<s>
Extensible	B-Protocol
Authentication	I-Protocol
Protocol	I-Protocol
(	O
EAP	O
)	O
is	O
an	O
authentication	O
framework	O
frequently	O
used	O
in	O
network	O
and	O
internet	O
connections	O
.	O
</s>
<s>
Each	O
protocol	O
that	O
uses	O
EAP	O
defines	O
a	O
way	O
to	O
encapsulate	B-Protocol
by	O
the	O
user	O
EAP	O
messages	O
within	O
that	O
protocol	O
's	O
messages	O
.	O
</s>
<s>
Methods	O
defined	O
in	O
IETF	O
RFCs	O
include	O
EAP-MD5	O
,	O
EAP-POTP	O
,	O
EAP-GTC	O
,	O
EAP-TLS	O
,	O
EAP-IKEv2	O
,	O
EAP-SIM	O
,	O
EAP-AKA	O
,	O
and	O
EAP-AKA	O
'	O
.	O
</s>
<s>
Commonly	O
used	O
modern	O
methods	O
capable	O
of	O
operating	O
in	O
wireless	O
networks	O
include	O
EAP-TLS	O
,	O
EAP-SIM	O
,	O
EAP-AKA	O
,	O
LEAP	B-Protocol
and	O
EAP-TTLS	O
.	O
</s>
<s>
The	O
Lightweight	B-Protocol
Extensible	I-Protocol
Authentication	I-Protocol
Protocol	I-Protocol
(	O
LEAP	B-Protocol
)	O
method	O
was	O
developed	O
by	O
Cisco	O
Systems	O
prior	O
to	O
the	O
IEEE	O
ratification	O
of	O
the	O
802.11i	B-Protocol
security	O
standard	O
.	O
</s>
<s>
Cisco	O
distributed	O
the	O
protocol	O
through	O
the	O
CCX	O
(	O
Cisco	O
Certified	O
Extensions	O
)	O
as	O
part	O
of	O
getting	O
802.1X	O
and	O
dynamic	O
WEP	B-Protocol
adoption	O
into	O
the	O
industry	O
in	O
the	O
absence	O
of	O
a	O
standard	O
.	O
</s>
<s>
There	O
is	O
no	O
native	O
support	O
for	O
LEAP	B-Protocol
in	O
any	O
Windows	B-Application
operating	I-Application
system	I-Application
,	O
but	O
it	O
is	O
widely	O
supported	O
by	O
third-party	O
client	O
software	O
most	O
commonly	O
included	O
with	O
WLAN	O
(	O
wireless	O
LAN	O
)	O
devices	O
.	O
</s>
<s>
LEAP	B-Protocol
support	O
for	O
Microsoft	B-Device
Windows	I-Device
7	I-Device
and	O
Microsoft	B-Application
Windows	I-Application
Vista	I-Application
can	O
be	O
added	O
by	O
downloading	O
a	O
client	O
add	O
in	O
from	O
Cisco	O
that	O
provides	O
support	O
for	O
both	O
LEAP	B-Protocol
and	O
EAP-FAST	O
.	O
</s>
<s>
Due	O
to	O
the	O
wide	O
adoption	O
of	O
LEAP	B-Protocol
in	O
the	O
networking	O
industry	O
many	O
other	O
WLAN	O
vendors	O
claim	O
support	O
for	O
LEAP	B-Protocol
.	O
</s>
<s>
LEAP	B-Protocol
uses	O
a	O
modified	O
version	O
of	O
MS-CHAP	B-Algorithm
,	O
an	O
authentication	B-Protocol
protocol	I-Protocol
in	O
which	O
user	O
credentials	O
are	O
not	O
strongly	O
protected	O
and	O
easily	O
compromised	O
;	O
an	O
exploit	O
tool	O
called	O
ASLEAP	O
was	O
released	O
in	O
early	O
2004	O
by	O
Joshua	O
Wright	O
.	O
</s>
<s>
Cisco	O
recommends	O
that	O
customers	O
who	O
absolutely	O
must	O
use	O
LEAP	B-Protocol
do	O
so	O
only	O
with	O
sufficiently	O
complex	O
passwords	O
,	O
though	O
complex	O
passwords	O
are	O
difficult	O
