From owner-freebsd-ipfw@FreeBSD.ORG Fri Sep 7 19:00:50 2007 Return-Path: Delivered-To: freebsd-ipfw@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 4100216A420 for ; Fri, 7 Sep 2007 19:00:49 +0000 (UTC) (envelope-from asstec@matik.com.br) Received: from msrv.matik.com.br (msrv.matik.com.br [200.152.83.14]) by mx1.freebsd.org (Postfix) with ESMTP id C4E5813C45A for ; Fri, 7 Sep 2007 19:00:47 +0000 (UTC) (envelope-from asstec@matik.com.br) Received: from ap-h.matik.com.br (ap-h.matik.com.br [200.152.83.36]) by msrv.matik.com.br (8.14.1/8.13.1) with ESMTP id l87Ht0P9097691; Fri, 7 Sep 2007 14:55:01 -0300 (BRT) (envelope-from asstec@matik.com.br) From: AT Matik Organization: Infomatik To: freebsd-ipfw@freebsd.org Date: Fri, 7 Sep 2007 14:54:06 -0300 User-Agent: KMail/1.9.7 References: <456319.24028.qm@web56801.mail.re3.yahoo.com> <46E181F1.2030404@mac.com> In-Reply-To: <46E181F1.2030404@mac.com> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200709071454.07445.asstec@matik.com.br> X-Virus-Scanned: ClamAV version 0.90.3, clamav-milter version 0.90.3 on msrv.matik.com.br X-Virus-Status: Clean Cc: Stephen GL Subject: Re: Allow only match both mac address and IP address X-BeenThere: freebsd-ipfw@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IPFW Technical Discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 07 Sep 2007 19:00:50 -0000 On Friday 07 September 2007 13:53:05 Chuck Swiger wrote: > Stephen GL wrote: > [ ... ] > > > I am very new about IPFW. I'm in FreeBSD 6.0. > > My job is pass anyone that has a valid both MAC and IP address. > > Beginning of my rule I check the valid MAC address that can get through. > > If pass, the next rule is check the IP address. > > If pass, he/she can get through. > > > > Everything is work as expected. My problem is the above rules doesn't > > check both MAC and IP address pairing. Assume someone spoof other MAC > > address, they can pass by changing the IP address of another. > > The way to deal with people who screw up your network by spoofing the MAC > and IP address of another machine is to fire them or drop them as a > customer, depending on the relationship. > a completely brilliant solution, technically brilliant, administrationally brilliant, please accept my admiration ... but we want the customer's money and not drop them man ... > However, if you really need to provide IP access to people whom you can't > trust not to play such games, consider switching to something which > requires authentication, such as PPPoE. that then cost money for password capslock/lost/forgot/change support ... and cost bandwidth overhead or the costumer get less bandwidth as supposed to back to the point, you need to run your server as bridge then you can drop traffic which is not an authorized mac/ip pair as in deny ip from any to any src-ip ${ip} layer2 not MAC any ${mac} recv ${nic} JM A mensagem foi scaneada pelo sistema de e-mail e pode ser considerada segura. Service fornecido pelo Datacenter Matik https://datacenter.matik.com.br