PPP over Ethernet?

Michael Nelson mikenel at iapetus.com
Fri Jun 5 23:49:07 UTC 1998


>No, actually, this is a tool that a close friend wrote while working on a
>test harness for the PPTP protocol.  It seems that MS PPTP doesn't quite
>work as advertized and it was necessary to sniff a ton of sessions to
>determine the protocol and write the state machine to interface to
>something other than Winblows as a client or server.  I suppose that
>"releasing" the crack will brings with it notoriety in the community if
>that's what you're after.  Personally, I find it more gratifying to know it
>can be done and have the prowess to do it than to provide the code to every
>bored 13y/o on the planet via anonymous ftp.
>
>>According to my Microsoft insider, "depends what the client is. If it's
>>NT and uses the NTLM hash, it's quite secure. If it's 9x and uses the
>>LM hash, it's easy to crack. Basically the deal is that 9x clients use
>>a shitty old hash method that's really easy to sniff and crack."
>
>The session hijacked was NT<->NT.  With 3DES/Blowfish/etc freely available,


>why does MS feel the need to  _attempt_ to write their own encryption?

Who said they wrote their own encryption? They use RC4 (40 or 128 bit). The
problems deal with authentication/key management, not encryption.

-mike





More information about the NANOG mailing list