to	O
administer	O
and	O
enforce	O
.	O
</s>
<s>
Cisco	O
's	O
current	O
recommendation	O
is	O
to	O
use	O
newer	O
and	O
stronger	O
EAP	O
protocols	O
such	O
as	O
EAP-FAST	O
,	O
PEAP	O
,	O
or	O
EAP-TLS	O
.	O
</s>
<s>
EAP	O
Transport	B-Protocol
Layer	I-Protocol
Security	I-Protocol
(	O
EAP-TLS	O
)	O
,	O
defined	O
in	O
,	O
is	O
an	O
IETF	O
open	O
standard	O
that	O
uses	O
the	O
Transport	B-Protocol
Layer	I-Protocol
Security	I-Protocol
(	O
TLS	B-Protocol
)	O
protocol	O
,	O
and	O
is	O
well-supported	O
among	O
wireless	O
vendors	O
.	O
</s>
<s>
EAP-TLS	O
is	O
the	O
original	O
,	O
standard	O
wireless	O
LAN	O
EAP	O
authentication	B-Protocol
protocol	I-Protocol
.	O
</s>
<s>
EAP-TLS	O
is	O
still	O
considered	O
one	O
of	O
the	O
most	O
secure	O
EAP	O
standards	O
available	O
,	O
although	O
TLS	B-Protocol
provides	O
strong	O
security	O
only	O
as	O
long	O
as	O
the	O
user	O
understands	O
potential	O
warnings	O
about	O
false	O
credentials	O
,	O
and	O
is	O
universally	O
supported	O
by	O
all	O
manufacturers	O
of	O
wireless	O
LAN	O
hardware	O
and	O
software	O
.	O
</s>
<s>
Until	O
April	O
2005	O
,	O
EAP-TLS	O
was	O
the	O
only	O
EAP	O
type	O
vendors	O
needed	O
to	O
certify	O
for	O
a	O
WPA	O
or	O
WPA2	O
logo	O
.	O
</s>
<s>
There	O
are	O
client	O
and	O
server	O
implementations	O
of	O
EAP-TLS	O
in	O
3Com	O
,	O
Apple	O
,	O
Avaya	O
,	O
Brocade	O
Communications	O
,	O
Cisco	O
,	O
Enterasys	O
Networks	O
,	O
Fortinet	O
,	O
Foundry	O
,	O
Hirschmann	O
,	O
HP	O
,	O
Juniper	O
,	O
Microsoft	O
,	O
and	O
open	O
source	O
operating	O
systems	O
.	O
</s>
<s>
EAP-TLS	O
is	O
natively	O
supported	O
in	O
Mac	O
OS	O
X	O
10.3	O
and	O
above	O
,	O
wpa_supplicant	O
,	O
Windows	B-Application
2000	I-Application
SP4	O
,	O
Windows	B-Application
XP	I-Application
and	O
above	O
,	O
Windows	O
Mobile	O
2003	O
and	O
above	O
,	O
Windows	O
CE	O
4.2	O
,	O
and	O
Apple	O
's	O
iOS	O
mobile	O
operating	O
system	O
.	O
</s>
<s>
Unlike	O
most	O
TLS	B-Protocol
implementations	O
of	O
HTTPS	B-Protocol
,	O
such	O
as	O
on	O
the	O
World	O
Wide	O
Web	O
,	O
the	O
majority	O
of	O
implementations	O
of	O
EAP-TLS	O
require	O
mutual	O
authentication	O
using	O
client-side	O
X.509	O
certificates	O
without	O
giving	O
the	O
option	O
to	O
disable	O
the	O
requirement	O
,	O
even	O
though	O
the	O
standard	O
does	O
not	O
mandate	O
their	O
use	O
.	O
</s>
<s>
Some	O
have	O
identified	O
this	O
as	O
having	O
the	O
potential	O
to	O
dramatically	O
reduce	O
adoption	O
of	O
EAP-TLS	O
and	O
prevent	O
"	O
open	O
"	O
but	O
encrypted	O
access	O
points	O
.	O
</s>
<s>
On	O
22	O
August	O
2012	O
hostapd	B-Application
(	O
and	O
wpa_supplicant	O
)	O
added	O
support	O
in	O
its	O
Git	B-Application
