Security Basics mailing list archives
RE: encrypted data honeypots and IDS
From: "dissolved" <dissolved () comcast net>
Date: Thu, 24 Feb 2005 19:43:33 -0500
Unless 75% of your traffic is encrypted, I wouldn't worry about it. We wont see full time encrypted networks for a while due to obvious reasons. When/if IPv6 ever comes out, that could be a different story -----Original Message----- From: John Galt [mailto:everbeeninlove () gmail com] Sent: Monday, February 21, 2005 7:34 AM To: honeypots () securityfocus com; focus-ids () securityfocus com; security-basics () securityfocus com Subject: encrypted data honeypots and IDS Hello! I have been working with IDS's and honeypots for a while, and have constantly been intruiged by one thing: As long as you control networks, its good to have all traffic encrypted (whether its over http over ssl or ssh instead of telnet etc), but to sniff and analyse data as in an IDS, you need it to be unencrypted. With encryption being used increasingly in so many communications, will that result in the demise of IDSs in the long run, unless they change their architecture in some manner. As an example, snort flags logs whenever there is a return id for root, since it assumes thats an automated script. But something like that over ssh would never get caught. Would be glad if anyone can give any inputs regarding work done to deal with this "problem" regards John Galt
Current thread:
- RE: encrypted data honeypots and IDS dissolved (Feb 28)
