On 29/01/2007, at 10:07 PM, Alan DeKok wrote:

James Lever wrote:
I'm stuck trying to work out how to avoid sending the password unhashed
to the server

  Why?

Two reasons - first I am trying to limit risk of client misconfiguration - if a client has misconfigured their supplicant, to avoid passwords inadvertently going through in the clear and secondly to limit the risk of account compromise through abuse of privileges on the radius server. Yes, I realise that this is a small risk, but I'm just trying to see how far I can go in terms of securing the user credentials.

See my web page for compatibility issues: http:// deployingradius.com/documents/protocols/compatibility.html

Thanks for the pointer. This helps clarify the requirements of the different authentication mechanisms.

Your desires are contradictory. If the password is hashed in EAP- TTLS, then the server needs the cleartext password in order to authenticate the user. I don't understand why giving the server access to the cleartext passwords is such a terrible thing to do.

What are the risks of client misconfiguration such that it will actually get to the point of attempting to transmit the password in the clear?

cheers,
James



- List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to