[28387] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: ABOVE.NET SECURITY TRUTHS?

daemon@ATHENA.MIT.EDU (Greene, Dylan)
Fri Apr 28 17:24:29 2000

Message-ID: <7C06EA1D5AAAD311B4EB00508B550B99014F7A2A@navexc01.and.navisite.com>
From: "Greene, Dylan" <DGreene@NaviSite.com>
To: "'Paul Froutan'" <pfroutan@rackspace.com>, rmeyer@mhsc.com
Cc: nanog@merit.edu
Date: Fri, 28 Apr 2000 17:10:23 -0400
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Errors-To: owner-nanog-outgoing@merit.edu



Maybe I should read the entire message before responding.. hehe.. =)

A switched private management lan resolves the cleartext problem.  

SSH version 1 is apparently supported in 12.0 as well (never played w/ it,
so dunno how well it works);

http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/120newft/120
limit/120s/120s5/sshv1.htm

..Dylan 

| -----Original Message-----
| From: Paul Froutan [mailto:pfroutan@rackspace.com]
| Sent: Friday, April 28, 2000 4:46 PM
| To: rmeyer@mhsc.com
| Cc: nanog@merit.edu
| Subject: RE: ABOVE.NET SECURITY TRUTHS?
| 
| 
| 
| I don't think you can.  However, I use TACACS on all my switches and 
| routers.  From what I know, TACACS passwords are encrypted 
| using the key on 
| your network devices and the TACACS server.  So, that, in 
| combination with 
| a private management LAN not accessible by your customers 
| should lock down 
| your network pretty effectively.  Any comments?
| 
| At 4/28/00 -0700, you wrote:
| 
| > > Exiled Dave
| > > Sent: Friday, April 28, 2000 1:10 PM
| >
| > > Lets think about this, cisco in no way has such a flaw
| > > that would allow someone to 'root' and erase all the
| > > info on switches. The password was sniffed.
| >
| >Can one setup SSH on a Cisco 6509?
| 
| Paul Froutan                              Email: 
| pfroutan@rackspace.com
| Rackspace, Ltd                       <http://www.rackspace.com>
| 
| 


home help back first fref pref prev next nref lref last post