So this means that people get to read the RFC, right? Awesome idea!
Or it means there can be philsophical debates about whether "not" doing
something is actually a form of doing something. ;)
But from a packet perspective, there is a 0 (none), 1 (plain) or 2
(message-digest) kinds. And who knows, there COULD be a "3" kind some
day since the binary value is already possible!
Since "not doing" authentication is a type, is "future unknown" also a
type? That would make 4. ;)
May the Force be with you.
*Scott Morris*, CCIE/x4/ (R&S/ISP-Dial/Security/Service Provider) #4713,
CCDE #2009::D, JNCIE-M #153, JNCIE-ER #102, CISSP, et al.
CCSI #21903, JNCI-M, JNCI-ER
swm_at_emanon.com
Knowledge is power.
Power corrupts.
Study hard and be Eeeeviiiil......
On 5/20/11 8:27 AM, Darby Weaver wrote:
> That's what I love about the CCIE Lab...
>
> Everyone says there are "only" 2 types of authentication in OSPF....
>
> 1. Plain text
> 2. MD5
>
> If you listen to all your most knowledgeable friends on Groupstudy and a
> couple of three (maybe more CCIE's of some repute)...
>
> And then you find yourself in the "gladiator's chamber" one day... and a
> third is suggested by some hint of a vague clue...
>
> Unless you've heard of RFC2328 and then you find... there is a third... and
> you find yourself astonished in about the same way everyone else was when we
> found out that Luke Skywalker was not quite "The Last Hope" as mentioned by
> Yoda... Yep... there are three...
>
>
> OSPF as defined in
> [RFC2328<https://mail.google.com/mail/html/compose/static_files/rfc2328>]
> includes three different types of
> authentication schemes: Null authentication, simple password and
> cryptographic authentication. NULL authentication is akin to having
> no authentication at all. In the simple password scheme of
> authentication, the passwords are exchanged in the clear text on the
> network and anyone with physical access to the network can learn the
> password and compromise the security of the OSPF domain.
>
> In the cryptographic authentication scheme, the OSPF routers on a
> common network/subnet share a secret key which is used to generate a
> keyed MD5 digest for each packet and a monotonically increasing
> sequence number scheme is used to prevent replay attacks.
Blogs and organic groups at http://www.ccie.net
Received on Fri May 20 2011 - 09:25:16 ART
This archive was generated by hypermail 2.2.0 : Wed Jun 01 2011 - 09:01:11 ART