[Openswan dev] Re: [Openswan Users] Xauth Client extensions
mcr at xelerance.com
mcr at xelerance.com
Tue Apr 20 18:53:38 CEST 2004
-----BEGIN PGP SIGNED MESSAGE-----
>>>>> "Henrik" == Henrik Nordstrom <hno at marasystems.com> writes:
Henrik> Yes.
Henrik> But the attacker do however need to guess (or sniff) a valid
Henrik> identity payload to be able to exploit this.
emphasis on the "or sniff".
90% of the groupid/passwords I've seen are either "cisco", "cisco123"
(what cisco has on their web site), "VPN_Base_Group" (Cisco's default
group), or the name of the company involved.
And, one may well be able to get it out of the client by attempting to
initiate with a client!
So, it scares the willies out of me, and would keep me up at night
worrying about. Three-way handshake makes know that at least I can
recognize an idiot before I commit to doing heavy crypto for them.
Why haven't we seen these attacks yet? Well, why bother when you can
just use Win32RPCGetRemoteRoot()?
- --
] ON HUMILITY: to err is human. To moo, bovine. | firewalls [
] Michael Richardson, Xelerance Corporation, Ottawa, ON |net architect[
] mcr at xelerance.com http://www.sandelman.ottawa.on.ca/mcr/ |device driver[
] panic("Just another Debian GNU/Linux using, kernel hacking, security guy"); [
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
Comment: Finger me for keys
iQCVAwUBQIXGEYqHRg3pndX9AQHdpAQA7D/NUWWQUkSm5jkSiB0z4DuWOUqFEkKr
IJeJYCm/e6DIoLtoVF3PYE2ElTI8ktmwlbG6x15INi13jsaQM/X+TV+IInsWllOS
A+gb2N6YilFwPhTClHtdLPD6gjzNYABVugnukwaUu1vu4P8MeU8gb79MVhVEtG0u
8btB0kOb9AM=
=6qnD
-----END PGP SIGNATURE-----
More information about the Users
mailing list