[c-nsp] enable secret 'password'
Andrew Miehs
andrew at 2sheds.de
Tue Nov 27 00:25:07 EST 2012
Ah ha!
Looks like they were just removing the type 5 (md5) passwords.
Using "enable secret 4 <key>" works - so I don't need to put plain text
passwords in my templates....
Phew!
Thanks
Andrew
(config)#enable secret test
(config)#do show run | i enable secret
enable secret 4 bsPEUMVATKKO9yeUlJfE3OCzHlgf0s6goJpg3P1k0UU
(config)#
(config)#enable secret 4 bsPEUMVATKKO9yeUlJfE3OCzHlgf0s6goJpg3P1k0UU
(config)#
On Tue, Nov 27, 2012 at 3:04 PM, Chuck Church <chuckchurch at gmail.com> wrote:
> Seems a bit odd. Perhaps they're pushing you towards using the new type 4
> SHA password hash that 15.x seems to introduce rather than the older and
> now-viewed insecure MD5?
>
> Chuck
>
> -----Original Message-----
> From: cisco-nsp-bounces at puck.nether.net
> [mailto:cisco-nsp-bounces at puck.nether.net] On Behalf Of Andrew Miehs
> Sent: Monday, November 26, 2012 10:58 PM
> To: cisco-nsp at puck.nether.net
> Subject: [c-nsp] enable secret 'password'
>
> Hi all,
>
> Cisco Cat 4500 running cat4500e-universalk9.SPA.03.03.02.SG.151-1.SG2.bin
>
> Warning: The CLI will be deprecated soon 'enable secret 5
> $xxxxxxxxxxxxxxxxxxxxxxxxx/'
> Please move to 'enable secret <password>' CLI
>
> Any suggestions on how to get around this - I don't really want the
> password
> lying around in plain text...
>
> Andrew
> _______________________________________________
> cisco-nsp mailing list cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
>
>
More information about the cisco-nsp
mailing list