Re: Disabling Promisc mode,

Paul Flinders (paul@dawa.demon.co.uk)
27 May 1998 21:28:54 +0100


David Woodhouse <Dave@imladris.demon.co.uk> writes:

> > Don't give root access to people you can't trust.
>
> That's a fine plan if you can guarantee it. However, if someone _does_ get root
> access to a box on a sensitive subnet, then it's nice to know they can't start
> a packet sniffer without recompiling the kernel and rebooting.
>
> Our University Computing Service has already suffered this kind of attack once
> on their main server backbone, when a Solaris box was hacked. If promiscuous
> mode isn't required, then it's entirely sensible to make it completely
> impossible.
>
> I'd like to see a CONFIG_DISABLE_PROMISC option, and will probably hack one
> together next week.
>
> For now, look through net/core/dev.c and muck about with dev_set_promiscuity()

Surely if you're that worried the correct solution is to use a
switched hub so that only packets destined for each machine go down
the wire?

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu