La séance de questions-réponses d'aujourd'hui nous est offerte par la sous-division SuperUser de Stack Exchange, un groupe de sites Web de questions-réponses dirigé par la communauté.
Photo gracieuseté de Kit (Flickr).
La question
Le lecteur superutilisateur newperson1 veut savoir s’il est possible que son propriétaire ait accès à son réseau personnel:
Can my landlord access things on my personal router’s network because he controls the upstream connection? For example, the DLNA on my NAS, a public file share on my NAS, or the media server running on my laptop?
Here is my configuration: I have my own router and connected to it are an NAS (wired) and a laptop (wireless). The Internet/WAN port on my router is plugged into a LAN port on my landlord’s router. The Internet/WAN port on my landlord’s router goes to the cable modem. I am the only one with access and the password to my router. I do not have access or the password to my landlord’s router or the cable modem.
Est-il possible que le propriétaire de newperson1 puisse accéder à son réseau personnel?
La réponse
Techie007 et Marky Mark, contributeurs au SuperUser, ont la solution pour nous. Tout d'abord, Techie007:
No, your router should block incoming access to your LAN just like it would if it was connected directly to the Internet. He may be able to sniff your Internet traffic though (since he is between you and the Internet).
You can read through these other SuperUser questions for more information:
- How much information can my ISP see?
- What information can my ISP see from my router?
Suivi de la réponse de Marky Mark:
The other answers are basically correct, but I thought I would expand on the topic. Hopefully this information will be useful.
As long as you have your router in a standard configuration, it should block unsolicited incoming network connection attempts, essentially acting as a blunt firewall.
Port Forwarding
Settings which increase your exposure surface would be forwarding any ports into your local area network (the devices connected to your router).
Be aware that some services on your network might open ports via UPnP (Universal Plug and Play), so if you want to be sure that no one is snooping inside your network, consider disabling UPnP in your router’s settings. Be aware that it will prevent anyone from connecting to a service on your network, such as hosting a video game.
Wi-Fi
If your router has Wi-Fi, consider the possibility that someone can potentially connect to it. Someone who connects to your Wi-Fi service is essentially on your local network and can see everything.
So, if you use Wi-Fi, make sure that you use the maximum security settings. At a minimum, set the network type to WPA2-AES, disable legacy support, set keys to reset a minimum of once per 24 hours, and choose a complex Wi-Fi password.
Protocol Sniffing and VPNs
As your landlord sits between you and the public Internet, he could potentially look at all traffic going into and out of your router. This is relatively easy to do and there are freely available network diagnostic tools to do this with.
Encrypted traffic between your browser and a website is generally safe as far as the content goes, however your landlord would be able to see what websites you visit (though not necessarily the specific pages).
However, consider that many web pages are not encrypted, and then there are all your mobile apps, e-mail, and other online activity that is potentially sent in the clear.
If you want ALL your traffic to be encrypted, then you need to use an encrypted virtual private network (VPN). A VPN connects your network to the network of a VPN operator (usually a commercial enterprise) using encrypted protocol tunneling.
Ideally, the VPN would encrypt using AES encryption and the connection would be established at the router level so that all WAN traffic (to the internet) is encrypted and routed via the VPN.
If the router does not support VPN, then you will need to set it up on each and every device (computer, phone, tablet, console, etc.) for the traffic you want to be secure.
Encryption
As a general security principle, I advocate strongly encrypting all traffic. If everything is strongly encrypted, anyone snooping on you will not know where to begin. But if you only encrypt “important stuff”, then they will know exactly where to attack.
Avez-vous quelque chose à ajouter à l'explication? Sound off dans les commentaires. Voulez-vous lire plus de réponses d'autres utilisateurs de Stack Exchange doués en technologie? Découvrez le fil de discussion complet ici.