[3709] in bugtraq

home help back first fref pref prev next nref lref last post

Re: BOOTP/DHCP security

daemon@ATHENA.MIT.EDU (Alan Cox)
Thu Nov 28 21:49:09 1996

Date: 	Thu, 28 Nov 1996 22:15:28 +0000
Reply-To: Alan Cox <alan@lxorguk.ukuu.org.uk>
From: Alan Cox <alan@lxorguk.ukuu.org.uk>
X-To:         benedikt@devnull.ruhr.de
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@NETSPACE.ORG>
In-Reply-To:  <87k9r79sux.fsf@devnull.ruhr.de> from "Benedikt Stockebrand" at
              Nov 27, 96 09:37:58 pm

> the servers IP address.  This forces the attacker to use a network
> card with a configurable MAC and usually stops attacks from machines
> belonging to the network (unless you've got this kind of card
> installed).

No. All the cards (in the PC world anyway) that don't a configurable
mac address can still be dumped into promisc mode and fake source addresses.
In effect the unprogrammable cards (very rare now anyway) simply lack the
ability to set a receive filter.

Alan

home help back first fref pref prev next nref lref last post