T 2.87 Use of insecure protocols in public networks

When communication is performed using public networks, especially the internet, a series of threats arises when insecure protocols are used.

One serious threat is that confidential information could fall into the wrong hands. Protocols transmitting information in plain text must be considered insecure protocols in particular. Since it is impossible to predict the route taken by the data packets when transmitted over the internet, it is possible in this case to read the information transmitted at various locations. This is particularly critical when the data contains the following types of information:

Examples of protocols transmitting all information in plain text include:

With such protocols, it is possible to read and possibly even change all information transmitted over any computer located in the communication route. The transmission of credit card numbers and passwords in the internet using HTTP connections is particularly critical.

Using password sniffers, it is possible to read passwords while they are being transmitted to a system. This then allows the attacker to gain access to this IT system and subsequently perform other attacks locally on the computer.

Man-in-the-middle attacks and session hijacking are potential threats when using one of the protocols mentioned, especially HTTP or Telnet (see T 5.89 Hijacking of network connections). During these types of attacks, an attacker is not only able to read information, but is also able to actively inflict damage by changing the transactions currently being

processed. For example, prices or order quantities in orders placed over the internet can be changed so that the person who sent the order only sees and receives confirmation for the items or the delivery address he/she has entered, while the attacker sends an order to the seller for a significantly larger amount, which is then sent to a different delivery address.

In addition to the protocols mentioned transmitting all information in plain text, there are also protocols that at least permit encryption of the transmission containing the authentication data. However, there is still a risk that the utilisation information transmitted could be read.