From RFC 1994 (CHAP): "CHAP requires that the secret be available in plaintext form. Irreversably encrypted password databases commonly available cannot be used." Peder ----- Original Message ----- From: "Carson Gaspar" <carsonat_private> To: "Eric Vyncke" <evynckeat_private>; <bugtraqat_private> Sent: Monday, July 02, 2001 5:35 PM Subject: Re: Cisco Security Advisory: IOS HTTP authorization vulnerability > > > --On Friday, June 29, 2001 10:00 AM +0200 Eric Vyncke <evynckeat_private> > wrote: > > > As you probably know, for some password (used notably for SNMP, CHAP, > > PAP, IKE, ...) there is a protocol need to get those passwords in the > > clear. Hence, the obfuscation mechanism will always be reversible. Even > > using 3DES will require a hard coded key hidden somewhere in the IOS > > code (and a 'simple' reverse engineering will expose this key). > > > > Of course, suggestions are welcome > > For CHAP, do you actually need the password in the clear, or do you need > the password+realm hash? The latter is far less dangerous. > > -- > Carson >
This archive was generated by hypermail 2b30 : Wed Jul 04 2001 - 14:26:44 PDT