Hi,

On Fri, 21 Oct 2005 19:19:15 +0000 (UTC)
James <[EMAIL PROTECTED]> wrote:

> Well, after much ado, it seems quite easy (trivial) to hide an ethernet 
> interface, while being able to collect reems of local ethernet traffic
> based data, from both snort and ethereal.

No, it's not that easy - depending on your requirements on the "hiding".
 
> Here's the normal ethernet interace on a portable:
>  /sbin/ifconfig -a
> eth0      Link encap:Ethernet  HWaddr 00:90:F5:0D:30:0E
>           inet addr:192.168.2.15  Bcast:192.168.2.255  Mask:255.255.255.0
>           UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
> 
> 
> issued:
> 
> route delete default
> ifconfig eth0  inet 0.0.0.0
> 
> and voila:
> /sbin/infconif -a
> eth0      Link encap:Ethernet  HWaddr 00:90:F5:0D:30:0E
>           UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1

Yep, it's up and doesn't have an IP. If this is sufficient for you,
fine then.

> On any system, 'ping 0.0.0.0' receives responses from the local
> interface.

No, if you specify an interface for those packets, it most probably
won't receive anything. But that's nitpicking here...

> What I need is for folks to test and verify that an ethernet 
> interface setup this way, is indeed invisible (undetectable)
> by other systems.

It surely isn't. It's up, listening at least to broadcasts and
multicasts (well, it's written uppercase in the ipconfig output).

> If you find this is not true, please tell me what you did and 
> what tool/syntax you used to discover/detect a system with an
> ethernet interface set up this way....

emerge hping2, emerge arping. And then play a little bit. Note that
ethernet frames don't rely on IPs to get to their targets. In the above
described situation, I would try to send a bunch of different ethernet
frames to that machine and see what happenes. If I were you, I would
dedicate another machine for the testing stage that sniffs if the
machine answers anything. "ping" isn't really the tool of choice here.

If you really don't want to chose a hardware based solution and go the
software way, you should carefully inspect /proc/sys/net/... and have a
read in linux docs how to chose sysctls for not letting linux itself
spit out packages.

But using this way, it is scientifically impossible (well, nearly) to
100% negate the theory that a package might get through. I really
recommend the already mentioned way, cutting the Tx wires. After all,
this is simple and you can be sure that you didn't forget anything.

-hwh
-- 
[email protected] mailing list

Reply via email to