RE: (PM) set secret - encryption

Phil Taylor (Phil@lansystems.co.uk)
Wed, 15 Jul 1998 09:49:27 +0100

If this is a concern to you then (IMHO) the concern should be not
whether Radius encryption is strong enough but who has 'physical' access
to your network.

It is only possible to 'sniff' packets on a network by physically
connecting a machine to it.

This could be a problem if you are authenticating users across an
(untrusted) link but if your radius servers and Portmasters are on the
same physical network together with only 'trusted' machines there isn't
really anything to worry about.

Cheers

Phil

-----Original Message-----
From: Jeff Northon [mailto:jeffo@seashell.sasquatch.com]
Sent: Wednesday, July 15, 1998 03:01
To: portmaster-users@livingston.com
Subject: (PM) set secret - encryption

Hi!

from: http://www.livingston.com/Tech/Technotes/500/510006.html

The users' passwords are encrypted as they are passed between Portmaster
and RADIUS. In order to de-crypt these passwords each Portmaster and
each respective line in RADIUS must have a matching key to crypt and
decrypt these passwords.

On the Portmaster the key is set with the following command:

set secret testing123

Is this encryption strong enough to not get picked off by a skilled
hacker sniffing on a network connection?

Should I worry about this or not?

Thanks,

Jeff Northon

-
To unsubscribe, email 'majordomo@livingston.com' with
'unsubscribe portmaster-users' in the body of the message.
Searchable list archive: <URL:http://www.livingston.com/Tech/archive/>
-
To unsubscribe, email 'majordomo@livingston.com' with
'unsubscribe portmaster-users' in the body of the message.
Searchable list archive: <URL:http://www.livingston.com/Tech/archive/>