On Oct 16, 2013, at 8:23 AM, Stephen Kent <[email protected]> wrote:
One reason
is that these e-mail access protocols are used in enterprise environment where 
passive
wiretapping often not considered a viable attack.
As someone who remembers the switch to Kerberos and then SSH driven by password 
sniffers in the LAN, including one which got my own password back in the day, I 
find this assumption grossly unrealistic.
That used to be a valid concern. I'm not sure why, but it seems to be less of a concern
today. Maybe use of VLANs, better switch management, ...
You have to REALLY lock-down the LAN, including properly configure high end 
switches with ARP filtering and/or other layer 3 management, for this 
assumption to be even remotely plausible.
OK.
Finally, we must consider passive wiretapping an active attack.  The only thing 
which prevents a passive wiretap from modifying (rather than just monitoring) 
traffic is almost invariably the will of the attacker, not any technical 
limitation, since even on-path wiretappers can packet inject, allowing the 
attacker to trivially promote themselves into a MitM situation in almost all 
circumstances.
I don't agree that we should ignore the differences between passive and active wiretapping. I do agree that passive wiretapping can be augment with active attacks of various sorts. It's not just the "will" of the attacker that matters; it's also the capabilities of the
attacker and their sensitivity to being detected.

Steve
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to