Reading
packets as they go by, frequently called packet
sniffing, is a frequent way of gathering information. If
you're passing around important information unencrypted, it may
be all that an attacker needs to do.
In order to read a packet, the attacker needs to get the packet
somehow. The easiest way to do that is to control some machine that
the traffic is supposed to go through anyway (a router or a firewall,
for instance). These machines are usually highly protected, however,
and don't usually provide tools that an attacker might want to
use.
Usually, it's more practical for an attacker to use some
less-protected machine, but that means that the attacker needs to be
able to read packets that are not addressed to the machine itself. On
some networks, that's very easy. An Ethernet network that uses
a bus topology, or that uses 10-base T cabling with unintelligent
hubs, will send every packet on the network to every machine.
Token-ring networks, including FDDI rings, will send most or all
packets to all machines. Machines are supposed to ignore the packets
that aren't addressed to them, but anybody with full control
over a machine can override this and read all the packets, no matter
what destination they were sent to.
Using a network switch to connect machines is supposed to avoid this
problem. A network switch, by definition, is a network device that
has multiple ports and sends traffic only to those ports that are
supposed to get it. Unfortunately, switches are not an absolute
guarantee. Most switches have an administrative function that will
allow a port to receive all traffic. Sometimes there's a single
physical port with this property, but sometimes the switch can turn
this function on for any port, so that an attacker who can subvert
the switch software can get all traffic. Furthermore, switches have
to keep track of which addresses belong to which ports, and they only
have a finite amount of space to store this information. If that
space is exhausted (for instance, because an attacker is sending fake
packets from many different addresses), the switch will fail. Some of
them will stop sending packets anywhere; others will simply send all
packets to all ports; and others provide a configuration parameter to
allow you to choose a failure mode.