Extensible Authentication Protocol EAP Method Requ
Extensible Authentication Protocol EAP Method Requ
net/publication/237542772
CITATIONS READS
71 480
1 author:
Bernard Aboba
Microsoft
38 PUBLICATIONS 1,262 CITATIONS
SEE PROFILE
All content following this page was uploaded by Bernard Aboba on 31 August 2015.
Copyright Notice
Abstract
Table of Contents
1. Introduction ................................................. 2
1.1. Requirements Specification ............................. 2
1.2. Terminology ............................................ 2
2. Method Requirements .......................................... 3
2.1. Credential Types ....................................... 3
2.2. Mandatory Requirements ................................. 4
2.3. Recommended Requirements ............................... 5
2.4. Optional Features ...................................... 5
2.5. Non-compliant EAP Authentication Methods ............... 5
3. Security Considerations ...................................... 6
4. References ................................................... 8
Acknowledgments .................................................. 9
Authors’ Addresses ............................................... 10
Full Copyright Statement ......................................... 11
1. Introduction
Today, deployments of IEEE 802.11 wireless LANs are based on EAP and
use several EAP methods, including EAP-TLS [RFC2716], EAP-TTLS
[TTLS], PEAP [PEAP], and EAP-SIM [EAPSIM]. These methods support
authentication credentials that include digital certificates, user-
names and passwords, secure tokens, and SIM secrets.
1.2. Terminology
authenticator
The end of the link initiating EAP authentication. The term
authenticator is used in [IEEE802.1X], and authenticator has the
same meaning in this document.
peer
The end of the link that responds to the authenticator. In
[IEEE802.1X], this end is known as the supplicant.
Supplicant
The end of the link that responds to the authenticator in
[IEEE802.1X].
EAP server
The entity that terminates the EAP authentication method with the
peer. In the case where no backend authentication server is used,
the EAP server is part of the authenticator. In the case where
the authenticator operates in pass-through mode, the EAP server is
located on the backend authentication server.
4-Way Handshake
A pairwise Authentication and Key Management Protocol (AKMP)
defined in [IEEE802.11i], which confirms mutual possession of a
Pairwise Master Key by two parties and distributes a Group Key.
2. Method Requirements
[2] Key strength. An EAP method suitable for use with IEEE 802.11
MUST be capable of generating keying material with 128-bits of
effective key strength, as defined in [RFC3748], Section 7.2.1.
As noted in [RFC3748], Section 7.10, an EAP method supporting
key derivation MUST export a Master Session Key (MSK) of at
least 64 octets, and an Extended Master Session Key (EMSK) of at
least 64 octets.
[4] Shared state equivalence. The shared EAP method state of the
EAP peer and server must be equivalent when the EAP method is
successfully completed on both sides. This includes the
internal state of the authentication protocol but not the state
external to the EAP method, such as the negotiation occurring
prior to initiation of the EAP method. The exact state
attributes that are shared may vary from method to method, but
typically include the method version number, the credentials
presented and accepted by both parties, the cryptographic keys
shared, and the EAP method specific attributes negotiated, such
as ciphersuites and limitations of usage on all protocol state.
Both parties must be able to distinguish this instance of the
protocol from all other instances of the protocol, and they must
share the same view regarding which state attributes are public
and which are private to the two parties alone. The server must
obtain the authenticated peer name, and the peer must obtain the
authenticated server name (if the authenticated server name is
available).
3. Security Considerations
Algorithm independence
Requirement: "Wherever cryptographic algorithms are chosen, the
algorithms must be negotiable, in order to provide resilience
against compromise of a particular cryptographic algorithm."
Replay protection
Requirement: "All protocol exchanges must be replay protected."
Authentication
Requirements: "All parties need to be authenticated. The
confidentiality of the authenticator must be maintained. No
plaintext passwords are allowed."
Authorization
Requirement: "EAP peer and authenticator authorization must be
performed."
Session keys
Requirement: "Confidentiality of session keys must be maintained."
Ciphersuite negotiation
Requirement: "The selection of the "best" ciphersuite must be
securely confirmed."
Unique naming
Requirement: "Session keys must be uniquely named."
Domino effect
Requirement: "Compromise of a single authenticator cannot
compromise any other part of the system, including session keys
and long-term secrets."
Key binding
Requirement: "The key must be bound to the appropriate context."
4. References
[RFC3748] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and
H. Levkowetz, "Extensible Authentication Protocol
(EAP)", RFC 3748, June 2004.
Acknowledgements
Authors’ Addresses
Dorothy Stanley
Agere Systems
2000 North Naperville Rd.
Naperville, IL 60566
Jesse R. Walker
Intel Corporation
2111 N.E. 25th Avenue
Hillsboro, OR 97214
EMail: [email protected]
Bernard Aboba
Microsoft Corporation
One Microsoft Way
Redmond, WA 98052
Intellectual Property
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at ietf-
[email protected].
Acknowledgement