RADIUS Insecurity RADIUS is almost thirty years old, and uses cryptography based on MD5. Given that MD5 has been broken for over a decade, what are the implications for RADIUS? Why is RADIUS still using MD5? RADIUS sti... IETF and RADIUS Standards
Announcing SRADIUS RADIUS has used MD5 for security for almost thirty years. It is time to use a modern alternative: SRADIUS! We just released an Internet-Draft which defines “Secure RADIUS”, or “SRADIUS”. We also have ... IETF and RADIUS Standards
Inaugural RADIUS Conference Set for March 12–13, 2025 FOR IMMEDIATE RELEASE Jana Sedivy InkBridge Networks jana.sedivy@inkbridgenetworks.com InkBridgeNetworks.com Inaugural RADIUS Conference Set for March 12–13, 2025 The first-ever global RADIUS conferen... Industry Insights and Trends
Authorized users only: Why use RADIUS and 802.1x to control network access? RADIUS can be an alternative to implementing 802.1x for network access control in complex enterprise environments. Controlling which users and what devices are on your network has become significantly... Enterprises Network Security Best Practices
RADIUS security best practices: How to harden your deployment RADIUS has several well-known security limitations, most of which are easy to mitigate once you know what to do. This guide walks through five common weaknesses in the RADIUS protocol and the practica... IETF and RADIUS Standards
Exposed: National Public Data breach makes a nation’s secrets public The hacking of 270 million social security numbers from National Public Data reinforces the best practice for personal data: always encrypt PII. The cat is out of the bag for National Public Data. In ... Security Threats and Vulnerabilities
TP-Link Investigation Highlights IT Hardware Risks Calls for an investigation into routers from TP-Link highlight the security risk of using compromised hardware as part of a corporate network. What is the TP-Link controversy? Concerns that the Peopl... Security Threats and Vulnerabilities
How to customize an OEM instance of FreeRADIUS As the most popular RADIUS server in the world, FreeRADIUS is used by many hardware vendors. They ship their products with FreeRADIUS as an embedded or “OEM” product. It is common for them to need som... FreeRADIUS Technical Guides
Expert Advice Beats Internet Wisdom: What Not To Do About BlastRADIUS There’s a lot of misinformation circulating about the BlastRADIUS vulnerability. For us, as RADIUS experts, it’s a depressing reminder of how little people understand about this foundational protocol ... Network Security Best Practices Security Threats and Vulnerabilities
RADIUS password compatibility This article covers password storage compatibility for RADIUS deployments. You'll findan overview of how the RADIUS protocol works here. In order for RADIUS authentication to work, user passwords need... Network Security Protocols
How authentication protocols work Choosing an authentication protocol is one of the most important decisions when designing a RADIUS ecosystem. There are a variety of authentication protocols to choose from, each with their own set of... Network Security Protocols
PAP vs CHAP: A complete security comparison PAP and CHAP are both RADIUS authentication protocols, but they trade off security in opposite places. PAP transmits passwords between the customer and the NAS in the clear, while allowing passwords t... Network Security Protocols