haven't checked this one out
yet)...
and by analyzing broadcast traffic you might be able to
get existing MACs on the network and spoof hosts easily.
this is a big deal for wireless based communications
On Saturday 09 August 2003 17:18, White-Tiger wrote:
I am sorry I got on this late... Some
If you are in a switched network... some switches support
snmp traps for link up/down.
if port 12 is unused... and you get a trap that is just
went UP... the bingo... someone is on. also... you get set
it up so that if yoiu have a workstation with a link that
goes down/up/down/ or some
I am sorry I got on this late... Some switches support
eapol
that works with a radius server to auth mac address at port
level before the switch will enable that port... I have
done limited testing. If you unplug a live connect, not
only will someone be calling saying that something doesn't
work,
I have to nic on the same switch right now... running
openbsd3.2-stable.
For the first couple of hours/days I got tons of messages
saying that the arp data was being updated by the first NIC
and then a while later it was back to the second NIC..
If you want fail-over, the second NIC in your
Just another .2$
in the ports there is pgpsendmail. Havn't tried it yet,
but what that will do for you is automagicly pgp encrypt
and decrypt email for anyone that you have there public key
in your keyring.
that way the users do not have to worry about it.
also. look into sendmail's TLS
that