How authentication protocols work Choosing an authentication protocol is one of the most important decisions when designing a RADIUS ecosystem. There are a variety of authentication protocols to choose from, each with their own set of... Network Security Protocols
PAP vs CHAP. Is PAP less secure? One of the most common questions about RADIUS security asks “Is PAP secure?” The usual answer is “no”, which is (in our opinion) simply wrong. A better answer is “Here’s a comparison of PAP and CHAP, ... Network Security Best Practices Network Security Protocols
Is PAP secure? A common misconception is that PAP is less secure than other authentication protocols such as CHAP, MS-CHAP, or EAP-MSCHAP(v2). This perception arises because of a misunderstanding of how PAP is actua... Network Security Best Practices Network Security Protocols
MS-CHAP is dead While MS-CHAP has been used since 1998, it uses DES encryption which was deprecated in 2002. Attacks on MS-CHAP itself have been known since 2006, and those attacks have only gotten better over time. ... Network Security Best Practices Network Security Protocols
BlastRADIUS Neutralized: Experts at InkBridge Networks Provide Fix for Critical Network Vulnerability FOR IMMEDIATE RELEASE Jana Sedivy InkBridge Networks JSedivy@InkBridgeNetworks.com inkbridgenetworks.com [OTTAWA, CANADA]:The RADIUS experts at InkBridge Networks have developed a blueprint to resolve... Security Threats and Vulnerabilities
NetworkRADIUS Rebrands as InkBridge Networks, Expands to Support Broader Network Challenges for Enterprises FOR IMMEDIATE RELEASE Jana Sedivy InkBridge Networks JSedivy@InkBridgeNetworks.com inkbridgenetworks.com [OTTAWA, CANADA]: NetworkRADIUS is rebranding as InkBridge Networks, and expanding its focus as...
BlastRADIUS Vulnerability Threatens Corporate Networks and Cloud – InkBridge Networks Guides Organizations Through the Fix FOR IMMEDIATE RELEASE Jana Sedivy InkBridge Networks JSedivy@InkBridgeNetworks.com inkbridgenetworks.com [OTTAWA, CANADA]: The BlastRADIUS vulnerability announced July 9 by cybersecurity researchers i... Security Threats and Vulnerabilities
Client Case Study: Slow network performance When the pandemic hit, thousands of employees suddenly needed remote access overnight. This aerospace company's "simple" Python-based authentication system became their biggest business threat—until o... Network Security Best Practices
Network authentication protocols: compatibility between systems and methods In many network configurations, there will be some transactions for which the RADIUS server will not perform the authentication itself, but simply pass credentials to a third-party system and rely on ... Network Security Protocols
Authentication: Is it really you? RADIUS security is composed of three components: authentication, authorization, and accounting. These three links in the RADIUS security chain are often referred to by their acronym, “AAA”. The first ... Network Security Protocols
802.1X FreeRADIUS setup Undertaking 802.1X setup is a daunting experience for many organizations. There are detailed requirements on end-user PCs, switches, servers, certificates, and more. If any of these requirements are n... Network Security Best Practices
Client Case Study: RADIUS proxy consolidation for efficiency When an ISP is running a large number of systems at 99% idle capacity "just in case," you know there's room for optimization. We worked with a multi-service provider that had built four separate RADIU... Network Security Best Practices