Announcement

Collapse
No announcement yet.

Linux Vendors Warn of Flaws

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • #61
    Wombat: Switched Network.
    Hey, Donny! We got us a German who wants to die for his country... Oblige him. - Lt. Aldo Raine

    Comment


    • #62
      Originally posted by Wulfman
      small version of "Never underestimate the bandwidth of a station wagon full of tapes."?

      mfg
      wulfman
      But the latency, the latency...

      AZ
      There's an Opera in my macbook.

      Comment


      • #63
        apparently latency is not important as their admins are quite prone to that. see, the telnet vs ssh issue hasn't reached them yet...

        Comment


        • #64
          Originally posted by MultimediaMan
          Wombat: Switched Network.
          So what? All I have to do is watch one piece of wire to get a password. Then I can jump in anywhere. If you're only running telnet, then you have no idea if any given client has been tampered with.
          Gigabyte P35-DS3L with a Q6600, 2GB Kingston HyperX (after *3* bad pairs of Crucial Ballistix 1066), Galaxy 8800GT 512MB, SB X-Fi, some drives, and a Dell 2005fpw. Running WinXP.

          Comment


          • #65
            There are several ways to sniff a switched network. So a switched network is definatly not secure.
            Main: Dual Xeon LV2.4Ghz@3.1Ghz | 3X21" | NVidia 6800 | 2Gb DDR | SCSI
            Second: Dual PIII 1GHz | 21" Monitor | G200MMS + Quadro 2 Pro | 512MB ECC SDRAM | SCSI
            Third: Apple G4 450Mhz | 21" Monitor | Radeon 8500 | 1,5Gb SDRAM | SCSI

            Comment


            • #66
              Now what we have here has moved away from a practical matter to a matter of opinion. I'm not arguing that an inline sniffer could be made to do this, but the *Only* way to do that would be to gain physical access to the box. Please Take Note: many Unix boxes will shut down an interface and *not* bring it back up if it loses a physical connection. If you have physical access, SSH is not a factor (You've got Bigger Problems, at that point).

              KeiFront: As far as trying to sniff from a remote area of the network, have fun. The only practical way would be to get an inline sniffer on the backbone and hope you hear something, but doing that would *definitely* attract notice just from the interruption. VLans is another subject I have not broached, and it shouldn't take any imagination to see how those can be used to further segment a switched network.

              This subject has been discussed many times internally, as I found out last week (I took the opportunity to ask about it when conferring with a Network Engineer about another problem).
              Hey, Donny! We got us a German who wants to die for his country... Oblige him. - Lt. Aldo Raine

              Comment


              • #67
                You KNOW that the biggest threat is from ppl working on the INSIDE right?

                Comment


                • #68
                  Yes, I do, and yes, it has been addressed.
                  Hey, Donny! We got us a German who wants to die for his country... Oblige him. - Lt. Aldo Raine

                  Comment


                  • #69
                    Ok guys, stop picking on him. He can't say to much about what they do to address the issue.

                    Also the control over how it's done is well and truely out of his hands.
                    Juu nin to iro


                    English doesn't borrow from other languages. It follows them down dark alleys, knocks them over, and goes through their pockets for loose grammar.

                    Comment

                    Working...
                    X