lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <42D2CA87.8020300@csuohio.edu> Date: Mon Jul 11 20:38:43 2005 From: michael.holstein at csuohio.edu (Michael Holstein) Subject: how to bypass rouge machine detection techniques > now i am just wondering if the detection technique can be integrated > at the switch level. for example, one software can connect to switch > via ssh, and collect the ipaddress information of the machine trying > to plug in to the network, as soon as we detect this machine, we can > connect to it to test whether its a part of trusted domain/network or > not. http://www.cisco.com/univercd/cc/td/doc/product/lan/cat4000/12_1_13/config/dhcp.htm Not 100% of what you asked, but basically requires the device "obey" the trusted DHCP server you define. It's only available on certian edge switches (notably the 35xx and some 29xx units) AFIK. Cheers, ~Mike.
Powered by blists - more mailing lists