| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: maxthon browser exploit |
From: Mike N. On Mon, 4 Apr 2005 23:33:37 -0400, "Geo" wrote: >But I do have a question, if using bridged mode, aren't they all >basically on the same ethernet segment so they see each other's broadcast >traffic? In other words if it's a bunch of windows boxes with no firewalls >couldn't they browse to each other? There is an older style bridged configuration that is pure bridged mode (IRB) that works as you describe above. It is appropriate only when the ISP installs, configures, and controls both the modem and a router/firewall. Nearly everyone now uses RBE in which every circuit is a separate network and they receive only the traffic that gets routed to them and broadcasts are suppressed. A malicious user can guess a neighboring IP address and send packets using that IP. However he cannot receive any replies because replies will go to the rightful owner. (I don't think there is a Source Address Assurance filter per circuit with RBE). A DSL aggregator router may have SAA though. --- BBBS/NT v4.01 Flag-5* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45) SEEN-BY: 633/267 270 5030/786 @PATH: 379/45 1 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.