First thing to do would be to add a rule to allow only local traffic into
the intranet then the only worry is local users (that's always the biggest
worry when it's about sniffing traffic)
 
Internally... you can sniff whatever you want with a man in the middle
'attack'. SSL would just encrypt the payload making it harder to get at.
(There are of course ways around that) SSL on an internal network would do
nothing but slow someone down or add an extra step to the sniffing process
(an easy step).

....VPN is your friend. :-)


-----Original Message-----
From: Damien McKenna [mailto:[EMAIL PROTECTED] 
Sent: Monday, October 02, 2006 2:27 PM
To: CF-Talk
Subject: Break it down for n00bs: security problems of non-SSL intranet?

Could someone please help break this down for me so that even the  
most clueless of project managers could understand?

What are the security implications of having an intranet *not*  
secured using SSL when it is behind an existing beefy hardware  
firewall?  I know it is standard practice to do so, but what are the  
legit reasons for it?  The site in question runs on a cluster of  
ColdFusion 5 boxes running Linux (unknown distro) and Apache 1.3.x.   
Would it be possible to snoop data on connections to these servers  
and if so what tools would I use to do so?  Don't worry about the  
legalities of answering this, I have full authority to do so.

Thanks.

-- 
Damien McKenna, husband, father, geek.
[EMAIL PROTECTED] - http://www.mc-kenna.com/





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Introducing the Fusion Authority Quarterly Update. 80 pages of hard-hitting,
up-to-date ColdFusion information by your peers, delivered to your door four 
times a year.
http://www.fusionauthority.com/quarterly

Archive: 
http://www.houseoffusion.com/groups/CF-Talk/message.cfm/messageid:255063
Subscription: http://www.houseoffusion.com/groups/CF-Talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4

Reply via email to