I’m using FreeRTOS+TCP for a TI TMS570LS3137 chip. It’s working very good.
At the moment I’m making some tests for the TCP/IP stack and MAC driver. One test is to send many ARP reply packages from a Win10 PC. I noticed that the data (MAC address and IP address) of these packages are taken to the ARP table without restrictions (except the subnet mask).
I’m not an expert of network stacks, but this can be dangerous because then other UDP packages will be send to another node. (I learned that this is known as ARP spoofing attack)
I also do not know if this can be prevent by the FreeRTOS+TCP stack or if other stacks prevents this. Googling this attack shows that, for example Linux, ignores ARP reply packages without an ARP request package.
Can this also be done in FreeRTOS+TCP stack?
Thanks and best regards