[3706] in bugtraq

home help back first fref pref prev next nref lref last post

Re: BOOTP/DHCP security

daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Thu Nov 28 13:43:30 1996

Date: 	Thu, 28 Nov 1996 04:09:57 -0500
Reply-To: Valdis.Kletnieks@vt.edu
From: Valdis.Kletnieks@vt.edu
X-To:         Benedikt Stockebrand <benedikt@devnull.ruhr.de>
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@netspace.org>
In-Reply-To:  Your message of "Wed, 27 Nov 1996 21:37:58 +0100."
              <87k9r79sux.fsf@devnull.ruhr.de>

On Wed, 27 Nov 1996 21:37:58 +0100, you said:
> (1) Make this machine check for bogus MACs in its ARP cache mapped to
> the servers IP address.  This forces the attacker to use a network
> card with a configurable MAC and usually stops attacks from machines
> belonging to the network (unless you've got this kind of card
> installed).

Umm.. are there cards that DONT support changing the MAC address?
I know that any card that did older Decnet releases *had* to be
able to do this.

For another good giggle, find a manager who's just learned about
the fact that packet sniffers exist, and point out to him that
the Ethernet spec *requires* support for promiscuous mode.
Watch him shriek "AAAARRGGGGHH!!!!" and call for the return
of IBM3270s hanging off coax.  Ever tried to install a sniffer
on an IBM bus/tag pair?  Kind of hard to do without the operator
noticing... ;)

                                Valdis Kletnieks
                                Computer Systems Engineer
                                Virginia Tech

home help back first fref pref prev next nref lref last post