Open authentication can be used in combination with which one of the following

You can also restrict authentication methods in the Security tab of the RRAS server’s Properties dialog box, as described earlier in this chapter. If a method is disabled in the server’s properties, it will not be used even if it is enabled for a remote access Policy.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781931836937500117

Authentication and Granular Access

In The Best Damn Exchange, SQL and IIS Book Period, 2007

Digest Authentication

Digest authentication is another authentication type specified in HTTP 1.1. Unlike basic authentication, digest authentication does not require the password to be transmitted. Rather, the client takes the username and password and uses the MD5 hashing algorithm to create a hash, which is then sent to the SQL Server.

If you are not familiar with hashing algorithms, they are one-way functions when you put in a stream of values (such as the username and password), and you get a stream of characters as a result. If the hashing algorithm is “reasonable secure,” there is no way to take the output stream of characters from a hashing algorithm and get back to original stream. As a result, most of the research on hashing algorithms revolve around finding techniques to generate collisions. A collision is when two different input streams produce the exact same output stream. For instance, if “dog” and “cat” both produced “boy” when going through a hashing algorithm, we’d have a collision. Unfortunately, recent research against MD5 has found mechanisms for generating collisions rather quickly.

With respect to SQL Server 2005, digest authentication requires two key elements to work. First, the username must be a valid Windows domain login. A local Windows account on the server will not work. Neither will a SQL Server login. Second, the domain controllers for the domain must be at least Windows Server 2003. Windows 2000 domain controllers do not support digest authentication. There is a workaround to make digest authentication work with IIS 5.0, but it requires all user account passwords to be stored in a format where the encryption can easily be reversed (and the password revealed). This insecure method of supporting digest authentication is not utilized by SQL Server 2005. Therefore, if you have SQL Servers on a Windows 2000 domain, you likely won’t be able to use digest authentication.

NTLM Authentication

NTLM stands for NT LAN Manager; it’s the traditional authentication protocol for Windows NT-based kernels (to include Windows 2000, XP, and 2003). NTLM was the most secure protocol for NT 4.0 but it is considered a secondary means of authentication as of Windows 2000. Kerberos, which we’ll discuss next, has taken its place as the primary security authentication protocol for Windows domains.

NTLM works on a challenge-response authentication mechanism. The authenticating mechanism, whether the local server or a domain controller, produces a challenge that the client must use to generate its response. The client takes the challenge and encrypts it with its password. It then sends the response back. The authenticating mechanism, which has the password, too, is able to validate whether or not the client knows the password. It does this by taking the challenge and encrypting it with the password it knows. If both are the same, the client has proven that it knows the password. Therefore, the authenticating mechanism recognizes the client. All this has taken place without a password being transmitted across the network.

Given this challenge response mechanism for authentication, NTLM is considered more secure than either basic or digest authentication. Whenever possible, it should be used rather than those two authentication types.

Kerberos Authentication

Kerberos was introduced as a security protocol starting with Windows 2000. Microsoft’s implementation of this protocol is based off of Request for Comments (RFC) 1510, the RFC for Kerberos version 5 (since superseded by RFC 4120). Admittedly, though, Microsoft has “extended” the Kerberos implementation specified in this Internet “standard.” One advantage Kerberos has over NTLM is that of mutual authentication. In NTLM, only the client is verified. The client must assume the server is legitimate. That is, no rogue server is pretending to be the server being connected to. Kerberos handles this issue by using a trusted third party (in an Active Directory implementation this trusted third party is a domain controller), the details of which are not germane to our discussion here.

However, in order to use Kerberos, the account being used to authenticate must be a domain account. In addition, there is likely some work that’ll be required of a domain administrator in order to ensure the proper Service Principal Names (SPNs) are registered. How to do this will be covered later in this chapter.

Shortcut…

NTLM vs Kerberos

Given that Kerberos provides the same sorts of features as NTLM authentication plus the ability to mutually authenticate, is there a reason to use NTLM over Kerberos? Yes, as there are cases where Kerberos authentication cannot be used. In cases where the client and server are in different domains and those domains are not in the same forest or are not in forests where a forest-level trust has been established, there is no option to use Kerberos authentication. For instance, if domainA in forestA has an external trust with domainB in forestB, but no such forest level trust exists between forestA and forestB, Kerberos authentication cannot happen between domainA and domainB. In this case, only NTLM authentication is possible.

