From owner-freebsd-questions@FreeBSD.ORG Fri Jan 23 02:23:46 2004 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 3400F16A4CE for ; Fri, 23 Jan 2004 02:23:46 -0800 (PST) Received: from office.un.kiev.ua (relay.un.kiev.ua [195.137.202.30]) by mx1.FreeBSD.org (Postfix) with ESMTP id 325E043D2D for ; Fri, 23 Jan 2004 02:23:41 -0800 (PST) (envelope-from ask@un.kiev.ua) Received: from un4.un (un4.un [192.168.0.4]) by office.un.kiev.ua (8.12.9p2/8.11.1) with ESMTP id i0NANFTn014766 for ; Fri, 23 Jan 2004 12:23:15 +0200 (EET) Date: Fri, 23 Jan 2004 12:23:39 +0200 From: Alexey Kuzmenko Organization: UN House in Ukraine X-Priority: 3 (Normal) Message-ID: <137240266074.20040123122339@un.kiev.ua> To: freebsd-questions@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Subject: ARP poisonong. LIVE_MAC X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list Reply-To: Alexey Kuzmenko List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 23 Jan 2004 10:23:46 -0000 Hi all, There is a kernel module under Linux which is called LIVE-MAC. This module provide a sort of arp spoofing attack. It broadcasts arp replies for restricted host causing these hosts (basically windows) not to work in the LAN. I'm wandering if there is something like above but for FreeBSD. I need to disallow any host network activity from the server (FreeBSD 4.8) -- Alexey Kuzmenko CCNA System Administrator UN House in Ukraine