tcp/routing question...

Andy Green andy at warmcat.com
Tue Jun 7 16:04:01 UTC 2005


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

bruce wrote:
| andy...
|
| right....
|
| which means that a mitm attack would have to appear to be both the
| client/server to the actual server/client...
|
| but if what you say is true... then mitm attacks aren't really
possible with
| a server/app in the middle of the client/server.
|
| keep in mind, i'm not sure this kind of attack is really worth worrying
| about. but i am concerned.

Scot's short answer is "yes, but" where my short answer is "no", but we
are saying the same thing.  As Scot said, if you have really intercepted
the bank's network so you can proxy their traffic, then you can do these
tricks.

If the situation is that the hopeful MITM machine is somewhere random on
the Internet and does not control the client or the bank's machines or
network, no.

There are so many ways to pervert communication that there is always a
residual chance that you are totally hacked already and just can't tell.
~ For example, any upstream in Fedora could have been compromised and we
are all compromised right now: you can't disprove it.  You just have to
throw up your hands in the end.

- -Andy
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iD8DBQFCpcVwjKeDCxMJCTIRAt4cAJ0Wd7yAQAY5+YIQtMDrJQ+yGKs9egCeP/p9
bZxQlodMKrGRlrVmhmzqks4=
=6DuA
-----END PGP SIGNATURE-----




More information about the users mailing list