Integrated Authentication

Integrated authentication is actually NTLM and Kerberos Authentication rolled into one exchange. In order to understand what I mean by this, we have to take a look at how HTTP-based authentication normally happens. Let’s take a closer look.

When a client wants to access a resource via HTTP, it first sends a request to the server identifying exactly what it wants. If the resource requires some sort of authentication (SQL Server does), the server will send back a response indicating that authentication is required. In that response the server will indicate to the client what methods of authentication are permitted. When an HTTP endpoint is configured to use Integrated authentication, the server will tell the client that it can choose either Kerberos or NTLM authentication. The client, if it chooses to continue, responds by following through with the appropriate form of authentication. In the case of integrated authentication, the client can either choose to authenticate via Kerberos or NTLM. If the authentication succeeds, the server then provides the resource as requested. However, if the authentication fails, SQL Server will not permit the client to try again with the second method without going through the whole connection process again.

Shortcut…

A Gotcha with HTTP Endpoints

SQL Server Management Studio doesn’t provide a GUI interface to create an endpoint. The only means to do so is via the CREATE ENDPOINT T-SQL command. Working through the CREATE ENDPOINT syntax can be confusing, but when dealing with HTTP endpoints there can be another complication: the URL you want users to connect to may not be reserved for SQL Server use. For instance, if you want the users to connect to http://myserver.mydomain.com/sql, you need to reserve that namespace. The trick to doing so is another stored procedure, appropriately named sp_reserve_http_namespace. You’ll have to execute this stored procedure first with the appropriate path (and port) before creating your HTTP endpoint.

TCP Endpoints

TCP endpoints have only a few authentication types, two of which we’ve talked about in the previous section. The types available to us are:

NTLM Authentication

Kerberos Authentication

Negotiate Authentication

Certificate Authentication

We’ve already covered NTLM and Kerberos authentication under HTTP endpoints. The authentication method doesn’t differ except with respect to how the client is communicating with SQL Server. Otherwise, authentication is exactly the same. If we’re setting up an endpoint for T-SQL traffic, we actually don’t specify a means of authentication. SQL Server will use whatever the authentication mode is for the server. These authentication types only come into specific use when we’re defining a service broker or database mirroring endpoint.

Note

Though it is possible in SQL Server to create more than one TCP endpoint for T-SQL, there’s no point in doing so. One of the things I attempted when first experimenting with SQL Server 2005 endpoint security was trying to create a second TCP endpoint for T-SQL and locking down its access. The idea was to have one connection, from the internal network, with few restrictions, and a second connection, strictly locked down, for the web servers in the DMZ. Unfortunately, SQL Server 2005 treats all the T-SQL endpoints the same (with the exception of the Dedicated Administrator Connection). Therefore, there is no good reason to have more than one TCP endpoint for T-SQL.

Negotiate Authentication

Negotiate is like integrated authentication in that it’s not an authentication mechanism unto itself. Rather, it combines both the NTLM and Kerberos protocols to offer the client a choice on how to authenticate. Unlike integrated authentication, however, both client and server use the Windows Negotiate protocol to determine which method to use.

Certificate Authentication

Because SQL Server 2005 has built-in encryption capabilities, it has the ability to generate certificates for use with authentication. While normal clients cannot connect using certificates, connections via service broker or database mirroring can be made using them. This permits SQL Servers from untrusted domains to connect to each other with hopefully better security than a username/password sent over the wire.

When a TCP endpoint is configured for either database mirroring or a service broker connection, the authentication of a particular certificate can be configured to be used. The certificate will need to be exported (using the BACKUP CERTIFICATE command) and securely copied to a SQL Server using that endpoint and then imported. In this case the certificate represents the shared secret. Therefore, it must be kept safe from compromise.

Note

When you are specifying the authentication type for a database mirroring or service broker TCP endpoint, both Windows methods of authentication (NTLM, Kerberos, or Negotiate) and certificate authentication can be combined. However, the order in which SQL Server attempts to authenticate must be set. Either certificate authenticate is attempted first or Windows authentication is. However, both types of authentication can be supported. This may be useful when you have trusted clients connecting to a service broker connection via Windows authentication and untrusted clients using a certificate.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597492195000224

Authentication and Granular Access

In How to Cheat at Securing SQL Server 2005, 2007

Digest Authentication

Digest authentication is another authentication type specified in HTTP 1.1. Unlike basic authentication, digest authentication does not require the password to be transmitted. Rather, the client takes the username and password and uses the MD5 hashing algorithm to create a hash, which is then sent to the SQL Server.

