|
|
%!s(int64=10) %!d(string=hai) anos | |
|---|---|---|
| .. | ||
| exports | %!s(int64=10) %!d(string=hai) anos | |
| include | %!s(int64=10) %!d(string=hai) anos | |
| README.md | %!s(int64=10) %!d(string=hai) anos | |
| X500 UID.vbs | %!s(int64=10) %!d(string=hai) anos | |
| dllmain.cpp | %!s(int64=10) %!d(string=hai) anos | |
| stdafx.h | %!s(int64=10) %!d(string=hai) anos | |
The ars exists of 2 types:
When the user tries to connect through VPN, the credentials are send by a RADIUS packet to the RADIUS server.
On the RADIUS server is an extra extension loaded to make sure the 2nd authentication step is used. (Using the app).
The RADIUS server responds within 30 seconds with the answer to the VPN server (Access granded or denied).
This server is partitialy open the the internet. One port is configured in a DMZ zone, others are connected the the secure company network.
The VPN server has the following configurations:
On this server the actual authentication is done.
First the server checks if the provided credentials are correct.
If correct, the extension will start.
The extension ALWAYS returns an answer (accept or reject)
The extension can responde is 3 ways:
The extension is configured to NEVER answer with a discard message, as the NPS doens't forward the discard message back to the VPN server.
This will be seen as a timeout by the VPN server, so it tries agian after 40 seconds.
By that time most devices (computer trying to connect to VPN) automaticaly hang up because they timed out.
Thats why the extension ALWAYS responds with a reject message, except when the user granded access ofcourse.
Here a list of possible scenarios with can occur to the extension:
The Extension also logs the activity to a log file. The directory is hard coded to C:\Temp\NPS.log.txt.
It logs:
This allows the system administrator to see if there is an hacker trying to connect and to determine if the hacker must be banned.