
110
Chapter 5: Authentication and Encryption
AirMagnet Laptop Wireless LAN Policy Reference Guide
Figure 5-3: Shared key authentication 4-packet protocol exchange
Shared key authentication uses a standard challenge and response
approach for authentication between the 802.11 client and the access
point. The challenge text is unencrypted and in clear text. The
algorithm (not the shared secret key) for the challenge response is
standard and public knowledge. It has been proven that shared key
authentication can be easily exploited through a passive attack by
eavesdropping. An attacker can use brute force to compute the
challenge response off-line after capturing challenge text, which is in
clear text. Once the match is found, the attacker has acquired the
shared secret key. See the paper published by University of Maryland
Your 802.11 Wireless Network has No Clothes
, which highlights
some of the security problems including the shared key vulnerability
in wireless LANs.
AirMagnet
Mobile
detects the use of Shared Key Authentication and
advises alternatives. Many enterprises today deploy 802.11 WLANs
using
Open Authentication
instead of
Shared Key Authentication
with a higher level authentication mechanism provided by
802.1x
and
EAP
methods such as
LEAP
,
PEAP
,
TLS
, etc.
Laptop Wireless LAN Policy Reference Guide.book Page 110 Thursday, January 25, 2007 5:36 PM
Содержание PRG-Laptop 7.0
Страница 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 30: ...22 Chapter 1 Configuration Vulnerabilities AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 136: ...128 Chapter 5 Authentication and Encryption AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...