Content deleted Content added
fixed incomplete previous edits. (moved link from see-also section, to where it is cited, instead of just deleting it.) |
cleanup |
||
Line 24:
| website = {{URL|https://www.cisco.com/c/en/us/products/security/vpn-endpoint-security-clients/index.html}}
}}
'''Cisco Systems VPN Client''' is a software application for connecting to
On July 29, 2011, Cisco announced the end of life of the product. No further product updates were released after July 30, 2012, and support ceased in July 29, 2014.<ref>https://www.cisco.com/c/en/us/products/collateral/security/vpn-client/end_of_life_c51-680819.html</ref> The Support page with documentation links was taken down on July 30, 2016, replaced with an Obsolete Status Notification.<ref>[https://www.cisco.com/c/en/us/support/web/obsolete/security-vpn-client.html
==Availability and compatibility ==▼
▲==Availability==
The software is not free but is often installed on university and business computers in accordance with a site-license. As with most corporate licenses, administrators are allowed to freely distribute the software to users within their network.
The open-source [https://www.unix-ag.uni-kl.de/~massar/vpnc/ vpnc client] can connect to most VPNs supported by the official client.
VPN Client 4.9.01.0230 beta added support for Mac OS X 10.6.<ref>[https://www.cisco.com/web/software/282364316/35919/4.9.1.0230-beta-rel-notes.txt Release Notes for VPN Client, Release 4.9.01.0230 Beta for Mac OS X]</ref> Stable version 4.9.01.0180 appears to lack that support; 4.9.00.0050 explicitly did ''not'' support versions of Mac OS X later than 10.5.<ref>[https://www.cisco.com/en/US/docs/security/vpn_client/cisco_vpn_client/vpn_client49/release/notes/49client.pdf Release Notes for VPN Client, Release 4.9.00.0050 for Mac OS X, Revised: May 21, 2010, OL-11179-04]</ref>
Line 43 ⟶ 38:
==Security==
The client uses [[profile configuration file]]s (.pcf) that store VPN passwords either [[cryptographic hash function|hashed]] with [[type 7]], or stored as [[plaintext]]. A vulnerability has been identified,<ref name=cSec>{{cite web|url=https://www.cisco.com/en/US/tech/tk583/tk372/technologies_security_notice09186a0080215981.html|title=Cisco Security Notice: Cisco IPsec VPN Implementation Group Password Usage Vulnerability}}</ref> and those passwords can easily be decoded using software or online services.<ref>{{cite web|url=http://www.unix-ag.uni-kl.de/~massar/bin/cisco-decode|title=Cisco Systems VPN Client Group Password Decoder}}</ref> To work around these issues, network administrators are advised to use the Mutual Group Authentication feature, or use unique passwords (that aren't related to other important network passwords).<ref name=cSec/>
|