Vulnerability Development mailing list archives
Re: Possible DHCP DOS attack
From: sen_ml () ECCOSYS COM (Sen_Ml Sen_Ml)
Date: Fri, 4 Feb 2000 17:10:23 +0900
paul> 3)You should always be able to track an offending mac down paul> to at least a switch port, and if you are using managed paul> hubs, then a hub port too. The thing is that you are making paul> up your MACs in this case, and they are only used very paul> briefly, so they will likely have timed out in the switches paul> and hubs by the time the admin gets around to looking for paul> them. as far as the dhcp dos attack is concerned, does configuring the dhcp servers to only hand out ip addresses to registered mac addresses work for you? my guess would be no ;-) it doesn't do anything to stop people from just assigning themselves an ip address and it's a pain to administer for large sites, but fwiw it's what i do for small networks.
Current thread:
- Re: Possible DHCP DOS attack Tal Hornstein (Feb 03)
- Re: Possible DHCP DOS attack Paul Keefer (Feb 03)
- Re: Possible DHCP DOS attack Sen_Ml Sen_Ml (Feb 04)
- Re: Possible DHCP DOS attack Vladimir Dubrovin (Feb 04)
- Re: Possible DHCP DOS attack Blue Boar (Feb 04)
- how to transfer files on napster Jason Copenhaver (Feb 05)
- Re: how to transfer files on napster Jordan Ritter (Feb 05)
- Re: how to transfer files on napster Blue Boar (Feb 05)
- Re: how to transfer files on napster Seth Georgion (Feb 05)
- Re: how to transfer files on napster whitvamp () MINDLESS COM (Feb 05)
- Re: how to transfer files on napster Jordan Ritter (Feb 05)
- Re: how to transfer files on napster Blue Boar (Feb 07)
- Re: how to transfer files on napster David U. (Feb 07)
- Re: Possible DHCP DOS attack Paul Keefer (Feb 03)