stefan/list,

I am not sure this is a freeradius thing, but maybe others have similar questions/issues.

there are obviously different kinds of encryption and as you mention with out a key, decryption
is not possible. that leaves public key based encryption. so, poptop can do ssl based encryption,
can that be utilized to encrypt the transport in much the same way https encrypts http traffic?


the other thing that I am wondering is where the encryption/decryption takes place. I am keeping
my radius server on the pptpd server. so I do not care if the stream from pptpd to the freeradius
server is encrypted. so, when I connect, I encrypt at my client and then the pptpd calls the
freeradius plugin for authentication. does anyone know if pptpd decrypts before it passes the string to freeradius for authentication? or does it just pass on the encrypted stream and thus tries
to compare the mschapv2 encrypted stream with a md5 encrypted unix password? which lead to alan's response of "it won't work and never will".


if I am a user/admin that is concerned about security and manageablity am I stuck in the market
for a contivity vpn server ($$) that offers encrypted transport since it has its own client and can
thus handle the key management via that same $$?


thanks,
cb

From: [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: problem authenticating to passwd/shadow files
Date: Wed, 20 Oct 2004 17:42:20 +0100

        Hi,

> 2. what is the best way to have encrypted transport
> and encrypted passwords?

It depends on what you mean by encryption. Of course you
can encrypt stuff by some symmetric encryption method and
store the key to get the cleartext from the encrypted text
somewhere (e.g. radius secrets), but that essentially means
the password is protected just by another password which
is somewhat pointless.

So, the term "encrypted" password as its used in normal conversation
is just missleading. It normally really means "something which
allows you to check correctness of the password, but doesn't
allow you to get back to the password, no matter what". Typically,
it's a hashed password or a challenge-response protocol or something
similar, _not_ an enrypted password.

In that sense, you can have _either_ encrypted transport (i.e. the
server sends a challenge and the client encrypts the challenge
using the password as encryption key), then the server needs to
know the password to verify the correctness ((MS-)CHAP protocols).
_Or_ you can transfer the password ("unencrypted" transport)
and let the server check that it can be hashed to the correct
value (PAP-protocol).

However, you cannot avoid the need to _either_ actually
transfer the password in every authentication _or_ have the
server always know the password.

Of course, if you decide to transfer the password, you can
add some protection such that not everybody sniffing the
conversation can immediately read it (that's what the radius
secret is used for in the conversation between AP and radius server,
conversation between client and AP is the more vulnerable part,
though).

And just the same, if you decide to store in on the server, you
can add some protection such that not everybody sniffing on your
local network can easily read it (e.g. putting it on a local
disk instead of transporting it via NFS/Samba/whatever or
putting it in an encrypted file or putting it in a file readable
by root only and what ever else you can come up with).

        Regards,
                Stefan



-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



- List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to