Linux Security Cookbook [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Linux Security Cookbook [Electronic resources] - نسخه متنی

Daniel J. Barrett, Robert G. Byrnes, Richard Silverman

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید










Recipe 2.11 Controlling Access by MAC Address



2.11.1 Problem


You want only a particular machine,
identified by its MAC address, to access your system.


2.11.2 Solution


# iptables -F INPUT
# iptables -A INPUT -i lo -j ACCEPT
# iptables -A INPUT -m mac --mac-source 12:34:56:89:90:ab -j ACCEPT
# iptables -A INPUT -j REJECT

ipchains does not support this feature.


2.11.3 Discussion


This technique works only within your local subnet. If you receive a
packets from a machine outside your subnet, it will contain your
gateway's MAC address, not that of the original
source machine.


MAC
addresses can be spoofed. Suppose you have a machine called

mackie whose MAC address is
trusted by your firewall. If an intruder discovers this fact, and

mackie is down, the intruder
could spoof

mackie 's MAC address
and your firewall would be none the wiser. On the other hand, if

mackie is up during the
spoofing, its kernel will start screaming (via
syslog) about duplicate MAC addresses.

Note that our recipe permits local connections from your own host;
these arrive via the loopback interface.


2.11.4 See Also


iptables(8), ipchains(8).

/ 247