首页 EAP-总结

EAP-总结

举报
开通vip

EAP-总结nullPEAP & EAP-TTLSPEAP & EAP-TTLSEAP-TLS Drawbacks PEAP EAP-TTLS EAP-TTLS – Full Example Security Issues PEAP vs. EAP-TTLS Other EAP methods Summary So far… So far… EAP was introduced, it doesn’t provide enough security for wireless environments. EAP-TLS p...

EAP-总结
nullPEAP & EAP-TTLSPEAP & EAP-TTLSEAP-TLS Drawbacks PEAP EAP-TTLS EAP-TTLS – Full Example Security Issues PEAP vs. EAP-TTLS Other EAP methods Summary So far… So far… EAP was introduced, it doesn’t provide enough security for wireless environments. EAP-TLS provides protection from most attacks EAP-TLS Drawbacks EAP-TLS Drawbacks Lack of user identity protection Passed in the EAP/Identity and in the certificate Needs client certificate in order to authenticate client Generate and distribute the certificates Revoke keys Users login from different computers (Coffe shop…) Users are more familiar with the idea of passwords. Certificates may require some training. EAP-TLS ExtensionsEAP-TLS ExtensionsTwo quite similar protocols are developed in order to improve the weaker points of EAP-TLS. In both, the main idea is to establish a TLS channel and then using the TLS tunnel in order to pass the identity of the user and perform the authentication protocol. PEAP – Protected EAP PEAP – Protected EAP Developed by Microsoft, Cisco and RSA Security Current status: Internet draft (draft-josefsson-pppext-eap-tls-eap-06.txt at ieft.org) Provides: Mutual authentication, client identity protection and key generation. PEAP – The ParticipantsPEAP – The ParticipantsClientNASBackend ServerPerform PEAP (NAS uses as pass-through)TrustCan be the same machine or separated The NAS doesn’t have to know PEAPSome Link LayerSecured LinkPEAP – The ProtocolPEAP – The ProtocolTwo phases: Perform TLS handshake in which the server is being authenticated to the client by using a certificate. Optionally, the user can be authenticated as well with a certificate. If the user was not authenticated with a certificate, perform EAP in the generated TLS channel in order to authenticate the client. PEAP Packet FormatPEAP Packet FormatCodeTypeIdentifierFlagsLengthTLS Message Length……TLS Message LengthTLS Data…. (EAP packets)Ver Code: 1- Request 2- Response Identifier – Used to match response to request Type- 25 (PEAP) Flags: Length included, More fragments, Start flagPEAP – Phase 1PEAP – Phase 1ClientPEAP Server EAP- Response (empty)PEAP – Phase 2PEAP – Phase 2PEAP Server ClientTransfer of the generated key from the PEAP server to the NAS if on different machines EAP-TTLSEAP-TTLSDeveloped by Funk Software. Internet draft: draft-ieft-pppext-eap-ttls-02.txt on ietf.org Provides: mutual authentication, key generation , client identity privacy and data cipher suite negotiation EAP-TTLS – The ProtocolEAP-TTLS – The ProtocolAgain, two phases: Establish TLS Channel, authenticate server (Optionally authenticate user too) If the user wasn’t authenticated, use the TLS channel to authenticate user using an authentication protocol (not only EAP)EAP-TTLS – The ParticipantsEAP-TTLS – The ParticipantsClientNAS (EAP,AAA)TTLS Server (TLS,AAA)AAA ServerEAP-TTLS conversation, TLS ChannelAuthenticate (EAP, PAP, CHAP, etc)Authentication, Authorizing and/or Accounting protocol (such as Radius)EAP-TTLS LayersEAP-TTLS LayersLink Layer/AAA layer – PPP, Radius, etcEAPEAP-TTLSUser Authentication- PAP/CHAP/EAP etcTLSEAP-TTLS Packet FormatEAP-TTLS Packet FormatCodeTypeIdentifierFlagsLengthTLS Message Length……TLS Message LengthTLS Data….Ver Code: 1- Request 2- Response Identifier – Used to match response to request Type- 21 (EAP-TTLS) Flags: Length included, More fragments, Start