Vulnerability Development mailing list archives
Re: mac duplication
From: Valdis.Kletnieks () vt edu
Date: Mon, 15 Dec 2003 12:05:33 -0500
On Sat, 13 Dec 2003 23:23:57 CST, "Burton M. Strauss III" <BStrauss () acm org> said:
That's also not to say you can't spoof the address, but even then, if you override it, you're SUPPOSED to set the LLA bit (i.e. a LLA address is
See http://www.ietf.org/rfc/rfc3514.txt
Attachment:
_bin
Description:
Current thread:
- mac duplication Dev (Dec 12)
- Re: mac duplication Miles Stevenson (Dec 12)
- RE: mac duplication Burton M. Strauss III (Dec 12)
- RE: mac duplication Peter Moody (Dec 15)
- RE: mac duplication Burton M. Strauss III (Dec 15)
- Re: mac duplication Valdis . Kletnieks (Dec 15)
- Re: mac duplication dreamwvr () dreamwvr com (Dec 15)
- RE: mac duplication Peter Moody (Dec 15)
- Re: mac duplication Sam Baskinger (Dec 12)
- Re: mac duplication Jimi Thompson (Dec 13)
- Re: mac duplication fooler (Dec 15)
- RE: mac duplication David Gillett (Dec 15)
- RE: mac duplication Dom De Vitto (Dec 15)
- Re: mac duplication Peter Moody (Dec 15)
- <Possible follow-ups>
- RE: mac duplication Boyer, G. T. IT2 ISSM Office (Dec 15)
- RE: mac duplication Demar, Jeremy D CTM1 (CCDG12 Aug) (Dec 15)
- RE: mac duplication Glenn_Everhart (Dec 15)