Page 208 - StudyBook.pdf
P. 208

192    Chapter 4 • Communication Security: Wireless


                  ■   TLS Requires that the server supply a certificate and establish that it has
                      possession of the private key.

                  ■   IKE Requires that the server show possession of a preshared key or pri-
                      vate key (this can be considered certificate authentication).

                  ■   GSS_API (Kerberos)  Requires that the server can demonstrate knowl-
                      edge of the session key.

             Per-Packet Authentication
             EAP can support per-packet authentication and integrity protection, but it is not
             extended to all types of EAP messages. For example, negative acknowledgment
             (NACK) and notification messages cannot use per-packet authentication and
             integrity. Per-packet authentication and integrity protection works for the fol-
             lowing (packet is encrypted unless otherwise noted):

                  ■   TLS and IKE derive session key

                  ■   TLS ciphersuite negotiations (not encrypted)
                  ■   IKE ciphersuite negotiations
                  ■   Kerberos tickets

                  ■   Success and failure messages that use a derived session key (through WEP)


              NOTE

                  EAP was designed to support extended authentication. When imple-
                  menting EAP, dictionary attacks can be avoided by using non-password-
                  based schemes such as biometrics, certificates, OTP, Smart Cards, and
                  token cards. Using a password-based scheme should require the use of
                  some form of mutual authentication so that the authentication process
                  is protected against dictionary attacks.





              TEST DAY TIP

                  It is helpful to write out a table showing the various authentication
                  methods used in 802.11 networks (for example, open authentication,
                  shared-key authentication, and 802.1x authentication) with the various
                  properties each of these authentication methods require. This will help
                  keep them straight in your mind when taking the test.



          www.syngress.com
   203   204   205   206   207   208   209   210   211   212   213