Cable Modem [really responsible engineering]

Wojtek Zlobicki wojtekz at idirect.com
Wed Jun 27 13:05:05 UTC 2001


Having tried the utility, I guess I need to put my foot in my mouth (please
disregard my previous message)...  I wonder how arping is able to get around
the MAC broadcast filters.  Very dangerous tool !!


----- Original Message -----
From: "PJ" <briareos at otherlands.net>
To: "Wojtek Zlobicki" <wojtekz at idirect.com>
Cc: <nanog at merit.edu>
Sent: Wednesday, June 27, 2001 5:04 AM
Subject: Re: Cable Modem [really responsible engineering]


> On Tue, 26 Jun 2001, Wojtek Zlobicki wrote:
>
> >
> >
> > ----- Original Message -----
> > From: "Chris Adams" <cmadams at hiwaay.net>
> > To: <nanog at merit.edu>
> > Sent: Tuesday, June 26, 2001 9:20 PM
> > Subject: Re: Cable Modem [really responsible engineering]
> >
> > >
> > > Also, how do you prevent the user from trying to forge someone else's
> > > IP address or even MAC address in outgoing packets?  Without
protecting
> > > against forged packets, I don't see how to provide accountability when
> > > someone attacks.
> >
> > How would anyone find out anothers MAC.  As long as you seperate each
> > customer into their own bridge group, there is no way for them to find
> > anothers MAC.  As for forging IP's not much you can do about that.  MAC
> > address access list.. do they exists ?
> >
> >
>
> There is a neat little utility called arping that can return the MAC
address of a
> specified IP.  Comes in handy for bypassing MAC address filters.
>
> PJ
>
> --
> Security is mostly a superstition.  It does not exist in nature.
> -- Helen Keller




More information about the NANOG mailing list