Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security

Ethernet Wiring Through Hostile Territory? 65

GoogleDidntFindIt asks: "I need to connect a terminal to a server which contains very sensitive information. Unfortunately, the terminal is about 200 feet away from the server. The server (which even includes a 'self destruct' device) and terminal are both in highly secure areas of the building, but the wiring will be in uncontrolled areas. What should I do to keep people from tapping or monitoring the wire?" Is there any way a conduit can be wired with an alarm which goes off when it's integrity has been violated?

"Heres a basic description of my situation:

  • A new wire/fiber/cable/whatever will be run and I can use any sort of conduit I want.
  • A potential attacker may have several days of undetected access to parts of the wire/conduit and may have sophisticated fiber-optic tapping equipment (which can tap a fiber without cutting it).
  • I can physically inspect the conduit/cable/wire once a month.
  • Ideally, the system would also notify me of a majority of successful attacks (or, even better, disconnect the line).
I'm aware of IPSEC and other encryption systems, but they aren't suitable for this project - I'm looking for systems which address physical security and protect against traffic analysis."
This discussion has been archived. No new comments can be posted.

Ethernet Wiring Through Hostile Territory?

Comments Filter:
  • by jvhaarst ( 64020 ) on Friday October 19, 2001 @06:59AM (#2450810)
    How about putting the conduit under pressure/vacuum and shutting it down when there's a leak ?
    A waterhose with a waterprrof glassfibre should do the trick.
    • by bribecka ( 176328 ) on Friday October 19, 2001 @11:10AM (#2451467) Homepage
      True, under a lot of pressure, but it seems the media has totally forgotten about him. Luckily he probably won't run for reelection.

      Oh, Conduit. I have nothing to say about that.
      • Too bad you already have max mod points, because _that_ was the funniest thing I've read on here in weeks!
    • Won't work unless you get pressurizable wiring boxes (this is not nema level 12 (explosive proof), its custom stuff), then you would need a presure sensor, and a plc. You could have a program running in the background on the computer moitoring the plc's I/O points. Additionally, you could electrify the conduit, not high power, but enouf that if the conduit is cut through at any point, an alarm goes off.
  • by loony ( 37622 ) on Friday October 19, 2001 @08:35AM (#2450918)
    Depends on how much you want to spend, but I'd go with a fibre connection - makes it more difficult to tap.... Put it into a steel pipe, mostly to protect the fibre. Then an thin insulating layer (the thinner and fragile the better), a layer of copper (like the shielding of a coax cable) and a final protective layer. Pressurize the steel pipe and monitor the pressure, and also put a little voltage between the steel pipe and the copper. That way the fibre is well protected against accidental, mechanical damage, and its pretty difficult to first get rid of the copper layer without it touching the steel pipe, and even more difficult to open the pipe to get to the fibre without changing the pressure... Costs you probably quite a lot, but I'll bett my lunch that unless you're up against the government, you'll be happy with it.
    • Did you or the idiots who modded you up read the article?

      His potential attackers have devices that can tap a fiber optic cable without breaking it.

      A far more sensible approach would be to rig up a jacket around a fiber optic cable that would block the tapping devices. Run some signal through the jacket that will cease if somebody tries to peel it off.

      Pressurizing steel pipes requires too many manhours to install and is too impractical.
    • and also put a little voltage

      how much fun is that? now if you can get one of those 10,000 volt lines down to the server room... then I think you'd have something!

  • t1 equipment (Score:2, Interesting)

    by frantzen ( 137260 )
    i believe major investment houses and large banks have little black boxes to place on both ends of a T1. they do the crypto, but they also constantly stream random bits if there is no real traffic.

    do you care about someone pumping a few amps down the wire and trying to burn out the IO pins on your super-duper computer? in that case it would be prudent to pick up your soldering iron and build a serial relay with electro-optical interconnects.

    your best bet may be to just go wireless, run IPSEC and keep lots of random traffic in the background. at least it would take more smarts to create an EM pulse strong enough to attack the electronics.
    • they are called cisco routers with a recent version of IOS

