Avatar of Supahoop
Supahoop
 asked on

Secure traffic between 2 desktops

Hi Experts,
I was hoping for some advice.

This is the setup we have - we have an application running on a Windows 10 machine that sends TCP traffic to another Windows 10 machine. The 2 machines are in the same subnet but are not in a domain. Neither are allowed access to the internet.

We need to encrypt the traffic between the 2 machines to prevent a 'man in the middle attack'. Can you please advise on the best method to achieve this? We can use third party software but cannot change our application. The current method we're exploring is an IPsec tunnel between the machines but have yet to get this to work.

Thanks in advance
Network Security

Avatar of undefined
Last Comment
John Tsioumpris

8/22/2022 - Mon
SOLUTION
McKnife

THIS SOLUTION ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
GET A PERSONALIZED SOLUTION
Ask your own question & get feedback from real experts
Find out why thousands trust the EE community with their toughest problems.
John Tsioumpris

I want to ask 2 two machines are they on your premises ?
Supahoop

ASKER
Hi both,
Thanks for getting back to me

Not we're not using shares unfortunately.

Yes both machines are on our premises

Many thanks
John Tsioumpris

So how exactly there is the chance for man in the middle ?...are they connected via wireless or cable ?
I started with Experts Exchange in 2004 and it's been a mainstay of my professional computing life since. It helped me launch a career as a programmer / Oracle data analyst
William Peck
McKnife

"Not we're not using shares unfortunately." - so what are you using?
Supahoop

ASKER
Connected by cables via switch

pushing the traffic via certain ports to a 'listener' application on the second desktop.
ASKER CERTIFIED SOLUTION
John Tsioumpris

THIS SOLUTION ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
GET A PERSONALIZED SOLUTION
Ask your own question & get feedback from real experts
Find out why thousands trust the EE community with their toughest problems.
McKnife

I agree with John. Doing attacks that can do without the switch mirroring port is not easy and will definitely be noticed at the client due to a massive slowdown not only of network traffic but of also of working on the machine. The risk is low when there's no accessible mirroring port involved.

Of course you could also go another route: install wifi cards into the machines and use wireless encryption, give the key to no one else
⚡ FREE TRIAL OFFER
Try out a week of full access for free.
Find out why thousands trust the EE community with their toughest problems.
John Tsioumpris

If the machines are less than 100m you can use a crossover cable to connect between them and do some kind on enclosing so none has access (at least without causing severe and noticeable damage)
SOLUTION
Natty Greg

THIS SOLUTION ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
⚡ FREE TRIAL OFFER
Try out a week of full access for free.
Find out why thousands trust the EE community with their toughest problems.
Supahoop

ASKER
Hi all,
We ended up using OpenVPN in bridged mode.

Thanks for all your help
McKnife

Supahoop, you should close the question and award points according to what were helpful comments.
Experts Exchange has (a) saved my job multiple times, (b) saved me hours, days, and even weeks of work, and often (c) makes me look like a superhero! This place is MAGIC!
Walt Forbes
John Tsioumpris

The question left a lot to speculate..comments were correct