>From RFC 1994 (CHAP):

"CHAP requires that the secret be available in plaintext form.
   Irreversably encrypted password databases commonly available cannot
   be used."


Peder

----- Original Message -----
From: "Carson Gaspar" <[EMAIL PROTECTED]>
To: "Eric Vyncke" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Monday, July 02, 2001 5:35 PM
Subject: Re: Cisco Security Advisory: IOS HTTP authorization vulnerability


>
>
> --On Friday, June 29, 2001 10:00 AM +0200 Eric Vyncke <[EMAIL PROTECTED]>
> wrote:
>
> > As you probably know, for some password (used notably for SNMP, CHAP,
> > PAP,  IKE, ...) there is a protocol need to get those passwords in the
> > clear.  Hence, the obfuscation mechanism will always be reversible. Even
> > using 3DES  will require a hard coded key hidden somewhere in the IOS
> > code (and a  'simple' reverse engineering will expose this key).
> >
> > Of course, suggestions are welcome
>
> For CHAP, do you actually need the password in the clear, or do you need
> the password+realm hash? The latter is far less dangerous.
>
> --
> Carson
>

Reply via email to