      I had a friend who worked for Wachovia MIS, and he said thats what they did, IPSec on Cisco Routers.
  • by anticypher ( 48312 ) <anticypher.gmail@com> on Friday October 19, 2001 @08:55AM (#2450971) Homepage
    I read your questions as:

    "I have a budget of $0.39, and I would like the same amount of security major banks, intelligence organisations, and the military use. I'll ask /. how I can build a super-secure connection for less than a dollar, I'm sure many geeks have done this before"

    If you truly have information so valuable that someone could gain information just on traffic analysis, you need to hire real professionals. Not some ex-cracker wannabe with a nose-ring and tattoo collection, but ex-DIA soldiers who have already made a career of physical security.

    You either spend the money, or tell the powers-that-be to kill the idea of placing a remote terminal in an unsecured location. If the information is that valuable, those who need access to it can cross the street. If they are too lazy to cross the street for your information, then the information isn't valuable enough to keep secure.

    Pressurised conduit requires separate monitoring facilities at both ends, inside the secure areas. That means physical access for inspections and maintenance on a regular basis, not just once a month. And if you can't run a customised IPSec implementation with a constant level of traffic, you don't have the budget to do this project correctly. Kill yourself now :-)

    the AC
    • I dis-agree, the post speaks of self-destruct on the server and being able to run in pretty much any conduit possible. This doesn't sound like a low budget situation to me.

      The post also is after physical security, not encryption, It sounds like he/she is trying to protect against some seriously determined people, who probably have lots of resources. If you can hack the connection and just sniff a copy of all the traffic, and happen to have a super-computer lying around, then you can probably decrypt the data eventually. Maybe that isn't aceptable.

      As for hiring professionals, maybe he/she is going to get professionals in but wants some background suggestions so they don't get taken for a ride.

  • Expensive Specs (Score:5, Insightful)

    by clark625 ( 308380 ) <clark625@yahoo . c om> on Friday October 19, 2001 @09:17AM (#2451038) Homepage

    Okay, my $0.02 will likely cost you a large amount of money; but hey... if the data's so important to require self-destruct devices then I can understand that money isn't the biggest concern. Perhaps some of my ideas will prove useful.

    Some of the previous articles mention using vacuum or pressure. This isn't a bad idea; though it could potentially be defeated by extremely carefully poking a small hole (about 5 microns in diameter) and then getting a pressure monitor on there. It may take hours for the gauge to read anything of use; but supposedly attackers may have that long. The hole itself would just look like a very small leak on 200 foot of pipe--and so you would believe that it's not an attacker.

    Instead, you really should use a multi-layered configuration. Start with a fiber--they are a pain to tap without splicing; and I'll assume you could monitor each end and check for signal degradation that would be indicative of a splice. Then, the fiber should be insulated already, so jacket it in copper or aluminum sheeting (like grounded CAT5) with insulation on top of that. To top off the internal layer, send this "wire" down the smallest metal tube you can; with Great Stuff or other spray-in insulator filling the gap. Note that the fiber et al should be running nearly down the center of this conduit.

    That's the first layer. Outside of that, fit the conduit inside another one (again, metal)--this one should be have a good vacuum on it. 10e-3 torr is easy to reach with a roughing pump, so you shouldn't have any trouble getting there. And then one more pipe outside of that. The final pipe should have a high pressure on it, 75 or 100 psi can be reached by a common air compressor. So this gives a total of three metal conduits to go through before reaching the fiber. Obviously, monitor the pressure from both ends--and those numbers should match up (with some error).

    Yes, I realize this seems like over-kill. But, with this set up you can do some really cool things to check for intrusion. First, one can put different voltages across each of the 4 metal layers (fiber jacket included). If any of those are the same, you've got an attacker. You also can connect two layers on one end and gauge the resistance from the other. If this number doesn't match what it was yesterday, then there is an attacker. My personal favorite, though, is checking the capacitance between the different layers. If someone somehow figures out how to cut through the pressure and vacuum jacketting, the resistance test might be able to catch it. If you check the capacitance, there's almost no way they can not be detected. If this were me, I would configure both sides to randomly check different combinations from my list.

