<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic pap password readability ? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/pap-password-readability/m-p/368530#M437683</link>
    <description>&lt;P&gt;We have users claiming they punch in the correct PAP password. Is there a way that we can verify what they type ? We use ACS with radius.&lt;/P&gt;&lt;P&gt; I can see string of digits in the file C:\Program Files\CiscoSecure ACS v3.3\CSRadius\Logs\rds.log&lt;/P&gt;&lt;P&gt;with the title: "[002] User-Password..value: ..."&lt;/P&gt;&lt;P&gt;But that is in some way encrypted.&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 20:55:23 GMT</pubDate>
    <dc:creator>harmkanters</dc:creator>
    <dc:date>2019-03-10T20:55:23Z</dc:date>
    <item>
      <title>pap password readability ?</title>
      <link>https://community.cisco.com/t5/network-access-control/pap-password-readability/m-p/368530#M437683</link>
      <description>&lt;P&gt;We have users claiming they punch in the correct PAP password. Is there a way that we can verify what they type ? We use ACS with radius.&lt;/P&gt;&lt;P&gt; I can see string of digits in the file C:\Program Files\CiscoSecure ACS v3.3\CSRadius\Logs\rds.log&lt;/P&gt;&lt;P&gt;with the title: "[002] User-Password..value: ..."&lt;/P&gt;&lt;P&gt;But that is in some way encrypted.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 20:55:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/pap-password-readability/m-p/368530#M437683</guid>
      <dc:creator>harmkanters</dc:creator>
      <dc:date>2019-03-10T20:55:23Z</dc:date>
    </item>
    <item>
      <title>Re: pap password readability ?</title>
      <link>https://community.cisco.com/t5/network-access-control/pap-password-readability/m-p/368531#M437741</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not aware of a way to recover the clear text password from the log file. If you have the ability to capture and analyze packets on the network (sniffer or similar capability) you could see the text in the captured packet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Dec 2004 20:01:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/pap-password-readability/m-p/368531#M437741</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2004-12-10T20:01:30Z</dc:date>
    </item>
    <item>
      <title>Re: pap password readability ?</title>
      <link>https://community.cisco.com/t5/network-access-control/pap-password-readability/m-p/368532#M437765</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I thought about that, but al components are @ remote co-locations. that would involve remote span ports. very difficult..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 11 Dec 2004 19:46:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/pap-password-readability/m-p/368532#M437765</guid>
      <dc:creator>harmkanters</dc:creator>
      <dc:date>2004-12-11T19:46:25Z</dc:date>
    </item>
  </channel>
</rss>

