On Sun, May 07, 2006 at 12:39:44AM +0100, Stuart Henderson wrote:
> On 2006/05/06 11:49, S t i n g r a y wrote:
> > & as i am using a network in which i dont have control
> > over users PC & cannot use service authentication i am
> > stuck with ip & mac filtering.
>
> Look at authpf(8), it's much _much_ safer than what you suggest

I have looked into authpf(8) before and understand how it works, but the 
following excerpt from the BUGS section of the man page puzzles me 
somewhat:

        The authenticating ssh(1) connection may be secured, but if the 
        network is not secured the user may expose insecure protocols to 
        attackers on the same network, or enable other attackers on the 
        network to pretend to be the user by spoofing their IP address.

If IP spoofing is still a concern with authpf(8), what makes it an 
improvement over IP filtering?  I can believe it *is* an improvement, 
I am just curious *how* in light of the above warning.

For example, a spoofer would have to fake the IP address of a current 
legitimate user, and I expect this makes certain attacks more difficult, 
but they could still easily send UDP datagrams (e.g. to poison a DNS 
cache), right?

A quick googling and mailing list search gave plenty of hits for 
configuring authpf, but I did not find anything specifically related to 
the above.

Reply via email to