I'd create a pool, put that MAC in the pool, and then use
 
subnet 192.168.9.0 netmask 255.255.255.0 {
  range 192.168.9.125 192.168.9.200;
   deny members of "pool";
   option subnet-mask 255.255.255.0;
   option broadcast-address 192.168.9.255;
   ...
}

That way you can use the pool for other uses, like denying any MAC that is 
insecure, not paid their bills, etc.

Dave


-----Original Message-----
From: [email protected] [mailto:[email protected]] On 
Behalf Of Tim Evans
Sent: Friday, July 16, 2010 3:52 PM
To: Red Hat Enterprise Linux 5 (Tikanga) discussion mailing-list
Subject: [rhelv5-list] Deny DHCP Address by MAC Address?

A .EDU with insecure offices, network outlets, and labs, is trying to 
track down a rogue DHCP client on their network that also happens to be 
infected with conficker.

They have a completely open DHCP setup:

ddns-update-style ad-hoc;
authoritative;
subnet 192.168.9.0 netmask 255.255.255.0 {
  range 192.168.9.125 192.168.9.200;
   option subnet-mask 255.255.255.0;
   option broadcast-address 192.168.9.255;
   option routers 192.168.9.1;
   option domain-name-servers 192.168.9.4;
   option domain-name "xxx.xxx.xxx";
}

Any connected machine can get an address from the range specified in the 
config file. Bouncing this one's lease merely results in it getting a 
new one.

They know the rogue machine's MAC address, of course.  Can they deny it 
a DHCP address based only on the MAC? How?
-- 
Tim Evans, TKEvans.com, Inc.    |   5 Chestnut Court
UNIX System Admin Consulting    |   Owings Mills, MD 21117
http://www.tkevans.com/         |   443-394-3864
http://www.come-here.com/News/  |   [email protected]

_______________________________________________
rhelv5-list mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/rhelv5-list

_______________________________________________
rhelv5-list mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/rhelv5-list

Reply via email to