Radius server,PAP and CHAP Protocols

Dhananjay Aloorkar
Dhananjay AloorkarStudent em SICSR
RADIUS Server
PAP & CHAP Protocols
Computer Security
 In computer security, AAA protocol commonly stands for authentication, authorization and accounting.
 Authentication :
Refers to confirmation that a user who is requesting a service is a valid user.
Examples of credentials are passwords, one-time tokens, digital certificates, and phone numbers (calling/called).
 Authorization :
Refers to the granting of specific types of service (including "no service") to a user, based on their authentication.
Examples of services : IP address filtering, encryption, bandwidth control/traffic management.
 Accounting :
Refers to the tracking of the consumption of network resources by users.
May be used for management, planning, billing etc.
AAA server provides all the above services to its clients.
AAA Protocols
 Terminal Access Controller Access Control System (TACACS)
 TACACS+
 Remote Authentication Dial In User Service(RADIUS)
 DIAMETER :Diameter is a planned replacement of RADIUS.
RADIUS Server
 The Remote Authentication Dial-In User Service (RADIUS) protocol was
developed by Livingston Enterprises, Inc., as an access server
authentication and accounting protocol.
 RADIUS is a protocol for carrying authentication, authorization, and
configuration information between a Network Access Server which desires
to authenticate its links and a shared Authentication Server.
 Uses PAP, CHAP or EAP protocols to authenticate users.
 Look in text file, LDAP Servers, Database for authentication.
 After authentication services parameters passed back to NAS.
RADIUS infrastructure components
Functions..
 Communication between a network access server (NAS) and a RADIUS
server is based on the User Datagram Protocol (UDP).
 RADIUS server handles issues related to server availability, retransmission,
and timeouts.
 RADIUS is a client/server protocol
 A RADIUS server can act as a proxy client to other RADIUS servers or other
kinds of authentication servers.
Interaction between a user and the
RADIUS client and server
Authentication and Authorization
 The RADIUS server can support a variety of methods to authenticate a
user.
PAP
 The Password Authentication Protocol (PAP) provides a simple method for
a user to authenticate using a 2-way handshake.
 PAP is used by Point to Point Protocol to validate users before allowing
them access to server resources.
 PAP transmits unencrypted ASCII passwords over the network and is
therefore considered insecure.
Working of PAP
CHAP
 Challenge-Handshake Authentication Protocol is a more secure
procedure for connecting to a system than the Password Authentication
Procedure (PAP).
 It involves a three-way exchange of a shared secret. During link
establishment, CHAP conducts periodic challenges to make sure that the
remote host still has a valid password value.
 While PAP basically stops working once authentication is established, this
leaves the network vulnerable to attack.
Working of CHAP
Advantages
 CHAP provides protection against playback attack by using different
challenge value that is unique and comes in random. Because the
challenge is unique and unpredictable, the resulting hash value is also
unique and random. Which makes it difficult for ‘guessing’.
 The use of repeated and different challenges, limits the time of exposure
to any single attack.
PAP vs CHAP
 PAP is in clear text. It mostly refers to providing a password to an account.
The password gets thru the wire. It is vulnerable to sniffing cause whoever is
listening would know the password.
 CHAP, on the other hand, issues a challenge. The password never actually
makes it thru the wire but a question is asked.
References
 http://www.cisco.com/c/en/us/support/docs/security-vpn/remote-
authentication-dial-user-service-radius/12433-32.html
 http://www.orbit-computer-solutions.com/Challenge-Handshake-
Authentication-Protocol--CHAP-.php
 http://www.orbit-computer-solutions.com/Password-Authentication-
Protocol--PAP-.php
Contact : dhananjay5315@gmail.com
1 de 16

Recomendados

AAA & RADIUS Protocols por
AAA & RADIUS ProtocolsAAA & RADIUS Protocols
AAA & RADIUS ProtocolsPeter R. Egli
14.3K visualizações12 slides
RADIUS por
RADIUSRADIUS
RADIUSamogh_ubale
6.7K visualizações24 slides
Radius1 por
Radius1Radius1
Radius1balamurugan.k Kalibalamurugan
677 visualizações22 slides
Radius Protocol por
Radius ProtocolRadius Protocol
Radius ProtocolNetwax Lab
1.9K visualizações9 slides
Radius vs. Tacacs+ por
Radius vs. Tacacs+Radius vs. Tacacs+
Radius vs. Tacacs+Netwax Lab
1.7K visualizações3 slides
Implementing 802.1x Authentication por
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authenticationdkaya
15.3K visualizações30 slides

