Is there a way to filter ARP on an OpenBSD bridge firewall joining a
bunch of ethernet ports with their own VLANs? I'm horrified by the
shared ethernet segments some organizations use for access among
mutually un-trusting people.

Currently pf does allow me to prevent L3 games, but it seems like
it's still possible to deny service by responding to another port's IP
address, so the router will learn the wrong MAC address and the packets
will be dropped by pf since they have the wrong IP destination for that
port.

I'm aware of static ARP, MAC filtering on the switch and DHCP snooping.
I'm not too keen on trusting the latter, and the former two are a
nightmare to manage (and I'd like to be able to use DHCP to hand out
static addresses to some clueless people, while not forcing DHCP on
some machines.)

I also would rather avoid wasting obscene amounts of IP addresses by
giving each vlan its own subnet.

This is the classic "hotel" scenario, for which I can find many
dissatisfactory solutions (either DHCP snooping or cisco "private" vlans
that won't allow communication within the subnet without silly proxy arp
hacks on the router), and scary examples of shared ethernet segments
with windows broadcasts storming in...

General ideas on securing ethernet are also welcome (I don't really like
the idea of having separate servers sharing a subnet, either - and we
had a discussion about the wrong solutions a while ago.)

-- 
Jussi Peltola

Reply via email to