Date: Wed, 5 Jul 2000 08:07:24 -0600 (CST) From: Ryan Thompson <ryan@sasknow.com> To: Chris <kingsqueak@home.com> Cc: freebsd-questions@freebsd.org Subject: Re: TCP/IP forwarding in SSH2 - testing? Message-ID: <Pine.BSF.4.21.0007050751280.22226-100000@ren.sasknow.com> In-Reply-To: <20000705085049.C7940@kingsqueak.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Chris wrote to Ryan Thompson:
> To be honest with you what I suspect you are seeing by running tcpdump
> locally is free text transmission that is in fact viewable on your local
> machine. With port redirection I'm not sure that is avoidable.
>
> What you will verify with my hub suggestion is that *all* traffic
> external to your machine in relation to that connect will be encrypted.
Yup.. However, I put another system on the same Ethernet segment and
started analysing packets:
.---------------. .--------.
| remote client | ---- Internet ---- | router |
`---------------' `--------'
_______|_______ 100Mbps Ethernet
| |
.---------. .------------------.
| monitor | | ssh/telnetd host |
`---------' `------------------'
So, from the "monitor" system, I sniff packets.
On port 22, I see encrypted text transmitted to and fro when the remote
client types text or receives information. To me that is a Good Sign.
However, Even on the monitor system, I still see clear text transmissions
on the high-numbered port used for forwarding, AND the telnet port. (The
remote client did in fact telnet to the ssh/telnet host on the
high-numbered forwarded port--see my example previously in this thread)
So, the fact that encrypted data is being transmitted over port 22 in
perfect time with the client typing commands/receiving output gives me
encouragement.
The fact that the resultant data is available in the clear to other
systems on the receiving LAN is discouraging ;-) Is it possible or likely
that the ssh server is, for some reason, injecting the decrypted data
packets back onto the Ethernet, despite the fact that all packets have a
destination (or source) of the ssh server only?
> IOW, the redirected traffic will remain in clear text to anyone with
> priveledges to activate sniffing on your local server, however enroute
> it will be encrypted.
I've had the same thoughts. I suppose the next step is throwing another
gateway on another subnet between the two hosts and monitoring from there.
(Truly man-in-the-middle monitoring).
- Ryan
--
Ryan Thompson <ryan@sasknow.com>
Systems Administrator, Accounts
Phone: +1 (306) 664-1161
SaskNow Technologies http://www.sasknow.com
#106-380 3120 8th St E Saskatoon, SK S7H 0W2
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0007050751280.22226-100000>
