Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 29 Jul 1997 15:38:15 -0400
From:      Matthew Hunt <mph@astro.psu.edu>
To:        Poul-Henning Kamp <phk@dk.tfs.com>
Cc:        security@FreeBSD.ORG
Subject:   Re: Detecting sniffers (was: Re: security hole in FreeBSD)
Message-ID:  <19970729153815.19286@astro.psu.edu>
In-Reply-To: <284.870203173@critter.dk.tfs.com>; from Poul-Henning Kamp on Tue, Jul 29, 1997 at 09:06:13PM %2B0200
References:  <Pine.BSF.3.95q.970729125111.22895A-100000@chaos.amber.org> <284.870203173@critter.dk.tfs.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, Jul 29, 1997 at 09:06:13PM +0200, Poul-Henning Kamp wrote:

> Except that most of them are easy to spoof:  Set up your sniffer to 
> output 10 packets with different "from" MAC and it figures "hey port
> #4 is upstream, send it everything..."

I think some can be configured with hardcoded associations between the
MAC and port, rather than learning them on their own.  Such beasts are
used for the residence hall networks at Penn State.




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19970729153815.19286>