Mais conteúdo relacionado

Mais procurados

OAuth por
OAuthOAuth
OAuthIván Fernández Perea
2.3K visualizações13 slides
如何因應連網商機下的資安風險 por
如何因應連網商機下的資安風險如何因應連網商機下的資安風險
如何因應連網商機下的資安風險Onward Security
77 visualizações23 slides
Tacacs por
TacacsTacacs
Tacacs1 2d
1.6K visualizações8 slides
11 palo alto user-id concepts por
11 palo alto user-id concepts11 palo alto user-id concepts
11 palo alto user-id conceptsMostafa El Lathy
724 visualizações12 slides
SSL/TLS 101 por
SSL/TLS 101SSL/TLS 101
SSL/TLS 101Chul-Woong Yang
1.1K visualizações21 slides
Aruba clearpass ebook_chpt1_final por
Aruba clearpass ebook_chpt1_finalAruba clearpass ebook_chpt1_final
Aruba clearpass ebook_chpt1_finalAruba, a Hewlett Packard Enterprise company
7.8K visualizações16 slides

Mais procurados(20)

如何因應連網商機下的資安風險 por Onward Security
如何因應連網商機下的資安風險如何因應連網商機下的資安風險
如何因應連網商機下的資安風險
Onward Security77 visualizações
Tacacs por 1 2d
TacacsTacacs
Tacacs
1 2d1.6K visualizações
11 palo alto user-id concepts por Mostafa El Lathy
11 palo alto user-id concepts11 palo alto user-id concepts
11 palo alto user-id concepts
Mostafa El Lathy724 visualizações
SSL/TLS 101 por Chul-Woong Yang
SSL/TLS 101SSL/TLS 101
SSL/TLS 101
Chul-Woong Yang1.1K visualizações
ClearPass Overview por JoAnna Cheshire
ClearPass OverviewClearPass Overview
ClearPass Overview
JoAnna Cheshire5.4K visualizações
Wpa3 por Bhavya Dashora
Wpa3Wpa3
Wpa3
Bhavya Dashora2.9K visualizações
Identity Access Management 101 por OneLogin
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
OneLogin9.7K visualizações
OpenSSL por Timbal Mayank
OpenSSLOpenSSL
OpenSSL
Timbal Mayank631 visualizações
Ssl (Secure Sockets Layer) por Asad Ali
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
Asad Ali3.6K visualizações
Introduction to Secure Sockets Layer por Nascenia IT
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
Nascenia IT29.6K visualizações
Ssl in a nutshell por Frank Kelly
Ssl in a nutshellSsl in a nutshell
Ssl in a nutshell
Frank Kelly9.2K visualizações
AAA server por hetvi naik
AAA serverAAA server
AAA server
hetvi naik364 visualizações
Wpa vs Wpa2 por Nzava Luwawa
Wpa vs Wpa2Wpa vs Wpa2
Wpa vs Wpa2
Nzava Luwawa3.9K visualizações
OAuth & OpenID Connect Deep Dive por Nordic APIs
OAuth & OpenID Connect Deep DiveOAuth & OpenID Connect Deep Dive
OAuth & OpenID Connect Deep Dive
Nordic APIs1.6K visualizações
Cloud Security Architecture.pptx por Moshe Ferber
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
Moshe Ferber616 visualizações
Authentication, authorization, accounting(aaa) slides por rahul kundu
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slides
rahul kundu5.5K visualizações
20 palo alto site to site por Mostafa El Lathy
20 palo alto site to site20 palo alto site to site
20 palo alto site to site
Mostafa El Lathy834 visualizações

Destaque

AAA in a nutshell por
AAA in a nutshellAAA in a nutshell
AAA in a nutshellMohamed Daif
3.5K visualizações18 slides
Point to-point protocol (ppp), PAP & CHAP por
Point to-point protocol (ppp), PAP & CHAPPoint to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAPNetProtocol Xpert
1.6K visualizações17 slides
Introduction to Diameter Protocol - Part1 por
Introduction to Diameter Protocol - Part1Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1Basim Aly (JNCIP-SP, JNCIP-ENT)
21K visualizações77 slides
Diameter Presentation por
Diameter PresentationDiameter Presentation
Diameter PresentationBeny Haddad
40.3K visualizações43 slides
Open Policy Network: Seeking Community Input por
Open Policy Network: Seeking Community InputOpen Policy Network: Seeking Community Input
Open Policy Network: Seeking Community InputCable Green
968 visualizações58 slides
Network Policy Abstractions in OpenStack Neutron por
Network Policy Abstractions in OpenStack NeutronNetwork Policy Abstractions in OpenStack Neutron
Network Policy Abstractions in OpenStack NeutronSumit Naiksatam
2.1K visualizações40 slides

