Re: DoS Attack against many RADIUS servers

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



This is a common problem with the way RADIUS does it's retransmissions.

Any flood of requests will cause the server to kill itself with the
UDP retransmissions.  And, if requests take too long, the protocol will
break, since it can only have 254 (or is it 253) active requests alive at
any one given time.  (A single character identifier)

That's why the IETF created Diameter, which will one day replace RADIUS,
and is not susceptable to this type of DoS attack.

-Dave



On Thursday, 21 Feb 2002, Alan DeKok wrote:
>   There was a report recently to the maintainers of FreeRADIUS of a
> DoS attack against it.  For background, FreeRADIUS is a free software
> RADIUS authentication, authorization, and accounting server. [1]
> 
> 

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux