1994-09-13 - Re: “Packet Sniffers”

Header Data

From: “Ian Farquhar” <ianf@wiley.sydney.sgi.com>
To: Adam Shostack <hayden@krypton.mankato.msus.edu
Message Hash: d66b1d0a0eb2137165c21efc86bf4ce84c604dbfc7a30011274cd56c7778567c
Message ID: <9409131812.ZM11343@wiley.sydney.sgi.com>
Reply To: <199409121847.OAA17194@arthur.bwh.harvard.edu>
UTC Datetime: 1994-09-13 08:17:21 UTC
Raw Date: Tue, 13 Sep 94 01:17:21 PDT

Raw message

From: "Ian Farquhar" <ianf@wiley.sydney.sgi.com>
Date: Tue, 13 Sep 94 01:17:21 PDT
To: Adam Shostack <hayden@krypton.mankato.msus.edu
Subject: Re: "Packet Sniffers"
In-Reply-To: <199409121847.OAA17194@arthur.bwh.harvard.edu>
Message-ID: <9409131812.ZM11343@wiley.sydney.sgi.com>
MIME-Version: 1.0
Content-Type: text/plain


On Sep 12,  2:47pm, Adam Shostack wrote:
> 	The way thinnet ethernet works, all machines on the net will
> probably see all packets going to/from any of them.

All machine on the same PHYSICAL network will.

If the university is worried about password sniffing, they should put
the machine on a bridged ethernet segment.  If they're really concerned,
give them their own subnet and apply an appropriate routing policy.  This
is not difficult.

> The way telnet works has no
> encryption in it; the password you type gets sent across the network
> as you type it.  This is barely even a secret anymore.

It never was a secret.

							Ian.








Thread