Jim Ray [[EMAIL PROTECTED]] wrote: > Having that degree of granularity at the mac level darn sure eliminates > ip spoofing as a root cause of security breech...until someone comes up > with mac spoofing.
Uh, someone has come up with mac spoofing. It's not terribly difficult. Once you're crafting packets, it's not tough to alter the mac fields and dump the result out on the wire. Mike -- "If life hands you lemons, YOU BLOW THOSE LEMONS TO BITS WITH YOUR LASER CANNONS!" -- Brak GNUPG Key fingerprint = ACD2 2F2F C151 FB35 B3AF C821 89C4 DF9A 5DDD 95D1 GNUPG Key = http://www.enoch.org/mike/mike.pubkey.asc
msg06611/pgp00000.pgp
Description: PGP signature
