This is a common problem with the way RADIUS does it's retransmissions. Any flood of requests will cause the server to kill itself with the UDP retransmissions. And, if requests take too long, the protocol will break, since it can only have 254 (or is it 253) active requests alive at any one given time. (A single character identifier) That's why the IETF created Diameter, which will one day replace RADIUS, and is not susceptable to this type of DoS attack. -Dave On Thursday, 21 Feb 2002, Alan DeKok wrote: > There was a report recently to the maintainers of FreeRADIUS of a > DoS attack against it. For background, FreeRADIUS is a free software > RADIUS authentication, authorization, and accounting server. [1] > >