(e-mail address removed) hath wroth:
A lot of sniffing and snooping may be going on, under the guise of
"corporate security". Unless there is a termination or other blatant
disclosure, one might never know what has been observed.
That would seem a bit paranoid but possible. The company would need a
good reason to justify such a fishing expedition. There would also
need to be some evidence of wrong doing, documented procedures for the
inevitable trial or labor board hearing, and possibly proof of secure
handling of the accumulated evidence. If the evil corporation is
going fishing, it would be considered good form if the fish were
suitable for litigation or termination. Otherwise, why bother?
From my limited experiences, some companies do sniff internet traffic
in order to detect viruses and leakage of internal documents. I
installed a sniffer long ago that looked for specific project names in
SMTP packets. However, that's about the limits of sniffing that I've
seen.
Snooping around a users network backwards via VPN is possible. One
software company installs VNC and SSH in addition to the usual IPSec
VPN client on their users laptops. The purpose is not for the admins
to spy on their programmers, but rather so that the programmers can
pickup files from their home machines in a secure manner. VNC is
setup to only operate inside the VPN tunnel. However, it would be
fairly easy to use VNC to spy on the rest of the users home LAN.
That wouldn't exactly be the case in a normal setup. Those other vile
computers would probably have no access to the corporate LAN, because they
aren't running Nortel clients, and the "normal" LAN has no access to the
work PC once it connects to the VPN.
Agreed. The "normal" VPN setup disconnects the local LAN and sends
all traffic through the remote VPN gateway. Every time I connect, I
immediately lose my local networked printer, any local servers, my IM
connections, Skype goes dead, etc. Some reconnect via the VPN if
there is an internet connection at the other end of the tunnel, but
the LAN stays disconnected.
However, that's the "normal". It would not take much imagination to
visualize a method by which the "normal" VPN security can be
compromised. Setting the default gateway to NOT go through the tunnel
to the remove VPN router is a good start. Bridging the ethernet
interface to a wireless device is another. Adding forensic "helper"
applications will certainly do the job.
The big exposure is that he is only occasionally required to use the VPN,
implying that the work PC might be infected at some time while not under
the corporate security umbrella.
I used to assume that corporate laptops had their security fairly well
nailed down with security templates and Windoze group policy
management.
http://www.cisecurity.com
Then, I took a close look at some allegedly secure laptops owned some
banks, insurance companies, and medical offices. Methinks that
malware infection is a definite risk and I'm amazed that it doesn't
happen more often with such laptops.
Hmmm. That wouldn't be a "Nortel VPN" connection then... it should be more
obviously a corporate router, which wasn't mentioned, and is unlikely,
since the VPN portion of the connection has been described as occasional.
I don't have any experience with Nortel VPN's, but I guess(tm) that
it's just another IPSec VPN with the usual assortment of
encapsulation, authentication, and encryption options. As long as
Nortel hasn't added anything proprietary, it should work with any VPN
device including the hardware VPN routers such as Sonicwall. Nortel
does make a small VPN router (Model 600), but you're correct that the
OP probably doesn't have one as it's more suitable for a branch office
than a home user.
|
http://products.nortel.com/go/product_content.jsp?prod_id=34760
Hard to say. Asking three times in slightly different fashion can
certainly elicit N^3 different responses ;-)
Have you ever noticed that if you ask a doctor or lawyer for an
opinion, you'll never get a single answer? You always get multiple
possibilities leaving you with the responsibility of making the
decision. If you decide incorrectly, the doctor or lawyer can claim
it wasn't their advice that sent you astray, it was your decision. In
keeping with such established procedures, I always muddle my answers
with a surplus of possibilities, thus offering me an easy way out if I
happen to be wrong.