    Finally, you likely will have a few seconds from when an attacker is detected and when he/she could be possibly be listening. This means that you can fully trust the computer on the other end even just after an intruder detection. Use this time for "Oh my God! Cut the line! Shut up and don't talk again!!!" as well as any other last-second transactions you need.

  • Try running the secure cable through a metal conduit with a bunch of dummy or less sensitive cables. As previously suggested, have everything sending random packets when not in use. This may not keep the cable secure but it will make it harder to penetrate/find.
  • by Anonymous Coward
    It seems like a good idea, but then you have one more security system to secure. How do you know someone didn't tap into the pressure monitor and override it first? Now you have to have security layered upon security.

    Drilling tiny holes is easy to do, and it can be done under pressure, or under vacuums. The high pressure problems are regularly dealt with when they splice trans-oceanic cables. (These are much bigger, I know.)

    Fiber is hard to splice, but it's not hard to knick just enough to bleed some signal off of, so fiber may not be good. However, it's better than copper, since someone with Van Eck equipment might be able to read the signal without actually opening the conduit.

    I'd recommend making it look like something other than conduit, or hiding it inside of other pipes, like sewer pipes or steam pipes (those pipes need not be active). You might even consider using the glass waste pipe that they use for chemistry waste, as this is harder and more fragile to deal with than metal conduit. It also allows for visual inspection. The alternative is to place the conduit in a secured location, or at least in a blatantly public location (like in the middle of the ceiling in the middle of the most used hallway) so that tampering efforts are quickly noticed. Don't rule out motion/vibration sensors (including motion in the area of the conduit). If you're going to use a vacuum, there are real-time smoke sniffers I've seen that constantly pull air through pipes and sniff it for smoke (the server room here has several). One of these could probably be adapted that notices smell changes, such as adhesives or hot metal from cutting. One of those companies that are working on bomb/drug sniffers for the Feds and airports might have something.

    The real problem with asking us is that the people who know may be under federal rules not to say anything.

    I think your simplest solution is to make a 200' dog kennel, put the wire in there, and let a couple of mean dogs loose to guard it.
  • Idea! (Score:2, Interesting)

    by ajuda ( 124386 )
    Am I the only person wondering why you can't just stick the terminal in the same room as the server? There would be 0 (zero)chance of monitored communications between the two machines. If both computers are only available in secured locations anyway, what would be the problem with this? It's cheap, easy and effective.

  • by unitron ( 5733 ) on Friday October 19, 2001 @10:45AM (#2451342) Homepage Journal
    What if he's the one trying to break in to an already existing setup and is just looking for ideas on what kinds of defenses he might encounter?
  • I can't think of much data that would be sensitive enough to warrent this level of protection. AFAIK even the government feels good encryption and frequent (weekly) inspection of the fiber is good enough to protect critical military operational data.

    If your worried about someone with government level resources cracking the data and the amount of data trafficing the pipe is not huge your best bet is a pad cypher (generally considered to be unbreakable). Generate completely random data (atmospheric noise is a good source), burn it to two CDROMs. Encrypt and decrypt the stream of data on each end. You can use a small embedded PC on each end if the data stream is non-standard. Never reuse the same stream of random data.
    • Let me guess where you got this idea from? Clancy's "Sum of All Fears"?
      It is a good idea, but you would first need a way of recording the noise, and building an encryption program that allows the data to be integrated with the noise. Would take time to decrypt, secure as hell, but would take along time to implicate
  • Hello,
    Does anyone have any good links about physical security? ANd any info on programs to genereate traffic when a line is dead?
  • Addition (Score:4, Insightful)

    by ScuzzMonkey ( 208981 ) on Friday October 19, 2001 @12:37PM (#2451942) Homepage
    Just a suggestion to add to a lot of other very adequate ideas...

    I notice most of them recommend running fiber through some sort of pressurized, protected conduit, with various tamper notification schemes. Great; do all that. But instead of just running your single fiber strand, run a lot of them. If you feel extra devious, rig up something to pump garbage signal through them, signal which will look not unlike the encrypted traffic I assume you'll be using on the real line.

