<div dir="ltr"><div>FWIW, this "vulnerability" was being exploited as early as 2003 when certain ADSL routers had a defect that caused them to overwhelm authentication servers that still had forking modes of operation best suited to a dialup environment. Basically if they were denied authentication the routers would immediately retry with the same credentials, at a rate of about 15 times per second.</div><div><br></div><div>We would forge "accept" packets to quarantine the dirty routers as a way of resolving a race condition that otherwise created a cascading denial of service. Not long after we switched to using Radiator which didn't have this problem.</div><div><br></div><div>I don't believe that anyone ever expected UDP RADIUS packets to traverse public networks, although I suppose I am not surprised this needs to be announced as a threat.</div><div><br></div><div>John</div><div><br></div><div><br></div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Thu, 11 Jul 2024 at 12:19, David Beveridge <<a href="mailto:dave@bevhost.com">dave@bevhost.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-style:solid;border-left-color:rgb(204,204,204);padding-left:1ex"><div dir="ltr"><div><span style="color:rgb(51,51,51);font-family:Roboto,sans-serif;font-size:18px">CVE-2024-3596</span><br></div><a href="https://www.helpnetsecurity.com/2024/07/09/blastradius-radius-protocol-vulnerability/" target="_blank">https://www.helpnetsecurity.com/2024/07/09/blastradius-radius-protocol-vulnerability/</a><br></div>
_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net" target="_blank">AusNOG@lists.ausnog.net</a><br>
<a href="https://lists.ausnog.net/mailman/listinfo/ausnog" rel="noreferrer" target="_blank">https://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
</blockquote></div>