It is only possible to 'sniff' packets on a network by physically
connecting a machine to it.
This could be a problem if you are authenticating users across an
(untrusted) link but if your radius servers and Portmasters are on the
same physical network together with only 'trusted' machines there isn't
really anything to worry about.
Cheers
Phil
-----Original Message-----
From: Jeff Northon [mailto:jeffo@seashell.sasquatch.com]
Sent: Wednesday, July 15, 1998 03:01
To: portmaster-users@livingston.com
Subject: (PM) set secret - encryption
Hi!
from: http://www.livingston.com/Tech/Technotes/500/510006.html
The users' passwords are encrypted as they are passed between Portmaster
and RADIUS. In order to de-crypt these passwords each Portmaster and
each respective line in RADIUS must have a matching key to crypt and
decrypt these passwords.
On the Portmaster the key is set with the following command:
set secret testing123
Is this encryption strong enough to not get picked off by a skilled
hacker sniffing on a network connection?
Should I worry about this or not?
Thanks,
Jeff Northon
-
To unsubscribe, email 'majordomo@livingston.com' with
'unsubscribe portmaster-users' in the body of the message.
Searchable list archive: <URL:http://www.livingston.com/Tech/archive/>
-
To unsubscribe, email 'majordomo@livingston.com' with
'unsubscribe portmaster-users' in the body of the message.
Searchable list archive: <URL:http://www.livingston.com/Tech/archive/>