PEAPWhat is PEAP?EAP – Extensible Authentication ProtocolTLS – Transport Layer SecurityWhy do we need PEAP?How does PEAP fix these problems?How does PEAP work?Slide 8PEAP fast reconnectSecurity concernsReferencesPEAPProtected Extensible Authentication ProtocolWhat is PEAP?PEAP is an authentication protocol designed for wireless LANsPEAP makes use of 2 well known and well studied protocolsEAP - Extensible Authentication ProtocolTLS - Transport Layer SecurityEAP – Extensible Authentication ProtocolEAP is an authentication protocol that typically rides on top of another protocol such as 802.1x, RADIUS, PPP, etc.EAP allows the authenticator to serve as the user authentication carrier between the client and the authentication server.EAP limitations are well known and resolved by PEAP.TLS – Transport Layer SecurityTLS provides the encryption, compression and data integrity.TLS is based on the SSL 3.0 Protocol Specification and is often described as a improved version of SSL.TLS is well documented and has been extensively analyzed with no significant weaknesses found.Why do we need PEAP?A wireless access point (WAP) broadcasts all of its traffic so that anyone within broadcast range can passively collect the data. (Ethereal, AirSnort)Wireless encryption is weak and can be decrypted in a short period of time. (AirSnort, WEPcrack)Physical access of the network is not necessary to connect to the network. Knowledge of the SSID and possibly a valid MAC address is all that is required. (NetStumbler) Users have no way of knowing if they are connecting to a rogue access point setup as part of a man-in-the-middle attack.How does PEAP fix these problems?The transmission of user-sensitive authentication data is encrypted within a TLS tunnel.Data within the TLS tunnel cannot be decrypted without the TLS master secret.If a client does not successfully authenticate, its connection is dropped by the access point.The TLS master secret is not shared with the access point, so rogue access points will be unable to decrypt messages protected by PEAP.Server-side Public-Key Infrastructure based digital certificates are used to authenticate EAP Servers.How does PEAP work?Part 1 – Establish TLS tunnelRequest Connection Request ConnectionDo you support PEAP?YesServer PKI certificate & server’s TLS preferencesCertificate verified & client’s TLS preferences or OKClient WAP Authentication ServerTLS settings accepted & TLS finishedTLS tunnel established EAP ServerHow does PEAP work?Part 2 – EAP authentication within the TLS tunnelServer’s requested EAP authentication typeClient’s requested EAP authentication type or OKClient WAP EAP Server Authentication ServerEAP authentication successResponse to TLS tunnel establishedRequest client’s identityClient’s identity (tells server domain to contact)EAP method accepted, request authenticationClient’s UserID and PasswordTLS tunnel torn downUserID & passwordSuccessPEAP fast reconnectAllows wireless clients to move between access points on the same network without repeated requests for authentication.Requires that access points be configured to forward authentication requests to the same EAP server. If the original EAP server is not available, full authentication must occur.TLS session IDs are cached by the client and server. Because the server only caches TLS session IDs that successfully authenticate in part 2, if the client can reestablish the TLS session, it is not necessary to re-authenticate the client against the authentication server.Security concernsAuthentication data transmitted between the NAS and the authentication server is not encrypted by the TLS tunnel. This channel must be protected from man-in-the-middle attacks.Data transmitted after PEAP authentication is not encrypted. The TLS tunnel is only used for authentication.Implementation of PEAP must be setup correctly. Poor configuration can allow for several severe
View Full Document