[10377] in bugtraq
Link-layer security flaws
daemon@ATHENA.MIT.EDU (Otel Florian-Daniel)
Wed Apr 28 15:54:56 1999
Mime-Version: 1.0 (generated by tm-edit 7.108)
Content-Type: text/plain; charset=US-ASCII
Message-Id: <14118.52204.410695.76345@cepc30.ce.chalmers.se>
Date: Wed, 28 Apr 1999 11:34:59 +0200
Reply-To: otel@ce.chalmers.se
From: Otel Florian-Daniel <otel@CE.CHALMERS.SE>
To: BUGTRAQ@NETSPACE.ORG
Hello everybody,
I'm trying to gather some data about link-layer protocol specific attacks
and/or security flaws that can be exploited, e.g. Ethernet is prone to
sniffing and MAC address spoofing. Most of the stuff I found so far
revolves around Eth. sniffing (how to use it, how to detect it, so
on and so forth). But what about other types of attacks and/or
link-layers (e.g. broadcast-storm based DoS attack? Are Token Ring, FDDI,
ISDN, ATM flawless ?) Does anybody have some info about this ? Is the
topic superfluous/too general ?
Many thanks in advance for any reasonable comment and/or pointers,
Florian
P.S: Maybe is worth stressing more that I'm looking for vendor and
protocol independent info and not specific implementation bugs.