MPPE-128 is the encryption typically used in PPPoE sessions. While this will encrypt a PPPoE session with what I consider to be weak 128-bit RC4 encryption, the hardware needs to support it. Most PPPoE client hardware out there doesn't support PPPoE encryption, so the session is plaintext. I know the higher end stuff will support PPPoE with encryption, but most customers won't pay for it.

Back to the original question in this thread, educate the users. Add several layers to the onion. WEP, MPPE-128 and SSL are all pretty weak in my opinion. Combined, they will keep the information encrypted and safe from prying eyes. However, if someone wants the data from that customer, they will get it no matter what you do for encryption.

--Blaine


At 09:09 AM 7/1/2003, you wrote:
> David Berndt

>      Eje, I would ussually agree with you there but there are
approximately 0
> bb routers that do encrypted pppoe, sure some of them do secure mschapv2
> authentication but none of them (excluding snapgear and draytek
possibly)
> do encrypted pppoe. The point of the original post was to see if an
> encrypted tunnel could be created to help with security or atleast with
> the users feeling of "security".


Uhhhh.... I always thought PPOE included some (thin?) form of security that would prevent the casual sniffer from seeing plain text flying around. Does it provide anything at all for encrypting the connection, or is it just a neat way to authenticate legit users?

Tim Foster
www.AledoBroadBand.com
Aledo's only high-speed ISP

The PART-15.ORG smartBridges Discussion List
To Join: mailto:[EMAIL PROTECTED] (in the body type subscribe smartBridges <yournickname>
To Remove: mailto:[EMAIL PROTECTED] (in the body type unsubscribe smartBridges)
Archives: http://archives.part-15.org

The PART-15.ORG smartBridges Discussion List
To Join: mailto:[EMAIL PROTECTED] (in the body type subscribe smartBridges <yournickname>
To Remove: mailto:[EMAIL PROTECTED] (in the body type unsubscribe smartBridges)
Archives: http://archives.part-15.org

Reply via email to