PSK Exposure in ISE Authentication Logs - Recommendations for Mitigation? #97
EvanusModestus
started this conversation in
General
Replies: 1 comment
-
|
This sounds like an ISE issue not a iPSK-Manager issue. Have you addressed it up that chain? |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I'm implementing iPSK Manager for IoT devices that lack 802.1X capabilities. The solution is working well, but I've identified a security concern regarding PSK exposure in ISE authentication logs.
Issue:
While the cisco-av-pair attributes in the Result section properly mask the PSK value (psk=****), the plaintext PSK is exposed in the "Other Attributes" section of ISE RADIUS authentication logs:
Other Attributes
Result
Concerns:
Questions:
pskValueattribute in logs similar to how cisco-av-pair is handled?Environment:
Any guidance on addressing this logging concern would be greatly appreciated!
Beta Was this translation helpful? Give feedback.
All reactions