repository	O
for	O
an	O
UNAUTH-TLS	O
vendor-specific	O
EAP	O
type	O
(	O
using	O
the	O
hostapd/wpa_supplicant	O
project	O
Private	O
Enterprise	O
Number	O
)	O
,	O
and	O
on	O
25	O
February	O
2014	O
added	O
support	O
for	O
the	O
WFA-UNAUTH-TLS	O
vendor-specific	O
EAP	O
type	O
(	O
using	O
the	O
Wi-Fi	O
Alliance	O
Private	O
Enterprise	O
Number	O
)	O
,	O
which	O
only	O
do	O
server	O
authentication	O
.	O
</s>
<s>
This	O
would	O
allow	O
for	O
situations	O
much	O
like	O
HTTPS	B-Protocol
,	O
where	O
a	O
wireless	O
hotspot	O
allows	O
free	O
access	O
and	O
does	O
not	O
authenticate	O
station	O
clients	O
but	O
station	O
clients	O
wish	O
to	O
use	O
encryption	O
(	O
IEEE	B-Protocol
802.11i-2004	I-Protocol
i.e.	O
</s>
<s>
There	O
have	O
also	O
been	O
proposals	O
to	O
use	O
IEEE	O
802.11u	O
for	O
access	O
points	O
to	O
signal	O
that	O
they	O
allow	O
EAP-TLS	O
using	O
only	O
server-side	O
authentication	O
,	O
using	O
the	O
standard	O
EAP-TLS	O
IETF	O
type	O
instead	O
of	O
a	O
vendor-specific	O
EAP	O
type	O
.	O
</s>
<s>
The	O
requirement	O
for	O
a	O
client-side	O
certificate	O
,	O
however	O
unpopular	O
it	O
may	O
be	O
,	O
is	O
what	O
gives	O
EAP-TLS	O
its	O
authentication	O
strength	O
and	O
illustrates	O
the	O
classic	O
convenience	O
vs.	O
security	O
trade-off	O
.	O
</s>
<s>
With	O
a	O
client-side	O
certificate	O
,	O
a	O
compromised	O
password	O
is	O
not	O
enough	O
to	O
break	O
into	O
EAP-TLS	O
enabled	O
systems	O
because	O
the	O
intruder	O
still	O
needs	O
to	O
have	O
the	O
client-side	O
certificate	O
;	O
indeed	O
,	O
a	O
password	O
is	O
not	O
even	O
needed	O
,	O
as	O
it	O
is	O
only	O
used	O
to	O
encrypt	O
the	O
client-side	O
certificate	O
for	O
storage	O
.	O
</s>
<s>
The	O
highest	O
security	O
available	O
is	O
when	O
the	O
"	O
private	B-Application
keys	I-Application
"	O
of	O
client-side	O
certificate	O
are	O
housed	O
in	O
smart	O
cards	O
.	O
</s>
<s>
This	O
is	O
because	O
there	O
is	O
no	O
way	O
to	O
steal	O
a	O
client-side	O
certificate	O
's	O
corresponding	O
private	B-Application
key	I-Application
from	O
a	O
smart	O
card	O
without	O
stealing	O
the	O
card	O
itself	O
.	O
</s>
<s>
In	O
addition	O
,	O
the	O
private	B-Application
key	I-Application
on	O
a	O
smart	O
card	O
is	O
typically	O
encrypted	O
using	O
a	O
PIN	O
that	O
only	O
the	O
owner	O
of	O
the	O
smart	O
card	O
knows	O
,	O
minimizing	O
its	O
utility	O
for	O
a	O
thief	O
even	O
before	O
the	O
card	O
has	O
been	O
reported	O
stolen	O
and	O
revoked	O
.	O
</s>
<s>
EAP-MD5	O
was	O
the	O
only	O
IETF	O
Standards	O
Track	O
based	O
EAP	O
method	O
when	O
it	O
was	O
first	O
defined	O
in	O
the	O
original	O
RFC	O
for	O
EAP	O
,	O
.	O
</s>
<s>
It	O
offers	O
minimal	O
security	O
;	O
the	O
MD5	B-Algorithm
hash	I-Algorithm
function	O
is	O
vulnerable	O
to	O
dictionary	O
attacks	O
,	O
and	O
does	O
not	O
support	O
key	O
generation	O
,	O
which	O
makes	O
it	O
unsuitable	O
for	O
use	O
with	O
dynamic	O
WEP	B-Protocol
,	O
or	O
WPA/WPA2	O
enterprise	O
.	O
</s>
<s>
EAP-MD5	O
differs	O
from	O
other	O
EAP	O
methods	O
in	O
that	O
it	O
only	O
provides	O
authentication	O
of	O
the	O
EAP	O
peer	O
to	O
the	O
EAP	O
server	O
but	O
not	O
mutual	O
authentication	O
.	O
</s>
<s>
EAP-MD5	O
support	O
was	O
first	O
included	O
in	O
Windows	B-Application
2000	I-Application
and	O
deprecated	O
in	O
Windows	B-Application
Vista	I-Application
.	O
</s>
<s>
EAP-PSK	O
is	O
documented	O
in	O
an	O
experimental	O
RFC	O
that	O
provides	O
a	O
lightweight	O
and	O
extensible	O
EAP	O
method	O
that	O
does	O
not	O
require	O
any	O
public-key	B-Application
cryptography	I-Application
.	O
</s>
<s>
It	O
is	O
in	O
FreeRADIUS	O
and	O
Radiator	O
RADIUS	B-Protocol
servers	I-Protocol
,	O
and	O
it	O
is	O
in	O
hostapd	B-Application
and	O
wpa_supplicant	O
.	O
</s>
<s>
EAP	O
Tunneled	O
Transport	B-Protocol
Layer	I-Protocol
Security	I-Protocol
(	O
EAP-TTLS	O
)	O
is	O
an	O
EAP	O
protocol	O
that	O
extends	O
TLS	B-Protocol
.	O
</s>
<s>
Microsoft	O
did	O
not	O
incorporate	O
native	O
support	O
for	O
the	O
EAP-TTLS	O
protocol	O
in	O
Windows	B-Application
XP	I-Application
,	O
Vista	B-Application
,	O
or	O
7	B-Device
.	O
</s>
<s>
Microsoft	B-Application
Windows	I-Application
started	O
EAP-TTLS	O
support	O
with	O
Windows	B-Application
8	I-Application
,	O
support	O
for	O
EAP-TTLS	O
appeared	O
in	O
Windows	O
Phone	O
version	B-Protocol
8.1	I-Protocol
.	O
</s>
<s>
The	O
client	O
can	O
,	O
but	O
does	O
not	O
have	O
to	O
be	O
authenticated	O
via	O
a	O
CA-signed	O
PKI	B-Architecture
certificate	O
to	O
the	O
server	O
.	O
</s>
<s>
After	O
the	O
server	O
is	O
securely	O
authenticated	O
to	O
the	O
client	O
via	O
its	O
CA	B-Architecture
certificate	I-Architecture
and	O
optionally	O
the	O
client	O
to	O
the	O
server	O
,	O
the	O
server	O
can	O
then	O
use	O
the	O
established	O
secure	O
connection	O
(	O
"	O
tunnel	B-Protocol
"	O
)	O
to	O
authenticate	O
the	O
client	O
.	O
</s>
<s>
It	O
can	O
use	O
an	O
existing	O
and	O
widely	O
deployed	O
authentication	B-Protocol
protocol	I-Protocol
and	O
infrastructure	O
,	O
incorporating	O
legacy	O
password	O
mechanisms	O
and	O
authentication	O
databases	O
,	O
while	O
the	O
secure	O
tunnel	B-Protocol
provides	O
protection	O
from	O
eavesdropping	O
and	O
man-in-the-middle	O
attack	O
.	O
</s>
<s>
EAP	O
Internet	B-Protocol
Key	I-Protocol
Exchange	I-Protocol
v	O
.	O
2	O
(	O
EAP-IKEv2	O
)	O
is	O
