娇喘是什么| 梦见鬼是什么意思| 黑枸杞和红枸杞有什么区别| 公章是什么样的| 月经一直不停有什么办法止血| 87属什么生肖| 男大女6岁有什么说法| 人血白蛋白适合什么人| 温州特产是什么| 白细胞计数偏高是什么意思| 这是什么呀| 降血压吃什么| 面基是什么意思啊| 夹腿是什么| 钥匙代表什么生肖| 五险都有什么险| 临床药学是干什么的| 一个口一个且念什么字| 谷丙转氨酶是检查什么的| 脂肪肝是什么引起的| 胃不好的人吃什么好| 奥氮平片治疗什么病| 小节是什么意思| 瘦的快是什么原因| 骨盐量偏高代表什么| 吃激素有什么副作用| 蓝五行属什么| 7月17是什么星座| 晚上睡觉老做梦是什么原因| 冬虫夏草长什么样| 肾虚是什么症状| 为什么叫丁克| 胃胀气吃什么食物| 世界上最贵的东西是什么| 冬天手脚冰凉是什么原因怎么调理| 什么时候刮胡子最好| 什么是风湿病| 火加同念什么| 皿是什么意思| 梦到公鸡是什么意思| 安逸什么意思| 可否是什么意思| 普通健康证都检查什么| 唇上有痣代表什么| 守宫是什么动物| 私募是什么意思| 甲状腺去医院挂什么科| 白带多是为什么| 什么茶减肥效果最好| 农历7月是什么月| 恶风是什么意思| 92年什么命| 一个立一个羽念什么| 矿物油是什么油| 氟哌酸又叫什么名字| 婊子代表什么生肖| 骨裂吃什么药| 羽衣甘蓝是什么| 什么是激素药| 火险痣是什么意思| 8月5日什么星座| GOLF是什么品牌| 尿黄是什么原因引起的男性| 人为什么要抽烟| 黄金发红是什么原因| 心肌缺血做什么检查能查出来| 六月是什么生肖| 停经吃什么药能来月经| 什么是混合磨玻璃结节| 书字五行属什么| 尿中有泡沫是什么原因| 舌头咬破了用什么药| 为什么一生气就胃疼| 肌酸激酶偏低是什么原因| 赡养是什么意思| 叶凡为什么要找荒天帝| 鸡汤炖什么菜好吃| dove什么意思| 豆腐吃多了有什么坏处| 什么啊| 日逼是什么意思| 身上老出汗是什么原因引起的| 输卵管堵塞吃什么药可以疏通| 个体户是什么职业| 口比念什么| 胎心不稳定是什么原因| 粟是什么农作物| 江米是什么米| 有且仅有什么意思| 孕妇什么时候做nt| apc是什么药| 夏至什么时候| 人为什么会焦虑| 梦见自己请客吃饭是什么意思| 一什么马车| 户籍所在地是指什么| 什么是规培生| 检查乳房挂什么科| 六十六大寿有什么讲究| 三妻四妾是什么生肖| 总是打哈欠是什么原因| 店招是什么意思| fte是什么意思| 为什么会便秘| 什么时候闰正月| 事半功倍的意思是什么| 天秤女和什么座最配对| 嗯嗯嗯是什么意思| 固执什么意思| 哈欠是什么意思| 舌战群儒是什么意思| 泌尿感染是什么症状| 1944年属什么生肖| 副巡视员是什么级别| 柱镜是什么意思| 一次不忠终身不用什么意思| 01什么意思| 共轭什么意思| 5月24日什么星座| 姓蔡的女孩起什么名字| 精字五行属什么| 2021属什么生肖| 河北属于什么地区| 苦荞茶有什么作用| 尿道口流白色液体是什么病| 灌肠用什么| 梦见对象出轨什么征兆| 气炎念什么| 肚子一直响是什么原因| 梦见卖鱼是什么意思| 鼻炎什么症状| 豚是什么意思| 杨玉环属什么生肖| 下焦湿热是什么意思| 农历六月十三是什么星座| 女性睾酮高说明什么| ggdb是什么牌子| 6s是什么| 肾火吃什么药| 拔罐是什么原理| 针眼是什么样子的图片| 腰脱什么症状| 宫颈多发潴留囊肿是什么意思| 什么的东风填词语| 白头发吃什么能变黑| 忌廉是什么东西| 52年属什么| 牛鞭是牛的什么部位| 听什么音乐容易入睡| 戊肝是什么病| 核磁共振是查什么的| 眼皮为什么会跳| 痱子是什么样的| 97年属什么的生肖| 生性凉薄什么意思| 为什么手臂上有很多很小的点| 肾虚是什么原因造成的| 1.4是什么星座| 心水是什么意思| 6月22日什么星座| 喜怒无常是什么意思| 喝蜂蜜水不能吃什么| 艾滋病一年有什么症状| 钙片什么牌子好| rop是什么意思| 一贫如什么| 胎儿胆囊偏小有什么影响| 男人吃生蚝补什么| 二代身份证是什么意思| 眼袋肿了是什么原因| 无什么什么什么| 为什么感觉不到饿| 折耳猫是什么| 炖鸡肉放什么调料| 什么人适合吃蛋白质粉| 犯花痴什么意思| 眼睛肿胀是什么原因| 钾低了会出现什么症状| 美国为什么不敢打伊朗| 拍大腿内侧有什么好处| 属鸡适合佩戴什么饰品| 中国属于什么人种| 口干舌燥喝水也不解渴是什么原因| 怀孕什么不能吃| 芊芊学子什么意思| 申酉是什么时间| ieg是什么意思| hm是什么牌子| 唐氏筛查高风险是什么意思| 不举是什么原因造成的| 什么的感受| 多吃什么可以长头发| 甲亢不能吃什么| 六个口是什么字| 2010年属虎的是什么命| 兔子爱吃什么| 怀孕什么时候开始孕吐| 发烧吃什么水果| 肿大淋巴结是什么意思| 怀孕第一个月有什么反应| 嗓子疼喝什么| 小孩感冒流鼻涕吃什么药| 屁多是什么病的前兆| 脑白质病是什么病| 保胎是什么意思| 站姐是什么职业| cartier什么牌子| dl是什么意思| 睡不着有什么好办法吗| 体质指数是什么意思| 巨细胞病毒抗体阳性是什么意思| 什么食物属于发物| 脚趾麻是什么原因| 金不换是什么菜| 喝酒打嗝是什么原因| 子宫内膜双层什么意思| tct检查什么| 青少年膝盖痛什么原因| 宫颈潴留囊肿是什么意思| 动脉导管未闭对宝宝有什么影响| 鸡头米什么时候上市| 朋友妻不可欺是什么意思| 西洋参跟花旗参有什么区别| 1月8日是什么星座| diamond是什么牌子| g6pd筛查是检查什么| raf是什么意思| 比目鱼又叫什么鱼| 我是什么课文| 大姨妈来了吃什么对身体好| 乳腺点状钙化是什么意思| 月经来了头疼是什么原因导致的| 蒸鱼豉油什么时候放| 自渎是什么意思| 三级士官是什么级别| 1月10号什么星座| 腿软无力是什么原因| 乌龟都吃什么| 有没有什么| 破瓜年华是什么意思| 什么闻什么睹| 教皇是什么意思| 1月24号什么星座| 芡实不能和什么一起吃| 什么是生殖器疱疹| 邪淫是什么意思| 手背发麻是什么原因| 虚岁29岁属什么生肖| 吕布是什么生肖| 什么天揽月| 腰酸是什么原因引起的| 喝菊花水有什么好处| 久坐脚肿是什么原因| 4月28号是什么星座| 脂蛋白高吃什么药能降下来| 2月25日是什么星座| 鼻子出油多是什么原因| 舌面有裂纹是什么原因| 左行气右行血什么意思| 感冒为什么会打喷嚏| 吉兆什么意思| 图谋不轨什么意思| 菜籽油是什么菜籽做的| 泳帽什么材质的好| 百度Jump to content

