Jim Ray [[EMAIL PROTECTED]] wrote:
> Having that degree of granularity at the mac level darn sure eliminates
> ip spoofing as a root cause of security breech...until someone comes up
> with mac spoofing.

Uh, someone has come up with mac spoofing.  It's not terribly difficult.
Once you're crafting packets, it's not tough to alter the mac fields and
dump the result out on the wire.

Mike
-- 
"If life hands you lemons, YOU BLOW THOSE LEMONS TO BITS WITH 
 YOUR LASER CANNONS!" -- Brak

GNUPG Key fingerprint = ACD2 2F2F C151 FB35 B3AF  C821 89C4 DF9A 5DDD 95D1
GNUPG Key = http://www.enoch.org/mike/mike.pubkey.asc

Attachment: msg06611/pgp00000.pgp
Description: PGP signature

Reply via email to