[190336] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Cisco 2 factor authentication

daemon@ATHENA.MIT.EDU (Alan Buxey)
Sun Jun 26 13:24:02 2016

X-Original-To: nanog@nanog.org
In-Reply-To: <CAAAwwbUCrC3VX106bfEV0AyBFu2mroPUJt_gfUZrQsiMdWgLJg@mail.gmail.com>
From: Alan Buxey <A.L.M.Buxey@lboro.ac.uk>
Date: Sun, 26 Jun 2016 18:23:49 +0100
To: Jimmy Hess <mysidia@gmail.com>, Chris Lawrence <clawrence@dovefire.co.uk>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

As per other statements of such seen elsewhere online, do you have examples or code which will allow the recovery of passwords in a radius exchange? Yes,  the shared secret mechanism is widely stated as 'weak' but actively attacked?  

alan

home help back first fref pref prev next nref lref last post