If you are not familiar with hashing algorithms, they are one-way functions when you put in a stream of values (such as the username and password), and you get a stream of characters as a result. If the hashing algorithm is “reasonable secure,” there is no way to take the output stream of characters from a hashing algorithm and get back to original stream. As a result, most of the research on hashing algorithms revolves around finding techniques to generate collisions. A collision is when two different input streams produce the exact same output stream. For instance, if “dog” and “cat” both produced “boy” when going through a hashing algorithm, you’d have a collision. Unfortunately, recent research against MD5 has found mechanisms for generating collisions rather quickly.

With respect to SQL Server 2005, digest authentication requires two key elements to work. First, the username must be a valid Windows domain login. A local Windows account on the server will not work. Neither will a SQL Server login. Second, the domain controllers for the domain must be at least Windows Server 2003. Windows 2000 domain controllers do not support digest authentication. There is a workaround to make digest authentication work with IIS 5.0, but it requires all user account passwords to be stored in a format where the encryption can easily be reversed (and the password revealed). This insecure method of supporting digest authentication is not utilized by SQL Server 2005. Therefore, if you have SQL Servers on a Windows 2000 domain, you likely won’t be able to use digest authentication.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597491969500200

Sniffing

In Hack Proofing Your Network (Second Edition), 2002

Capturing Windows NT Authentication Information

Windows operating systems support a number of different authentication types, each of which progressively increase its security. The use of weak Windows NT authentication mechanisms, as explained next, creates one of the weakest links in Windows NT security. The authentication types supported are explained here:

Plaintext Passwords are transmitted in the clear over the network.

Lan Manager (LM) Uses a weak challenge response mechanism where the server sends a challenge to the client, which it uses to encrypt the user's password hash and then send it back to the server. The server does the same, and compares the result to authenticate the user. The mechanism with which this hash is transformed before transmission is very weak, and the original hash can be sniffed from the network and cracked quite easily. In Windows NT 4, even though a stronger authentication mechanism is available (NTLM), the LM hash was still sent over the network along with the NTLM hash, which lowers the security to the security of the LM mechanism.

NT Lan Manager (NTLM) and NT Lan Manager v2 (NTLMv2) NTLM and NTLMv2 provide a much stronger challenge/response mechanism, which has made it much more difficult to crack captured authentication requests. NTLMv2 was introduced with the release of Service Pack 4 for Windows NT 4.0. NTLMv2 should be used if possible; however, care must be taken to ensure that your clients can support the protocol. You may need to install additional software on the clients to allow them to use NTLMv2.

The development of these mechanisms occurred in a series of iterative steps, as weaknesses were found in each prior implementation (fortunately, the weaknesses became less significant with each improvement).

There are specialized sniffers that support only the capture of Windows NT authentication information. A good example is one included with the L0phtcrack program (which is exclusively a Windows NT password cracker). The documentation that comes with L0phtcrack explains in great detail how Windows NT password hashes are created. L0phtcrack can be obtained at http://stake.com/research/lc3.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781928994701500136

Passwords, Vulnerabilities, and Exploits

Littlejohn Shinder, Michael Cross, in Scene of the Cybercrime (Second Edition), 2008

Authentication Protocols

The protocols used for authenticating identity depend on the authentication type. Some common protocols used for authentication include the following:

Kerberos The default logon authentication protocol used by Windows 2000, XP, and Vista, as well as by Windows Server 2003 and Windows Server 2008. It is also used by Mac OS X. This protocol is based on secret key (symmetric) cryptography, which we'll discuss in Chapter 12. This system uses tickets that a central server issues to determine whether a user can access the network and its resources. Rather than being used to log on to each server, the tickets are used by all of the servers to determine what a user is permitted to access.

Challenge Handshake Authentication Protocol (CHAP) Uses a sequence in which one party sends a challenge and the other responds with an answer. The most common form of this sequence is the server requesting a password, which the client provides to gain access to a system. Microsoft developed its own version of the protocol, called MS-CHAP.

NT LAN Manager (NTLM) Another Microsoft logon authentication method that is supported by newer versions of Windows. NTLMv2 provides more security than NTLMv1, and uses a challenge-response sequence to authenticate the user. Unlike Kerberos, with NTLM, when a client wants to access a server's resources, that server must contact the domain controller to have the client's identity verified. The client doesn't have credentials already issued (the session ticket in Kerberos) that the file or application server knows it can trust.

