@techreport{hoeper-proxythreat-02, number = {draft-hoeper-proxythreat-02}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-hoeper-proxythreat/02/}, author = {Stefan Winter and Katrin Hoeper}, title = {{Threat Model for Networks Employing AAA Proxies}}, pagetotal = 23, year = 2009, month = mar, day = 9, abstract = {This memo defines a threat model for access networks with AAA proxies. Use cases of current and future applications in which AAA proxies are employed are described and it is discussed how proxies could launch attacks in the defined use cases. The risk associated with these attacks in each use case is analyzed. In addition, mitigation techniques used in current AAA deployments are discussed and best practices for mitigating the identified attacks are identified. As a result, this draft can serve as a guideline for risk assessments and problem mitigation by providers, implementers and protocol designers of systems with proxies.}, }