青岛一季度互联网+类专业吃香 文创人才缺口大

From Wikipedia, the free encyclopedia
百度 内饰材质的不惜工本也是美系车的优秀传统,像CT6车内就由顶级Opus牛皮、高档实木、碳纤维等顶级材质构成,通过精巧的搭配从座椅、门饰到中控台皆能感受到不同材质的独特质感。

Extensible Authentication Protocol (EAP) is an authentication framework frequently used in network and internet connections. It is defined in RFC 3748, which made RFC 2284 obsolete, and is updated by RFC 5247. EAP is an authentication framework for providing the transport and usage of material and parameters generated by EAP methods. There are many methods defined by RFCs, and a number of vendor-specific methods and new proposals exist. EAP is not a wire protocol; instead it only defines the information from the interface and the formats. Each protocol that uses EAP defines a way to encapsulate by the user EAP messages within that protocol's messages.

EAP is in wide use. For example, in IEEE 802.11 (Wi-Fi) the WPA and WPA2 standards have adopted IEEE 802.1X (with various EAP types) as the canonical authentication mechanism.

Methods

[edit]

EAP is an authentication framework, not a specific authentication mechanism.[1] It provides some common functions and negotiation of authentication methods called EAP methods. There are currently about 40 different methods defined. Methods defined in IETF RFCs include EAP-MD5, EAP-POTP, EAP-GTC, EAP-TLS, EAP-IKEv2, EAP-SIM, EAP-AKA, and EAP-AKA'. Additionally, a number of vendor-specific methods and new proposals exist. Commonly used modern methods capable of operating in wireless networks include EAP-TLS, EAP-SIM, EAP-AKA, LEAP and EAP-TTLS. Requirements for EAP methods used in wireless LAN authentication are described in RFC 4017. The list of type and packets codes used in EAP is available from the IANA EAP Registry.[2]

The standard also describes the conditions under which the AAA key management requirements described in RFC 4962 can be satisfied.

Lightweight Extensible Authentication Protocol (LEAP)

[edit]

The Lightweight Extensible Authentication Protocol (LEAP) method was developed by Cisco Systems prior to the IEEE ratification of the 802.11i security standard.[3] Cisco distributed the protocol through the CCX (Cisco Certified Extensions) as part of getting 802.1X and dynamic WEP adoption into the industry in the absence of a standard. There is no native support for LEAP in any Windows operating system, but it is widely supported by third-party client software most commonly included with WLAN (wireless LAN) devices. LEAP support for Microsoft Windows 7 and Microsoft Windows Vista can be added by downloading a client add in from Cisco that provides support for both LEAP and EAP-FAST. Due to the wide adoption of LEAP in the networking industry many other WLAN vendors[who?] claim support for LEAP.

LEAP uses a modified version of MS-CHAP, an authentication protocol in which user credentials are not strongly protected and easily compromised; an exploit tool called ASLEAP was released in early 2004 by Joshua Wright.[4] Cisco recommends that customers who absolutely must use LEAP do so only with sufficiently complex passwords, though complex passwords are difficult to administer and enforce. Cisco's current recommendation is to use newer and stronger EAP protocols such as EAP-FAST, PEAP, or EAP-TLS.

EAP Transport Layer Security (EAP-TLS)

[edit]

EAP Transport Layer Security (EAP-TLS), defined in RFC 5216, is an IETF open standard that uses the Transport Layer Security (TLS) protocol, and is well-supported among wireless vendors. EAP-TLS is the original, standard wireless LAN EAP authentication protocol.

EAP-TLS is still considered one of the most secure EAP standards available, although TLS provides strong security only as long as the user understands potential warnings about false credentials, and is universally supported by all manufacturers of wireless LAN hardware and software. Until April 2005, EAP-TLS was the only EAP type vendors needed to certify for a WPA or WPA2 logo.[5] There are client and server implementations of EAP-TLS in 3Com, Apple, Avaya, Brocade Communications, Cisco, Enterasys Networks, Fortinet, Foundry, Hirschmann, HP, Juniper, Microsoft, and open source operating systems. EAP-TLS is natively supported in Mac OS X 10.3 and above, wpa_supplicant, Windows 2000 SP4, Windows XP and above, Windows Mobile 2003 and above, Windows CE 4.2, and Apple's iOS mobile operating system.

Unlike most TLS implementations of HTTPS, such as on the World Wide Web, the majority of implementations of EAP-TLS require mutual authentication using client-side X.509 certificates without giving the option to disable the requirement, even though the standard does not mandate their use.[6][7] Some have identified this as having the potential to dramatically reduce adoption of EAP-TLS and prevent "open" but encrypted access points.[6][7] On 22 August 2012 hostapd (and wpa_supplicant) added support in its Git repository for an UNAUTH-TLS vendor-specific EAP type (using the hostapd/wpa_supplicant project RFC 5612 Private Enterprise Number),[8] and on 25 February 2014 added support for the WFA-UNAUTH-TLS vendor-specific EAP type (using the Wi-Fi Alliance Private Enterprise Number),[9][10] which only do server authentication. This would allow for situations much like HTTPS, where a wireless hotspot allows free access and does not authenticate station clients but station clients wish to use encryption (IEEE 802.11i-2004 i.e. WPA2) and potentially authenticate the wireless hotspot. There have also been proposals to use IEEE 802.11u for access points to signal that they allow EAP-TLS using only server-side authentication, using the standard EAP-TLS IETF type instead of a vendor-specific EAP type.[11]

The requirement for a client-side certificate, however unpopular it may be, is what gives EAP-TLS its authentication strength and illustrates the classic convenience vs. security trade-off. With a client-side certificate, a compromised password is not enough to break into EAP-TLS enabled systems because the intruder still needs to have the client-side certificate; indeed, a password is not even needed, as it is only used to encrypt the client-side certificate for storage. The highest security available is when the "private keys" of client-side certificate are housed in smart cards.[12] This is because there is no way to steal a client-side certificate's corresponding private key from a smart card without stealing the card itself. It is more likely that the physical theft of a smart card would be noticed (and the smart card immediately revoked) than a (typical) password theft would be noticed. In addition, the private key on a smart card is typically encrypted using a PIN that only the owner of the smart card knows, minimizing its utility for a thief even before the card has been reported stolen and revoked.

EAP-MD5

[edit]

EAP-MD5 was the only IETF Standards Track based EAP method when it was first defined in the original RFC for EAP, RFC 2284. It offers minimal security; the MD5 hash function is vulnerable to dictionary attacks, and does not support key generation, which makes it unsuitable for use with dynamic WEP, or WPA/WPA2 enterprise. EAP-MD5 differs from other EAP methods in that it only provides authentication of the EAP peer to the EAP server but not mutual authentication. By not providing EAP server authentication, this EAP method is vulnerable to man-in-the-middle attacks.[13] EAP-MD5 support was first included in Windows 2000 and deprecated in Windows Vista.[14]

EAP Protected One-Time Password (EAP-POTP)

[edit]

EAP Protected One-Time Password (EAP-POTP), which is described in RFC 4793, is an EAP method developed by RSA Laboratories that uses one-time password (OTP) tokens, such as a handheld hardware device or a hardware or software module running on a personal computer, to generate authentication keys. EAP-POTP can be used to provide unilateral or mutual authentication and key material in protocols that use EAP.

The EAP-POTP method provides two-factor user authentication, meaning that a user needs both physical access to a token and knowledge of a personal identification number (PIN) to perform authentication.[15]

EAP Pre-Shared Key (EAP-PSK)

[edit]

[1] EAP Pre-shared key (EAP-PSK), defined in RFC 4764, is an EAP method for mutual authentication and session key derivation using a pre-shared key (PSK). It provides a protected communication channel, when mutual authentication is successful, for both parties to communicate and is designed for authentication over insecure networks such as IEEE 802.11.

EAP-PSK is documented in an experimental RFC that provides a lightweight and extensible EAP method that does not require any public-key cryptography. The EAP method protocol exchange is done in a minimum of four messages.

EAP Password (EAP-PWD)

[edit]

EAP Password (EAP-PWD), defined in RFC 5931, is an EAP method which uses a shared password for authentication. The password may be a low-entropy one and may be drawn from some set of possible passwords, like a dictionary, which is available to an attacker. The underlying key exchange is resistant to active attack, passive attack, and dictionary attack.

EAP-PWD is in the base of Android 4.0 (ICS). It is in FreeRADIUS[16] and Radiator[17] RADIUS servers, and it is in hostapd and wpa_supplicant.[18]

EAP Tunneled Transport Layer Security (EAP-TTLS)

[edit]

EAP Tunneled Transport Layer Security (EAP-TTLS) is an EAP protocol that extends TLS. It was co-developed by Funk Software and Certicom and is widely supported across platforms. Microsoft did not incorporate native support for the EAP-TTLS protocol in Windows XP, Vista, or 7. Supporting TTLS on these platforms requires third-party Encryption Control Protocol (ECP) certified software. Microsoft Windows started EAP-TTLS support with Windows 8,[19] support for EAP-TTLS[20] appeared in Windows Phone version 8.1.[21]

The client can, but does not have to be authenticated via a CA-signed PKI certificate to the server. This greatly simplifies the setup procedure since a certificate is not needed on every client.

After the server is securely authenticated to the client via its CA certificate and optionally the client to the server, the server can then use the established secure connection ("tunnel") to authenticate the client. It can use an existing and widely deployed authentication protocol and infrastructure, incorporating legacy password mechanisms and authentication databases, while the secure tunnel provides protection from eavesdropping and man-in-the-middle attack. Note that the user's name is never transmitted in unencrypted clear text, improving privacy.

Two distinct versions of EAP-TTLS exist: original EAP-TTLS (a.k.a. EAP-TTLSv0) and EAP-TTLSv1. EAP-TTLSv0 is described in RFC 5281, EAP-TTLSv1 is available as an Internet draft.[22]

EAP Internet Key Exchange v. 2 (EAP-IKEv2)

[edit]

EAP Internet Key Exchange v. 2 (EAP-IKEv2) is an EAP method based on the Internet Key Exchange protocol version 2 (IKEv2). It provides mutual authentication and session key establishment between an EAP peer and an EAP server. It supports authentication techniques that are based on the following types of credentials:

Asymmetric key pairs
Public/private key pairs where the public key is embedded into a digital certificate, and the corresponding private key is known only to a single party.
Passwords
Low-entropy bit strings that are known to both the server and the peer.
Symmetric keys
High-entropy bit strings that are known to both the server and the peer.

