On Tue, 30 Apr 2002 [EMAIL PROTECTED] wrote: > It's too trivial to spoof a MAC though. If you're relying upon this > for some type of secure transaction, I wouldn't trust a MAC as the > GUID. > > What about using an SSH or GPG key, an md5 hash somehow?
Paul has an excellent point. MAC's are perfect if this is something that you may need to muck around with and you don't really need to be secure, you just want something relatively reliably unique. You may need the ability to swap a box out temporarily and force the MAC to the original box. An SSL certificate or any asymmetrical keypair would be a more secure solution, if that's what the design calls for, however. Ben -- To know the road ahead, ask those coming back. ***************************************************************** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *****************************************************************
