Skip to main content

Threat Model for Networks Employing AAA Proxies
draft-hoeper-proxythreat-02

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Stefan Winter , Katrin Hoeper
Last updated 2009-03-09
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This memo defines a threat model for access networks with AAA proxies. Use cases of current and future applications in which AAA proxies are employed are described and it is discussed how proxies could launch attacks in the defined use cases. The risk associated with these attacks in each use case is analyzed. In addition, mitigation techniques used in current AAA deployments are discussed and best practices for mitigating the identified attacks are identified. As a result, this draft can serve as a guideline for risk assessments and problem mitigation by providers, implementers and protocol designers of systems with proxies.

Authors

Stefan Winter
Katrin Hoeper

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)