I agree with everything you said.  Also, I suppose my 'dangerous to assume'
wasn't a complete thought.  Basically, if I told a user 'only do important
things via HTTPS'....I would assume they are incapable of following those
instructions to a degree with which I would feel safe.

I hope that clears it up.  I didn't intend to put words into Andy's mouth
with my writing.


-- 
James Harless
Network Security Engineer

Kidwell Companies
kCOM  kE  kTECH
900 S. 26th Street
Lincoln, NE 68510  
                   
13336 Industrial Road
Suite 101
Omaha, NE 68137

Main: 402-475-9151
Fax: 402-475-9186
[EMAIL PROTECTED]
www.kidwellcompanies.com <http://www.kidwellcompanies.com/>



On 4/20/06 9:34 AM, "[EMAIL PROTECTED]" <[EMAIL PROTECTED]> wrote:

> I reread Andy's post, and I don't see the he was assuming 'she's only
> visiting HTTPS sites so, she doesn't need encryption'.  He stated if
> that was the case, then a VPN wasn't needed.  If it's not the case, use
> a VPN.  Although, probaly not a likely case I agree.
> 
> You are correct to not underestimate the value of leaked information and
> I would point out that not even a VPN, a firewall, HTTPS, etc. can
> protect her 100%.  Set aside all the data encryption for a minute and
> all that other stuff us geeks always migrate to when as about security
> and focus on her physical surroundings.  If I'm sitting in Panera and
> the guy behind me can see everything on my screen, and perhaps what I
> type, no amount of encryption and/or tunneling is going to help.  And
> yes there are people out there that can read keystrokes as you type in
> your password.
> 
> Just a reminder that your data is not the only thing in the public when
> using hotspots.  You are in public as well.  Be sure no one is "looking
> over your shoulder."  Social engineering is just as big a threat.
> Although personally I think in this case it's more like "stalking
> engineering"...
> 
> Brady McClenon
> Systems Administrator
> State University College at Oneonta
> 
> 
>> -----Original Message-----
>> From: James Harless [mailto:[EMAIL PROTECTED]
>> Sent: Thursday, April 20, 2006 9:27 AM
>> To: [EMAIL PROTECTED]; [email protected]
>> Subject: Re: Internet security on "hotspots"
>> 
>> Personal firewalls had already been covered by many posts
>> including the Original Poster.  I didn't see any need to
>> reiterate that since the post asked for 'other ideas or
>> thoughts'.  I assume that everything mentioned is in addition
>> to a personal firewall.
>> 
>> Also, it's dangerous to assume that 'she's only visiting
>> HTTPS sites so, she doesn't need encryption'.  Are you sure?
>> Is she going to check/send email?
>> POP3?  SMTP?  Is there anything I, as an attacker, can gain
>> by learning her email address/password + the fact that she
>> visits www.herpersonalbank.com?
>> Can I do anything with that information?  What if I also
>> learn the email addresses of trusted senders?  What if she
>> fires up SSH to her home?  Is her username the same as her
>> email address, per chance?  A lot of users will use the same
>> or similar passwords, even.
>> 
>> I would never underestimate the value of 'leaked'
>> information.  Potential attackers would even be sizing her up
>> as a target based on how she dresses and the type of tech
>> she's carrying.
>> 
>> 
>> --
>> James Harless
>> Network Security Engineer
>> 
>> Kidwell Companies
>> kCOM  kE  kTECH
>> 900 S. 26th Street
>> Lincoln, NE 68510
>>                 
>> 13336 Industrial Road
>> Suite 101
>> Omaha, NE 68137
>> 
>> Main: 402-475-9151
>> Fax: 402-475-9186
>> [EMAIL PROTECTED]
>> www.kidwellcompanies.com <http://www.kidwellcompanies.com/>
>> 
>> 
>> 
>> On 4/19/06 12:38 PM, "[EMAIL PROTECTED]"
>> <[EMAIL PROTECTED]> wrote:
>> 
>>> A VPN would work well for keeping her traffic safe but if
>> her laptop 
>>> wasn't safe then the VPN would be moot.  I think using a VPN is
>>> complicating the situation beyond what the user maybe was
>> looking for.
>>> The two places to secure would be the end node and the traffic in
>>> between.  The traffic could be secured by a VPN, but that
>> would still 
>>> leave the end node vulnerable to attack.  I think with the
>> amount of 
>>> threats currently in the wild, browsing the internet without a
>>> personal firewall can be a dangerous venture.
>>> 
>>> If she's looking for the most secure approach I would say a
>> personal 
>>> firewall and a VPN connection to a trusted source.  If she is just
>>> looking for machine security I think a personal firewall would be
>>> plenty.  I would steer towards a firewall with good reviews
>> that looks 
>>> at more than just ports, like IE requests and such.  If she
>> used SSL 
>>> sites anytime she was divulging personal information her
>> traffic would 
>>> be encrypted and there wouldn't really be a need for a VPN.
>>> 
>>> Andy Kitzke
>>> Network Engineer
>>> In-Sink-Erator
>>>  
>>> -----Original Message-----
>>> From: James Harless [mailto:[EMAIL PROTECTED]
>>> Sent: Wednesday, April 19, 2006 8:53 AM
>>> To: [email protected]
>>> Subject: Re: Internet security on "hotspots"
>>> 
>>> Have her connect to a VPN that is available to her.  If her company
>>> doesn't have one available, there are many easy to
>> implement solutions
>>> for setting up a PPTP VPN.  Then, she can connect to an insecure
>>> Wireless AP but, all of her traffic would flow encrypted to the VPN
>>> and out to the 'net from that remote location.
>>> 
>>> 
>> 
>> 
>> --------------------------------------------------------------
>> -------------
>> --------------------------------------------------------------
>> -------------
>> 
>> 


---------------------------------------------------------------------------
---------------------------------------------------------------------------

Reply via email to