Talk:Extensible Authentication Protocol
![]() | Computing: Networking Unassessed | ||||||||||||
|
![]() | It is requested that a diagram or diagrams illustrating Security protocols are inherently difficult to understand. Diagrams are helpful. be included in this article to improve its quality. Specific illustrations, plots, or diagrams can be requested at the Graphic Lab. Please replace this template with a more specific media request template where possible. For more information, refer to discussion on this page and/or the listing at Wikipedia:Requested images. |
This page seems to have some serious anti-Cisco slant, possibly to the extent that it violates NPOV. In particular, phrases such as 'Swallowing the Cisco Kool-Aid' have no place in an encyclopdiac entry. Yes, it is true that LEAP as well as MD5 are vulernable to dictionary attacks; however, this article makes such the assinine references that EAP-FAST is likewise going to be insecure which is true speculation and also has no place in this entry. --anon
- Thanks for pointing that out: I've cut a few sentences that were blatant, but it still needs work, and the article is pretty hard to understand to boot. I've added a "cleanup" tag. — Matt Crypto 16:29, 24 Jun 2005 (UTC)
- I apologize for that 'Swallowing the Cisco Kool-Aid' comment. This was my first contribution to the Wiki and it was a newbie mistake. I will be more careful in the future. -- George
The EAP should, according to IETF (see http://www3.ietf.org/proceedings/02mar/slides/eap-1/tsld010.htm), be pronounced as "ee ey pee". Schotti 03:22, 16 February 2006 (UTC)
I made the small changes to the LEAP section and I would like to add I do not work for Cisco nor am I associated with them in any way other than as an end-user. I actually have a personal general bias against them due to their use of proprietary protocols everywhere (EIGRP anyone?). -Matt
Tagged Changed
This article seems pretty clean. I swapped out the cleanup for diagram because security protocols are inherently difficult to understand. --meatclerk 19:16, 23 July 2006 (UTC)
The data on the difference between PEAPv0 and PEAPv1 is wrong.
Both versions of PEAP support EAP subtypes and microsoft has an extension API allowing their use. Which supplicants support what by default or per supplicant implementation is not the same as saying they are not supported or various EAP subtypes that work in v0 can't work in v1 or vis versa. I've personally used EAP-GTC over PEAPv0 using the AEGIS supplicant.
The difference between v0 and v1 is that v0 uses a slightly different header format and v0 uses the eap type of EAP Extension (Type 33) to convey success/failure information. This is the ONLY difference between v0 and v1. From the users perspective neither version is better than the other. They both have the same capabilities and security properties and capabile of supporting the same subtypes.
The latest PEAP drafts define PEAPv2 which is similiar to v1 except that it adds a crypto binding between the inner EAP-PEAP-(EAP-??) method protected by PEAP and the keying material used in the PEAP handshake. This provides improved security.
RFC status
Why is RFC 2716 (EAP-TLS) called "open standard", whereas RFC 4746 (EAP-PSX) is called "experimental RFC"? Both are "experimental track" RFCs, but it sounds like someone is twisting words here. To the uninitiated, RFCs can be one of standards track: These have the IETF stamp of approval for future direction and relevancy. informational: Often non-normative documents, or contributed documents from vendors who wish to publish what they've implemented. experimental: A suggested protocol or similar which is, well, experimental. IETF will not publish bad or inconsistent protocols, so there is nothing derogatory about being an experimental RFC. BGP started out as experimental, and didn't become standards track until BGP-4! Finally, there's historic: obsolete standards.
It is also stated that EAP-MD5 is the only standards track EAP application, but this is not strictly correct -- the Diameter EAP application (RFC 4072) is also standards track. Kjetilho (talk) 11:58, 3 February 2008 (UTC)
Merge proposal
I've added templates suggesting a merge of Protected Extensible Authentication Protocol into this article. The PEAP redirect should become a disambig page at that point, since there is a line at the top of the page about a different expansion of the acronym. Todd Vierling (talk) 15:42, 6 August 2008 (UTC)
Merger Notice
I agree with the suggestion that Protected Extensible Authentication Protocol should be merged into this article. I am considering taking up the work of carrying out the merger. I request the other contributors to voice objections if any (approvals are obviously welcome :) )
Kcrao - Engineer, Security and Wireless Technologies (talk) 09:22, 6 March 2009 (UTC)
From RADIUS
The following text does not have anything to do with RADIUS. I've moved it here in case it's needed in the EAP article.
Some EAP methods establish a secure tunnel between an authenticator and the home AAA server before the transmission of sensitive data, providing relief for most of those concerns. In these cases, there is sometimes an outer identity in clear text transmitted outside the EAP tunnel - visible to proxies so they can route packets - which doesn't have to reveal much about the user's true identity, and an inner identity that does, which is transmitted inside the secure EAP tunnel.{{Fact|date=April 2009}} kgrr talk 08:19, 30 April 2009 (UTC)
- Unassessed Computing articles
- Unknown-importance Computing articles
- Unassessed Computer networking articles
- Unknown-importance Computer networking articles
- Unassessed Computer networking articles of Unknown-importance
- All Computer networking articles
- All Computing articles
- Wikipedia requested diagram images