> On Oct 26, 2020, at 1:05 PM, Ted Lemon <mel...@fugue.com> wrote:
> 
> On Oct 26, 2020, at 12:59 PM, Toerless Eckert <t...@cs.fau.de> wrote:
>> The networks where i am worried are not home networks,
>> but something like an office park network, where supposedly each
>> tenant (company) should have gotten their disjoint L2 domains, ... and then
>> they didn't. And one of the tenants has a "funny" network engineer/hacker.
> 
> That’s pretty clearly the thing to fix.
> 

There’s plenty of bad engineering out there, but when on a shared lan without 
client isolation enabled (Eg: wireless) many bad things can be done.

I think explaining that the threat domain is the layer-2 and that 
administrators should consider what services are available, eg: do you accept 
dhcp server on the network, what devices are permitted to send RA’s etc all 
become part of the question..

Much of this is just operational guidance in how to run a good network which 
prevents these types of bad behaviors and consequences from exceeding their 
blast radius.

- Jared
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to