Content deleted Content added
Add text on trade-offs between PPP/PAP and password storage methods. |
m Disambiguating links to TLS (link changed to Transport Layer Security; link changed to Transport Layer Security) using DisamAssist. |
||
Line 5:
As the [[Point to Point Protocol|Point to Point Protocol (PPP)]] sends data unencrypted and "in the clear", PAP is vulnerable to any attacker who can observe the PPP session. An attacker can see the users name, password, and any other information associated with the PPP session. Some additional security can be gained on the PPP link by using [[Challenge-handshake authentication protocol|CHAP]] or [[Extensible Authentication Protocol|EAP]]. However, there are always tradeoffs when choosing an authentication method, and there is no single answer for which is more secure.
When PAP is used in PPP, it is considered a weak authentication scheme. Weak schemes are simpler and have lighter [[overhead (computing)|computational overhead]] than more complex schemes such as [[
===Other Uses of PAP===
|