It is possible to use a different authentication credential (and thereby technique) in each direction. For example, the EAP server authenticates itself using public/private key pair and the EAP peer using symmetric key. However, not all of the nine theoretical combinations are expected in practice. Specifically, the standard RFC 5106 lists four use cases: The server authenticating with an asymmetric key pair while the client uses any of the three methods; and that both sides use a symmetric key.

EAP-IKEv2 is described in RFC 5106, and a prototype implementation exists.

EAP Flexible Authentication via Secure Tunneling (EAP-FAST)

[edit]

Flexible Authentication via Secure Tunneling (EAP-FAST; RFC 4851) is a protocol proposal by Cisco Systems as a replacement for LEAP.[23] The protocol was designed to address the weaknesses of LEAP while preserving the "lightweight" implementation. Use of server certificates is optional in EAP-FAST. EAP-FAST uses a Protected Access Credential (PAC) to establish a TLS tunnel in which client credentials are verified.

EAP-FAST has three phases:[24]

Phase Function Description Purpose
0 In-band provisioning—provide the peer with a shared secret to be used in secure phase 1 conversation Uses Authenticated Diffie-Hellman Protocol (ADHP). This phase is independent of other phases; hence, any other scheme (in-band or out-of-band) can be used in the future. Eliminate the requirement in the client to establish a master secret every time a client requires network access
1 Tunnel establishment Authenticates using the PAC and establishes a tunnel key Key establishment to provide confidentiality and integrity during the authentication process in phase 2
2 Authentication Authenticates the peer Multiple tunneled, secure authentication mechanisms (credentials exchanged)

When automatic PAC provisioning is enabled, EAP-FAST has a vulnerability where an attacker can intercept the PAC and use that to compromise user credentials. This vulnerability is mitigated by manual PAC provisioning or by using server certificates for the PAC provisioning phase.

It is worth noting that the PAC file is issued on a per-user basis. This is a requirement in RFC 4851 sec 7.4.4 so if a new user logs on the network from a device, a new PAC file must be provisioned first. This is one reason why it is difficult not to run EAP-FAST in insecure anonymous provisioning mode. The alternative is to use device passwords instead, but then the device is validated on the network not the user.

EAP-FAST can be used without PAC files, falling back to normal TLS.

EAP-FAST is natively supported in Apple OS X 10.4.8 and newer. Cisco supplies an EAP-FAST module[25] for Windows Vista[26] and later operating systems which have an extensible EAPHost architecture for new authentication methods and supplicants.[27]

Tunnel Extensible Authentication Protocol (TEAP)

[edit]

Tunnel Extensible Authentication Protocol (TEAP; RFC 7170) is a tunnel-based EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) protocol to establish a mutually authenticated tunnel. Within the tunnel, TLV (Type-Length-Value) objects are used to convey authentication-related data between the EAP peer and the EAP server.

In addition to peer authentication, TEAP allows the peer to ask the server for a certificate by sending a request in PKCS#10 format. After receiving the certificate request and authenticating the peer, the server can provision a certificate to the peer in PKCS#7 format (RFC 2325). The server can also distribute trusted root certificates to the peer in PKCS#7 format (RFC 2325). Both operations are enclosed into the corresponding TLVs and happen securely within the already established TLS tunnel.

EAP Subscriber Identity Module (EAP-SIM)

[edit]

EAP Subscriber Identity Module (EAP-SIM) is used for authentication and session key distribution using the subscriber identity module (SIM) from the Global System for Mobile Communications (GSM).

GSM cellular networks use a subscriber identity module card to carry out user authentication. EAP-SIM use a SIM authentication algorithm between the client and an Authentication, Authorization and Accounting (AAA) server providing mutual authentication between the client and the network.

In EAP-SIM the communication between the SIM card and the Authentication Centre (AuC) replaces the need for a pre-established password between the client and the AAA server.

The A3/A8 algorithms are being run a few times, with different 128 bit challenges, so there will be more 64 bit Kc-s which will be combined/mixed to create stronger keys (Kc-s won't be used directly). The lack of mutual authentication in GSM has also been overcome.

EAP-SIM is described in RFC 4186.

EAP Authentication and Key Agreement (EAP-AKA)

[edit]

Extensible Authentication Protocol Method for Universal Mobile Telecommunications System (UMTS) Authentication and Key Agreement (EAP-AKA), is an EAP mechanism for authentication and session key distribution using the UMTS Subscriber Identity Module (USIM). EAP-AKA is defined in RFC 4187.

EAP Authentication and Key Agreement prime (EAP-AKA')

[edit]

The EAP-AKA' variant of EAP-AKA, defined in RFC 5448, and is used for non-3GPP access to a 3GPP core network. For example, via EVDO, WiFi, or WiMax.

EAP Generic Token Card (EAP-GTC)

[edit]

EAP Generic Token Card, or EAP-GTC, is an EAP method created by Cisco as an alternative to PEAPv0/EAP-MSCHAPv2 and defined in RFC 2284 and RFC 3748. EAP-GTC carries a text challenge from the authentication server, and a reply generated by a security token. The PEAP-GTC authentication mechanism allows generic authentication to a number of databases such as Novell Directory Service (NDS) and Lightweight Directory Access Protocol (LDAP), as well as the use of a one-time password.

EAP Encrypted Key Exchange (EAP-EKE)

[edit]

EAP with the encrypted key exchange, or EAP-EKE, is one of the few EAP methods that provide secure mutual authentication using short passwords and no need for public key certificates. It is a three-round exchange, based on the Diffie-Hellman variant of the well-known EKE protocol.

EAP-EKE is specified in RFC 6124.

Nimble out-of-band authentication for EAP (EAP-NOOB)

[edit]

Nimble out-of-band authentication for EAP[28] (EAP-NOOB) is a generic bootstrapping solution for devices which have no pre-configured authentication credentials and which are not yet registered on any server. It is especially useful for Internet-of-Things (IoT) gadgets and toys that come with no information about any owner, network or server. Authentication for this EAP method is based on a user-assisted out-of-band (OOB) channel between the server and peer. EAP-NOOB supports many types of OOB channels such as QR codes, NFC tags, audio etc. and unlike other EAP methods, the protocol security has been verified by formal modeling of the specification with ProVerif and MCRL2 tools.[29]

EAP-NOOB performs an Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) over the in-band EAP channel. The user then confirms this exchange by transferring the OOB message. Users can transfer the OOB message from the peer to the server, when for example, the device is a smart TV that can show a QR code. Alternatively, users can transfer the OOB message from the server to the peer, when for example, the device being bootstrapped is a camera that can only read a QR code.

Encapsulation

[edit]

EAP is not a wire protocol; instead it only defines message formats. Each protocol that uses EAP defines a way to encapsulate EAP messages within that protocol's messages.[30][31]

IEEE 802.1X

[edit]

The encapsulation of EAP over IEEE 802 is defined in IEEE 802.1X and known as "EAP over LANs" or EAPOL.[32][33][34] EAPOL was originally designed for IEEE 802.3 Ethernet in 802.1X-2001, but was clarified to suit other IEEE 802 LAN technologies such as IEEE 802.11 wireless and Fiber Distributed Data Interface (ANSI X3T9.5/X3T12, adopted as ISO 9314) in 802.1X-2004.[35] The EAPOL protocol was also modified for use with IEEE 802.1AE (MACsec) and IEEE 802.1AR (Initial Device Identity, IDevID) in 802.1X-2010.[36]

When EAP is invoked by an 802.1X enabled Network Access Server (NAS) device such as an IEEE 802.11i-2004 Wireless Access Point (WAP), modern EAP methods can provide a secure authentication mechanism and negotiate a secure private key (Pair-wise Master Key, PMK) between the client and NAS which can then be used for a wireless encryption session utilizing TKIP or CCMP (based on AES) encryption.

PEAP

[edit]

The Protected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates EAP within a potentially encrypted and authenticated Transport Layer Security (TLS) tunnel.[37][38][39] The purpose was to correct deficiencies in EAP; EAP assumed a protected communication channel, such as that provided by physical security, so facilities for protection of the EAP conversation were not provided.[40]

PEAP was jointly developed by Cisco Systems, Microsoft, and RSA Security. PEAPv0 was the version included with Microsoft Windows XP and was nominally defined in draft-kamath-pppext-peapv0-00. PEAPv1 and PEAPv2 were defined in different versions of draft-josefsson-pppext-eap-tls-eap. PEAPv1 was defined in draft-josefsson-pppext-eap-tls-eap-00 through draft-josefsson-pppext-eap-tls-eap-05,[41] and PEAPv2 was defined in versions beginning with draft-josefsson-pppext-eap-tls-eap-06.[42]

The protocol only specifies chaining multiple EAP mechanisms and not any specific method.[38][43] Use of the EAP-MSCHAPv2 and EAP-GTC methods are the most commonly supported.[citation needed]

RADIUS and Diameter

[edit]

Both the RADIUS and Diameter AAA protocols can encapsulate EAP messages. They are often used by Network Access Server (NAS) devices to forward EAP packets between IEEE 802.1X endpoints and AAA servers to facilitate IEEE 802.1X.

