[40014] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: telnet vs ssh on Core equipment , looking for reasons why ?

daemon@ATHENA.MIT.EDU (Stephen J. Wilcox)
Tue Jul 31 10:18:51 2001

Date: Tue, 31 Jul 2001 15:16:17 +0100 (BST)
From: "Stephen J. Wilcox" <steve@opaltelecom.co.uk>
To: fingers <fingers@fingers.co.za>
Cc: "Mr. James W. Laferriere" <babydr@baby-dragons.com>,
	nanog@merit.edu
In-Reply-To: <20010731155409.J6051-100000@snow.fingers.co.za>
Message-ID: <Pine.LNX.4.21.0107311514050.23776-100000@staff.opaltelecom.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu


> > true, but i would point out that if its your core equipment that you are
> > accessing from your network that sits directly on the core then you should
> > be happy with the fact that no one is eavesdropping and it makes no
> > difference.
> 
> not everyone has out-of-band networks for management. Management of
> devices is sometimes done thousands of miles away. Remember also that this
> traffic can be sniffed before it gets to the core (yes, ssh is sniffable
> aswell, but just not as easily, and atleast it's not in plaintext)

this is in-band. if as you say you are accessing from another network then
this is where the encryption kicks in being useful, however that raises
another question - do you just allow any host to connect providing they
can authenticate? i know my login ports are restricted at both network and
host level to specific authorized addresses...

> > so thats my main logic, authentication... i cant understand the big
> > paranoia on people sniffing tho!
> 
> unfortunately ssh is just as sniffable if it's an arp spoof, but hopefully
> it's not as easy for the naughty eavesdropper to get into the right
> position for that....

exactly, its probably easier to hack the box by other means than sniffing
auth details!

Steve


home help back first fref pref prev next nref lref last post