[21183] in bugtraq

home help back first fref pref prev next nref lref last post

Re: ISS Security Advisory: Wired-side SNMP WEP key exposure in

daemon@ATHENA.MIT.EDU (Brandon S. Allbery KF8NH)
Mon Jun 25 13:00:04 2001

Date: Fri, 22 Jun 2001 17:47:27 -0400
From: "Brandon S. Allbery KF8NH" <allbery@ece.cmu.edu>
To: bugtraq@securityfocus.com
Message-ID: <15350000.993246446@vpn100.ece.cmu.edu>
In-Reply-To: <3B312495.49CA0B6C@atpco.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

On Wednesday, June 20, 2001 17:32:53 -0500, Matthew Potter 
<mpotter@atpco.com> wrote:
+-----
| If i remeber correctly arent the lucent access point products root/snmp
| write and read access products passwd "public" ?  I think you need to
| enable snmp on the lucent box though...  you can user their windows
| client and plug in "public" and your in...
+--->8

By default, yes; so is the Apple AirPort (I think these are all KarlBridge
products in disguise).  And SNMP is enabled by default because that's how 
they're configured.

I just change the password when I configure it for the first time.

-- 
brandon s. allbery     [os/2][linux][solaris][japh]   allbery@kf8nh.apk.net
system administrator        [WAY too many hats]         allbery@ece.cmu.edu
electrical and computer engineering                                   KF8NH
carnegie mellon university     ["better check the oblivious first" -ke6sls]


home help back first fref pref prev next nref lref last post