Like someone else said, PPTP is not secure in any of it's iterations. Anyone that can stiff your traffic can trivially break the CHAP password exchange:

http://www.hak5.org/episodes/episode-612

If you need an alternative I highly recommend L2TP/IPsec. It does *proper* 2 factor authentication (X.509 certificate + password) if so desired and clients are built into a wide variety of operating systems: NT5 (aka Windows 2000) and higher, Mac OS x 10.3 and newer, most smartphone OSs, etc. Virtually all non-tonka-toy firewalls have a built-in L2TP/IPsec server.

If you don't want to to certificate authentication for the IPsec portion you can also do a PSK (pre-shared key), although my experience is that it is easier to set a PSK in XP and newer than it is in Win2k.

Phillip Partipilo <[email protected]> previously uttered:

There are a lot of things in transition here, but one little one has been implementation of a Watchguard UTM box. Recently remote SSL VPN users have been having issues. I'm taking that up with support, so not asking about that. But call me an old stubborn fart, but I have things working with PPTP, which Windows has a built in client for, and now theres the addition of SSL which needs additional software. Maybe call me a minimalist, but the less 3rd party crap I have to install on my PC, the more streamlined it stays. Comments?

--

Phil Brutsche
[email protected]


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to