How does RIPv2 authenticate routing peers?

What will be an ideal response?


RIP authentication can occur either by passing the authentication keys in clear text or via MD5 authentication. RFC 1321 defines MD5 as an "algorithm [that] takes as input a message of arbitrary length and produces as output a 128-bit ‘fingerprint' or ‘message digest' of the input." In short, using MD5 allows RIPv2 to authenticate a routing peer without sending the secret key (a text string) across the link between the two peers. Instead, it runs the MD5 algorithm against the secret key and sends the hash to the peer. A hash is a number generated by MD5 from the secret key. This number cannot be reverse-engineered easily enough for someone to guess the secret key. The hash is sent to the opposite peer, which runs MD5 against its configured secret key; if the two hashes match, then the two peers are considered authenticated.

Computer Science & Information Technology

You might also like to view...

Which of the following events is NOT a type of macro that can be created in Access?

A) stand-alone B) data C) embedded D) encapsulated

Computer Science & Information Technology

In most programming languages, global variables are declared explicitly as global or declared in the main module outside any other modules.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

List at least three kinds of harm a company could experience from electronic espionage or unauthorized viewing of confidential company materials

What will be an ideal response?

Computer Science & Information Technology

Case-Based Critical Thinking QuestionEddie is working on a large presentation which requires many repetitive steps. Help him figure out how to automate the repetitive steps so he can become more efficient. To ____ an action button, Eddie can cut and paste it onto another page.

A. modify B. showcase C. duplicate D. activate

Computer Science & Information Technology