Home
Prev
cOS Stream 4.00.03 Application Control Signatures
Next
Chapter 4: Authentication
4.1. Challenge Handshake Authentication Protocol
The CHAP protocol is used to verify the identity of a peer on a point-to-point link.
Family:
Authentication
Over:
ppp
Revision:
18
Risk level:
4
Tag:
Information Leaking
Tag:
Server Applications