Survey requests sent out to PPPEXT, IEEE 802.1X mailing lists in early June 2001 ... Goal is to push exhaustion of EAP Type space out several years ...
Title: RFC 2284bis Open Issues Last modified by: Bernard Aboba Created Date: 9/30/1996 6:28:10 PM Document presentation format: On-screen Show Other titles
TLS master secret permutation. Initial master key is derived as usual during initial handshake phase. Master key is permuted at the end of each application phase: ...
Cryptographic Separation between apps. Consistent Key ... Defines how keys will be used/derived from (AMSK) Defines where keys are used and how they get there ...
The initial WEP standard turns out to have cryptographic weakneses, which is ... The initial papers concerning WEP weaknesses can be found here: http://www.cs. ...
EAP-SIM Using EAP-SIM for WLAN Authentication yliqiang@gmail.com 2005-9-13 Definition( ) EAP-SIM is an Extensible Authentication Protocol (EAP) [RFC3748 ...
Developed by Funk and Certicom. ... Funk Software and Interlink Networks added support for the proposed wireless security protocol, developed by Funk and Certicom, ...
Published 86 RFCs (2099 pages) since. the last IETF report. Independent Submissions have been ... Draft-khan-gaur-secure-mpeg-syntax-00.txt IESG/TO ...
The initial WEP standard turns out to have cryptographic weakneses, which is ... iLabs whitepapers on Authentication methods at http://www.opus1.com/wsec/wp.html ...
IEEE 802.11i security needs to be analyzed as a system ... APIs. EAP. APIs. PPP. 802.3. 802.5. 802.11. AKA/SIM. PEAP/EAP TTLS. LEAP. Division of Responsibilities ...
... security needs to be analyzed as a system ... 802.1aa defines usage guidelines for existing RADIUS ... Informal liason between IEEE 802.1aa and IETF Bridge ...
MAC address authentication (no encryption and easy to sniff and spoof) ... LAN environment is 100% switched and sniffing on the wired LAN is not possible ...
Discovery phase is out of band of EAP and may not be secure ... TEKs must be fresh, not used ... May be no way for EAP peer to be informed of the key lifetime ...
Impersonation of another client. Resource exhaustion attack on server (more likely on IPv4) ... Attacker can impersonate an insecure server in an insecure realm, ...
Challenge-based authentication methods require the back-end server ... Should seeded methods be dealt with? Can/Should the seed safely be communicated or known? ...