Password Authentication Protocol (PAP) A remote access authentication protocol used for Point-to-Point (PPP) or dial-up connections. Its distinguishing characteristic (and the reason it should not be used on secure networks) is the fact that it sends passwords in plain text. This means an unauthorized person can intercept and use the passwords during transmission. The only good reason to use PAP is if you face a situation in which the remote server doesn't support other, more secure authentication methods. Shiva PAP (S-PAP) addresses this problem by using a two-way reversible authentication method that encrypts passwords so that they will not be subject to interception and misuse.

The Remote Authentication Dial-in User Service (RADIUS) Another means of authenticating remote connections that takes the authentication responsibility off each individual remote access server by providing a centralized server to authenticate clients securely.

Secure Shell (SSH) Allows users to log on to UNIX systems remotely. Both ends of the connection (client and server) are authenticated, and data—as well as passwords—can be encrypted.

Note

In Chapter 12, we'll discuss a number of these protocols and how many of them use various types of encryption to ensure that data passed between a client and a server is secure.

On the Scene

Identity Confirmed; Now What?

Once a user's identity has been established, the next step in the security process is authorization, which is concerned with what that user is permitted to do. Authentication and authorization work together to provide a security system that takes into account the need for different users to have different capabilities on the network.

Administrators can control which files and other objects a user can access and the level of access (read only, change, and so on) by setting permissions. Most network operating systems provide a mechanism for associating specific permissions on an object with certain user accounts or groups. For example, Windows computers that have hard disks formatted as New Technology File System (NTFS) provide for two levels of permissions: share permissions that apply only to users accessing the resource across the network, and file-level permissions (also called NTFS permissions) that apply both across the network and to users accessing the resource from the local machine.

Administrators can also control which system-wide actions a particular user (or group of users) can perform by setting user rights. User rights differ from permissions in that permissions apply to access of individual files, folders, printers, and other objects.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B978159749276800011X

Confirm User Identity

Thomas Porter, Michael Gough, in How to Cheat at VoIP Security, 2007

LEAP

LEAP (Lightweight Extensible Authentication Protocol) is an EAP authentication type used primarily in Cisco Aironet WLANs. LEAP supports strong mutual authentication, based upon a modified MS-CHAPv2 challenge/response, between the client and a RADIUS server using a logon password as the shared secret. It provides dynamic per-user, per-session WEP encryption keys. LEAP has been superseded by EAP-FAST due to the public availability of LEAP hash cracking tools such as ASLEAP. There is some disagreement regarding the value of complex password enforcement when using LEAP. When in doubt, use the longest, most complicated passwords that your userbase will agree to.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597491693500074

Microsoft Vista: Wireless World

In Microsoft Vista for IT Security Professionals, 2007

802.1x

802.1x is a port authentication control protocol used to translate messages from a variety of different authentication types into their appropriate frame formats. You can use 802.1x in other 802-based technologies such as Ethernet (802.3) and Token Ring (802.5). For the purposes of this chapter, we will refer to 802.1x and its use for wireless (802.11) networks.

802.1x supports the requirements for per-user authentication and settings. It supports mutual authentication methods between the access point and the wireless client that is authenticating. Allowing the wireless client to authenticate the wireless gateway just as the wireless gateway authenticates the client user helps improve security by preventing the possibility of clients authenticating to a possible rogue device or, perhaps, a planted attacker’s access point. 802.1x also supports dynamic per-user keying. Dynamic creation of encryption keys and per-user capability create robust security for enterprise networks.

Although 802.1x does not choose what authentication and algorithm types it will use, it does work with EAP to provide such information.

The three common components of 802.1x are the supplicant Port Access Entity (PAE), the authenticator PAE, and the authentication server. The supplicant is the client end user trying to authenticate and connect to the wireless network resources. The authenticator is normally the access point that enforces authentication before it allows access to the resources. The authentication server is used to verify end-user credentials against a local or remote database. Figure 7.23 shows the relationship among the three components.