Destaque(20)

AAA in a nutshell por Mohamed Daif
AAA in a nutshellAAA in a nutshell
AAA in a nutshell
Mohamed Daif3.5K visualizações
Point to-point protocol (ppp), PAP & CHAP por NetProtocol Xpert
Point to-point protocol (ppp), PAP & CHAPPoint to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAP
NetProtocol Xpert1.6K visualizações
Diameter Presentation por Beny Haddad
Diameter PresentationDiameter Presentation
Diameter Presentation
Beny Haddad40.3K visualizações
Open Policy Network: Seeking Community Input por Cable Green
Open Policy Network: Seeking Community InputOpen Policy Network: Seeking Community Input
Open Policy Network: Seeking Community Input
Cable Green968 visualizações
Network Policy Abstractions in OpenStack Neutron por Sumit Naiksatam
Network Policy Abstractions in OpenStack NeutronNetwork Policy Abstractions in OpenStack Neutron
Network Policy Abstractions in OpenStack Neutron
Sumit Naiksatam2.1K visualizações
3G Mobile Internet por Erick O'Connor
3G Mobile Internet3G Mobile Internet
3G Mobile Internet
Erick O'Connor1.7K visualizações
(Ppp) chap pap-chap por Fajar Rohmawan
(Ppp) chap pap-chap(Ppp) chap pap-chap
(Ppp) chap pap-chap
Fajar Rohmawan573 visualizações
Openeye Radius Overview por openeyevideo
Openeye Radius OverviewOpeneye Radius Overview
Openeye Radius Overview
openeyevideo853 visualizações
Ieee 802.1 x por matoko
Ieee 802.1 xIeee 802.1 x
Ieee 802.1 x
matoko552 visualizações
Private VLANs por NetProtocol Xpert
Private VLANsPrivate VLANs
Private VLANs
NetProtocol Xpert1.1K visualizações
NT320-Final White Paper por Ryan Ellingson
NT320-Final White PaperNT320-Final White Paper
NT320-Final White Paper
Ryan Ellingson523 visualizações
Oracle Exadata Maintenance tasks 101 - OTN Tour 2015 por Nelson Calero
Oracle Exadata Maintenance tasks 101 - OTN Tour 2015Oracle Exadata Maintenance tasks 101 - OTN Tour 2015
Oracle Exadata Maintenance tasks 101 - OTN Tour 2015
Nelson Calero3.2K visualizações
Cisco ASR 1001-X Router por NetProtocol Xpert
Cisco ASR 1001-X RouterCisco ASR 1001-X Router
Cisco ASR 1001-X Router
NetProtocol Xpert1.6K visualizações
Authentication and Authorization in Asp.Net por Shivanand Arur
Authentication and Authorization in Asp.NetAuthentication and Authorization in Asp.Net
Authentication and Authorization in Asp.Net
Shivanand Arur12.7K visualizações
802.1x Authentication Standard por Dan Miller
802.1x Authentication Standard802.1x Authentication Standard
802.1x Authentication Standard
Dan Miller1.9K visualizações
Hot Spot Network Manager por HS NETWORK MANAGER
Hot Spot Network ManagerHot Spot Network Manager
Hot Spot Network Manager
HS NETWORK MANAGER4.7K visualizações
Diameter Overview por John Loughney
Diameter OverviewDiameter Overview
Diameter Overview
John Loughney8.3K visualizações

Similar a Radius server,PAP and CHAP Protocols

AAA Protocol por
AAA ProtocolAAA Protocol
AAA ProtocolNetwax Lab
3.4K visualizações8 slides
WiFi Hotspot Password por
WiFi Hotspot PasswordWiFi Hotspot Password
WiFi Hotspot PasswordMaryam Namira
144 visualizações8 slides
Ch08 Authentication por
Ch08 AuthenticationCh08 Authentication
Ch08 AuthenticationInformation Technology
5.5K visualizações55 slides
RADIUS provides three services- authentication- authorization- and acc.docx por
RADIUS provides three services- authentication- authorization- and acc.docxRADIUS provides three services- authentication- authorization- and acc.docx
RADIUS provides three services- authentication- authorization- and acc.docxacarolyn
3 visualizações2 slides
The three chain links of radius security por
The three chain links of radius securityThe three chain links of radius security
The three chain links of radius securityGrafic.guru
1.4K visualizações7 slides
Remote access service por
Remote access serviceRemote access service
Remote access serviceApoorw Pandey
16.4K visualizações43 slides

