Network Security – so https and ssh are immune to arp spoofing right?



When a machine has been arp spoofed, ALL network traffic from it is likely passing through a “hostile” machine. So, NO, https and ssh traffic is not immune, it is travelling through a hostile machine. However, it should be encrypted. There are a few exceptions though. SSH version 1 is a broken encryption scheme and should be avoided like the plague. As far as I know SSH 2 should be safe. Pay attention to complaints about the host identification not being able to be verified….


HTTPS is also an encrypted protocol, usually used for online banking logins, etc. There is a problem though…. one of the responsibilities of certificate based authentication is that the end user has the ultimate call if a certificate doesn’t match. (You do look at those right?)… SO…. it’s possible that an ARP spoofing attacker machine decrypts the network data from the https:// protected website and then generates a forged certificate and a new encrypted stream to the client machine.

The client machine at this point will complain and say something along the lines that the certificate could not be verified do you still want to accept? So, if the end user supports the forged certificate, then all https passwords can be sniffed as well, because they’ve accepted a fake certificate. So the moral of this story is to be extremely cautious when accepting dubious certificates. HTTPS can be secure, but ultimately it’s up to the end user whether or not they accept a forged certificate.

So what hope is there against arp spoofing?

Related Posts

Blog Traffic Exchange Related Posts
  • Disappointing trend for online banking sites Given how easy it is for people to be fooled by phishing sites, you would think banks would try and keep as many "easy ways to identify a legitimate bank site" as possible wouldn't you? I mean, user-friendliness is certainly a big selling point in things software and even web......
  • Network security - how safe is your network? Looking at ARP A while back I did a network security series and one of the points that I mentioned was that it's important to know what is normal for your network. In other words, what machines are NORMALLY connected, what services are normally running, etc. Well, I'm about to start a serious......
  • Network Security guide for the home or small business network - Part 18 - What about Dialup Users? So, most everything so far has been targetted to high speed internet users or business networks. That means if I use dialup I'm safe. Wrong. For starters, in many ways dialup internet is LESS of a risk than high speed broadband for two main reasons. First, high speed/broadband connections are......
Blog Traffic Exchange Related Websites
  • Finovate Startup 2009 Live Twitter I am attending Finovate Startup 2009. It is an action packed 1 day format which I belive will lend itself perfectly to a live twitter. Stay tuned it should be an amazing day. http://twitter.com/BlogTrafficExch In the break I have scheduled some talks with SimplFi, Mint, and Calendar Budget. I am......
  • Feb Edition of Hackin9 - Network Security Another exciting edition of Hackin9 is out and you can download it here.  Information about this edition is located below: ·  Wuala – Secure Online Storage There are a lot of online storage/backup solutions available nowadays and it is hard to find differences between them, but I think Wuala from......
  • Trade Key TradeKey.com was established in 2005 with the aim to facilitate global trade and bring buyers and sellers from all around the world to one common platform. TradeKey.com is the world's leading marketplace which connects traders with worldwide wholesalers, buyers, importers & exporters, manufacturers and distributors in over 220 countries,......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site