This thread seems to have morphed from the original question, but I'll note that we have a cisco vpn 3000 w/ Xauth (central username and password) using MGA (server cert authn) to prevent MITM. Use of the vpn is available from the wireless net but not required.

We've seen a substantial increase in use of the VPN over the last year (though mostly from off-campus). I believe that it's mostly useful for avoiding hotel-net brokenness and open-untrusted-highly-suspect wifi areas (at least, that's when I use it.) We still encourage e2e authn/authz/privacy, but it's another layer and does help with protocols for which we have no control.

I believe that 802.1x/wpa is a better implementation of what a traditional vpn over wireless provides.

We do use a common username & password for these services, and I believe that this is the right direction. We have a kerberos infrastructure and it would be great for vpn/802.1x/etc to do kerberos "correctly" and key SSO.

So with respect to PPTP, inasmuch as it often requires a separate username and password (either because you don't have the plaintext or don't trust it to keep the password safe), I avoid it.

Tom, I didn't realize IKE v2 was EAP-based. Thanks for the pointer.

-Kevin

Tom Zeller wrote:
A) PPTP using MS-CHAP v2  has one one major vulnerability.  It is
susceptible to a man-in-the-middle attack and the challenge-response is
encrypted with the user's password.  If the user's password is in the
attacker's dictionary they can determine what it is quickly.  However a
truly strong password is not very susceptible to this attack.  Read the
details in Bruce Schneier's analaysis at:

http://www.schneier.com/pptp.html


**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.

Reply via email to