On Tue, 30 Apr 2002 [EMAIL PROTECTED] wrote:
> It's too trivial to spoof a MAC though.  If you're relying upon this 
> for some type of secure transaction, I wouldn't trust a MAC as the 
> GUID.
> 
> What about using an SSH or GPG key, an md5 hash somehow?

Paul has an excellent point.  MAC's are perfect if this is something that 
you may need to muck around with and you don't really need to be secure, 
you just want something relatively reliably unique.  You may need the 
ability to swap a box out temporarily and force the MAC to the original 
box.  

An SSL certificate or any asymmetrical keypair would be a more secure 
solution, if that's what the design calls for, however.

Ben

-- 

To know the road ahead, ask those coming back. 


*****************************************************************
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*****************************************************************

Reply via email to