- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
12-12-2011 11:20 AM
Are they hashed before storing them in the config files? By the looks of them, it seems like the PAN appliance is storing them in an encrypted format. If so, can they be decrypted?
For example, an OSPF key is stored as follows
"-AQ==xxxxxxxxxxxxx=xxxxxxxxxxxxx=="
This pattern can be observed in almost all of the keys/passwords stored in the XML config. Is there a way to decrypt these keys. I am particularly interested in the OSPF MD5 keys as I need to add new routers to our network but I don't know the key.
Has anyone successfully decrypted a PAN key?
Thanks.
01-02-2012 07:29 PM
you can also use the 'request password-hash' operational mode CLI command.
01-03-2012 12:11 AM
I also noticed that when I create users via the API in 4.1, I can send the passwords in clear.
08-29-2013 02:33 PM
guys,
Is this still the case for 5.0.X PAs ?
08-30-2013 02:39 PM
Given that PA recently got approved for various security oriented certificates I sure do hope this has been fixed or at least noted in these tests:
http://researchcenter.paloaltonetworks.com/2013/07/update-on-certifications-dept-of-defense-uc-apl/
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!