Similar a Radius server,PAP and CHAP Protocols(20)

AAA Protocol por Netwax Lab
AAA ProtocolAAA Protocol
AAA Protocol
Netwax Lab3.4K visualizações
WiFi Hotspot Password por Maryam Namira
WiFi Hotspot PasswordWiFi Hotspot Password
WiFi Hotspot Password
Maryam Namira144 visualizações
RADIUS provides three services- authentication- authorization- and acc.docx por acarolyn
RADIUS provides three services- authentication- authorization- and acc.docxRADIUS provides three services- authentication- authorization- and acc.docx
RADIUS provides three services- authentication- authorization- and acc.docx
acarolyn3 visualizações
The three chain links of radius security por Grafic.guru
The three chain links of radius securityThe three chain links of radius security
The three chain links of radius security
Grafic.guru1.4K visualizações
Remote access service por Apoorw Pandey
Remote access serviceRemote access service
Remote access service
Apoorw Pandey16.4K visualizações
AAA Best Practices por Sagar Gor
AAA Best PracticesAAA Best Practices
AAA Best Practices
Sagar Gor299 visualizações
Team9 presentation version 3(1) por Premkumar Bazskarraj
Team9 presentation  version 3(1)Team9 presentation  version 3(1)
Team9 presentation version 3(1)
Premkumar Bazskarraj185 visualizações
EAP-TLS por Karri Huhtanen
EAP-TLSEAP-TLS
EAP-TLS
Karri Huhtanen435 visualizações
Ssl Https Server por Ram Srivastava
Ssl Https ServerSsl Https Server
Ssl Https Server
Ram Srivastava973 visualizações
Configuring Wired 802.1x Authentication on Windows Server 2012.pdf por djameleddine2015
Configuring Wired 802.1x Authentication on Windows Server 2012.pdfConfiguring Wired 802.1x Authentication on Windows Server 2012.pdf
Configuring Wired 802.1x Authentication on Windows Server 2012.pdf
djameleddine2015143 visualizações
e-SUAP - Security - Windows azure access control list (english version) por Sabino Labarile
e-SUAP - Security - Windows azure access control list (english version)e-SUAP - Security - Windows azure access control list (english version)
e-SUAP - Security - Windows azure access control list (english version)
Sabino Labarile374 visualizações
Security por Akram Salih
SecuritySecurity
Security
Akram Salih372 visualizações
Efficient Multi Server Authentication and Hybrid Authentication Method por IJCERT
Efficient Multi Server Authentication and Hybrid Authentication MethodEfficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication Method
IJCERT123 visualizações
Securing RESTful API por Muhammad Zbeedat
Securing RESTful APISecuring RESTful API
Securing RESTful API
Muhammad Zbeedat271 visualizações
CERTIFYING AUTHORITY por StartupSolicitors
CERTIFYING AUTHORITYCERTIFYING AUTHORITY
CERTIFYING AUTHORITY
StartupSolicitors33 visualizações

Último

2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe por
2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe
2024: A Travel Odyssey The Role of Generative AI in the Tourism UniverseSimone Puorto
13 visualizações61 slides
Special_edition_innovator_2023.pdf por
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdfWillDavies22
18 visualizações6 slides
PharoJS - Zürich Smalltalk Group Meetup November 2023 por
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023Noury Bouraqadi
139 visualizações17 slides
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... por
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...The Digital Insurer
24 visualizações52 slides
SUPPLIER SOURCING.pptx por
SUPPLIER SOURCING.pptxSUPPLIER SOURCING.pptx
SUPPLIER SOURCING.pptxangelicacueva6
20 visualizações1 slide
Melek BEN MAHMOUD.pdf por
Melek BEN MAHMOUD.pdfMelek BEN MAHMOUD.pdf
Melek BEN MAHMOUD.pdfMelekBenMahmoud
17 visualizações1 slide

Último(20)

2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe por Simone Puorto
2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe
2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe
Simone Puorto13 visualizações
Special_edition_innovator_2023.pdf por WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2218 visualizações
PharoJS - Zürich Smalltalk Group Meetup November 2023 por Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi139 visualizações
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... por The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
The Digital Insurer24 visualizações
SUPPLIER SOURCING.pptx por angelicacueva6
SUPPLIER SOURCING.pptxSUPPLIER SOURCING.pptx
SUPPLIER SOURCING.pptx
angelicacueva620 visualizações
Melek BEN MAHMOUD.pdf por MelekBenMahmoud
Melek BEN MAHMOUD.pdfMelek BEN MAHMOUD.pdf
Melek BEN MAHMOUD.pdf
MelekBenMahmoud17 visualizações
"Surviving highload with Node.js", Andrii Shumada por Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays33 visualizações
virtual reality.pptx por G036GaikwadSnehal
virtual reality.pptxvirtual reality.pptx
virtual reality.pptx
G036GaikwadSnehal18 visualizações
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive por Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Network Automation Forum43 visualizações
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 por IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
IttrainingIttraining69 visualizações
Five Things You SHOULD Know About Postman por Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman38 visualizações
HTTP headers that make your website go faster - devs.gent November 2023 por Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn26 visualizações
Mini-Track: Challenges to Network Automation Adoption por Network Automation Forum
Mini-Track: Challenges to Network Automation AdoptionMini-Track: Challenges to Network Automation Adoption
Mini-Track: Challenges to Network Automation Adoption
Network Automation Forum17 visualizações
Scaling Knowledge Graph Architectures with AI por Enterprise Knowledge
Scaling Knowledge Graph Architectures with AIScaling Knowledge Graph Architectures with AI
Scaling Knowledge Graph Architectures with AI
Enterprise Knowledge50 visualizações
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... por TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc72 visualizações
PRODUCT LISTING.pptx por angelicacueva6
PRODUCT LISTING.pptxPRODUCT LISTING.pptx
PRODUCT LISTING.pptx
angelicacueva618 visualizações
Piloting & Scaling Successfully With Microsoft Viva por Richard Harbridge
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
Richard Harbridge13 visualizações
SAP Automation Using Bar Code and FIORI.pdf por Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
Virendra Rai, PMP25 visualizações

Radius server,PAP and CHAP Protocols

  • 1. RADIUS Server PAP & CHAP Protocols
  • 2. Computer Security  In computer security, AAA protocol commonly stands for authentication, authorization and accounting.  Authentication : Refers to confirmation that a user who is requesting a service is a valid user. Examples of credentials are passwords, one-time tokens, digital certificates, and phone numbers (calling/called).  Authorization : Refers to the granting of specific types of service (including "no service") to a user, based on their authentication. Examples of services : IP address filtering, encryption, bandwidth control/traffic management.  Accounting : Refers to the tracking of the consumption of network resources by users. May be used for management, planning, billing etc. AAA server provides all the above services to its clients.
  • 3. AAA Protocols  Terminal Access Controller Access Control System (TACACS)  TACACS+  Remote Authentication Dial In User Service(RADIUS)  DIAMETER :Diameter is a planned replacement of RADIUS.
  • 4. RADIUS Server  The Remote Authentication Dial-In User Service (RADIUS) protocol was developed by Livingston Enterprises, Inc., as an access server authentication and accounting protocol.  RADIUS is a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server.  Uses PAP, CHAP or EAP protocols to authenticate users.  Look in text file, LDAP Servers, Database for authentication.  After authentication services parameters passed back to NAS.
  • 6. Functions..  Communication between a network access server (NAS) and a RADIUS server is based on the User Datagram Protocol (UDP).  RADIUS server handles issues related to server availability, retransmission, and timeouts.  RADIUS is a client/server protocol  A RADIUS server can act as a proxy client to other RADIUS servers or other kinds of authentication servers.
  • 7. Interaction between a user and the RADIUS client and server
  • 8. Authentication and Authorization  The RADIUS server can support a variety of methods to authenticate a user.
  • 9. PAP  The Password Authentication Protocol (PAP) provides a simple method for a user to authenticate using a 2-way handshake.  PAP is used by Point to Point Protocol to validate users before allowing them access to server resources.  PAP transmits unencrypted ASCII passwords over the network and is therefore considered insecure.
  • 11. CHAP  Challenge-Handshake Authentication Protocol is a more secure procedure for connecting to a system than the Password Authentication Procedure (PAP).  It involves a three-way exchange of a shared secret. During link establishment, CHAP conducts periodic challenges to make sure that the remote host still has a valid password value.  While PAP basically stops working once authentication is established, this leaves the network vulnerable to attack.
  • 13. Advantages  CHAP provides protection against playback attack by using different challenge value that is unique and comes in random. Because the challenge is unique and unpredictable, the resulting hash value is also unique and random. Which makes it difficult for ‘guessing’.  The use of repeated and different challenges, limits the time of exposure to any single attack.
  • 14. PAP vs CHAP  PAP is in clear text. It mostly refers to providing a password to an account. The password gets thru the wire. It is vulnerable to sniffing cause whoever is listening would know the password.  CHAP, on the other hand, issues a challenge. The password never actually makes it thru the wire but a question is asked.