Thanks to all whom replied for your insight and direction.




Regards,

Chuck






On Fri, 2005-09-16 at 20:10, [EMAIL PROTECTED] wrote:
>         Hi,
> 
> > You must have missed the information in RFC 2865 (RADIUS), which is also 
> > a Fine Manual.  The PAP password is XOR'd with the MD5 hash of the 
> > shared secret and the authenticator.
> 
> Yes, that's a bit clearer than saying "the password is hashed", since it
> also shows that the process is reversible and you can easily obtain the
> cleartext password from the "obfuscated" password.
> 
> > You've been reading about the protocol prior to the RADIUS client's 
> > involvment. The same thing applies to CHAP, just to head you off.
> 
> No, not quite. Here, the password is (essentially) used as a key to compute
> the hash value of a challenge. Most notably, this means you (or the server) 
> have
> no way whatsoever to get back to the clear text password from what is 
> transmitted
> to the server.
> 
>         Regards,
>               Stefan  
> 
> 
> 
> - 
> List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to