flagContains AVPs, which encapsulates authentication information (PAP/CHAP/...)AVPsAVPsIn PEAP the data exchanged between the client and the server over the TLS channel is EAP packets. In EAP-TTLS, AVPs – attribute-values pairs are exchanged. Encrypted by TLS and encapsulated in EAP-TTLS packets. The AVPs format of EAP-TTLS is compatible with the Diameter & Radius AVP format. This allows easy translation of AVP packets by the EAP-TTLS server between the client and the AAA server (using Radius for example). EAP-TTLS AVP FormatEAP-TTLS AVP FormatAVP CodeAVP LengthVendor-ID (optional)Data…V M r r r r r rAVP Code + Vendor ID : Used to identify attributes V: Does Vendor-ID appear M: 0- This AVP can be ignored if not supported 1- If this AVP isnt supported, fail the negotation EAP-TTLS - Phase 1EAP-TTLS - Phase 1EAP- Response / Identity [My Domain]EAP-Request (Type= EAP-TTLS, start)TLS HandshakeClientTTLS Server EAP- Response (empty)EAP-Request / IdentityEAP-TTLS – Phase 2EAP-TTLS – Phase 2ClientTTLS Server AAA Server Radius Message ExchangeTTLS Message Exchange NAS as a pass-throughEAP-TTLS – Key DistributionEAP-TTLS – Key DistributionEAP-TTLS Enables key distribution to the client and to the access point. The key is used for the communication between the AP and the client. Supports exchange of: Data cipher suite (cryptographic algorithm, key length) not the same as the suite used in the TLS phase Keying Material (from which the used keys will be generated) Supported by PEAP as well.EAP-TTLS – Key Distribution (2)EAP-TTLS – Key Distribution (2)The client and the AP send their data cipher suite preferences to the TTLS server which select a cipher suite supported by both and sends it to both. (we’ll see when exactly in the following example) If the client and/or the AP do not send their preferences, other means of negotiation should be used. (link layer…) The client and TTLS server generate their keying material (as in EAP-TLS) and the TTLS sends the keying material to the APEAP-TTLS – Full ExampleEAP-TTLS – Full ExampleLANClientAccess PointTTLS ServerAAARadiusRadius Usage of CHAP in order to authenticate the client Establishment of data cipher suite and keying materialEAP-TTLS – Full Example (1)EAP-TTLS – Full Example (1)ClientAccess PointTTLS ServerAAARadiusRadiusEAP-Request/IdentityEAP-Response/IdentityRadius Access Request: Data-Cipher-Suite+ EAP-Response/IdentityRadius Access Challenge: EAP-Request/TTLS-StartEAP-Request/TTLS-StartEAP-Response/TTLS: client_helloRAR: EAP-Response/TTLS: client_helloRAC: EAP-Request/TTLS (server_hello,certificate, server_key_exchange,server_hello_done)EAP-TTLS – Full Example (2)EAP-TTLS – Full Example (2)ClientAccess PointTTLS ServerAAARadiusRadiusEAP-Request/TTLS (server_hello,certificate,server_key_exchange,srv_hello_done)EAP-Response/TTLS (client_key_exchange,CCS,client_finish)RAR: EAP-Response/TTLS (client_key_exchange,CCS,client_finish)RAC: EAP-Request/TTLS (CCS, server_finish)EAP-Request/TTLS (CCS, server_finish)EAP-Response/TTLS (user_name, CHAP-Challenge&Password) Data-CipherSuite+RAR: User_name, CHAP-Challenge, Chap-PasswordRAR: EAP-Response/TTLS (user_name, CHAP-Challenge, CHAP-Password) +Data-CipherSuiteEAP-TTLS – Full Example (3)EAP-TTLS – Full Example (3)ClientAccess PointTTLS ServerAAARadiusRadiusRadius Access-Accept [RAA]RAC: EAP-Request/TTLS (Data-Cipher-Suite)EAP-Request/TTLS (Data-Cipher-Suite)EAP-Response (No data)RAR: EAP-Response (No data)RAA: Data-Cipher-Suite, Data-Keying-Material, EAP-SuccessEAP-SuccessMutual Authentication done Data cipher suite and key establishedPEAP & EAP-TTLS Security IssuesPEAP & EAP-TTLS Security IssuesBased on TLS which is well