Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Point-to-Point Tunneling Protocol (PPTP) cracked

crutchy (1949900) writes | more than 2 years ago

Microsoft 3

crutchy (1949900) writes ""Security researchers released two tools at the Defcon security conference that can be used to crack the encryption of any PPTP (Point-to-Point Tunneling Protocol) and WPA2-Enterprise (Wireless Protected Access) sessions that use MS-CHAPv2 for authentication."

"Marlinspike's advice to businesses and VPN providers was to stop using PPTP and switch to other technologies like IPsec or OpenVPN. Companies with wireless network deployments that use WPA2 Enterprise security with MS-CHAPv2 authentication should also switch to an alternative.""

Link to Original Source

cancel ×


Sorry! There are no comments related to the filter you selected.

Missing (direct) Link (1)

Penurious Penguin (2687307) | more than 2 years ago | (#41002461)

Re:Missing (direct) Link (1)

crutchy (1949900) | more than 2 years ago | (#41020941)

have a squiz at the "Link to Original Source" below TFA

i supplied the link to schneier because slashdotters not signed up for his newsletter may find other interesting security tidbits

Re:Missing (direct) Link (1)

Penurious Penguin (2687307) | more than 2 years ago | (#41021091)

I considered that and admired the notion. It was not criticism, but an attempted contribution for efficiency. Take it as a compliment, if you will. I definitely support the submission and voted it up.
Check for New Comments
Slashdot Login

Need an Account?

Forgot your password?