views:

92

answers:

8

Inside of large companies, is it standard practice to use SSL (e.g. https) for running corporate apps over the LAN. I am thinking of ERP systems, SFA systems, HR systems, etc. But I am also thinking of SOA...web service providers and consumers.

In other words, is there any concern that something on the LAN could be sniffing plaintext info going around? If not SSL, how is this security threat dealt with?

What's your experience?

A: 

Unfortunately, no it's not standard practice.

Chris Lively
A: 

What's done and what should be done are not necessarily the same here...

Without a doubt any system with confidential information should be secured, especially on a LAN, as that's where most attacks originate - disgruntles employees etc etc.

unfortunately, it's often not the case.

Doobi
A: 

Yep, pretty standard practice in a lot of places I've seen.

I think the reasons why should be obvious:

  • Extra security against common attacks
  • Pretty much no reason not to
Kragen
A: 

You might see a consumer router on your desk, but the router in the main closet only sends data to the destination. Each computer in the office will have a cable running straight to the main router.

It should be standard practice most places, it's certainly easy enough to mod_rewrite anything that should be secure.

I'd post this on serverfault, you'll get a better answer there.

Edit: Security is hard. Never hurts to take another look.

Brian Maltzan
"the router in the main closet only sends data to the destination" This is not always the case... There are a tremendous number of network "engineers" out there who only know how to plug things in.
Chris Lively
Sure, but in a large company, there only has to be one who knows how to set it up right.
Brian Maltzan
@Brian -- are you saying the using a switch instead of a router means you can't sniff traffic?
HDave
@HDave - Yes, the device(s) in the closet can be setup to allow computers on your network to talk (hub/switch), but only send the messages (route) to the involved computers/networks. You can sniff, but you'll only see your messages and the replies. If you share an office and have an inexpensive hub on a shelf, you'll probably be able to sniff all the traffic on that hub.
Brian Maltzan
+2  A: 

Inside of large companies, is it standard practice to use SSL (e.g. https) for running corporate apps over the LAN.

Generally SSL for LAN only internal applications is not common practice. Historically the LAN has been viewed as a "trusted" network, and so SSL for LAN apps hasn't been a priority.

Also, connection to internal application servers is usually via an authenticated proxy, which in itself mitigates some of the risk.

This is, slowly, changing however as organisations (generally) increasingly treat the LAN with less trust.

If not SSL, how is this security threat dealt with?

Most enterprises do monitor what is attached to their LAN and record events when new devices are added.

If the device doesn't correspond to something planned (i.e a new desktop or printer) - then it is investigated.

Unauthorised devices are seen as a much greater risk (than not using SSL) because they pose additional threats, like introducing a virus, an external network connection, or some other kind of attack vector.

Rich
I understand proxies, but can you elaborate on the authenticated proxy? Is it an SSO server/approach? The reason I ask is because without SSL, what keeps users from sending username/password in plaintext to the servers when they log in?
HDave
nothin stops the users form sending username/password in plaintext... it's just that there are other layers of control which prevent someone from being able to use those credentials. By proxy server I mean like Microsoft ISA server, or whatever it's called these days, Bluecoat is another one. Basically web app servers are in a firewalled network zone. The firewall ensures that the only way to access the web app servers is via an approved proxy. So you have to be able to authenticate to the proxy (that's usually done in these environments using SPNEGO).
Rich
BTW: Your question asked what is standard practice. This is standard practice.... It might not be the most secure solution, but it is pretty standard practice and certainly not unprofessional.
Rich
A: 

I wonder if one of the problems is that going to SSL always seems just a bit more complicated than it should be. If one could enable SSL with a single switch without having to worry about certificates perhaps at least the encryption part could become default.

Obviously you wouldn't get endpoint authentication without taking the extra step of setting up certificates, but then at least there would be truly no reason to go without encryption.

Boone
Boy I couldn't agree more. Screw the chain-of-trust racket...just give me the encryption!!
HDave
The encryption is a useless security blanket without authentication. All it tells you is that you are communicating securely with *someone*; without also knowing who you're talking to, you could just be communicating perfectly securely with the eavesdropper.
caf
+1  A: 

Inside of large companies, is it standard practice to use SSL (e.g. https) for running corporate apps over the LAN. I am thinking of ERP systems, SFA systems, HR systems, etc. But I am also thinking of SOA...web service providers and consumers.

I would feel very uncomfortable if such apps weren't secured. In many place I've worked, they were. In some other, they weren't and I consider this as unprofessional.

In other words, is there any concern that something on the LAN could be sniffing plaintext info going around?

For me, the answer is obviously YES.

If not SSL, how is this security threat dealt with?

One Time Password (with RSA SecureID).

Pascal Thivent
A: 

It really depends on what you consider a "large company". The company I work at has over 50,000 employees; thus our corporate network is really not a great deal more trustable than the Internet.

We do use SSL on corporate Intranet web applications. We have our own internal CA certificate installed on all corporate PCs, so we can issue our own internal SSL certificates in-house.

caf