Extensible Authentication Protocol (EAP)

1893 Words4 Pages

Introduction

The following paper will review the Extensible Authentication Protocol (EAP) as a widely accepted standard. A brief description will be provided with visual aids to help with understanding. A current implementation of EAP with the Transport Layer Security (TLS) will be described. Common implemented security measures will also be disused. Following the security measures I will provide research on common attack vectors and ways to mitigate these attacks to protect secure data transmissions. A full discussion of EAP and TLS falls out of the scope of this paper. The research contained herein is provided as a high level understanding of the EAP protocol and one possible implementation with the known risks.

Protocol Description

EAP was built upon the Point to Point Protocol (PPP) due to the need for a way of establishing a connection before a client (peer/supplicant) had the ability to negotiate the authentication method. PPP originally would negotiate the way it would provide Authentication between two entities before the two were actually connected, called the Link Establishment Phase (RFC 1661, 1994). Technology today must have peers connect to the authenticator first and then establish the authentication, authorization, and accounting (AAA) method that will be used. The authentication had to move from the Link Establishment Phase into a new standard. Thus EAP was developed as a new method of authentication negotiation (Sotillo, 2007). A very common example of EAP is wireless communications, the peer must connect to the authenticator to establish a connection, and then the EAP negotiation is initiated.

The main components of EAP are the peer/client, authenticator, and authentication server which ar...

... middle of paper ...

...eering Task Force: http://tools.ietf.org/html/rfc5216

RFC 5246. (2008, August 2008). The Transport Layer Security (TLS) Protocol. Retrieved November 15, 2013, from The Internet Engineering Task Force : http://tools.ietf.org/html/rfc5246

RFC 5247. (2008, August). Extensible Authentication Protocol (EAP) Key Management Framework. Retrieved November 14, 2013, from The Internet Engineering Task Force: http://tools.ietf.org/html/rfc5247

Sotillo, S. (2007, November 27). Extensible Authentication Protocol (EAP). Retrieved November 16, 2013, from Infosec Writers: http://www.infosecwriters.com/text_resources/pdf/SSotillo_EAP.pdf

Turner, B. (2008, December 3). Securing a wireless network with EAP-TLS: perception and realities of its implementation. Retrieved November 15, 2013, from Edith Cowan University: http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1055&context=ism

More about Extensible Authentication Protocol (EAP)

Open Document