Threat Level: green Handler on Duty: Russell Eubanks

SANS ISC: InfoSec Handlers Diary Blog - Con-fu revisited InfoSec Handlers Diary Blog

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Con-fu revisited

Published: 2007-07-28
Last Updated: 2007-07-28 04:23:56 UTC
by Kyle Haugsness (Version: 1)
0 comment(s)

Next week is a very famous pair of security conferences in the US.  I imagine quite a few of our readers will be attending.  So I offer my tips on secure networking from untrusted wireless networks.  You don't want to end up on the "Wall of Shame", right?  Assuming that you trust your wireless device drivers and SSH, here are my tips (from 2005):

Please note that you can do this a little more easily without the Squid proxy on your remote SSHD (and using the built-in SOCKS proxy of SSH).  However, if you use that approach your DNS requests still go through the local network.  If you use Squid, your DNS requests are also proxied which is benefitial.

Also note that the wireless network does seem _way_ more reliable the past two years, but it still goes down occassionally.

0 comment(s)
Diary Archives