Hacker News new | past | comments | ask | show | jobs | submit login

Correct, you can't use the password alone, but the challenge/response method used is readily available online, and easy to implement.



Apparently, some people who make firewalls believe in security by obscurity. (They could at least have used an RSA key to verify. Though that would still have been bad.)


I've worked at a large telco testing CPE devices (routers and whatnot) and it was common place to find backdoors like this. The devices were made by a third party vendor and most of them had hardcoded passwords and hidden debug features.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: