Security Features

The GPON configuration intrinsically provides multiple layers of security to ensure backend systems are protected and authorization limits are respected.

1. Input Validation

  • Formatting Checks Prevents directory traversal attacks (..), SQL injection vectors by restricting spaces (` ), and malformed realm processing (@@, `.).

  • Strict Normalization The system forces all usernames to lowercase to prevent bypass mechanisms utilizing case sensitivity.

  • Canonical Transformation The backend database is shielded from raw, potentially dangerous input. Only a validated, 11-digit numerical string (94xxxxxxxxx) is ever passed to the SQL lookup engine.

2. Access Control

  • Barred User Enforcements (barred_user_policy)

Regardless of password correctness, the user cannot access the GPON network if their billing/administrative status is restricted.

Pseudocode Rule:

IF Barring-Status != 0 THEN REJECT "User Barred"
  • Simultaneous Session Control (max_session_policy)

Prevents account sharing or ghost session lockups by ensuring strict session counts.

Pseudocode Rule:

IF Simultaneous-Session-Status != 1 THEN REJECT "Maximal Concurrent User Sessions Reached"

3. Data Leakage Prevention

In the post-auth block, the system explicitly purges internal identifiers:

update reply { &User-Name !* ANY }

This guarantees the downstream network equipment and user do not receive internal identifiers utilized by the backend database, masking the internal architecture.