Open authentication can be used in combination with which one of the following

Figure 7.23. 802.1x Components and Their Relationship

You may have noticed the acronym EAPOW in the figure. EAPOW stands for Extensible Authentication Protocol Over Wireless and it is an EAP message that is encapsulated over wireless networks. During the authentication phase, the access point will only allow EAPOW traffic through to the wired network from the end user trying to establish connectivity. This mechanism prevents the authenticating user from sending anything but its credentials into the wired network. After a successful authentication completes, an EAP message is sent from the authentication server to the access point telling the access point that the authentication has passed. At this point, the access point lifts the EAPOW access-only filter and opens up other communications specified by the security policy for the authenticating user.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B978159749139650011X

Administration of an IIS 7.0 Web Server

Chris Adams, ... Gene Whitley, in How to Cheat at IIS 7 Server Administration, 2007

Changing Authentication Settings

You can take several actions in the security space, such as changing the authentication type for your Web site or application. The needs of your Web applications often differ even though they are running on the same server and it is important to understand how to change authentication settings.

Authentication in IIS 7.0

IIS 7.0 offers several options like previous versions of IIS for authenticating to your Web server. The default behavior for a typical installation of IIS 7.0 is to have all authentication types disabled except anonymous authentication.

Enabling Basic Authentication

Basic authentication is a standards-based authentication for HTTP clients. It is a popular authentication when protected by SSL, but should not be used on the Internet without protecting the authentication with SSL since it will expose your user's credentials, given it is an insecure protocol.

To enable Basic authentication, click the left column of your Web site, then follow these steps:

1.

On the Web site home page, double-click Authentication.

2.

Select Basic Authentication by clicking it.

3.

In the right-column, click Enable in the Actions.

Enabling Windows Authentication

In Intranet environments, it is common to disable anonymous authentication and enable Windows authentication. In IIS 6.0, Windows authentication was enabled by default but this isn't the case in IIS 7.0. There is often a lot of confusion around Windows authentication because it has a couple of authentication protocols in it, namely NT Challenge\Response (NTLM) and Kerberos. The default setting is to allow both in IIS 7.0 and let the client select the protocol to use.

To enable Windows authentication:

1.

Click your Web site in the left column.

2.

On the Web site home page, double-click Authentication.

3.

Select Windows Authentication by clicking it.

4.

In the right-column, click Enable in the Actions.

SOME INDEPENDENT ADVICE

It is possible that when viewing Authentication in IIS Manager you will not see all the supported IIS 7.0 authentications in the list. This is what happens when you have chosen not to install the authentication during setup. If you do not see the authentication type you want, use setup to add the features binaries and then restart IIS Manager.

Enabling Digest Authentication

Digest authentication is a standards-based authentication protocol defined in RFC 2617 (www.ietf.org/rfc/rfc2617.txt). In IIS 7.0, there is only one version of digest authentication, unlike in IIS 6.0. For more information on digest authentication, see the following Microsoft Webcast www.iis.net/default.aspx?tabid=2&subtabid=26&i=67.

To enable Digest authentication:

1.

Click the left column of your Web site.

2.

On the Web site home page, double-click Authentication.

3.

Select Digest Authentication by clicking it.

4.

In the right-column, click Enable in the Actions pane.

Enabling Forms Authentication

The integration between IIS and ASP.NET is unprecedented in IIS 7.0. This integration lets you protect all your content using ASP.NET's forms-based authentication. This cookie or cookie-less-based authentication allows Web applications to be authenticated using credentials other than Windows. For more information on forms authentication, see the following http://msdn2.microsoft.com/en-us/library/aa480476.aspx.

To enable forms authentication:

1.

Click the left column of your Web site.

2.

On the Web site home page, double-click Authentication.

3.

Select Forms Authentication by clicking it.

4.

In the right-column, click Enable in the Actions pane.

SOME INDEPENDENT ADVICE

When using Forms Authentication, you will need to do a bit more work than just enabling it in IIS. You are required to create a default login page using ASP.NET's login control and save that page. The default settings for Forms Authentication are available in IIS Manager by clicking Edit after selecting Forms Authentication.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597491556500094

Looking Ahead: Cisco Wireless Security

Eric Knipp, ... Edgar DanielyanTechnical Editor, in Managing Cisco Network Security (Second Edition), 2002

Extensible Authentication Protocol (EAP)

The Extensible Authentication Protocol (EAP) was designed to provide authentication methods within the Point-to-Point-Protocol (PPP). EAP allows for the integration of third-party authentication packages that use PPP. EAP can be configured so that it can support a number of methods for authentication schemes, such as token cards, public key, certificates, PINs, and on and on.

When you install PPP/EAP, EAP will not select a specific authentication method at the Link Control Protocol (LCP) Phase, but will wait until the Authentication Phase to begin. What this does is allow the authenticator the ability to request more information, and with this information it will decide on the method of authentication to use. This delay will also allow for the implementation of a server on the backend that can control the various authentication methods while the PPP authenticator passes through the authentication exchange.

