40 likes | 245 Views
DHCP – Wireless Auth. Standards stuff January CSG – Duke poepping@cmu.edu. Auth-DHCP. 2-way auth Server knows client, client can know server Current draft specifies shared secrets (password) Other security methods possible, but issues with 3-way Still can forge addresses (MAC or IP)
E N D
DHCP – Wireless Auth Standards stuff January CSG – Duke poepping@cmu.edu
Auth-DHCP • 2-way auth • Server knows client, client can know server • Current draft specifies shared secrets (password) • Other security methods possible, but issues with 3-way • Still can forge addresses (MAC or IP) • http://www.ietf.org/internet-drafts/draft-ietf-dhc-authentication-15.txt
802.1x • Port-based auth for 802 (ethernet) • Maybe 2-3Q2001, pre-standard devices soon • Optional key exchange (likely for encryption, but no encryption specified) • Whistler ‘support’, not tried (no device) • EAP (radius) backend (rfc2284) • 2284 – md5challenge, otp, generic chal-resp card • Draft – gss mechanism
802.11e Requirements Stage • http://grouper.ieee.org/groups/802/11/ • QoS • Provisioning and implementation • Wired interop • Privacy – WEP ‘upgrade’ • Other encryption options - internationalization • Authentication • Basic access control • Roaming support - IAPP – Inter-Access-Point Protocol - 802.11f? • Other • Load balancing • Vendor-specific stuff