Zum Inhalt springen

„MS-CHAP“ – Versionsunterschied

aus Wikipedia, der freien Enzyklopädie
[ungesichtete Version][ungesichtete Version]
Inhalt gelöscht Inhalt hinzugefügt
Adding short description: "Authentication protocol to validate users"
Flaws: Add link to EAP-TLS
Zeile 20: Zeile 20:
As of 2012, MS-CHAP had been completely broken.<ref>{{cite web|url=https://www.cloudcracker.com/blog/2012/07/29/cracking-ms-chap-v2/|title=Divide and Conquer: Cracking MS-CHAPv2 with a 100% success rate|year=2012|publisher=[[DEF CON|David Hulton]]|archive-url=https://web.archive.org/web/20160316174007/https://www.cloudcracker.com/blog/2012/07/29/cracking-ms-chap-v2/|archive-date=16 March 2016|access-date=2013-03-10}}</ref>
As of 2012, MS-CHAP had been completely broken.<ref>{{cite web|url=https://www.cloudcracker.com/blog/2012/07/29/cracking-ms-chap-v2/|title=Divide and Conquer: Cracking MS-CHAPv2 with a 100% success rate|year=2012|publisher=[[DEF CON|David Hulton]]|archive-url=https://web.archive.org/web/20160316174007/https://www.cloudcracker.com/blog/2012/07/29/cracking-ms-chap-v2/|archive-date=16 March 2016|access-date=2013-03-10}}</ref>


After [[Windows 11]] 22H2, with the default activation of Windows Defender Credential Guard, users can no longer authenticate with MSCHAPv2. The developers recommend a move from MSCHAPv2-based connections to certificate-based authentication (such as PEAP-TLS or EAP-TLS).<ref>{{Cite web|url=https://learn.microsoft.com/en-us/windows/security/identity-protection/credential-guard/credential-guard-considerations|title=Considerations when using Windows Defender Credential Guard - Windows Security|date=January 27, 2023|website=learn.microsoft.com}}</ref>
After [[Windows 11]] 22H2, with the default activation of Windows Defender Credential Guard, users can no longer authenticate with MSCHAPv2. The developers recommend a move from MSCHAPv2-based connections to certificate-based authentication (such as PEAP-TLS or [[Extensible_Authentication_Protocol#EAP-TLS|EAP-TLS]]).<ref>{{Cite web|url=https://learn.microsoft.com/en-us/windows/security/identity-protection/credential-guard/credential-guard-considerations|title=Considerations when using Windows Defender Credential Guard - Windows Security|date=January 27, 2023|website=learn.microsoft.com}}</ref>


==See also==
==See also==

Version vom 23. November 2024, 13:09 Uhr

Vorlage:Short description MS-CHAP is the Microsoft version of the Challenge-Handshake Authentication Protocol, (CHAP).

Versions

The protocol exists in two versions, MS-CHAPv1 (defined in Vorlage:IETF RFC) and MS-CHAPv2 (defined in Vorlage:IETF RFC). MS-CHAPv2 was introduced with pptp3-fix that was included in Windows NT 4.0 SP4 and was added to Windows 98 in the "Windows 98 Dial-Up Networking Security Upgrade Release"[1] and Windows 95 in the "Dial Up Networking 1.3 Performance & Security Update for MS Windows 95" upgrade. Windows Vista dropped support for MS-CHAPv1.

Applications

MS-CHAP is used as one authentication option in Microsoft's implementation of the PPTP protocol for virtual private networks. It is also used as an authentication option with RADIUS[2] servers which are used with IEEE 802.1X (e.g., WiFi security using the WPA-Enterprise protocol). It is further used as the main authentication option of the Protected Extensible Authentication Protocol (PEAP).

Features

Compared with CHAP,[3] MS-CHAP:[4][5] works by negotiating CHAP Algorithm 0x80 (0x81 for MS-CHAPv2) in LCP option 3, Authentication Protocol. It provides an authenticator-controlled password change mechanism. It provides an authenticator-controlled authentication retry mechanism and defines failure codes returned in the Failure packet message field.

MS-CHAPv2 provides mutual authentication between peers by piggybacking a peer challenge on the response packet and an authenticator response on the success packet.

MS-CHAP requires each peer to either know the plaintext password, or an MD4 hash of the password, and does not transmit the password over the link. As such, it is not compatible with most password storage formats.

Flaws

Weaknesses have been identified in MS-CHAP and MS-CHAPv2.[6] The DES encryption used in NTLMv1 and MS-CHAPv2 to encrypt the NTLM password hash enable custom hardware attacks utilizing the method of brute force.[7]

As of 2012, MS-CHAP had been completely broken.[8]

After Windows 11 22H2, with the default activation of Windows Defender Credential Guard, users can no longer authenticate with MSCHAPv2. The developers recommend a move from MSCHAPv2-based connections to certificate-based authentication (such as PEAP-TLS or EAP-TLS).[9]

See also

References

Vorlage:Reflist

Vorlage:Authentication APIs

  1. Windows 98 Dial-Up Networking Security Upgrade Release Notes (August 1998). In: Support. Microsoft, August 1998;.
  2. Vorlage:Cite IETF
  3. Vorlage:Cite IETF
  4. Vorlage:Cite IETF
  5. Vorlage:Cite IETF
  6. Bruce Schneier, Mudge, David Wagner: Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2). In: schneier.com. 19. Oktober 1999;.
  7. Jochen Eisinger: Exploiting known security holes in Microsoft's PPTP Authentication Extensions (MS-CHAPv2). In: penguin-breeder.org. 23. Juli 2001;.
  8. Divide and Conquer: Cracking MS-CHAPv2 with a 100% success rate. David Hulton, 2012, archiviert vom Original am 16. März 2016; abgerufen am 10. März 2013.
  9. Considerations when using Windows Defender Credential Guard - Windows Security. In: learn.microsoft.com. 27. Januar 2023;.