[Snort-users] DSL

Rich Adamson radamson at ...2127...
Tue Jan 7 06:01:01 EST 2003


> Is it a fact that you can only sniff the traffic on
> DSL that's directed only to you and you caint sniff
> any other traffic at all?

That depends 100% on how your telephone company and ISP configured
their dsl offering. In most US cases, the telephone company provides
the basic dsl pipe, and most of the layer 2 and/or 3 components are
implemented by the ISP. There has been three popular implementations.

1. small telephone companies frequently use a relatively inexpensive
 dslam-like device that act similar to a hub. The equipment allows
 one dsl subscriber to see and interact with some of the other dsl
 subscriber's systems. (Most of these devices appear almost like
 ethernet extenders with no layer 2 or 3 functionality to speak of.)

2. some ISPs implement their head-end equipment in bridging mode as
 it's the easiest configuration to use when you don't understand all
 the technical dsl details. Later they generally wish they would have
 used a true layer-3 approach, but it becomes too costly for them to
 revisit their dsl customers to switch to another implementation.
 The bridging approach will allow broadcasts and some other traffic
 to appear at a customer's location that has no business for going
 there (wastes bandwidth). Given the chatty nature of Microsoft
 systems, you will see some traffic from other dsl customer machines.

3. some ISPs implement true layer-3 at the head-end, reducing the 
 amount of other dsl customer traffic seen at your location. That
 implementation generally requires a fair amount of understanding 
 and planning prior to activating a dsl offering.

4. regardless of how the telephone company and ISP configure their
 equipment, the majority use dsl modems at the customer location
 that implements Network Address Translation (NAT). The NAT function
 provides a very basic firewall-like function that further reduces
 (and in many cases eliminates) any traffic from neighboring dsl
 users. Pure guess is that something greater then 90% of all dsl
 modems in use implement NAT in one form or another.

Since most people don't have access to the equipment necessary to
sniff (or snort) the actual physical dsl circuit, whether adjacent 
dsl customer traffic appears on the wire is mostly irrelevant (except 
for the small amount of bandwidth consumed by this unproductive 
neighbor broadcast traffic, etc).

If you sniff/snort the ethernet side of the dsl modem (as opposed to
the physical dsl circuit) and see broadcasts, the implementation is
probably either #1 or #2, above.

The telphone companies generally consider the dsl modem as "customer 
owned" equipment. Therefore, a fairly large percentage of dsl providers 
leave the dsl modem open to console, telnet, web and/or snmp access
in one direction or the other. In some implementations, the modem is
password protected, but the password is given to the customer since the
box is considered customer owned. If a hacker-type subscribes to dsl 
services, he can reconfigure the dsl modem in some cases to allow him 
to sniff/snort more of his neighboring dsl customer traffic then what 
would normally be seen. If the telephone company uses #1, above, the
hacker would see most/all neighboring dsl traffic.

If security is a concern for a dsl customer (regardless of the above),
then the customer should consider an on-site firewall-like device
to reduce the possibility of neighbors rummaging through their mostly
open PC systems, etc.





More information about the Snort-users mailing list