From owner-freebsd-security Fri Apr 20 10:12:41 2001 Delivered-To: freebsd-security@freebsd.org Received: from obelix.rby.hk-r.se (obelix.rby.hk-r.se [194.47.134.4]) by hub.freebsd.org (Postfix) with ESMTP id 4F06737B43F for ; Fri, 20 Apr 2001 10:12:38 -0700 (PDT) (envelope-from t98pth@student.bth.se) Received: from helios.kna.hk-r.se (helios [194.47.153.5]) by obelix.rby.hk-r.se (8.10.2/8.10.2) with ESMTP id f3KHCaM16325 for ; Fri, 20 Apr 2001 19:12:36 +0200 (MEST) Received: from localhost (t98pth@localhost) by helios.kna.hk-r.se (8.9.3+Sun/8.9.3) with ESMTP id TAA27421 for ; Fri, 20 Apr 2001 19:13:14 +0200 (MEST) X-Authentication-Warning: helios.kna.hk-r.se: t98pth owned process doing -bs Date: Fri, 20 Apr 2001 19:13:14 +0200 (MEST) From: =?ISO-8859-1?Q?P=E4r_Thoren?= X-Sender: t98pth@helios To: freebsd-security@freebsd.org Subject: static arp values Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=ISO-8859-1 Content-Transfer-Encoding: QUOTED-PRINTABLE Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Hi! Is it possible to make a arptable entry static? For example the arp adress of my gateway. So that man-in-the-middle attack can be prevented. I=B4ve tried "arp -S ip-adres mac-adres" but it seems that it is still possible to infect the arptable with a false mac adress of the gateway and sniff the connection. /P=E4r To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message