Date: Thu, 18 Jan 2007 11:25:28 +0300 From: "Andrew Pantyukhin" <infofarmer@FreeBSD.org> To: "Ted Mittelstaedt" <tedm@toybox.placo.com> Cc: "Dan Mahoney, System Admin" <danm@prime.gushi.org>, questions@freebsd.org Subject: Re: Transport Mode IPSEC Message-ID: <cb5206420701180025t33de5399q11a8b96f6322a964@mail.gmail.com> In-Reply-To: <005701c73ad3$1e433560$3c01a8c0@coolf89ea26645> References: <20070118022306.Q26349@prime.gushi.org> <005701c73ad3$1e433560$3c01a8c0@coolf89ea26645>
next in thread | previous in thread | raw e-mail | index | archive | help
On 1/18/07, Ted Mittelstaedt <tedm@toybox.placo.com> wrote: > Dan, > > You do realize, don't you, that since both of these hosts are on a switch, > and are using unicast traffic to communicate with each other, that they > cannot be sniffed, don't you? > > You might read up on ethernet switching technology a bit before > answering that. I'm sorry to be the one to make this remark but it's you who needs to read a bit to learn (a) how to sniff traffic off most Ethernet switches from D-Link to Cisco; (b) what other security risks unprotected NFSv3 shares pose.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?cb5206420701180025t33de5399q11a8b96f6322a964>