tested. Using TLS grants protection from: Man in the middle attacks Snooping user ID & password Session hijacking Usage of tunneling: Enables using existing protocols over a protected layer Provides client identity protection: Identity passed over the TLS channel If the client is to be authenticated using a certificate, can be done after the TLS channel was established Open Security ProblemsOpen Security ProblemsRelies on the security between the AAA, TTLS/PEAP server and AP. Injection of EAP-Success / EAP-Failure packets Possible solution: Other EAP message? inside the channel?Compare PEAP, EAP-TTLS, EAP-TLSCompare PEAP, EAP-TTLS, EAP-TLSAdditional IssuesAdditional Issues In addition to the security issues we introduced about PEAP & EAP-TTLS , they have some additional features: Same as in EAP-TLS: Support for fragmentation of long messages Support for fast re-connection to the network (using TLS resumption abilities) Exchange of information between the client and the authentication server. (EAP-TTLS: AVPs, PEAP: Latest draft defines something similar – TLVs) Example for such information: language settings for notifications Other EAP MethodsOther EAP MethodsEAP-MD5 Only user authentication Uses user id and password Vulnerable to Dictionary attack, man in the middle, session hijack Easy implementation EAP-SRP (Secure Remote Password) Usage of DH in order to authenticate both sides. (The DH exchange is protected via usage of hash and salt) Does not use certificates at all Mutual authentication Uses user id and passwordEAP Methods (2)EAP Methods (2)EAP-LEAP (Light Extensible Authentication Protocol) Developed by Cisco as a proprietary protocol, can only be supported by Cisco NASes Usage of challenge and response Mutual authentication Uses user id and password (no certificates) Vulnerable to dictionary attack EAP-SIM Used for cellular communication, based on challenge-response which is done according to a key stored in the SIM card of a GSM cell phone. Mutual Authentication Vulnerable to spoofingEAP Methods (3)EAP Methods (3) EAP-SecurID Usage of one time password in order to authenticated client. No authentication of the server (solution: use tunneling) Vulnerable to Man in the middle attack, session hijackSummary (1)Summary (1)EAP enables usage of diverse methods in order to perform authentication. It defines the exchange of message until authentication process is done. EAP-TLS makes use of the existing TLS protocol in order to provide safe mutual authentication. PEAP and EAP-TTLS use TLS to authenticate server and offer tunneling of other methods in order to authenticate the client. Summary (2) EAP ArchitectureSummary (2) EAP ArchitectureSummary (3)Summary (3)What to use? A few examples: On a wired network EAP-MD5 is probably enough for most uses. Can be tunneled through PEAP/EAP-TTLS for extended security and server authentication If a certificate system is existing EAP-TLS can be used to provide a high level of security. If an existing non-EAP authentication system exists- EAP-TTLS is the only option to enable its usage in a secure way. EAP-SecurID can be used tunneled if OTPs are to be used. LEAP can be used if the NAS is from cisco. Many more methods are being developed.
本文档为【EAP-总结】,请使用软件OFFICE或WPS软件打开。作品中的文字与图均可以修改和编辑, 图片更改请在作品中右键图片并更换,文字修改请直接点击文字进行修改,也可以新增和删除文档中的内容。
该文档来自用户分享,如有侵权行为请发邮件ishare@vip.sina.com联系网站客服,我们会及时删除。
[版权声明] 本站所有资料为用户分享产生,若发现您的权利被侵害,请联系客服邮件isharekefu@iask.cn,我们尽快处理。
本作品所展示的图片、画像、字体、音乐的版权可能需版权方额外授权,请谨慎使用。
网站提供的党政主题相关内容(国旗、国徽、党徽..)目的在于配合国家政策宣传,仅限个人学习分享使用,禁止用于任何广告和商用目的。
下载需要: 免费 已有0 人下载
最新资料
资料动态
专题动态
is_923781
暂无简介~
格式:ppt
大小:440KB
软件:PowerPoint
页数:0
分类:互联网
上传时间:2012-12-11
浏览量:33