Welcome, Guest. Please login or register.

Author Topic: Secure connections really secure ?  (Read 3222 times)

Description:

0 Members and 1 Guest are viewing this topic.

Offline uncharted

  • Hero Member
  • *****
  • Join Date: Mar 2002
  • Posts: 1520
    • Show only replies by uncharted
Re: Secure connections really secure ?
« Reply #14 from previous page: July 16, 2007, 10:38:44 AM »
Quote

Jose wrote:
All seems pretty straightforward, still a doubt poped up about when using wireless but logged in here today and you guys have already answered that:)

So as I see it, I don't care if anyone spies on the sites that I visit when using wireless connection, cause the ones with sensitive information are encrypted.


Wireless routers can be set up with WPA encryption for an additional layer of security.
 

Offline trip6

  • Sr. Member
  • ****
  • Join Date: Jun 2007
  • Posts: 348
    • Show only replies by trip6
Re: Secure connections really secure ?
« Reply #15 on: July 16, 2007, 10:25:04 PM »
An if using wireless, you can also use mac address filter lists to filter clients with only specific mac addresses to gain access to the wireless connection.

But just as any security, mac addresses can be spoofed. That is why security is a layered approach and why others have recommended WPA for wireless too... So mac address list, WPA or EAP or LEAP and your about as secure as you can get on a wireless connection...

To the guy who was referring to AES-256, it is pretty darn secure but was and has been cracked already in penetrative testing by the DOD electronic warfare guys in about a 3 month time frame. The current highest level of security available is rumored to be a 2048-bit tumbling key standard created by the DOD that has yet to be cracked. No one in the public has seen it, and it may not become a public standard ever...

Nuff said...
 

Offline JoseTopic starter

  • Hero Member
  • *****
  • Join Date: Feb 2002
  • Posts: 2871
    • Show only replies by Jose
Re: Secure connections really secure ?
« Reply #16 on: July 16, 2007, 10:53:51 PM »
Saw an article by accident that kind of contradicts things that have been said here...
HERE

To my understanding of what has been posted here and the links  you posted https encrypts the data so even if one set up a twin tower without WPA the server would never be able to get it.
But the guy seems to have some authority on the matter ... :-?
\\"We made Amiga, they {bleep}ed it up\\"
 

Offline Floid

  • Hero Member
  • *****
  • Join Date: Feb 2003
  • Posts: 918
    • Show only replies by Floid
Re: Secure connections really secure ?
« Reply #17 on: July 17, 2007, 12:10:16 AM »
Quote

Jose wrote:
Saw an article by accident that kind of contradicts things that have been said here...
HERE

To my understanding of what has been posted here and the links  you posted https encrypts the data so even if one set up a twin tower without WPA the server would never be able to get it.
But the guy seems to have some authority on the matter ... :-?


Journalists are often idiots, unfortunately.

A rogue AP is potentially a man-in-the-middle, and connecting to one lets its operator view traffic not otherwise encrypted -- that is to say, TCP/IP never gave you any security on its lonesome, and WEP or WPA only gives you some measure of link-layer security to create a trusted path between yourself and the AP you're using.  If you end up trusting the wrong guy, that's 'your problem.'

Again quoting Wikipedia, just because the author put it eloquently:
Quote
TLS runs on layers beneath application protocols such as HTTP, FTP, SMTP, NNTP, and XMPP and above a reliable transport protocol, TCP for example.


When you bend the OSI model to the real world, TLS is technically on the 'application layer' with everything else that rides atop TCP atop IP.


So... if you're actually connecting to your bank over TLS, you're pretty much fine no matter what link you use, that's the point of the protocol.  However, a man in the middle could:

* Set up a man-in-the-middle attack that proxies TLS both ways; this would probably require you to be stupid and trust his certificate, which your browser will warn and complain about.  At least, unless you or some monkey in the IT department disabled the warning because it was 'getting annoying' when working with machines with self-signed certificates.  (Right process: Add certificate to browser.  Wrong process: Trusting every machine to trust one machine.)

* Set up an AP down the street from a coffee shop that has users pay through their browsers for access, copying the appearance of their login and payment pages, probably just implementing it with no encryption so harried users won't see any obvious warnings.  Of course, unlike the coffee shop's system, there's no reason to provide service after the details are phished, but a smart attacker could then route things through a single paid login via the real AP to avoid detection.  Cheap price for him to pay, especially if he's paying with someone else's CC.


Neither of those compromise encryption, though both do attack weaknesses in the human ability to understand and remain aware of authentication protocols.


Here's an example of a fairly clever attack which has nothing to do with wireless:  

http://news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html
This 'worked' because the offending script was legitimately served by PayPal over TLS, probably embedded in the attacker's username or address string or somesuch.  Note that the redirect for the actual attack pointed to a different server, so the URL would be a tipoff -- generally attackers mask these with a few thousand bytes of garbage arguments similar to the real ones PayPal or eBay use during a session.


"Users need to be wary of not using their WiFi enabled laptops or other portable devices in order to conduct financial transactions or anything that is of a sensitive personal nature, for fear of having disclosed this information to an unauthorised third party"?  

No, users need to be wary of feeding sensitive details into any system where they don't understand how to authenticate the receiving party and security of the path.

---

Can I have $0.75 for this response?  I'm supposed to be working and I've got no change for the soda machine.  :-(
 

Offline Floid

  • Hero Member
  • *****
  • Join Date: Feb 2003
  • Posts: 918
    • Show only replies by Floid
Re: Secure connections really secure ?
« Reply #18 on: July 17, 2007, 12:12:35 AM »
Quote

vk3heg wrote:
Quote

InTheSand wrote:
Quote

Floid wrote:
idiots sharing customer_data.xls on an open WebDAV share


Heh! Are people/companies really that stupid??!  :lol:

 - Ali


YES!

:roll: :shocked:


This is what's known as a 'Google attack.'
 

Offline Floid

  • Hero Member
  • *****
  • Join Date: Feb 2003
  • Posts: 918
    • Show only replies by Floid
Re: Secure connections really secure ?
« Reply #19 on: July 17, 2007, 12:24:40 AM »
Quote

trip6 wrote:

But just as any security, mac addresses can be spoofed. That is why security is a layered approach and why others have recommended WPA for wireless too... So mac address list, WPA or EAP or LEAP and your about as secure as you can get on a wireless connection...


As long as you're happy to connect to anyone who solves for the WPA-PSK PMK and spoofs the MAC address, apparently.

I think you meant 'and EAP...,' at least, but all this link-layer security is mostly flawed compared to end-to-end.  Even if any technique actually granted 'Wired-Equivalent Privacy,' the only security your wire had was your door lock.
 

Offline Zac67

  • Hero Member
  • *****
  • Join Date: Nov 2004
  • Posts: 2890
    • Show only replies by Zac67
Re: Secure connections really secure ?
« Reply #20 on: July 17, 2007, 07:23:00 AM »
Quote
trip6 wrote:
To the guy who was referring to AES-256, it is pretty darn secure but was and has been cracked already in penetrative testing by the DOD electronic warfare guys in about a 3 month time frame.


DOH - you got any details/link to that? Or is it only rumour? The only known methods of attack can hardly be regarded as 'cracked'.
 

Offline JoseTopic starter

  • Hero Member
  • *****
  • Join Date: Feb 2002
  • Posts: 2871
    • Show only replies by Jose
Re: Secure connections really secure ?
« Reply #21 on: July 17, 2007, 02:10:54 PM »
Excellent replies, that clarifies it. I'm starting to like this networking thing... :-D
\\"We made Amiga, they {bleep}ed it up\\"