[161625] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Cisco password implementation trubs: weakened strength?

daemon@ATHENA.MIT.EDU (Nick Hilliard)
Thu Mar 21 06:57:15 2013

X-Envelope-To: <nanog@nanog.org>
Date: Thu, 21 Mar 2013 10:57:02 +0000
From: Nick Hilliard <nick@foobar.org>
To: nanog@nanog.org
In-Reply-To: <CABL6YZQFf9_e9va0J15kdz1np-Jv-jeZ1Vi9LPnNewGKwMzDNg@mail.gmail.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 21/03/2013 10:10, jamie rishaw wrote:
> apparently, Cisco is changing its password schemas.
> 
> old: pbkdf2 by 1k, salted
> vs
> New: (type 4) unsalted sha256
> ..
> discuss.?

security advisory:

> http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20130318-type4

which states:

> Because of the issues discussed in this Security Response, Cisco is
> taking the following actions for future Cisco IOS and Cisco IOS XE
> releases:
> 
> Type 4 passwords will be deprecated: Future Cisco IOS and Cisco IOS XE
> releases will not generate Type 4 passwords. However, to maintain
> backward compatibility, existing Type 4 passwords will be parsed and
> accepted. Customers will need to manually remove the existing Type 4
> passwords from their configuration.

Kudos to Cisco - this was the right thing to do.

Nick



home help back first fref pref prev next nref lref last post