North American Network Operators Group|
Date Prev | Date Next |
Date Index |
Thread Index |
Author Index |
Re: Cable Modem [really responsible engineering]
- From: Wojtek Zlobicki
- Date: Wed Jun 27 09:08:49 2001
Having tried the utility, I guess I need to put my foot in my mouth (please
disregard my previous message)... I wonder how arping is able to get around
the MAC broadcast filters. Very dangerous tool !!
----- Original Message -----
From: "PJ" <email@example.com>
To: "Wojtek Zlobicki" <firstname.lastname@example.org>
Sent: Wednesday, June 27, 2001 5:04 AM
Subject: Re: Cable Modem [really responsible engineering]
> On Tue, 26 Jun 2001, Wojtek Zlobicki wrote:
> > ----- Original Message -----
> > From: "Chris Adams" <email@example.com>
> > To: <firstname.lastname@example.org>
> > Sent: Tuesday, June 26, 2001 9:20 PM
> > Subject: Re: Cable Modem [really responsible engineering]
> > >
> > > Also, how do you prevent the user from trying to forge someone else's
> > > IP address or even MAC address in outgoing packets? Without
> > > against forged packets, I don't see how to provide accountability when
> > > someone attacks.
> > How would anyone find out anothers MAC. As long as you seperate each
> > customer into their own bridge group, there is no way for them to find
> > anothers MAC. As for forging IP's not much you can do about that. MAC
> > address access list.. do they exists ?
> There is a neat little utility called arping that can return the MAC
address of a
> specified IP. Comes in handy for bypassing MAC address filters.
> Security is mostly a superstition. It does not exist in nature.
> -- Helen Keller