IDS mailing list archives
Re: Avoiding VLAN bridge with N-IDS?
From: Mike Frantzen <frantzen () nfr com>
Date: Tue, 10 Aug 2004 10:56:41 -0400
My understanding is that the deployment of N-IDS in a VLANd environment where the switch is spanned to enable a single N-IDS to sniff all VLAN traffic creates the risk that the IDS sensor can form a bridge to where someone can compromise the N-IDS machine and then use that to sniff all traffic or else move from VLAN to VLAN. Is there information on deploying N-IDS in switched and VLANd environments that do not require one N-IDS per VLAN and avoid the above risk if it does exist?
At NFR we have a custom jail that the sniffing engine is placed into. Before it starts monitoring network traffic it enters the jail, chroots, and drops all privileges. Among other things, the jail prevents the sniffing engine from sending any packets that aren't TCP resets and totally detaches the engine from the management interfaces. When I wrote the jail, I was terrified by people who have a sniffing interface outside the firewall and a management interface inside the firewall. Really good question by the way! .mike frantzen@(nfr.com | cvs.openbsd.org | w4g.org) PGP: CC A4 E2 E8 0C F8 42 F0 BC 26 85 5B 6F 9E ED 28 -------------------------------------------------------------------------- Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.securityfocus.com/sponsor/CoreSecurity_focus-ids_040708 to learn more. --------------------------------------------------------------------------
Current thread:
- Avoiding VLAN bridge with N-IDS? Chris Conacher (Aug 09)
- Re: Avoiding VLAN bridge with N-IDS? Rodrigo Barbosa (Aug 09)
- Re: Avoiding VLAN bridge with N-IDS? ADT (Aug 10)
- Re: Avoiding VLAN bridge with N-IDS? Mike Frantzen (Aug 11)
