Vulnerability Development mailing list archives

Re: spoofing the ethernet address


From: gtb () SLAC STANFORD EDU (Buhrmaster, Gary)
Date: Mon, 6 Mar 2000 09:49:31 -0800


-----Original Message-----
From: Trevor Schroeder [mailto:tschroed () ZWEKNU ORG]
Sent: Thursday, March 02, 2000 8:19 PM
To: VULN-DEV () SECURITYFOCUS COM
Subject: Re: spoofing the ethernet address
.....
On the other hand, IBM's TR adapters don't have a promiscuous
mode.  Is
this perhaps what you're thinking of?

It is my hazy recollection that while some TR cards didn't
have a promiscuous mode, the important item was that the
specification required that if you enabled promiscuous
mode, the card was supposed to announce that fact on the
ring so that everyone now knew that someone was listening
(and the "management station" could go out and smack someone).

Of course there were ways to get around that announcement,
there always are, but it showed some thought about the
issues.

Gary


Current thread: