HP 635n Practical IPsec Deployment for Printing and Imaging Devices - Page 19

Cargo

Page 19 highlights

To further explain, we'll bring up an analogy. You are a paleontologist in charge of a recent discovery of a new Tyrannosaurus Rex fossil. The skeleton was separated into fossils and these fossils have been distributed to various other paleontologists. The goal is to move these fossils to a museum across the country where the separate fossils will be assembled into a complete skeleton. Because money is an issue and the fossils can't be mailed, you devise a plan to deliver them across the country. Essentially, each paleontologist that has the fossils will put them in a package and hire a truck driver to deliver them to a city along the way. In the intermediate city, the cargo will be transferred to another hired driver's vehicle which will continue on with the delivery of the package. This process will be continued until all the cargo is delivered to the museum. Figure 17 - Cargo In our analogy, the truck/driver represents the Ethernet frame. The cargo represents the IP packet. The IP packet contains the original source (warehouse) address and final destination (museum) address and the data (fossils). The Ethernet frame is addressed from source to intermediate destination - not from original source to final destination - and encapsulates the data (IP packet). The IP packet is transferred from Ethernet frame to Ethernet frame. This concept is very important to understand for Man-In-The-Middle (MITM) attacks. Let's continue our analogy: An upset paleontologist, who didn't get a chance to examine any fossils, finds out about the shipment. He secretly changes the sign at the Intermediate Stop Point B to point to a new location. Essentially, he intercepts the cargo. He is able to examine the fossils and then hires another driver to drive the rest of the way to the museum. By making sure the museum receives the fossils, no one will suspect any mischief was done. He has executed a successful Man-In-The-Middle attack. 19

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193

19
To further explain, we’ll bring up an analogy.
You are a paleontologist in charge of a recent discovery of a new Tyrannosaurus Rex fossil.
The skeleton was separated into
fossils and these fossils have been distributed to various other paleontologists.
The goal is to move these fossils to a museum
across the country where the separate fossils will be assembled into a complete skeleton.
Because money is an issue and the
fossils can’t be mailed, you devise a plan to deliver them across the country.
Essentially, each paleontologist that has the fossils
will put them in a package and hire a truck driver to deliver them to a city along the way. In the intermediate city, the cargo
will be transferred to another hired driver’s vehicle which will continue on with the delivery of the package.
This process will
be continued until all the cargo is delivered to the museum.
Figure 17 - Cargo
In our analogy, the truck/driver represents the Ethernet frame.
The cargo represents the IP packet.
The IP packet contains the original source (warehouse) address and final destination (museum)
address and the data (fossils).
The Ethernet frame is addressed from source to intermediate
destination – not from original source to final destination – and encapsulates the data (IP packet).
The
IP packet is transferred from Ethernet frame to Ethernet frame. This concept is very important to
understand for Man-In-The-Middle (MITM) attacks.
Let’s continue our analogy:
An upset paleontologist, who didn’t get a chance to examine any fossils, finds out about the shipment.
He secretly changes the
sign at the Intermediate Stop Point B to point to a new location.
Essentially, he intercepts the cargo.
He is able to examine the
fossils and then hires another driver to drive the rest of the way to the museum.
By making sure the museum receives the fossils,
no one will suspect any mischief was done. He has executed a successful Man-In-The-Middle attack.