Hi,

On Mon, May 05, 2014 at 06:38:35PM +0000, Andy Wang wrote:
> with that in hand, I would consider mac-cert-remoteipandport have a very 
> strong binding and it is not easy to break it by just ARP spoofing.

*ARP* spoofing does not target the "switch" (OpenVPN) but the communication
endpoints.

You tell A "the mac address for B is C".

You tell B "the mac address for A is C".

And both will happily send all their packets for each other to *C*.

No L2 switch will be able to notice that anything unusual is happening, and
only very few L3 switches can filter this.

gert
-- 
USENET is *not* the non-clickable part of WWW!
                                                           //www.muc.de/~gert/
Gert Doering - Munich, Germany                             g...@greenie.muc.de
fax: +49-89-35655025                        g...@net.informatik.tu-muenchen.de

Attachment: pgpbYPfAcV5oH.pgp
Description: PGP signature

------------------------------------------------------------------------------
Is your legacy SCM system holding you back? Join Perforce May 7 to find out:
• 3 signs your SCM is hindering your productivity
• Requirements for releasing software faster
• Expert tips and advice for migrating your SCM now
http://p.sf.net/sfu/perforce
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to