Authentication protocol: Difference between revisions

Content deleted Content added
Get privacy
Tags: Reverted Visual edit Mobile edit Mobile web edit
m Reverted edits by 2A00:23C6:D80B:E201:ED15:F1F:64:E126 (talk) (HG) (3.4.10)
Line 1:
An '''authentication protocol''' is a type of computer [[communications protocol]] or [[cryptographic protocol]] specifically designed for transfer of [[authentication]] data between two entities. It allows the receiving entity to authenticate the connecting entity (e.g. Client connecting to a Server) as well as authenticate itself to the connecting entity (Server to a client) by declaring the type of information needed for authentication as well as syntax.<ref>{{cite web|url = https://www.sans.org/reading-room/whitepapers/authentication/overview-authentication-methods-protocols-118|title = An Overview of Different Authentication Methods and Protocols|date = 23 October 2001|access-date = 31 October 2015|website = www.sans.org|publisher = SANS Institute|last = Duncan|first = Richard}}</ref> It is the most important layer of protection needed for secure communication within computer networks.
 
==Purpose ==
Line 28:
The authentication process in this protocol is always initialized by the server/host and can be performed anytime during the session, even repeatedly. Server sends a random string (usually 128B long). The client uses password and the string received as parameters for MD5 hash function and then sends the result together with username in plain text. Server uses the username to apply the same function and compares the calculated and received hash. An authentication is successful or unsuccessful.
 
====EAP - Extensible Authentication Protocol====
**
 
EAP was originally developed for PPP(Point-to-Point Protocol) but today is widely used in [[IEEE 802.3]], [[IEEE 802.11]](WiFi) or [[IEEE 802.16]] as a part of [[IEEE 802.1x]] authentication framework. The latest version is standardized in RFC 5247. The advantage of EAP is that it is only a general authentication framework for client-server authentication - the specific way of authentication is defined in its many versions called EAP-methods. More than 40 EAP-methods exist, the most common are:
*[[EAP-MD5]]
*[[EAP-TLS]]
*[[EAP-TTLS]]
*[[EAP-FAST]]
*EAP-[[Protected Extensible Authentication Protocol|PEAP]]
 
===AAA architecture protocols (Authentication, Authorization, Accounting)===
Line 34 ⟶ 41:
Complex protocols used in larger networks for verifying the user (Authentication), controlling access to server data (Authorization) and monitoring network resources and information needed for billing of services (Accounting).
 
==== [[TACACS]], [[XTACACS]] and [[TACACS+ ]]====
The oldest AAA protocol using IP based authentication without any encryption (usernames and passwords were transported as plain text). Later version XTACACS (Extended TACACS) added authorization and accounting. Both of these protocols were later replaced by TACACS+. TACACS+ separates the AAA components thus they can be segregated and handled on separate servers (It can even use another protocol for e.g. Authorization). It uses [[Transmission Control Protocol|TCP]] (Transmission Control Protocol) for transport and encrypts the whole packet. TACACS+ is Cisco proprietary.
 
====[[RADIUS]]====
 
[[Remote Authentication Dial-In User Service]] (RADIUS) is a full [[AAA (computer security)|AAA protocol
]] commonly used by [[ISP]]. Credentials are mostly username-password combination based, it uses [[Network access server|NAS]] and [[User Datagram Protocol|UDP]] protocol for transport.<ref>{{cite web|url = http://www.cisco.com/c/en/us/td/docs/net_mgmt/cisco_secure_access_control_system/5-1/user/guide/acsuserguide/rad_tac_phase.html|title = AAA protocols|access-date = 31 October 2015|website = www.cisco.com|publisher = CISCO}}</ref>
 
====[[DIAMETER]]====
<ref>{{cite web|last=Liu|first=Jeffrey|date=24 January 2006|title=Introduction to Diameter|url=http://www.ibm.com/developerworks/wireless/library/wi-diameter/|url-status=live|access-date=31 October 2015|website=..|publisher=}}</ref>
[[Diameter (protocol)]] evolved from RADIUS and involves many improvements such as usage of more reliable TCP or SCTP transport protocol and higher security thanks to [[Transport Layer Security|TLS]].<ref>{{cite web|url = http://www.ibm.com/developerworks/wireless/library/wi-diameter/|title = Introduction to Diameter|date = 24 January 2006|access-date = 31 October 2015|website = www.ibm.com|publisher = IBM|last = Liu|first = Jeffrey}}</ref>
 
===Other===
[[File:Kerberos sch en.png|thumb|321x321px|Kerberos authentication scheme]]
 
====[[Kerberos (protocol)]]====
Kerberos is a centralized network authentication system developed at [[MIT]] and available as a free implementation from MIT but also in many commercial products. It is the default authentication method in [[Windows 2000]] and later. The authentication process itself is much more complicated than in the previous protocols - Kerberos uses [[symmetric key cryptography]], requires a [[trusted third party]] and can use [[public-key cryptography]] during certain phases of authentication if need be.<ref>{{cite web|url = http://web.mit.edu/kerberos/|title = Kerberos: The Network Authentication Protocol|date = 10 September 2015|access-date = 31 October 2015|website = web.mit.edu|publisher = MIT Kerberos}}</ref><ref>{{Cite book|title = Applied Cryptography|last = Schneier|first = Bruce|publisher = John Wiley & Sons, Inc.|year = 1997|isbn = 0-471-12845-7|___location = New York|pages = 52–74}}</ref><ref>{{cite web|url = http://srp.stanford.edu/history.html|title = Protocols of the Past|access-date = 31 October 2015|website = srp.stanford.edu|publisher = Stanford University}}</ref>
 
==List of various other authentication protocols==
* [[AKA (security)|AKA]]
*
* [[Basic access authentication]]
* [[CAVE-based authentication]]
* [[CRAM-MD5]]
* [[Digest authentication|Digest]]
* [[Host Identity Protocol]] (HIP)
*
* [[LAN Manager]]
*
* [[NTLM]], also known as NT LAN Manager
* [[OpenID]] protocol
* cols
* [[Password-authenticated key agreement]] protocols
* (PANA)
* [[Protocol for Carrying Authentication for Network Access]] (PANA)
*
* [[Secure Remote Password protocol]] (SRP)
*
* [[RFID-Authentication Protocols]]
*
* [[Woo Lam 92 (protocol)]]
*
* [[SAML]]
 
==References==