G'day...

Howard said
> > I have been doing some reading on Linux ethernet bridging - 
> brctl and 
> > ebtables - and I can see how it could be used covertly on a network.
> >
> > What I would be interested to know is any examples where it has 
> > legitimate use on a fully owned and managed network that 
> could not be 
> > achieved by other means.

Have to say that Oscar provided a great discussion.


Some examples I'd give would be:

        a) traffic analysis  (what type of traffic is going where, an
applied purpose may be to shape or prioritise traffic appropriately)
        b) network intrusion detection system (detect if anyone gains
unauthorised access to the network and gather as much information as
possible)
        c) program debugging (viewing actual behaviour vs expected
behaviour)
        d) egineering/reverse engineering/interoperability (what
communication is occuring, can we recognise patterns / cause and effect
that allow us to be able to create an application/protocol that is
interoperable)

Also, FWIW, a hub is a bridging device that echoes everything it
receives on one port on all other ports whilst a switch is a bridging
device that maintains a table of what address is connected to what port
and (where possible) only echoes what it receives on one port onto the
appropriate port (it does this through a process of observation).

All the best...

Regards,
Michael Kraus
Software Developer
[EMAIL PROTECTED]
Direct Line 02 8306 0007
 


--------------------------------------------------------------------------------

Wild Technology Pty Ltd , ABN 98 091 470 692
Sales - Ground Floor, 265/8 Lachlan Street, Waterloo NSW 2017
Admin - Level 4 Tiara, 306/9 Crystal Street, Waterloo NSW 2017
Telephone 1300-13-9453 |  Facsimile 1300-88-9453
http://www.wildtechnology.net
DISCLAIMER & CONFIDENTIALITY NOTICE:  The information contained in this email 
message and any attachments may be confidential information and may also be the 
subject of client legal - legal professional privilege. If you are not the 
intended recipient, any use, interference with, disclosure or copying of this 
material is unauthorised and prohibited.   This email and any attachments are 
also subject to copyright.  No part of them may be reproduced, adapted or 
transmitted without the written permission of the copyright owner.  If you have 
received this email in error, please immediately advise the sender by return 
email and delete the message from your system.


--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

Reply via email to