Point-to-Point Protocol (PPP) Security

Three types of authentication are available with Point-to-Point Protocol (PPP). The first and simplest one is regular UNIX authentication using usernames and passwords. The second is Password Authentication Protocol (PAP), which also uses the username/password scheme. The third is also the strongest—Challenge-Handshake Authentication Protocol. CHAP uses a variant of the challenge-handshake protocol to provide a good level of authentication without the pitfalls of PAP. Naturally, you should strive to use CHAP. However, if CHAP is unavailable, PAP can be used. UNIX username/password authentication must be the last resort. The authentication protocol used by PPP is defined in the /etc/asppp.cf configuration ...

Get Solaris 8 Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.