Cable Modem [really responsible engineering]
Wojtek Zlobicki
wojtekz at idirect.com
Wed Jun 27 13:05:05 UTC 2001
Having tried the utility, I guess I need to put my foot in my mouth (please
disregard my previous message)... I wonder how arping is able to get around
the MAC broadcast filters. Very dangerous tool !!
----- Original Message -----
From: "PJ" <briareos at otherlands.net>
To: "Wojtek Zlobicki" <wojtekz at idirect.com>
Cc: <nanog at merit.edu>
Sent: Wednesday, June 27, 2001 5:04 AM
Subject: Re: Cable Modem [really responsible engineering]
> On Tue, 26 Jun 2001, Wojtek Zlobicki wrote:
>
> >
> >
> > ----- Original Message -----
> > From: "Chris Adams" <cmadams at hiwaay.net>
> > To: <nanog at merit.edu>
> > Sent: Tuesday, June 26, 2001 9:20 PM
> > Subject: Re: Cable Modem [really responsible engineering]
> >
> > >
> > > Also, how do you prevent the user from trying to forge someone else's
> > > IP address or even MAC address in outgoing packets? Without
protecting
> > > against forged packets, I don't see how to provide accountability when
> > > someone attacks.
> >
> > How would anyone find out anothers MAC. As long as you seperate each
> > customer into their own bridge group, there is no way for them to find
> > anothers MAC. As for forging IP's not much you can do about that. MAC
> > address access list.. do they exists ?
> >
> >
>
> There is a neat little utility called arping that can return the MAC
address of a
> specified IP. Comes in handy for bypassing MAC address filters.
>
> PJ
>
> --
> Security is mostly a superstition. It does not exist in nature.
> -- Helen Keller
More information about the NANOG
mailing list