On 10/31/07 13:26, Matt Zagrabelny wrote:
If so, you can do MAC filtering (performance shouldn't matter as the
MAC address is in the link header), if not MAC filtering won't buy
you much, the layer2 address will always be the same.
Agreed.
However this can also be extended to help prevent spoofing in a routed
network. If you know that a given subnet is available via a given
router or routers you can only accept the packet if the source IP is
coming from said router's MAC address. Thus preventing someone else in
a different subnet from spoofing the source IP address. Or for those of
us who like to run basic layer 3 filtering on all routers that would
prevent such spoofed addresses, you can prevent someone from spoofing IP
addresses with in the core network, i.e. backbone LAN trying to claim to
be someone else.
This can and will work fairly well, though you have to be aware that
this is in effect if you ever change MAC addresses of routers.
If you are going to go this route, I'd suggest that you use your own
private OUI MAC addresses on routers. This way you know that you need
to alter the MAC on the routers when you put them in place to support
your security model.
This is essentially the difference between ARP and IP, or switching
and routing if you prefer.
*nod*
Or brouting (bridging / routing combination) if you so choose to go there.
Grant. . . .
-
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html