Firewall Wizards mailing list archives
Re: MAC blocking
From: Chuck Swiger <chuck () codefab com>
Date: Mon, 28 Nov 2005 18:21:25 -0500
On Nov 28, 2005, at 5:33 PM, Patrick M. Hausen wrote:
Hi, Chuck!
Hi--
I would say it's not safe to assume that VLANs can be trusted to separate traffic with complete reliability, especially if it is possible for a malicious machine to gain access to a trunk port:But you can eliminate the latter. Disable VTP and even STP for all ports that are connected to hosts - regardless if trusted or untrusted. OTOH this implies that you are in control of the physical environment, i.e. cabling. A datacenter is quite diffent from an office or, say, a school or library network.
Yes, certainly, if you aren't in control of the physical environment, your ability to maintain security is greatly compromised.
As you've said, you can mitigate against VLAN hopping by disabling trunk ports and STP for anything connected to a host, and doing so will work reasonably well, but I do not trust that two machines connected to one switch are truly isolated from each other, because the switch keeps too much state (such as the ARP table, the MAC to port mapping database).
With ARP-spoofing, you can generally confuse the switch about which port a host/MAC addr is actually on and gain access to a VLAN you're not supposed to be on, or at least create a denial-of-service condition....
-- -Chuck _______________________________________________ firewall-wizards mailing list firewall-wizards () honor icsalabs com http://honor.icsalabs.com/mailman/listinfo/firewall-wizards
Current thread:
- Re: MAC blocking Dale W. Carder (Dec 01)
- <Possible follow-ups>
- Re: MAC blocking Chuck Swiger (Dec 01)
