lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1429184073.12901.34.camel@transmode.se>
Date:	Thu, 16 Apr 2015 11:34:34 +0000
From:	Joakim Tjernlund <joakim.tjernlund@...nsmode.se>
To:	"netdev@...r.kernel.org" <netdev@...r.kernel.org>
Subject: pppoe relay and MAC address filtering

I have create pppoe session over a pppoe relay socket:
A B and C are Linux nodes, B impl. a relay socket so
that A and B can create a pppoe session:

A ifA---------ifB0 B ifB1----------ifC C

Now I noticed that if ifB0 is in promisc mode it picks up other pppoe pkgs which
are meant for some other pppoe session to another node(D) and relays this
pkg to node C!

To me this looks like the pppoe relay socket does not check if the DST MAC on
pppoe pkgs received over ifB0 matches ifB0 MAC address?
Instead the relay socket happily relays any pppoe pkg as long as the session id matches.

This feels like a bug to me, comments?

  Jocke--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