In this way, network devices like Access Points (APs) or switches do not need to understand each request type, because they will simply act as a conduit, or passthrough agent, for a server on a host. The network device will only need to see if the packet has the success or failure code in order to terminate the authentication phase.

EAP is able to define one or more requests for peer-to-peer authentication. This can happen because the request packet includes a type field, such as Generic Token, one-time password (OTP), or an MD5 challenge. The MD5 challenge is very similar to the Challenge Handshake Authentication Protocol (CHAP).

EAP is able to provide you with a flexible, link-layer security framework (see Figure 15.2), by having the following features:

Open authentication can be used in combination with which one of the following

Figure 15.2. The EAP Architecture

EAP mechanisms are IETF standards–based and allow for the growth of new authentication types when your security needs change:

Transport Layer Security (TLS)

Internet Key Exchange (IKE)

GSS_API (Kerberos)

Other authentication schemes (LEAP)

There is no dependency on IP, because this is an encapsulation protocol.

There is no windowing as this is a simple ACK/NAK protocol.

No support for fragmentation.

Can run over any link layer (PPP, 802.3, 802.5, 802.11, and so on).

Does not consider a physically secure link as an authentication method to provide security.

Assumes that there is no reordering of packets.

Retransmission of packets is the responsibility of authenticator.

802.1x and EAP

One type of wireless security is focused on providing centralized authentication and dynamic key distribution area. By using the IEEE 802.1x standard, the EAP, and LEAP as an end-to-end solution, you can provide enhanced functionality to your wireless network. Two main elements are involved in using this standard:

EAP/LEAP allows all wireless client adapters the capability to communicate with different authentication servers such as RADIUS and Terminal Access Controller Access Control System (TACACS+) servers that are located on the network.

You implement the IEEE 802.1x standard for network access control that is port based for MAC filtering.

When these features are deployed together, wireless clients that are associated with APs will not be able to gain access to the network unless the user performs a network logon. The user will need to enter a username and password for network logon, after which the client and a RADIUS server will perform authentication, hopefully leading to the client being authenticated by the supplied username and password and access to the network and resources.

How this occurs is that the RADIUS server and client device will then receive a client-specific WEP key that is used by the client for that specific logon session. As an added level of security, the user’s password and session key will never be transmitted in the open, over the wireless connection.

Here is how Authentication works and the WEP key is passed:

1.

The wireless client will associate with an AP located on the wireless network.

2.

The AP will then prevent all other attempts made by that client to gain access to network until the client logs on to the network.

3.

The client will supply a username and password for network logon.

4.

Using 802.1x standard and EAP/LEAP, the wireless client and a RADIUS server perform authentication through the AP. The client will then use a one-way hash of the user-supplied password as a response to the challenge, and this will be sent to the RADIUS server. The RADIUS server will then reference its user table and compare that to the response from the client. If there is a match, the RADIUS server authenticates the client, and the process will be repeated, but in reverse. This will enable the client to authenticate the RADIUS server.

(If you are using LEAP, the RADIUS server will send an authentication challenge to the client.)

After authentication completes successfully, the following steps take place:

1.

The RADIUS server and the client determine a WEP key that is unique for the client and that session.

2.

The RADIUS server transmits this WEP key (also known as a session key), across the wired LAN to the AP.

3.

The AP will encrypt the broadcast key and the session key so that it can then send the new encrypted key to the client. The client will then use the session key to decrypt it.

4.

The client and AP then activates the WEP. The APs and clients will then use the session and broadcast WEP keys for all communications that occur during the session.

5.

For enhanced security, the session key and broadcast key are regularly changed at regular periods that are configured in the RADIUS server.

What is Open authentication method?

Open System Authentication (OSA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol. With OSA, a computer equipped with a wireless modem can access any WEP network and receive files that are not encrypted.

What are two authentication methods that an access point could use?

The access point can authenticate up to 50 wireless client devices using LEAP, EAP-FAST, or MAC-based authentication.

Which of the following authentication systems may be used with wireless technologies?

There are three main methods of authentication that are used on today's wireless LANs: open authentication. shared authentication. EAP (Extensible Authentication Protocol) authentication.

What are the benefits of open system authentication?

Open System Authentication The major advantage of open mode is its simplicity: Any client can connect easily and without complex configuration. Open mode is recommended when there are guests who need to get onto the network, or more generally, when ease of connectivity is paramount and access control is not required.