    Stuff enough of them in there, and make the bogus signal convincing enough, and it will easily take your attacker longer than your one-month inspection period to breach the conduit, defeat the anti-tamper, and identify the correct strand, let alone get anything useful off it.

    • Re:Addition (Score:2, Interesting)

      by ReidMaynard ( 161608 )
      then string some innocent looking, dusty speaker wire in the ceiling, and use that ... the robbers will concentrate on the secure fiber.

      Like having a $50,000 safe in you house, then burrying the Krugernads in the backyard; the theievs waste time on the (empty) safe.
      • Ooooohhh! Sneaky. I like it!

      • Isn't this basically Security Through Obscurity. In other words, the security is entirely dependant on the secrecy. Once anyone knows the secret, through any means, all security completely vanishes. And worse, you probably won't / can't know when the secret becomes known and when an attack could be imminent.

        This may be sneaky. But it isn't any real security. Decoy systems may be okay. But the real system needs to also be secure.
  • I had a box (Score:3, Funny)

    by ReidMaynard ( 161608 ) on Friday October 19, 2001 @01:36PM (#2452253) Homepage
    with self-destruct feature...then I replaced Windows with linux
  • Why not ipsec? (Score:3, Interesting)

    by sulli ( 195030 ) on Friday October 19, 2001 @01:42PM (#2452277) Journal
    You can get cheap ipsec boxes to connect sites to each other over ethernet. Red Creek (still around, to my great surprise) makes a 6-ounce, 6x4 inch device [redcreek.com] that connects ethernet to ethernet, and runs ipsec over one ethernet link. Put one of these in each secure enclosure, and you should be in business!
    • Because often the simple fact that communication is occuring at particular times with particular characteristics is revealing.
      • Because often the simple fact that communication is occuring at particular times with particular characteristics is revealing.

        That can be defeated by well planned random junk messages. If the junk volume/frequency is random and widely variable enough, it may completely defeat traffic analysis.

      • Through his own building? I find it hard to believe that he has people in the building who would tap fiber and do traffic analysis, but hey, who am I to question the premise? In this case I would agree with the oher poster that random noise running through the ipsec devices at all times would be the right choice.
  • duh. easy. (Score:4, Interesting)

    by Zurk ( 37028 ) <zurktech@gmail . c om> on Friday October 19, 2001 @01:56PM (#2452330) Journal
    ignore all the comments about high pressure and other crap. pressure systems need to be maintained continously and are prone to failure.
    Try this :
    put a bunch of fibre optic strands into a steel pipe (large). make sure the fibre is all loose strands of single mode fibre (glass) and not encased in a protective coating. then fill the pipe completely with concrete and let it dry. attach the fibre to the terminal and the server and run something to monitor the connection 24/7. if the bad guys blowtorch thru the steel pipe they need to use a hammer to get thru the concrete. cracking the concrete cracks the fibre along with it destroying your connection (even if it is temporary and they rig something up to restore the connection your software monitoring the connection can sound the alarm). since single mode fibre is essentially very thin glass strands you will loose a few strands while pouring the concrete but at least one will work. you can use the one that works.
    its messy but reliable. epoxy and other nasty stuff in layers with the concrete is also useful.
    • Re:duh. easy. (Score:3, Interesting)

      by TheCarp ( 96830 )
      How about this one....

      put 3 strands down the middle of the conduit.. and a bunch all around at a small radius from it. Fill with asphalt.

      run stead signals through the outside strands... if an outside strand stops working...then check for intrusion.

      for added protection... put some temperature sensors in (actually... checking the resistance of the outside conduit (assuming its made of metal) may work for that)) the conduit. (to detect anyone tryin gto melt out the asphalt)

      oh yea...and spray paint all the fiber black, so it blends in with the asphalt.

      I would then use crypto in addition to that...but thats just me.

      -Steve
      • Alcatel sells color coded single mode fiber.

        The place I used to work for wrote a custom bench ORTD program for Alcatel, so we had a bunch of single mode color coded fiber laying around.
    • Best idea ive heard so far...but how about that black epoxy that almost all companies use to coat circuits/chips/boards with? That shit is tough. I once decided to see if i could slowly scratch my way through some on a chip (dead video card)... I spent HOURS... all for naught.

