On Oct 5, 2010, at 3:34 PM, Scott Lewis wrote: > This isn't really related to bridging. If your machine connects to an > access point (rogue) and that person behind that access point roots > your box, and you also are connected via LAN, that person has access > to your LAN without physical building access.
OK this is really wild and misguided concern. First how did this rogue WiFi point penetrate your building physical security? Second, how did this black hat "root kit" the Mac? It's not like there are any real exploits to be concerned about. Third your Mac isnt' just going to magically join a rouge access point unless you confiure it to join networks automatically, so just turn off that feature. Forth have you heard of routing? And packet forwarding is turned off unless it was very explicitly enabled by someone very familiar with sysctl. > No, I don't think it > would be very common, but they are subject to many audits, as they are > subject to PCI audits, HIPPA and SOX, so lots of odd things come up. > :) Common? Unheard of is more like it. > The simplest explanation I can think of is if you have ssh on, and I > somehow get access via that on a wireless connection named link sys > that your mac happily joined, Except this is not how joining is determined. So it's a bogon. > and you are plugged into a network via > Ethernet, with actively mounted fileshares, might not I be able to > access those shares? By what mystical magicks? This is seriously just paranoia and woolly thinking. -d ------------------------------------------------------------------------ Dan Shoop Computer Scientist [email protected] GoogleVoice: 1-646-402-5293 aim: iWiring twitter: @colonelmode _______________________________________________ MacOSX-admin mailing list [email protected] http://www.omnigroup.com/mailman/listinfo/macosx-admin
