sniffer/promisc detector

Steven M. Bellovin smb at research.att.com
Wed Jan 21 01:18:19 UTC 2004


In message <054c01c3df79$6049c4f0$6401a8c0 at alexh>, "Alexei Roudnev" writes:
>
>
>>
>> Uhm, that would be wrong.  This is simply "security through obscurity".
>Yes, it is wrong for the _smart books_. But it works in real life. Of
>course, it should not be the last line of defense; but it works as a first
>line very effectively.
>

Precisely.  Don't count on security through obscurity -- there are 
targeted attacks, if nothing else -- but *after* you've taken all due 
precautions against a knowledgeable adversary, throwing in some 
obscurity can help, too.   (Want a worked example?  Ask the NSA to 
publish the algorithm for one of their top secret encryption 
algorithms...)

But there's another major caveat:  this sort of obscurity doesn't scale 
very well.  It's fine to put ssh on another port if you have a 
relatively small community of reasonably sophisticated users who can 
cope, or if you can hand out canned configurations to less 
sophisticated users.  But you couldn't easily put SMTP elsewhere, or no 
one could find you.  You'd also have support problems with your user 
base if you tried doing that as an anti-relay technique.

Obscurity works in small, closed communities.  Beyond that, operational 
considerations can kill you.

		--Steve Bellovin, http://www.research.att.com/~smb





More information about the NANOG mailing list