      Of course if you ever experienced a heavy explosion or earthquake, the strands may break and you would be sol until it could be replaced.

  • Privided this isn't bandwidth intensive, why not send a whole lot of garbage and then stenograph the data in the noise. First encrypt the data with a strong encrytion algorithm. Then within the noise put the encrypted data in the noise. Use every Nth bit within the noise, changing N every so often. Of course you need physical security first! But even if someone was able to get in they would have to be there for quite some time to get enough information. Hopefully your physical security measures (the preussure ideas, etc.) will alert you in time to stop them before they can get much information. But even if they were to get enough information, they would have to figure out which bits they need, then on top of all of that they will have to figure out how to decrypt it.

    Of course every single one of these methods can be broken, but together it is near impossilbe.
  • Why spend all your money on physical security and you can waste it on something cooler like using differential phase shift keying (DPSK) and frequency shift keying (FSK)to ensure the integrity of your data. Check out this article [sans.org] for some pretty good encrytion ideas(at the end of the article). ohh and don't forget the cryptonite plated titanium pipe for a little extra security.
  • Ethernet Wiring Through Hostile Territory?

    Posted by Cliff on Friday October 19, @04:36AM
    from the security-doesn't-end-at-the-console dept.
    GoogleDidntFindIt asks: "I need to connect a terminal to a server which contains very sensitive information. Unfortunately, the terminal is about 200 feet away from the server. The server (which even includes a 'self destruct' device) and terminal are both in highly secure areas of the building, but the wiring will be in uncontrolled areas. What should I do to keep people from tapping or monitoring the wire?" Is there any way a conduit can be wired with an alarm which goes off when it's integrity has been violated?
    It sounds, to me, that he's not trying to send a line between his house, his server room, through the Mafia's territory, but within the same building, there are the secure areas, and he has to pass the wire down a back hallway, or a corridor that people are in, but isn't access controlled. Pressurization would be a little bit of overkill; just run multiple strands of whatever it is you're linking over in the same pipe. Put them in the walls, in a central vaccuum system, in steam or water pipes, in a sewer, or something, but make sure there's a lot. There are devices that can be purchased that encrypt/decrypt and stream random noise along; put one of these on each of the dummy lines, and run ipsec over the real one. A motion/vibration sensor would do the rest. Every week or so you could switch which physical cable that was used, with little more effort than swapping a plug or two on each end.
    • Well, if he's installing the wire in an unsecure access ceiling/wall, he probably doesn't want motion detectors going off every time the contractors come in to install more wiring, reconfigure wire runs, etc. as it would be going off way too much each time they bump the secure line. Likewise, he probably needs to protect against outside contractors coming in and messing with things they shouldn't be, on the outside chance that they're not 'just' contractors, but intelligence operatives from the competitor down the street.

      The best security is going to be a VP or other interested party, with very tangible reasons for maintaining the integrity of your systems. Sick 'em on the contractors whenever work is being done near your secure line. Encase the line in concrete, asphalt, or some highly volatile chemical capable of melting the line whenever something contacts it, and then don't worry about all those extra lines, junk data, etc. Just make sure you have someone you trust, and knows technically what's going on, to oversee any projects that happen along that 200ft span of wire.

  • Ok, this is sort of 3.1415962.... in the sky, but as long as you are transmitting your information classically, others can theoretically interrupt and observe the flow of information without your knowledge.

    If you could somehow transmit the information quantum mechanically, as soon as some one intercepted the message, it would change state and you would know.

    for more info check out www.qubit.org.

    of couse this is all theoretical, since no hardware like this exists commercially yet. There are some researchers doing some basic research into this area, though, so maybe banks and other high security institutuions will be using this in ~10 years.

    the other suggestions about fiber in a steel pipe along with a pressure differential as well as some capacitance measurement seem to be pretty good suggestions for data line integrety, though.
  • Avoiding traffic analysis is easy on a private line, use 100% of the bandwidth with fixed sized encrypted packets. Create a VPN. Multiplex the VPN with just enough zeros to exactly use the available bandwidth. Encrypt that data stream and send it with fixed sized packets. At the other end, decrypt, demultiplex out the zeros, and expand the VPN.