an	O
EAP	O
method	O
based	O
on	O
the	O
Internet	B-Protocol
Key	I-Protocol
Exchange	I-Protocol
protocol	O
version	O
2	O
(	O
IKEv2	B-Protocol
)	O
.	O
</s>
<s>
Asymmetric	B-Application
key	I-Application
pairs	O
Public/private	O
key	O
pairs	O
where	O
the	O
public	B-Application
key	I-Application
is	O
embedded	O
into	O
a	O
digital	O
certificate	O
,	O
and	O
the	O
corresponding	O
private	B-Application
key	I-Application
is	O
known	O
only	O
to	O
a	O
single	O
party	O
.	O
</s>
<s>
EAP-IKEv2	O
is	O
described	O
in	O
,	O
and	O
a	O
exists	O
.	O
</s>
<s>
Flexible	O
Authentication	O
via	O
Secure	O
Tunneling	O
(	O
EAP-FAST	O
;	O
)	O
is	O
a	O
protocol	O
proposal	O
by	O
Cisco	O
Systems	O
as	O
a	O
replacement	O
for	O
LEAP	B-Protocol
.	O
</s>
<s>
The	O
protocol	O
was	O
designed	O
to	O
address	O
the	O
weaknesses	O
of	O
LEAP	B-Protocol
while	O
preserving	O
the	O
"	O
lightweight	O
"	O
implementation	O
.	O
</s>
<s>
EAP-FAST	O
uses	O
a	O
Protected	O
Access	O
Credential	O
(	O
PAC	O
)	O
to	O
establish	O
a	O
TLS	B-Protocol
tunnel	B-Protocol
in	O
which	O
client	O
credentials	O
are	O
verified	O
.	O
</s>
<s>
Phase	O
Function	O
Description	O
Purpose	O
0	O
In-band	O
provisioning	O
—	O
provide	O
the	O
peer	O
with	O
a	O
shared	O
secret	O
to	O
be	O
used	O
in	O
secure	O
phase	O
1	O
conversation	O
Uses	O
Authenticated	O
Diffie-Hellman	B-Protocol
Protocol	O
(	O
ADHP	O
)	O
.	O
</s>
<s>
This	O
is	O
a	O
requirement	O
in	O
sec	O
7.4.4	O
so	O
if	O
a	O
new	O
user	O
logs	O
on	O
the	O
network	O
from	O
a	O
device	O
,	O
a	O
new	O
PAC	O
file	O
must	O
be	O
provisioned	O
first	O
.	O
</s>
<s>
EAP-FAST	O
can	O
be	O
used	O
without	O
PAC	O
files	O
,	O
falling	O
back	O
to	O
normal	O
TLS	B-Protocol
.	O
</s>
<s>
Cisco	O
supplies	O
an	O
EAP-FAST	O
module	O
for	O
Windows	B-Application
Vista	I-Application
and	O
later	O
operating	O
systems	O
which	O
have	O
an	O
extensible	O
EAPHost	O
architecture	O
for	O
new	O
authentication	O
methods	O
and	O
supplicants	O
.	O
</s>
<s>
Tunnel	B-Protocol
Extensible	B-Protocol
Authentication	I-Protocol
Protocol	I-Protocol
(	O
TEAP	O
;	O
)	O
is	O
a	O
tunnel-based	O
EAP	O
method	O
that	O
enables	O
secure	O
communication	O
between	O
a	O
peer	O
and	O
a	O
server	O
by	O
using	O
the	O
Transport	B-Protocol
Layer	I-Protocol
Security	I-Protocol
(	O
TLS	B-Protocol
)	O
protocol	O
to	O
establish	O
a	O
mutually	O
authenticated	O
tunnel	B-Protocol
.	O
</s>
<s>
Within	O
the	O
tunnel	B-Protocol
,	O
TLV	O
(	O
Type-Length-Value	O
)	O
objects	O
are	O
used	O
to	O
convey	O
authentication-related	O
data	O
between	O
the	O
EAP	O
peer	O
and	O
the	O
EAP	O
server	O
.	O
</s>
<s>
After	O
receiving	O
the	O
certificate	O
request	O
and	O
authenticating	O
