A .EDU with insecure offices, network outlets, and labs, is trying to track down a rogue DHCP client on their network that also happens to be infected with conficker.

They have a completely open DHCP setup:

ddns-update-style ad-hoc;
authoritative;
subnet 192.168.9.0 netmask 255.255.255.0 {
 range 192.168.9.125 192.168.9.200;
  option subnet-mask 255.255.255.0;
  option broadcast-address 192.168.9.255;
  option routers 192.168.9.1;
  option domain-name-servers 192.168.9.4;
  option domain-name "xxx.xxx.xxx";
}

Any connected machine can get an address from the range specified in the config file. Bouncing this one's lease merely results in it getting a new one.

They know the rogue machine's MAC address, of course. Can they deny it a DHCP address based only on the MAC? How?
--
Tim Evans, TKEvans.com, Inc.    |   5 Chestnut Court
UNIX System Admin Consulting    |   Owings Mills, MD 21117
http://www.tkevans.com/         |   443-394-3864
http://www.come-here.com/News/  |   [email protected]

_______________________________________________
rhelv5-list mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/rhelv5-list

Reply via email to