SlideShare a Scribd company logo
RADIUS Server
PAP & CHAP Protocols
Computer Security
 In computer security, AAA protocol commonly stands for authentication, authorization and accounting.
 Authentication :
Refers to confirmation that a user who is requesting a service is a valid user.
Examples of credentials are passwords, one-time tokens, digital certificates, and phone numbers (calling/called).
 Authorization :
Refers to the granting of specific types of service (including "no service") to a user, based on their authentication.
Examples of services : IP address filtering, encryption, bandwidth control/traffic management.
 Accounting :
Refers to the tracking of the consumption of network resources by users.
May be used for management, planning, billing etc.
AAA server provides all the above services to its clients.
AAA Protocols
 Terminal Access Controller Access Control System (TACACS)
 TACACS+
 Remote Authentication Dial In User Service(RADIUS)
 DIAMETER :Diameter is a planned replacement of RADIUS.
RADIUS Server
 The Remote Authentication Dial-In User Service (RADIUS) protocol was
developed by Livingston Enterprises, Inc., as an access server
authentication and accounting protocol.
 RADIUS is a protocol for carrying authentication, authorization, and
configuration information between a Network Access Server which desires
to authenticate its links and a shared Authentication Server.
 Uses PAP, CHAP or EAP protocols to authenticate users.
 Look in text file, LDAP Servers, Database for authentication.
 After authentication services parameters passed back to NAS.
RADIUS infrastructure components
Functions..
 Communication between a network access server (NAS) and a RADIUS
server is based on the User Datagram Protocol (UDP).
 RADIUS server handles issues related to server availability, retransmission,
and timeouts.
 RADIUS is a client/server protocol
 A RADIUS server can act as a proxy client to other RADIUS servers or other
kinds of authentication servers.
Interaction between a user and the
RADIUS client and server
Authentication and Authorization
 The RADIUS server can support a variety of methods to authenticate a
user.
PAP
 The Password Authentication Protocol (PAP) provides a simple method for
a user to authenticate using a 2-way handshake.
 PAP is used by Point to Point Protocol to validate users before allowing
them access to server resources.
 PAP transmits unencrypted ASCII passwords over the network and is
therefore considered insecure.
Working of PAP
CHAP
 Challenge-Handshake Authentication Protocol is a more secure
procedure for connecting to a system than the Password Authentication
Procedure (PAP).
 It involves a three-way exchange of a shared secret. During link
establishment, CHAP conducts periodic challenges to make sure that the
remote host still has a valid password value.
 While PAP basically stops working once authentication is established, this
leaves the network vulnerable to attack.
Working of CHAP
Advantages
 CHAP provides protection against playback attack by using different
challenge value that is unique and comes in random. Because the
challenge is unique and unpredictable, the resulting hash value is also
unique and random. Which makes it difficult for ‘guessing’.
 The use of repeated and different challenges, limits the time of exposure
to any single attack.
PAP vs CHAP
 PAP is in clear text. It mostly refers to providing a password to an account.
The password gets thru the wire. It is vulnerable to sniffing cause whoever is
listening would know the password.
 CHAP, on the other hand, issues a challenge. The password never actually
makes it thru the wire but a question is asked.
References
 http://www.cisco.com/c/en/us/support/docs/security-vpn/remote-
authentication-dial-user-service-radius/12433-32.html
 http://www.orbit-computer-solutions.com/Challenge-Handshake-
Authentication-Protocol--CHAP-.php
 http://www.orbit-computer-solutions.com/Password-Authentication-
Protocol--PAP-.php
Contact : dhananjay5315@gmail.com

More Related Content

What's hot

Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directorythebigredhemi
 
Active directory
Active directory Active directory
Active directory deshvikas
 
radius dhcp dot1.x (802.1x)
radius dhcp dot1.x (802.1x)radius dhcp dot1.x (802.1x)
radius dhcp dot1.x (802.1x)
rinnocente
 
AAA Protocol
AAA ProtocolAAA Protocol
AAA Protocol
Netwax Lab
 
Tacacs
TacacsTacacs
Tacacs1 2d
 
SSL intro
SSL introSSL intro
SSL intro
Three Lee
 
Microsoft Active Directory.pptx
Microsoft Active Directory.pptxMicrosoft Active Directory.pptx
Microsoft Active Directory.pptx
masbulosoke
 
Implementing Cisco AAA
Implementing Cisco AAAImplementing Cisco AAA
Implementing Cisco AAA
dkaya
 
AD & LDAP
AD & LDAPAD & LDAP
AAA server
AAA serverAAA server
AAA server
hetvi naik
 
Wireshark Basic Presentation
Wireshark Basic PresentationWireshark Basic Presentation
Wireshark Basic Presentation
MD. SHORIFUL ISLAM
 
What is active directory
What is active directoryWhat is active directory
What is active directory
Adeel Khurram
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
FIDO Alliance
 
Introduction to OpenID Connect
Introduction to OpenID Connect Introduction to OpenID Connect
Introduction to OpenID Connect
Nat Sakimura
 
Authentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesrahul kundu
 
Dynamic Host Configuration Protocol
Dynamic Host Configuration ProtocolDynamic Host Configuration Protocol
Dynamic Host Configuration Protocol
gueste98b36
 
Introducing Cisco HyperFlex Systems: The Next Generation in Complete Hypercon...
Introducing Cisco HyperFlex Systems: The Next Generation in Complete Hypercon...Introducing Cisco HyperFlex Systems: The Next Generation in Complete Hypercon...
Introducing Cisco HyperFlex Systems: The Next Generation in Complete Hypercon...
Cisco Canada
 
SSL And TLS
SSL And TLS SSL And TLS
SSL And TLS
Ghanshyam Patel
 

What's hot (20)

Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
 
Active directory
Active directory Active directory
Active directory
 
radius dhcp dot1.x (802.1x)
radius dhcp dot1.x (802.1x)radius dhcp dot1.x (802.1x)
radius dhcp dot1.x (802.1x)
 
AAA Protocol
AAA ProtocolAAA Protocol
AAA Protocol
 
Tacacs
TacacsTacacs
Tacacs
 
SSL intro
SSL introSSL intro
SSL intro
 
Microsoft Active Directory.pptx
Microsoft Active Directory.pptxMicrosoft Active Directory.pptx
Microsoft Active Directory.pptx
 
Implementing Cisco AAA
Implementing Cisco AAAImplementing Cisco AAA
Implementing Cisco AAA
 
AD & LDAP
AD & LDAPAD & LDAP
AD & LDAP
 
AAA server
AAA serverAAA server
AAA server
 
Wireshark Basic Presentation
Wireshark Basic PresentationWireshark Basic Presentation
Wireshark Basic Presentation
 
What is active directory
What is active directoryWhat is active directory
What is active directory
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
 
Introduction to OpenID Connect
Introduction to OpenID Connect Introduction to OpenID Connect
Introduction to OpenID Connect
 
DHCP
DHCPDHCP
DHCP
 
PIW ISE best practices
PIW ISE best practicesPIW ISE best practices
PIW ISE best practices
 
Authentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slides
 
Dynamic Host Configuration Protocol
Dynamic Host Configuration ProtocolDynamic Host Configuration Protocol
Dynamic Host Configuration Protocol
 
Introducing Cisco HyperFlex Systems: The Next Generation in Complete Hypercon...
Introducing Cisco HyperFlex Systems: The Next Generation in Complete Hypercon...Introducing Cisco HyperFlex Systems: The Next Generation in Complete Hypercon...
Introducing Cisco HyperFlex Systems: The Next Generation in Complete Hypercon...
 
SSL And TLS
SSL And TLS SSL And TLS
SSL And TLS
 

Viewers also liked

AAA in a nutshell
AAA in a nutshellAAA in a nutshell
AAA in a nutshell
Mohamed Daif
 
Point to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAPPoint to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAP
NetProtocol Xpert
 
Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1
Basim Aly (JNCIP-SP, JNCIP-ENT)
 
Diameter Presentation
Diameter PresentationDiameter Presentation
Diameter Presentation
Beny Haddad
 
Open Policy Network: Seeking Community Input
Open Policy Network: Seeking Community InputOpen Policy Network: Seeking Community Input
Open Policy Network: Seeking Community Input
Cable Green
 
Network Policy Abstractions in OpenStack Neutron
Network Policy Abstractions in OpenStack NeutronNetwork Policy Abstractions in OpenStack Neutron
Network Policy Abstractions in OpenStack Neutron
Sumit Naiksatam
 
3G Mobile Internet
3G Mobile Internet3G Mobile Internet
3G Mobile Internet
Erick O'Connor
 
Openeye Radius Overview
Openeye Radius OverviewOpeneye Radius Overview
Openeye Radius Overview
openeyevideo
 
Ieee 802.1 x
Ieee 802.1 xIeee 802.1 x
Ieee 802.1 xmatoko
 
Private VLANs
Private VLANsPrivate VLANs
Private VLANs
NetProtocol Xpert
 
NT320-Final White Paper
NT320-Final White PaperNT320-Final White Paper
NT320-Final White PaperRyan Ellingson
 
Oracle Exadata Maintenance tasks 101 - OTN Tour 2015
Oracle Exadata Maintenance tasks 101 - OTN Tour 2015Oracle Exadata Maintenance tasks 101 - OTN Tour 2015
Oracle Exadata Maintenance tasks 101 - OTN Tour 2015
Nelson Calero
 
Cisco ASR 1001-X Router
Cisco ASR 1001-X RouterCisco ASR 1001-X Router
Cisco ASR 1001-X Router
NetProtocol Xpert
 
Authentication and Authorization in Asp.Net
Authentication and Authorization in Asp.NetAuthentication and Authorization in Asp.Net
Authentication and Authorization in Asp.Net
Shivanand Arur
 
802.1x Authentication Standard
802.1x Authentication Standard802.1x Authentication Standard
802.1x Authentication StandardDan Miller
 
Hot Spot Network Manager
Hot Spot Network ManagerHot Spot Network Manager
Hot Spot Network Manager
HS NETWORK MANAGER
 
Diameter Overview
Diameter OverviewDiameter Overview
Diameter Overview
John Loughney
 

Viewers also liked (20)

AAA in a nutshell
AAA in a nutshellAAA in a nutshell
AAA in a nutshell
 
Point to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAPPoint to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAP
 
Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1
 
Diameter Presentation
Diameter PresentationDiameter Presentation
Diameter Presentation
 
Open Policy Network: Seeking Community Input
Open Policy Network: Seeking Community InputOpen Policy Network: Seeking Community Input
Open Policy Network: Seeking Community Input
 
Network Policy Abstractions in OpenStack Neutron
Network Policy Abstractions in OpenStack NeutronNetwork Policy Abstractions in OpenStack Neutron
Network Policy Abstractions in OpenStack Neutron
 
L2tp1
L2tp1L2tp1
L2tp1
 
3G Mobile Internet
3G Mobile Internet3G Mobile Internet
3G Mobile Internet
 
(Ppp) chap pap-chap
(Ppp) chap pap-chap(Ppp) chap pap-chap
(Ppp) chap pap-chap
 
Openeye Radius Overview
Openeye Radius OverviewOpeneye Radius Overview
Openeye Radius Overview
 
Ieee 802.1 x
Ieee 802.1 xIeee 802.1 x
Ieee 802.1 x
 
Private VLANs
Private VLANsPrivate VLANs
Private VLANs
 
NT320-Final White Paper
NT320-Final White PaperNT320-Final White Paper
NT320-Final White Paper
 
Oracle Exadata Maintenance tasks 101 - OTN Tour 2015
Oracle Exadata Maintenance tasks 101 - OTN Tour 2015Oracle Exadata Maintenance tasks 101 - OTN Tour 2015
Oracle Exadata Maintenance tasks 101 - OTN Tour 2015
 
Cisco ASR 1001-X Router
Cisco ASR 1001-X RouterCisco ASR 1001-X Router
Cisco ASR 1001-X Router
 
Authentication and Authorization in Asp.Net
Authentication and Authorization in Asp.NetAuthentication and Authorization in Asp.Net
Authentication and Authorization in Asp.Net
 
802.1x Authentication Standard
802.1x Authentication Standard802.1x Authentication Standard
802.1x Authentication Standard
 
Hot Spot Network Manager
Hot Spot Network ManagerHot Spot Network Manager
Hot Spot Network Manager
 
Diameter Overview
Diameter OverviewDiameter Overview
Diameter Overview
 
Chapter 2 point-to-point protocol (ppp)
Chapter 2   point-to-point protocol (ppp)Chapter 2   point-to-point protocol (ppp)
Chapter 2 point-to-point protocol (ppp)
 

Similar to Radius server,PAP and CHAP Protocols

WiFi Hotspot Password
WiFi Hotspot PasswordWiFi Hotspot Password
WiFi Hotspot Password
Maryam Namira
 
Ch08 Authentication
Ch08 AuthenticationCh08 Authentication
Ch08 Authentication
Information Technology
 
RADIUS provides three services- authentication- authorization- and acc.docx
RADIUS provides three services- authentication- authorization- and acc.docxRADIUS provides three services- authentication- authorization- and acc.docx
RADIUS provides three services- authentication- authorization- and acc.docx
acarolyn
 
The three chain links of radius security
The three chain links of radius securityThe three chain links of radius security
The three chain links of radius security
Grafic.guru
 
Remote access service
Remote access serviceRemote access service
Remote access serviceApoorw Pandey
 
CISSPills #1.03
CISSPills #1.03CISSPills #1.03
AAA Best Practices
AAA Best PracticesAAA Best Practices
AAA Best Practices
Sagar Gor
 
The process of authentication
The process of authenticationThe process of authentication
The process of authentication
AbdulrahmanAlmehmadi2
 
The process of authentication
The process of authenticationThe process of authentication
The process of authentication
AbdulrahmanAlmehmadi2
 
EAP-TLS
EAP-TLSEAP-TLS
Ssl Https Server
Ssl Https ServerSsl Https Server
Ssl Https Server
Ram Srivastava
 
Configuring Wired 802.1x Authentication on Windows Server 2012.pdf
Configuring Wired 802.1x Authentication on Windows Server 2012.pdfConfiguring Wired 802.1x Authentication on Windows Server 2012.pdf
Configuring Wired 802.1x Authentication on Windows Server 2012.pdf
djameleddine2015
 
e-SUAP - Security - Windows azure access control list (english version)
e-SUAP - Security - Windows azure access control list (english version)e-SUAP - Security - Windows azure access control list (english version)
e-SUAP - Security - Windows azure access control list (english version)
Sabino Labarile
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
dkaya
 
Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and PrivacyDisobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
Karri Huhtanen
 
Efficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication MethodEfficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication Method
IJCERT
 
Restful api
Restful apiRestful api
Restful api
Anurag Srivastava
 
Securing RESTful API
Securing RESTful APISecuring RESTful API
Securing RESTful API
Muhammad Zbeedat
 

Similar to Radius server,PAP and CHAP Protocols (20)

WiFi Hotspot Password
WiFi Hotspot PasswordWiFi Hotspot Password
WiFi Hotspot Password
 
Ch08 Authentication
Ch08 AuthenticationCh08 Authentication
Ch08 Authentication
 
RADIUS provides three services- authentication- authorization- and acc.docx
RADIUS provides three services- authentication- authorization- and acc.docxRADIUS provides three services- authentication- authorization- and acc.docx
RADIUS provides three services- authentication- authorization- and acc.docx
 
The three chain links of radius security
The three chain links of radius securityThe three chain links of radius security
The three chain links of radius security
 
Remote access service
Remote access serviceRemote access service
Remote access service
 
CISSPills #1.03
CISSPills #1.03CISSPills #1.03
CISSPills #1.03
 
AAA Best Practices
AAA Best PracticesAAA Best Practices
AAA Best Practices
 
The process of authentication
The process of authenticationThe process of authentication
The process of authentication
 
Team9 presentation version 3(1)
Team9 presentation  version 3(1)Team9 presentation  version 3(1)
Team9 presentation version 3(1)
 
The process of authentication
The process of authenticationThe process of authentication
The process of authentication
 
EAP-TLS
EAP-TLSEAP-TLS
EAP-TLS
 
Ssl Https Server
Ssl Https ServerSsl Https Server
Ssl Https Server
 
Configuring Wired 802.1x Authentication on Windows Server 2012.pdf
Configuring Wired 802.1x Authentication on Windows Server 2012.pdfConfiguring Wired 802.1x Authentication on Windows Server 2012.pdf
Configuring Wired 802.1x Authentication on Windows Server 2012.pdf
 
e-SUAP - Security - Windows azure access control list (english version)
e-SUAP - Security - Windows azure access control list (english version)e-SUAP - Security - Windows azure access control list (english version)
e-SUAP - Security - Windows azure access control list (english version)
 
Security
SecuritySecurity
Security
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
 
Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and PrivacyDisobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
 
Efficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication MethodEfficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication Method
 
Restful api
Restful apiRestful api
Restful api
 
Securing RESTful API
Securing RESTful APISecuring RESTful API
Securing RESTful API
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

Radius server,PAP and CHAP Protocols

  • 1. RADIUS Server PAP & CHAP Protocols
  • 2. Computer Security  In computer security, AAA protocol commonly stands for authentication, authorization and accounting.  Authentication : Refers to confirmation that a user who is requesting a service is a valid user. Examples of credentials are passwords, one-time tokens, digital certificates, and phone numbers (calling/called).  Authorization : Refers to the granting of specific types of service (including "no service") to a user, based on their authentication. Examples of services : IP address filtering, encryption, bandwidth control/traffic management.  Accounting : Refers to the tracking of the consumption of network resources by users. May be used for management, planning, billing etc. AAA server provides all the above services to its clients.
  • 3. AAA Protocols  Terminal Access Controller Access Control System (TACACS)  TACACS+  Remote Authentication Dial In User Service(RADIUS)  DIAMETER :Diameter is a planned replacement of RADIUS.
  • 4. RADIUS Server  The Remote Authentication Dial-In User Service (RADIUS) protocol was developed by Livingston Enterprises, Inc., as an access server authentication and accounting protocol.  RADIUS is a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server.  Uses PAP, CHAP or EAP protocols to authenticate users.  Look in text file, LDAP Servers, Database for authentication.  After authentication services parameters passed back to NAS.
  • 6. Functions..  Communication between a network access server (NAS) and a RADIUS server is based on the User Datagram Protocol (UDP).  RADIUS server handles issues related to server availability, retransmission, and timeouts.  RADIUS is a client/server protocol  A RADIUS server can act as a proxy client to other RADIUS servers or other kinds of authentication servers.
  • 7. Interaction between a user and the RADIUS client and server
  • 8. Authentication and Authorization  The RADIUS server can support a variety of methods to authenticate a user.
  • 9. PAP  The Password Authentication Protocol (PAP) provides a simple method for a user to authenticate using a 2-way handshake.  PAP is used by Point to Point Protocol to validate users before allowing them access to server resources.  PAP transmits unencrypted ASCII passwords over the network and is therefore considered insecure.
  • 11. CHAP  Challenge-Handshake Authentication Protocol is a more secure procedure for connecting to a system than the Password Authentication Procedure (PAP).  It involves a three-way exchange of a shared secret. During link establishment, CHAP conducts periodic challenges to make sure that the remote host still has a valid password value.  While PAP basically stops working once authentication is established, this leaves the network vulnerable to attack.
  • 13. Advantages  CHAP provides protection against playback attack by using different challenge value that is unique and comes in random. Because the challenge is unique and unpredictable, the resulting hash value is also unique and random. Which makes it difficult for ‘guessing’.  The use of repeated and different challenges, limits the time of exposure to any single attack.
  • 14. PAP vs CHAP  PAP is in clear text. It mostly refers to providing a password to an account. The password gets thru the wire. It is vulnerable to sniffing cause whoever is listening would know the password.  CHAP, on the other hand, issues a challenge. The password never actually makes it thru the wire but a question is asked.