Lightweight Extensible Authentication Protocol

The Lightweight Extensible Authentication Protocol (LEAP) is a proprietary wireless LAN authentication method developed by Cisco Systems. Important features of LEAP are dynamic WEP keys and mutual authentication (between a wireless client and a RADIUS server). LEAP allows for clients to reauthenticate frequently; upon each successful authentication, the clients acquire a new WEP key (with the hope that the WEP keys don't live long enough to be cracked). LEAP may be configured to use TKIP instead of dynamic WEP.

Some 3rd party vendors also support LEAP through the Cisco Compatible Extensions Program.[1]

Security considerations

Cisco LEAP, similar to WEP, has had well-known security weaknesses since 2003 involving offline password cracking.[2] LEAP uses a modified version of MS-CHAP, an authentication protocol in which user credentials are not strongly protected. Stronger authentication protocols employ a salt to strengthen the credentials against eavesdropping during the authentication process. Cisco's response to the weaknesses of LEAP suggests that network administrators either force users to have stronger, more complicated passwords or move to another authentication protocol also developed by Cisco, EAP-FAST, to ensure security.[3] Automated tools like ASLEAP demonstrate the simplicity of getting unauthorized access in networks protected by LEAP implementations.[4]

References

  1. "Cisco Compatible Extensions Program". Cisco. Retrieved 2008-02-22.
  2. "Cisco LEAP dictionary password guessing". ISS. Retrieved 2008-03-03.
  3. "Cisco Security Notice: Dictionary Attack on Cisco LEAP Vulnerability". Cisco. Retrieved 2008-02-22.
  4. "asleap". Sourceforge. Retrieved 2008-02-22.
This article is issued from Wikipedia - version of the 5/28/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.