PANA

[edit]

The Protocol for Carrying Authentication for Network Access (PANA) is an IP-based protocol that allows a device to authenticate itself with a network to be granted access. PANA will not define any new authentication protocol, key distribution, key agreement or key derivation protocols; for these purposes, EAP will be used, and PANA will carry the EAP payload. PANA allows dynamic service provider selection, supports various authentication methods, is suitable for roaming users, and is independent from the link layer mechanisms.

PPP

[edit]

EAP was originally an authentication extension for the Point-to-Point Protocol (PPP). PPP has supported EAP since EAP was created as an alternative to the Challenge-Handshake Authentication Protocol (CHAP) and the Password Authentication Protocol (PAP), which were eventually incorporated into EAP. The EAP extension to PPP was first defined in RFC 2284, now obsoleted by RFC 3748.

See also

[edit]

References

[edit]
  1. ^ a b "Introduction". Extensible Authentication Protocol (EAP). sec. 1. doi:10.17487/RFC3748. RFC 3748.
  2. ^ "Extensible Authentication Protocol (EAP) Registry". www.iana.org. Retrieved 2025-08-06.
  3. ^ George Ou (January 11, 2007). "Ultimate wireless security guide: An introduction to LEAP authentication". TechRepublic. Retrieved 2025-08-06.
  4. ^ Dan Jones (October 1, 2003). "Look Before You LEAP". Unstrung. Archived from the original on February 9, 2008. Retrieved 2025-08-06.
  5. ^ "Understanding the updated WPA and WPA2 standards". techrepublic.com. Retrieved 2025-08-06.
  6. ^ a b Byrd, Christopher (5 May 2010). "Open Secure Wireless" (PDF). Archived from the original (PDF) on 12 December 2013. Retrieved 2025-08-06.
  7. ^ a b The EAP-TLS Authentication Protocol. March 2008. doi:10.17487/RFC5216. RFC 5216. The certificate_request message is included when the server desires the peer to authenticate itself via public key. While the EAP server SHOULD require peer authentication, this is not mandatory, since there are circumstances in which peer authentication will not be needed (e.g., emergency services, as described in [UNAUTH]), or where the peer will authenticate via some other means.
  8. ^ "Add UNAUTH-TLS vendor specific EAP type". hostapd. Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  9. ^ "HS 2.0R2: Add WFA server-only EAP-TLS peer method". hostapd. Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  10. ^ "HS 2.0R2: Add WFA server-only EAP-TLS server method". hostapd. Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  11. ^ Byrd, Christopher (1 November 2011). "Open Secure Wireless 2.0". Archived from the original on 26 November 2013. Retrieved 2025-08-06.
  12. ^ Rand Morimoto; Kenton Gardinier; Michael Noel; Joe Coca (2003). Microsoft Exchange Server 2003 Unleashed. Sams. p. 244. ISBN 978-0-672-32581-6.
  13. ^ "Alternative Encryption Schemes: Targeting the weaknesses in static WEP". Ars Technica. Retrieved 2025-08-06.
  14. ^ "922574", Knowledge Base, Microsoft
  15. ^ "EAP-POTP Authentication Protocol". Juniper.net. Retrieved 2025-08-06.
  16. ^ FreeRADIUS EAP module rlm_eap_pwd
  17. ^ McCauley, Mike. "Added support for EAP-PWD per RFC 5931". radiator-announce (Mailing list).
  18. ^ Secure-authentication with only a password
  19. ^ Extensible Authentication Protocol (EAP) Settings for Network Access
  20. ^ "802.1x / EAP TTLS support? – Windows Phone Central Forums". Forums.wpcentral.com. Retrieved 2025-08-06.
  21. ^ "Enterprise Wi-Fi authentication (EAP)". Microsoft.com. Retrieved 2025-08-06.
  22. ^ EAP Tunneled TLS Authentication Protocol Version 1 (EAP-TTLSv1). I-D draft-funk-eap-ttls-v1-01.
  23. ^ "Ultimate wireless security guide: A primer on Cisco EAP-FAST authentication". techrepublic.com. Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  24. ^ "EAP-FAST > EAP Authentication Protocols for WLANs". Ciscopress.com. Retrieved 2025-08-06.
  25. ^ "EAP-FAST for Windows Vista Administrator Guide". Archived from the original on February 10, 2009.
  26. ^ How do I install CISCO EAP-FAST on my computer?
  27. ^ EAPHost in Windows
  28. ^ Aura, Tuomas; Sethi, Mohit; Peltonen, A. (December 2021). Nimble out-of-band authentication for EAP (EAP-NOOB). doi:10.17487/RFC9140. RFC 9140.
  29. ^ EAP-NOOB Model on GitHub
  30. ^ Pedersen, Torben (2005). "HTTPS, Secure HTTPS". Encyclopedia of Cryptography and Security. pp. 268–269. doi:10.1007/0-387-23483-7_189. ISBN 978-0-387-23473-1.
  31. ^ Plumb, Michelle, CAPPS : HTTPS Networking, OCLC 944514826
  32. ^ "EAP Usage Within IEEE 802". Extensible Authentication Protocol (EAP). sec. 3.3. doi:10.17487/RFC3748. RFC 3748.
  33. ^ "Link Layer". Extensible Authentication Protocol (EAP). sec. 7.12. doi:10.17487/RFC3748. RFC 3748.
  34. ^ IEEE 802.1X-2001, § 7
  35. ^ IEEE 802.1X-2004, § 3.2.2
  36. ^ IEEE 802.1X-2010, § 5
  37. ^ "EAP encapsulation". Microsoft's PEAP version 0 (Implementation in Windows XP SP1). sec. 1.1. I-D draft-kamath-pppext-peapv0-00.
  38. ^ a b Protected EAP Protocol (PEAP) Version 2. Abstract. I-D draft-josefsson-pppext-eap-tls-eap-10.
  39. ^ "Introduction". Protected EAP Protocol (PEAP) Version 2. sec. 1. I-D draft-josefsson-pppext-eap-tls-eap-10.
  40. ^ "Introduction". Protected EAP Protocol (PEAP) Version 2. sec. 1. I-D draft-josefsson-pppext-eap-tls-eap-07.
  41. ^ Protected EAP Protocol (PEAP). sec. 2.3. I-D draft-josefsson-pppext-eap-tls-eap-05.
  42. ^ "Version negotiation". Protected EAP Protocol (PEAP). sec. 2.3. I-D draft-josefsson-pppext-eap-tls-eap-06.
  43. ^ "Protocol Overview". Protected EAP Protocol (PEAP) Version 2. p. 11. I-D draft-josefsson-pppext-eap-tls-eap-10.

