[24384] in bugtraq
Re: DoS Attack against many RADIUS servers
daemon@ATHENA.MIT.EDU (David Frascone)
Fri Feb 22 19:42:27 2002
Date: Fri, 22 Feb 2002 12:07:51 -0600
From: David Frascone <dave@frascone.com>
To: Alan DeKok <aland@freeradius.org>
Cc: bugtraq@securityfocus.com
Message-ID: <20020222180751.GL26340@newman.frascone.com>
Mail-Followup-To: Alan DeKok <aland@freeradius.org>,
bugtraq@securityfocus.com
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <E16e1CR-0002CF-00@giles.striker.ottawa.on.ca>
This is a common problem with the way RADIUS does it's retransmissions.
Any flood of requests will cause the server to kill itself with the
UDP retransmissions. And, if requests take too long, the protocol will
break, since it can only have 254 (or is it 253) active requests alive at
any one given time. (A single character identifier)
That's why the IETF created Diameter, which will one day replace RADIUS,
and is not susceptable to this type of DoS attack.
-Dave
On Thursday, 21 Feb 2002, Alan DeKok wrote:
> There was a report recently to the maintainers of FreeRADIUS of a
> DoS attack against it. For background, FreeRADIUS is a free software
> RADIUS authentication, authorization, and accounting server. [1]
>
>