    For added annoyance value, use random data instead of zeros.

    You'll still want to armor the cable, put in a bunch of dummy fibers and many of the other things that were suggested.

    • Precisely! Physical security and encryption WILL both be broken. With physical security, you can pretty much make the lower bound on the time required somewhere in the days to months range. With encryption you can pretty much make the lower bound on the time required somewhere in the decades to millenia range. Of course, both of these estimates rely on lots of assumptions.


      It seems to me that you want to wrap your end-to-end encrypted tcp traffic (ipsec) with a synchronous link encryped protocol that sends garbage when it's not sending data. These sorts of link encryption devices exist (at least they used to). I imagine that modern versions exist that use AES, twofish, serpent, or RC6 instead of DES. (I've heard good arguments for each of these AES finalists. If you have the choice, you won't get blaimed for agreeing with NIST.)

      In any case, you really need to use ipsec in addition to your link encryption layer. Adding physical security may be a good idea as well, but traffic analysis-resistant link encryption has been arround for decades.


      If in the unforseable event that you can't find a supplier for link encryption, it sound like you may have the budget to develop your own link encryption. Authenticated key exchange is the easiest part to screw up, so go for manually entering the keys into the boxes. (If an attacker has physical acess to the link encryption device, assume you've already lost the traffic analysis game.) For link encryption, you probably want to use a self-syncing mode of a block cypher such as CFB Make sure your block cypher is suitable for CFB mode operation. Make sure to use gpg's crypto-strong random output function or something similar to generate your keys. You should rekey at least as often as you sheck the physical integrity of the line.

  • I remember reading about TEMPEST standards from the government. The documents were (mostly) declassified recently and have standards for wiring sensitive (RED) data connections in different environments-- all the way to battlefield conditions.

    Plus, you have some CYA protection here since it's a predefined standard!

    http://www.eskimo.com/~joelm/tempest.html [eskimo.com]

    http://www.fas.org/irp/program/security/tempest.ht m [fas.org]

    ... but I still like the chain link fence idea with guard dogs ...
  • Neither will detect a successful tap, but inducing an electrostatic charge on the conduit (a la the lamps that you touch anywhere on the base to activate/deactivate) would let monitoring systems know if someone touches the pipe to set off an alarm and shut down communications, but would open you up to an easy DOS.

    The second is an OTDR (optical time domain reflectometer) - this will easily detect changes in the fiber layout, and will also tell you exactly where the tap/modification occurred.

    Basically, an OTDR sends a pulse of light and looks at the reflection(s) over time. It will show bends, nicks, etc that occur in the fibre.
  • by p-n-wise ( 526587 ) on Saturday October 20, 2001 @12:37PM (#2454723) Homepage Journal

    The big boys use a plastic sheet coated with carbon tracks in many layers. Goretex (yes the same one that makes boots) sells this stuff. It is generally used to protect small devices from being probed. It works by measuring the resistance of the carbon tracks and can detect sub-micron drills. Crypto units in gov/mil applicions use this technique, so it is considered to be the best method.

    In your case the wire would be wrapped in this stuff and then coated in a soft epoxy resin. Any damage to the sheath and the system can take evasive action...

    I've got a contact in this area - Email me and I'll put you in contact.

  • There are commercial alternatives available which you can use. Some are based on using fibre-optic cables which will be broken if the pressurized oild surrounding gets broken. If you shut down the link until it's manually re-activated if the link evers gets marked as down, then you should have your solution.

    Also, I would not entirely rule out cryptography. If you start by sending as much garbage as you can, then sending encrypted data with no headers only when there's data to be send, instead of the noice, then you should be able to avoid the problems of traffic analysis.

    Personally I'd go with the following method:

    Make two queues, one virtual and one "real". If there's real data to be sent, encrypt it and store it in a buffer. If there's no real data to be sent, grab something from the virtual queue, which gives you either all NULLs, or random data, and encrypt that, then place it in the buffer. Then run another deamon or task which grabs data from the buffer at a constant rate and sends it. That way you'll have a constant stream of encrypted data. All the attacker will see is the encrypted data, and he should not be able to pick out any information usable for traffic analysis.

    This explanation is a nutshell one, you'd need to take care of re-keying etc. You also need a way for the recipient to know if the package is real data or random data. That can be done by prepending a checksum to each package, inside the encryption. If you're using a keyed sha1 checksum then you get authentication as well.

    Keeping in mind that nothing (neither physical nor electronic protection) is 100% secure, I'd combine both cable protection and encryption.

    I'm currently doing work on this encrypted approch, and can be contacted if you're interested.
  • Where I come from, simple and cheap equate to good. Not only with women, but also software solutions. Here's my take on how to solve your little dilema...

    Simply have a script running on the server that periodically (ie less than 1s intervals) sends a single short time-out ping to the other end of the line. If the other side fails to respond, kill the route and interface, and if possible, shut down and lock up the server, since a failed reply strongly suggests that the link has been compromised.

    If you feel like putting more work into the project, you can watch for unwelcome network traffic. Sending out various broadcast requests and looking for their response, as well as things like windows network broadcasts, and again killing the link if unacceptable results are found will give you an added level of security.

    While most of the above physical solutions are clearly outside of your budget, considering you're talking to slashdot and not a properly bonded security consultant, using fiber will make it significantly more difficult for the link to be compromised without detection. Running IPSEC(over IPSEC over...), or better yet not using ethernet & TCP/IP will add an aditional layer of confusion for any potential attackers.

    I could go on and on with various ideas, but I think I've said enough. If you really want more of my ideas, I'd be willing to talk for a case of beer and a hooker. If money's tight, I'll settle for a cheap hooker, just don't skimp on the beer, its where my magical powers come from. ^_^
  • uhhhhh...... (Score:1, Insightful)

    by Anonymous Coward
    How about this...

    Ignore all the people here wanting to use pressurised systems.

    Use fiber, because you can sniff ethernet via copper without having to touch the cable.

    Get some fiber cards that do IPSec at the ethernet packet level. Yes, they make them, because it's what I have to use. They are expensive, about 5K per card, but they do GigE... :)

    Also, when you run the fiber cable, just run it with all of the rest of the cables. You put that cable in a steel pipe with pressure or whatever... you might as well go ahead and label it as "HEY!!! CRACKERS!!!! THE SECURE CABLE IS IN HERE!!!!"

    Go look at the military regulations on the subject. They spent good tax payer dollars to do it.

    But another thing you might look at... Run some copper lines between the two, pick up some Westtel DSL modems, the ones with built in encryption. They have ethernet ports on each side of them, you can then run an additional layer of IPSec across them if you wanted to.

    Your application also encrypts the data... right? have you looked into useing SSH tunnels, or is that out of the question to?

    Just wondering, but if the data is THAT secure... why in the he** are they letting you even cross an insecure area?? I would NEVER be allowed to do that.
  • Hrm. What's the budget?

    You could get interesting.

    If I had an OK budget, I would try the following:

    Create an array of fibre cables running from terminal to server.

    Throw an IPSec Box on each end of each fiber.

    Use a random sequence (transmitted in the first packet of each sequence) for data to be transfered on each cable.
    IE Packet 1 goes through cable 2 packet 3 goes through cable 1, and change that up every 50 packets or so.

    Then cover the CAbles with OTDR and have that monitered on the server. Upon a tamper detection, have the connection shut off. Send notice of some kind through some other datapipe (A serial port with a repeater and Zener (I think that's the right spelling) Diodes to prevent a reverse in current, and have the connection sent to another PC (could be in the room actually) that can Dial out to call your cell or something.

    That should suffice. However, this method is quite useless without physical security :) So physical security is a must.

    If a hacker trys to get into one line (which might not be the right line at the time) he will immediatly set off the OTDR and parralize the system.

    In the meantime (heh, if possible) he still has to break through IPsec *and* get through your own random cable swapping/packet swapping sequence.

    I think that's impossible to break through. (almost? :)

HELP!!!! I'm being held prisoner in /usr/games/lib!

Working...