Vulnerability Development mailing list archives

Re: spoofing the ethernet address


From: timothy.miller () AFIWC01 AF MIL (Timothy J. Miller)
Date: Mon, 13 Mar 2000 07:36:31 -0600


"Buhrmaster, Gary" <gtb () SLAC STANFORD EDU> writes:

It is my hazy recollection that while some TR cards didn't
have a promiscuous mode, the important item was that the
specification required that if you enabled promiscuous
mode, the card was supposed to announce that fact on the
ring so that everyone now knew that someone was listening
(and the "management station" could go out and smack someone).

Correct.

Of course there were ways to get around that announcement,
there always are, but it showed some thought about the
issues.

In my experience, TR cards are fairly notorious for not doing what
they're supposed to.  For example, we had a condition on one of our
rings where MAC address test packets were being incorrectly responded
to, but only certain revisions of the TR cards on the ring were
properly kicking themselves out.  *That* one took some time to figure
out, (using a TR sniffer, as it happened) let me tell you.  8/


Current thread: