> The aforementioned bug's evaluation makes a cryptic reference to this > "feature" being used by "security-conscious" customers, but I don't see > how that can possibly be legitimate. Maybe someone who is more > security-conscious than I can shed some light on that evaluation.
I suppose if you wanted to ensure a given host (A) can only be reached by a subset of other hosts, you could explicitly configure the ARP table of those other hosts and delete the ARP entry from host A. -- meem _______________________________________________ networking-discuss mailing list [email protected]
