[28386] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: ABOVE.NET SECURITY TRUTHS?

daemon@ATHENA.MIT.EDU (Danny McPherson)
Fri Apr 28 17:20:33 2000

Message-Id: <200004290315.VAA20713@tcb.net>
To: nanog@merit.edu
From: Danny McPherson <danny@tcb.net>
Reply-To: danny@tcb.net
Date: Fri, 28 Apr 2000 21:15:10 -0600
Errors-To: owner-nanog-outgoing@merit.edu



IMO, it requires more than this.  Ideally, one-time, token-based (i.e. SecurID)
passwords, coupled with SSH, is the best solution, especially with the turnover
rates at providers these days.  

Of course, this also requires that all the backend (RADIUS, configuration management,
etc..) and out-of-band systems are secure, which is another rathole altogether.

As for this incident, well, I think if the intial intent of the 
"divulging message" was simply to remind folks to change their 
passwords, the points been made.

-danny

> 
> I don't think you can.  However, I use TACACS on all my switches and 
> routers.  From what I know, TACACS passwords are encrypted using the key on 
> your network devices and the TACACS server.  So, that, in combination with 
> a private management LAN not accessible by your customers should lock down 
> your network pretty effectively.  Any comments?


home help back first fref pref prev next nref lref last post