Re: RFE: FireKit

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Colin Walters wrote:
> 2009/7/24 Björn Persson <bjorn@xxxxxxxxxxxxxxxxxxxx>:
> > Colin Walters wrote:
> >> If for
> >> example I enable desktop sharing before leaving work, then head to the
> >> airport, and log on there to WiFi, you really don't want the desktop
> >> sharing still enabled.  Nor likely do you want sshd.
> >
> >  – Internal tech support, Randy Hacker speaking.
> >  – Hi Randy, Joe Salesman here. I'm at the airport. Something's wrong
> > with my laptop. The screen just goes black when I try to start Open
> > Office Impress. It worked fine yesterday. If I can't get it to work
> > before I get to the customer's site I won't be able to show the
> > presentation.
> >  – OK Joe, I'll SSH into your laptop and look at the logs. What's your
> > current IP address?
>
> In this case, when the firewall is re-enabled, it would be enabled to
> whatever the system administrator has configured it to do.  In other
> words if they added an explicit passthrough for port 22, that would
> continue to work.

Fair enough. Just don't assume that nobody would want SSH at an airport.

> > Joe might have file sharing enabled to share his documents with his
> > colleagues in his own company, but just because Joe wants to let people
> > see the presentation, that doesn't mean he wants anyone who might be
> > connected to the customer's network to read all his documents.
>
> Hmm?  How would they be able to read all his documents?

Isn't that one thing that the so called firewall is supposed to prevent? Surely 
Vino isn't the only thing you want to block when the network is considered 
untrusted?

> > In one known attack against the concept of trusted networks, an attacker
> > configures his laptop to present itself as a WiFi access point and
> > broadcast a large number of strategically chosen SSIDs. Then he sits down
> > in a public place and waits for unsuspecting laptops to recognize the
> > SSID of their home network and connect automatically.
>
> I believe NetworkManager's connection list is based on the pair of MAC
> address + SSID, not just SSID.

So in a large building with many access points you have to add each access 
point to the connection list individually?

The attack I read about was of course primarily targeted at Windows. Perhaps 
Windows looks only at the SSID. Still, I wonder how long it would take to loop 
through the MAC address ranges of all the big manufacturers of access points.

Björn Persson

Attachment: signature.asc
Description: This is a digitally signed message part.

-- 
fedora-devel-list mailing list
fedora-devel-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-devel-list

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux