Page 135 - StudyBook.pdf
P. 135

Communication Security: Remote Access and Messaging • Chapter 3  119


                 Figure 3.4 RADIUS Authentication Process


                                    Client requests authorization  RADIUS Client   RADIUS Server
                                                            (Remote Access Server


                                                                     Remote server queries
                                                                       central repository

                                                                    RADIUS server responds
                                                                   With either an allow or deny
                                       Remote server’s response




                 NOTE
                      See Chapter 9 for a discussion of shared secrets and other cryptography
                      terms and concepts.





                 Vulnerabilities

                 Certain “flavors” of RADIUS servers and Web servers can be compromised by
                 buffer-overflow attacks.A buffer-overflow attack occurs when a buffer is flooded with
                 more information than it can hold.The extra data overflows into other buffers,
                 which may be accessible to hackers.


                   Sometimes You Just Get Lucky…
               Head of the Class…  Many vulnerabilities found in network security are discovered by hackers
                   Once we lock a door, curiosity leads someone to try and see what is
                   behind it. This is the “cat-and-mouse game” that is network security.

                   trying to access systems they are not authorized to use. Sometimes,
                   “white-hat” hackers—security consultants hired to test system vulnera-
                   bilities—discover vulnerabilities in their testing. Unlike “black-hat”
                   hackers, whose intentions are malicious, and “gray-hat” hackers whose
                   intentions are not malicious), white-hat hackers generally work with
                   companies to fix issues before they become public knowledge. In 2001,
                   RADIUS buffer-overflow attacks were discovered by Internet Security
                   Systems while testing the vulnerabilities of the wireless networks.





                                                                              www.syngress.com
   130   131   132   133   134   135   136   137   138   139   140