-
Cryptographic Protocols
-
WEP (Wired Equivalent Privacy)
- Easily Hacked. Do not use.
-
WPA (Wi-Fi Protected Access)
- Use instead of WEP. Use WPA2 if available.
-
Uses TKIP:
- Temporal Key Integrity Protocol
-
WPA2 (Wi-Fi Protected Access Version 2)
- Upgraded WPA. Use this.
-
Uses CCMP:
- Counter Mode Cipher Block Chaining Message Authentication Code Protocol
- Based on AES
-
Authentication Protocols
-
IEEE 802.1X
- An IEEE Standard for port-based Network Access Control (PNAC).
- It is part of the IEEE 802.1 group of networking protocols.
- It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN.
-
Describe the three components of an 802.1X connection:
-
Supplicant:
- A client on a device. Also called an Authentication Agent
-
Authenticator:
- A WAP or switch that approves the user's provided password
-
AAA Server:
- RADIUS, Diameter, or TACACS+ server
-
List the four steps involved in the AAA (802.1X) authentication process:
-
Initialization:
- If a switch or AP detects a new supplicant, the port connection enables port 802.1X traffic. Other traffic is dropped.
-
Initiation:
- The authenticator periodically sends EAP requests to a MAC address on the network, which includes the encrypted username of the user. The supplicant listens for this address and sends an EAP response that includes a one-way hashed value calculated from the password. The authenticator checks this hashed value against its stored value. Assuming these two values match, the authenticator encapsulates the response and sends it to the authentication server.
-
Negotiation:
- The authentication server then sends a reply to the authenticator. The authentication server specifies which EAP method to use. Then the authenticator transmits that request to the supplicant.
-
Authentication:
- If the supplicant and the authentication server agree on an EAP method, the two transmit until there is either success or failure to authenticate the supplicant computer.
-
Extensible Authentication Protocol (EAP):
- A protocol for wireless networks that expands on authentication methods used by the Point-to-Point Protocol (PPP)
-
Explain the purpose of LEAP, PEAP, EAP-MD5, EAP-TLS, EAP-TTLS, and EAP-FAST:
- LEAP (Lightweight Extensible Authentication Protocol) is a Cisco-proprietary protocol, developed prior to the industry standard. There are known security issues with LEAP.
- PEAP (Protected Extensible Authentication Protocol) is a newer EAP draft that is gathering support to become an Internet standard.
- EAP-MD5 uses CHAP (Challenge Handshake Authentication Protocol) to provide one-way authentication.
- EAP-TLS uses Transport Layer Security (TLS), a certificate-based system, to provide mutual (bidirectional) security. Because of this, it is not well-suited for enterprise servers.
- EAP-TTLS uses Tunneled Transport Layer Security (TTLS), a version of TLS with encapsulation added. This version of EAP is well-suited for enterprises because it requires only server-side certificates.
- EAP-FAST uses Flexible Authentication via Secure Tunneling, a protected access credential (instead of a certificate) to achieve mutual authentication.