Timeline for Do I need to encrypt connections inside a corporate network?
Current License: CC BY-SA 4.0
8 events
when toggle format | what | by | license | comment | |
---|---|---|---|---|---|
Jul 1, 2018 at 7:52 | comment | added | le3th4x0rbot | @jjmontes ARP spoofing most definitely does work through switches. Most dumb switches are easily confused into delivering all traffic to a port even without ARP spoofing. | |
Jul 1, 2018 at 7:49 | comment | added | le3th4x0rbot | @jjmontes Static ARP is only supported in managed switches, imposes rather extreme management headache, and generally is not likely to be used in this scenario. Switches from the likes of Cisco do layer 3 snooping of ARP and use special magic to guess when ARP replies are bogus... this is disabled by default in Cisco hardware due to false positives. There are things like 802.11x with one mac/port... still requires expensive switches and a radius server. In any case none of these are even remotely close to the security that HTTPS provides for almost nothing out of the box. | |
Jun 29, 2018 at 13:45 | comment | added | jjmontes | In more secure networks, MAC addresses, IPs, switch ports (and cabling) and ARP tables in switches and routers are static. Afaik, a user of such network could not get traffic from any other port except by physical access, and any use of an incorrect MAC will block the port and be reported (though admitedly, this is not the case in most networks). Also, this doesn't mean the OP shouldn't encrypt intranet connections. | |
Jun 29, 2018 at 13:24 | comment | added | Tensibai | @jjmontes mind expanding ? I know very few networks where disabling ports with more than 2 or 3 mac addresses (phone, computer and maybe another device) is active, so turning a port into a copycat to get all traffic is not often a problem. | |
Jun 27, 2018 at 16:52 | comment | added | Michael Kohne | @jjmontes - 'properly secured' is not a phrase you can assume is applicable to most networks. | |
Jun 27, 2018 at 12:41 | comment | added | jjmontes | I don't agree: imho, running a ARP-spoofing based MITM attack on a properly secured network is not possible (or at least not "basically trivial"). | |
Jun 21, 2018 at 20:27 | history | edited | le3th4x0rbot | CC BY-SA 4.0 |
added 493 characters in body
|
Jun 21, 2018 at 20:20 | history | answered | le3th4x0rbot | CC BY-SA 4.0 |