O'Reilly logo

Solaris 8 Security by Edgar Danielyan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Point-to-Point Protocol (PPP) Security

Three types of authentication are available with Point-to-Point Protocol (PPP). The first and simplest one is regular UNIX authentication using usernames and passwords. The second is Password Authentication Protocol (PAP), which also uses the username/password scheme. The third is also the strongest—Challenge-Handshake Authentication Protocol. CHAP uses a variant of the challenge-handshake protocol to provide a good level of authentication without the pitfalls of PAP. Naturally, you should strive to use CHAP. However, if CHAP is unavailable, PAP can be used. UNIX username/password authentication must be the last resort. The authentication protocol used by PPP is defined in the /etc/asppp.cf configuration ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required