Further reading

[edit]
  • "AAA and Network Security for Mobile Access. RADIUS, DIAMETER, EAP, PKI and IP mobility". M Nakhjiri. John Wiley and Sons, Ltd.
[edit]
冠脉cta主要检查什么 什么是蝴蝶宝宝 金达莱花是什么花 什么水果去火 才女是什么意思
公蚊子吃什么 手掉皮是缺什么维生素 敢是什么意思 中国的全称是什么 吃什么下火
梦见自行车是什么意思 工事是什么意思 放屁多是什么原因 油腻是什么意思 马克华菲属于什么档次
狗狗不吃饭是什么原因 夏天穿什么衣服比较凉爽 心律平又叫什么名字 38码衣服相当于什么码 喉咙痛喝什么饮料
佛法无边是什么生肖jinxinzhichuang.com 薛之谦的真名叫什么hcv9jop5ns1r.cn 肾亏是什么意思hcv9jop2ns5r.cn 产品标准号是什么hcv8jop1ns4r.cn 金利来属于什么档次mmeoe.com
洛五行属性是什么hcv8jop9ns0r.cn 小孩子眼睛眨得很频繁是什么原因hcv9jop2ns9r.cn 水瓶座是什么象hcv9jop2ns9r.cn 女人阴道痒是什么原因hcv7jop5ns1r.cn 草莓的种子是什么hcv8jop3ns4r.cn
刚感染艾滋病什么症状hcv8jop4ns1r.cn 糖尿病适合喝什么饮料hcv9jop5ns9r.cn 滴虫病女性有什么症状hcv9jop5ns4r.cn 豆工念什么hcv9jop8ns3r.cn 枸杞与菊花一起泡水喝有什么功效wuhaiwuya.com
pt950是什么金hcv7jop6ns1r.cn 腰椎间盘突出什么症状hcv8jop3ns3r.cn 今年什么时候入梅hcv9jop6ns9r.cn 95年属什么的生肖hcv8jop6ns5r.cn 李连杰是什么国籍hcv7jop5ns1r.cn
百度