Security Basics mailing list archives

RE: CSMA/CD


From: "Stuart" <secmail () patchsupplier dyndns org>
Date: Mon, 25 Aug 2003 19:56:27 +0100

So technically, a specially crafted cat5 cable with rj45 jack connected
to a hub with some sort of power source active to send the same amount
of voltage as a network card on the send line of the cable would disrupt
the collision domain?

Stu

-----Original Message-----
From: Greg Holl [mailto:gholl () tp devry edu] 
Sent: 22 August 2003 05:10
To: Security-basics () securityfocus com
Subject: RE: CSMA/CD


Does this mean that IF you were to write this program, you'd actually

need to rewrite a part of the tcp/ip protocol stack?

 As someone else has pointed out, this is probably normally done as
part of the Ethernet >port hardware.  At best, it might be in driver
code.  Since Ethernet can be used to carry >AppleTalk, DECNet, IPX, etc,
it's not in the TCP/IP part of the stack.

This is done at the hardware level.  Think of the OSI model.  Collisions
take place at the physical layer.  CSMA/CD is an access methodology,
which is located at the physical layer.   Appletalk, DECNet, IPX,
TCP/IP, etc are suites of protocols existing at layer 3 and above.   You
can technically run these protocols on a CSMA/CA network (i.e. Token
Ring), because the protocol stacks don't really care what is happening
at the physical layer.  So, like David said, the closest you could come
to this type of disruption would be a DoS attack (which is generally a
layer 7 occurance).

-Greg

------------------------------------------------------------------------
---
------------------------------------------------------------------------
----


________________________________________________________________________
This email has been scanned for all viruses by the MessageLabs Email
Security System. For more information on a proactive email security
service working around the clock, around the globe, visit
http://www.messagelabs.com
________________________________________________________________________

------------------------------------------------------------------------
---
Attend Black Hat Briefings & Training Federal, September 29-30
(Training), 
October 1-2 (Briefings) in Tysons Corner, VA; the world's premier 
technical IT security event.  Modeled after the famous Black Hat event
in 
Las Vegas! 6 tracks, 12 training sessions, top speakers and sponsors.  
Symantec is the Diamond sponsor.  Early-bird registration ends September
6.Visit us: www.blackhat.com
------------------------------------------------------------------------
----



---------------------------------------------------------------------------
Attend Black Hat Briefings & Training Federal, September 29-30 (Training), 
October 1-2 (Briefings) in Tysons Corner, VA; the world's premier 
technical IT security event.  Modeled after the famous Black Hat event in 
Las Vegas! 6 tracks, 12 training sessions, top speakers and sponsors.  
Symantec is the Diamond sponsor.  Early-bird registration ends September 6.Visit us: www.blackhat.com
----------------------------------------------------------------------------


Current thread: