006 04:10:51 +0000
	(GMT)")
Errors-To: owner-nanog@merit.edu


* Christopher L. Morrow:

> On Wed, 14 Jun 2006, Suresh Ramasubramanian wrote:
>>
>> http://thespamdiaries.blogspot.com/2006/02/new-host-cloaking-technique-used-by.html
>>
>>     * Monitor your local network for interfaces transmitting ARP
>> responses they shouldn't be.
>
> how about just mac security on switch ports? limit the number of mac's at
> each port to 1 or some number 'valid' ?

The attack is not visible at layer 2, so this won't help.  You need
static ARP tables on relevant hosts, but even that is only a stopgag
measure.  Better invest into one (virtual) router port per customer
host. 8-/

home help back first fref pref prev next nref lref last post