From mboxrd@z Thu Jan 1 00:00:00 1970 From: Topher Fischer Subject: ARP Spoofing Date: Wed, 02 May 2007 11:44:13 -0600 Message-ID: <4638CDED.4020100@cs.byu.edu> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="------------enigD77B971FB419751992C50115" To: netdev@vger.kernel.org Return-path: Received: from mead.cs.byu.edu ([128.187.80.29]:34115 "EHLO mail.cs.byu.edu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1766935AbXEBRpJ (ORCPT ); Wed, 2 May 2007 13:45:09 -0400 Received: from [192.168.1.112] (c-67-161-222-31.hsd1.ut.comcast.net [67.161.222.31]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.cs.byu.edu (Postfix) with ESMTP id 57178AB4644 for ; Wed, 2 May 2007 11:45:08 -0600 (MDT) Sender: netdev-owner@vger.kernel.org List-Id: netdev.vger.kernel.org This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigD77B971FB419751992C50115 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Does the kernel have any protection against ARP spoofing? If not, does anybody know why not? (As in, nobody has done anything, or because of A, B, and C). Thanks, --=20 Topher Fischer GnuPG Fingerprint: 3597 1B8D C7A5 C5AF 2E19 EFF5 2FC3 BE99 D123 6674 javert42@cs.byu.edu | http://www.thetopher.com --------------enigD77B971FB419751992C50115 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (GNU/Linux) Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org iD8DBQFGOM3vL8O+mdEjZnQRAot0AJ9dCMVMnZjUlqt41SejwgRmwbTjJwCeJ791 A9gx7AH3230y6nJ7GAiOmh4= =+3UC -----END PGP SIGNATURE----- --------------enigD77B971FB419751992C50115--