LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-17-2009, 10:09 AM   #1
vibinlakshman
Member
 
Registered: Dec 2008
Location: Kerala, India
Distribution: Ubuntu 11.10
Posts: 334

Rep: Reputation: 33
Smile How to avoid dsniff ?


I'm using internet thru a common network which having a proxy server attacehd and others including me as clients , so one problem arises , my network password set by sys admin , it can be easily monitored by my fellow collegues using "dnsiff -i eth1 " , since its wireless mode , packet can be easily compromised
Any way to be in hidden mode ?
Coz using network password only we can go online , else cant
So if a person sniffs my user and pass , they can enter in my identity.

Any solution , i believe question and scenario is cleared

Last edited by vibinlakshman; 02-17-2009 at 10:10 AM.
 
Old 02-17-2009, 02:00 PM   #2
rossonieri#1
Member
 
Registered: Jun 2007
Posts: 359

Rep: Reputation: 34
hi,

Quote:
it can be easily monitored by my fellow collegues using "dnsiff -i eth1 " , since its wireless mode , packet can be easily compromised
it doesnt matter whether you were in wireless or wired mode - as long as your traffic is in plain text then its plain text.

nice topic btw,
but - as my nature that i dont like to talk any in-depth security topic in public forum, but as for your guidance - you might to start using an tunneled session like using HTTPS or SSL. if you need more than session based connection - you can start using IPSec as your communication method.

just my thought,

HTH.
 
Old 02-17-2009, 06:15 PM   #3
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by vibinlakshman View Post
I'm using internet thru a common network which having a proxy server attacehd and others including me as clients , so one problem arises , my network password set by sys admin , it can be easily monitored by my fellow collegues using "dnsiff -i eth1 " , since its wireless mode , packet can be easily compromised
Any way to be in hidden mode ?
Coz using network password only we can go online , else cant
So if a person sniffs my user and pass , they can enter in my identity.

Any solution , i believe question and scenario is cleared
Quote:
Originally Posted by rossonieri#1 View Post
it doesnt matter whether you were in wireless or wired mode - as long as your traffic is in plain text then its plain text.

nice topic btw,
but - as my nature that i dont like to talk any in-depth security topic in public forum, but as for your guidance - you might to start using an tunneled session like using HTTPS or SSL. if you need more than session based connection - you can start using IPSec as your communication method.
It seems to me like the password he is referring to is the one for the proxy server. So an SSL tunnel isn't gonna be an option unless the administrator explicitly made it one. vibinlakshman, have you considered approaching the system administrator and expressing your concerns to him? That might be all it takes for him to implement an SSL-protected authentication scheme.
 
Old 02-17-2009, 07:33 PM   #4
vibinlakshman
Member
 
Registered: Dec 2008
Location: Kerala, India
Distribution: Ubuntu 11.10
Posts: 334

Original Poster
Rep: Reputation: 33
Cool

Approaching sys admin would be the option , but i dont think they can provide a solution , i fear more security has to be added .
Thanks for all advice
 
Old 02-17-2009, 07:56 PM   #5
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by vibinlakshman View Post
Approaching sys admin would be the option , but i dont think they can provide a solution , i fear more security has to be added .
I agree that more security needs to be added, but in this case only the administrator can do that.
 
Old 02-17-2009, 08:01 PM   #6
vibinlakshman
Member
 
Registered: Dec 2008
Location: Kerala, India
Distribution: Ubuntu 11.10
Posts: 334

Original Poster
Rep: Reputation: 33
Wink

Quote:
Originally Posted by win32sux View Post
I agree that more security needs to be added, but in this case only the administrator can do that.
May i knw what wud they supposed to be do , as a first step ..
 
Old 02-17-2009, 08:05 PM   #7
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by vibinlakshman View Post
May i knw what wud they supposed to be do , as a first step ..
Depends on how exactly the plaintext password is getting to the proxy right now. If it's via a form on a Web page, then all they need to do is switch from HTTP to HTTPS for that page. This involves deploying a signed certificate, of course.
 
Old 02-17-2009, 08:10 PM   #8
vibinlakshman
Member
 
Registered: Dec 2008
Location: Kerala, India
Distribution: Ubuntu 11.10
Posts: 334

Original Poster
Rep: Reputation: 33
Wink

Quote:
Originally Posted by win32sux View Post
Depends on how exactly the plaintext password is getting to the proxy right now. If it's via a form on a Web page, then all they need to do is switch from HTTP to HTTPS for that page. This involves deploying a signed certificate, of course.
Yea nw i got it we had signed certificate also , but normally we accept when certificate windows pops up , is this the same certificate u r talking about , normally we click the first option allow certificate for this session, smething like that..
 
Old 02-17-2009, 08:20 PM   #9
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by vibinlakshman View Post
Yea nw i got it we had signed certificate also , but normally we accept when certificate windows pops up , is this the same certificate u r talking about , normally we click the first option allow certificate for this session, smething like that..
It sounds like they are using a self-signed certificate. This is fine if you have a way to verify that the public key does indeed belong to that server (this isn't necessary to do with certificates that are signed by trusted third parties). If you can confirm the public key, and permanently accept the certificate, then you should be okay. But if you are instead blindly doing the "accept the certificate for this session" thing, then every time you do so you are vulnerable to a man-in-the-middle attack.

That said, assuming that you have NOT been under a MITM attack, then regardless of whether your network is wired or wireless your password will be protected by the PKI scheme used by the server.

Last edited by win32sux; 02-17-2009 at 08:23 PM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
dsniff sachin1361 Linux - Enterprise 0 07-03-2007 07:23 AM
dsniff sachin1361 Linux - Enterprise 5 06-27-2007 07:32 AM
dsniff-2.3 angelus_kit Linux - Software 1 06-25-2006 01:05 PM
alternative to dsniff Ephracis Linux - Security 4 05-20-2005 04:55 PM
dsniff question Di0de Linux - Software 0 07-01-2003 02:29 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 11:47 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration