[10377] in bugtraq

home help back first fref pref prev next nref lref last post

Link-layer security flaws

daemon@ATHENA.MIT.EDU (Otel Florian-Daniel)
Wed Apr 28 15:54:56 1999

Mime-Version: 1.0 (generated by tm-edit 7.108)
Content-Type: text/plain; charset=US-ASCII
Message-Id: <14118.52204.410695.76345@cepc30.ce.chalmers.se>
Date: 	Wed, 28 Apr 1999 11:34:59 +0200
Reply-To: otel@ce.chalmers.se
From: Otel Florian-Daniel <otel@CE.CHALMERS.SE>
To: BUGTRAQ@NETSPACE.ORG

Hello everybody,

I'm trying to gather some data about link-layer protocol specific attacks
and/or security flaws that can be exploited, e.g. Ethernet is prone to
sniffing and MAC address spoofing. Most of the stuff I found so far
revolves around Eth. sniffing (how to use it, how to detect it, so
on and so forth). But what about other types of attacks and/or
link-layers (e.g. broadcast-storm based DoS attack? Are Token Ring, FDDI,
ISDN, ATM flawless ?)  Does anybody have some info about this ? Is the
topic superfluous/too general ?

Many thanks in advance for any reasonable comment and/or pointers,


Florian

P.S: Maybe is worth stressing more that I'm looking for vendor and
protocol independent info and not specific implementation bugs.

home help back first fref pref prev next nref lref last post