TACACS+ uses an MD5 pad based on the session ID, shared secret, TACACS+ version, and packet sequence number. This is XOR'd over the packet. The pad is in multiples of the MD5 hash length.

The header is sent plain text and includes the sequence number, the session ID and version number.

Encoding and decoding are symmetrical. It is not considered strong encoding.

We're all fortunate RADIUS doesn't use this to encode packets.

Natr Brazell wrote:
Thanks,
I'm looking into IPSEC at the moment. I'm curious how TACACS+ does their encryption? N

On Fri, Aug 6, 2010 at 4:09 PM, Alan DeKok <[email protected] <mailto:[email protected]>> wrote:

    Natr Brazell wrote:
     > Is there a way to secure the communication between the radius
    server and
     > the NAS especially wrt accounting data?

     IPSec.

     Most NASes implement IPv4, and not much else.  "Security" means "don't
    run RADIUS over a network where users have access".

     Alan DeKok.
    -
    List info/subscribe/unsubscribe? See
    http://www.freeradius.org/list/users.html



------------------------------------------------------------------------

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to