<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Its not the whole message in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/default-encryption-on-cisco-router-for-radius-authentication/m-p/2777994#M41366</link>
    <description>&lt;P&gt;Its not the whole message that gets encrypted. The user-password is encrypted in a way that is explained in &lt;A href="http://www.ietf.org/rfc/rfc2865.txt"&gt;section 5.2 of the RFC:&lt;/A&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;5.2.  User-Password

   Description

      This Attribute indicates the password of the user to be
      authenticated, or the user's input following an Access-Challenge.
      It is only used in Access-Request packets.

      On transmission, the password is hidden.  The password is first
      padded at the end with nulls to a multiple of 16 octets.  A one-
      way MD5 hash is calculated over a stream of octets consisting of
      the shared secret followed by the Request Authenticator.  This
      value is XORed with the first 16 octet segment of the password and
      placed in the first 16 octets of the String field of the User-
      Password Attribute.

      If the password is longer than 16 characters, a second one-way MD5
      hash is calculated over a stream of octets consisting of the
      shared secret followed by the result of the first xor.  That hash
      is XORed with the second 16 octet segment of the password and
      placed in the second 16 octets of the String field of the User-
      Password Attribute.

      If necessary, this operation is repeated, with each xor result
      being used along with the shared secret to generate the next hash
      to xor the next segment of the password, to no more than 128
      characters.
&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 14 Dec 2015 22:27:50 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2015-12-14T22:27:50Z</dc:date>
    <item>
      <title>Default encryption on cisco router for radius authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/default-encryption-on-cisco-router-for-radius-authentication/m-p/2777991#M41363</link>
      <description>&lt;P&gt;Hi everybody&lt;/P&gt;
&lt;P&gt;Please consider the following config:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What encryption will R1 use while communicating with radius server?&lt;/P&gt;
&lt;P&gt;Much appreciated!!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;R1(config)# aaa new-model&lt;BR /&gt;R1(config)# radius-server host 192.168.2.5 auth-port 1645 acct-port 1646&lt;BR /&gt;R1(config)# radius-server key MyRadiusKey&lt;/PRE&gt;</description>
      <pubDate>Mon, 11 Mar 2019 06:19:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/default-encryption-on-cisco-router-for-radius-authentication/m-p/2777991#M41363</guid>
      <dc:creator>sarahr202</dc:creator>
      <dc:date>2019-03-11T06:19:24Z</dc:date>
    </item>
    <item>
      <title>There is no general</title>
      <link>https://community.cisco.com/t5/network-access-control/default-encryption-on-cisco-router-for-radius-authentication/m-p/2777992#M41364</link>
      <description>&lt;P&gt;There is no general encryption in RADIUS. The&amp;nbsp;key is mainly used for authentication and encryption of only the user-password. This is from the &lt;A href="http://www.ietf.org/rfc/rfc2865.txt"&gt;RFC&lt;/A&gt;:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;      Transactions between the client and RADIUS server are
      authenticated through the use of a shared secret, which is never
      sent over the network.  In addition, any user passwords are sent
      encrypted between the client and RADIUS server, to eliminate the
      possibility that someone snooping on an unsecure network could
      determine a user's password.
&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 13 Dec 2015 11:07:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/default-encryption-on-cisco-router-for-radius-authentication/m-p/2777992#M41364</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-12-13T11:07:56Z</dc:date>
    </item>
    <item>
      <title>Thanks Karsten,for the</title>
      <link>https://community.cisco.com/t5/network-access-control/default-encryption-on-cisco-router-for-radius-authentication/m-p/2777993#M41365</link>
      <description>&lt;P&gt;Thanks Karsten,for the response.&lt;/P&gt;
&lt;P&gt;In my example R1 is a Cisco router. When it sends radius-access request to Server, it first encrypts the message. My question is what kind of encryption R1 uses if none is specified( does it use MD5 or SHA etc)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2015 22:18:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/default-encryption-on-cisco-router-for-radius-authentication/m-p/2777993#M41365</guid>
      <dc:creator>sarahr202</dc:creator>
      <dc:date>2015-12-14T22:18:44Z</dc:date>
    </item>
    <item>
      <title>Its not the whole message</title>
      <link>https://community.cisco.com/t5/network-access-control/default-encryption-on-cisco-router-for-radius-authentication/m-p/2777994#M41366</link>
      <description>&lt;P&gt;Its not the whole message that gets encrypted. The user-password is encrypted in a way that is explained in &lt;A href="http://www.ietf.org/rfc/rfc2865.txt"&gt;section 5.2 of the RFC:&lt;/A&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;5.2.  User-Password

   Description

      This Attribute indicates the password of the user to be
      authenticated, or the user's input following an Access-Challenge.
      It is only used in Access-Request packets.

      On transmission, the password is hidden.  The password is first
      padded at the end with nulls to a multiple of 16 octets.  A one-
      way MD5 hash is calculated over a stream of octets consisting of
      the shared secret followed by the Request Authenticator.  This
      value is XORed with the first 16 octet segment of the password and
      placed in the first 16 octets of the String field of the User-
      Password Attribute.

      If the password is longer than 16 characters, a second one-way MD5
      hash is calculated over a stream of octets consisting of the
      shared secret followed by the result of the first xor.  That hash
      is XORed with the second 16 octet segment of the password and
      placed in the second 16 octets of the String field of the User-
      Password Attribute.

      If necessary, this operation is repeated, with each xor result
      being used along with the shared secret to generate the next hash
      to xor the next segment of the password, to no more than 128
      characters.
&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2015 22:27:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/default-encryption-on-cisco-router-for-radius-authentication/m-p/2777994#M41366</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-12-14T22:27:50Z</dc:date>
    </item>
  </channel>
</rss>

