DOC PREVIEW
UCCS CS 6910 - Protected Extensible Authentication Protocol

This preview shows page 1-2-3-4 out of 11 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

PEAPWhat is PEAP?EAP – Extensible Authentication ProtocolTLS – Transport Layer SecurityWhy do we need PEAP?How does PEAP fix these problems?How does PEAP work?Slide 8PEAP fast reconnectSecurity concernsReferencesPEAPProtected Extensible Authentication ProtocolWhat is PEAP?PEAP is an authentication protocol designed for wireless LANsPEAP makes use of 2 well known and well studied protocolsEAP - Extensible Authentication ProtocolTLS - Transport Layer SecurityEAP – Extensible Authentication ProtocolEAP is an authentication protocol that typically rides on top of another protocol such as 802.1x, RADIUS, PPP, etc.EAP allows the authenticator to serve as the user authentication carrier between the client and the authentication server.EAP limitations are well known and resolved by PEAP.TLS – Transport Layer SecurityTLS provides the encryption, compression and data integrity.TLS is based on the SSL 3.0 Protocol Specification and is often described as a improved version of SSL.TLS is well documented and has been extensively analyzed with no significant weaknesses found.Why do we need PEAP?A wireless access point (WAP) broadcasts all of its traffic so that anyone within broadcast range can passively collect the data. (Ethereal, AirSnort)Wireless encryption is weak and can be decrypted in a short period of time. (AirSnort, WEPcrack)Physical access of the network is not necessary to connect to the network. Knowledge of the SSID and possibly a valid MAC address is all that is required. (NetStumbler) Users have no way of knowing if they are connecting to a rogue access point setup as part of a man-in-the-middle attack.How does PEAP fix these problems?The transmission of user-sensitive authentication data is encrypted within a TLS tunnel.Data within the TLS tunnel cannot be decrypted without the TLS master secret.If a client does not successfully authenticate, its connection is dropped by the access point.The TLS master secret is not shared with the access point, so rogue access points will be unable to decrypt messages protected by PEAP.Server-side Public-Key Infrastructure based digital certificates are used to authenticate EAP Servers.How does PEAP work?Part 1 – Establish TLS tunnelRequest Connection Request ConnectionDo you support PEAP?YesServer PKI certificate & server’s TLS preferencesCertificate verified & client’s TLS preferences or OKClient WAP Authentication ServerTLS settings accepted & TLS finishedTLS tunnel established EAP ServerHow does PEAP work?Part 2 – EAP authentication within the TLS tunnelServer’s requested EAP authentication typeClient’s requested EAP authentication type or OKClient WAP EAP Server Authentication ServerEAP authentication successResponse to TLS tunnel establishedRequest client’s identityClient’s identity (tells server domain to contact)EAP method accepted, request authenticationClient’s UserID and PasswordTLS tunnel torn downUserID & passwordSuccessPEAP fast reconnectAllows wireless clients to move between access points on the same network without repeated requests for authentication.Requires that access points be configured to forward authentication requests to the same EAP server. If the original EAP server is not available, full authentication must occur.TLS session IDs are cached by the client and server. Because the server only caches TLS session IDs that successfully authenticate in part 2, if the client can reestablish the TLS session, it is not necessary to re-authenticate the client against the authentication server.Security concernsAuthentication data transmitted between the NAS and the authentication server is not encrypted by the TLS tunnel. This channel must be protected from man-in-the-middle attacks.Data transmitted after PEAP authentication is not encrypted. The TLS tunnel is only used for authentication.Implementation of PEAP must be setup correctly. Poor configuration can allow for several severe


View Full Document

UCCS CS 6910 - Protected Extensible Authentication Protocol

Download Protected Extensible Authentication Protocol
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Protected Extensible Authentication Protocol and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Protected Extensible Authentication Protocol 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?