Re: RADIUS

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



Richard Grainger wrote:
On Fri, Feb 23, 2018 at 11:25 AM, hw <hw@xxxxxxxx> wrote:

But MAC addresses can be faked, can´t they?

Yes, someone can go to the trouble of obtaining a known corporate MAC
address and MAC-spoofing their personal device so they can PXE-boot a
corporate build on a VLAN that is otherwise useless.  If your
corporate build on it's own is precious enough in itself that you
worry about this eventuality, then make the build server insist on
authentication before the build initiates.

What´s the point in designing a security measure intended to prevent
unauthorized network access in such a way that it can be as easily
circumvented as it is to fake MAC addresses?
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
https://lists.centos.org/mailman/listinfo/centos




[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]


  Powered by Linux