the	O
peer	O
,	O
the	O
server	O
can	O
provision	O
a	O
certificate	O
to	O
the	O
peer	O
in	O
PKCS	O
#7	O
format	O
(	O
)	O
.	O
</s>
<s>
The	O
server	O
can	O
also	O
distribute	O
trusted	O
root	O
certificates	O
to	O
the	O
peer	O
in	O
PKCS	O
#7	O
format	O
(	O
)	O
.	O
</s>
<s>
Both	O
operations	O
are	O
enclosed	O
into	O
the	O
corresponding	O
TLVs	O
and	O
happen	O
securely	O
within	O
the	O
already	O
established	O
TLS	B-Protocol
tunnel	B-Protocol
.	O
</s>
<s>
In	O
EAP-SIM	O
the	O
communication	O
between	O
the	O
SIM	O
card	O
and	O
the	O
Authentication	O
Centre	O
(	O
AuC	O
)	O
replaces	O
the	O
need	O
for	O
a	O
pre-established	O
password	O
between	O
the	O
client	O
and	O
the	O
AAA	B-Protocol
server	I-Protocol
.	O
</s>
<s>
Extensible	B-Protocol
Authentication	I-Protocol
Protocol	I-Protocol
Method	O
for	O
Universal	B-Protocol
Mobile	I-Protocol
Telecommunications	I-Protocol
System	I-Protocol
(	O
UMTS	B-Protocol
)	O
Authentication	O
and	O
Key	O
Agreement	O
(	O
EAP-AKA	O
)	O
,	O
is	O
an	O
EAP	O
mechanism	O
for	O
authentication	O
and	O
session	O
key	O
distribution	O
using	O
the	O
UMTS	B-Protocol
Subscriber	O
Identity	O
Module	O
(	O
USIM	O
)	O
.	O
</s>
<s>
EAP	O
Generic	O
Token	O
Card	O
,	O
or	O
EAP-GTC	O
,	O
is	O
an	O
EAP	O
method	O
created	O
by	O
Cisco	O
as	O
an	O
alternative	O
to	O
PEAPv0/EAP	O
-MSCHAPv2	O
and	O
defined	O
in	O
and	O
.	O
</s>
<s>
The	O
PEAP-GTC	O
authentication	O
mechanism	O
allows	O
generic	O
authentication	O
to	O
a	O
number	O
of	O
databases	O
such	O
as	O
Novell	B-Application
Directory	I-Application
Service	I-Application
(	O
NDS	B-Application
)	O
and	O
Lightweight	B-Protocol
Directory	I-Protocol
Access	I-Protocol
Protocol	I-Protocol
(	O
LDAP	B-Protocol
)	O
,	O
as	O
well	O
as	O
the	O
use	O
of	O
a	O
one-time	O
password	O
.	O
</s>
<s>
EAP	O
with	O
the	O
encrypted	B-Protocol
key	I-Protocol
exchange	I-Protocol
,	O
or	O
EAP-EKE	O
,	O
is	O
one	O
of	O
the	O
few	O
EAP	O
methods	O
that	O
provide	O
secure	O
mutual	O
authentication	O
using	O
short	O
passwords	O
and	O
no	O
need	O
for	O
public	B-Application
key	I-Application
certificates	O
.	O
</s>
<s>
It	O
is	O
a	O
three-round	O
exchange	O
,	O
based	O
on	O
the	O
Diffie-Hellman	B-Protocol
variant	O
of	O
the	O
well-known	O
EKE	O
protocol	O
.	O
</s>
<s>
and	O
unlike	O
other	O
EAP	O
methods	O
,	O
the	O
protocol	O
security	O
has	O
been	O
verified	O
by	O
formal	O
modeling	O
of	O
the	O
specification	O
with	O
ProVerif	B-Application
and	O
MCRL2	B-Application
tools	O
.	O
</s>
<s>
EAP-NOOB	O
performs	O
an	O
Ephemeral	O
Elliptic	O
Curve	O
Diffie-Hellman	B-Protocol
(	O
ECDHE	O
)	O
over	O
the	O
in-band	O
EAP	O
channel	O
.	O
</s>
<s>
Each	O
protocol	O
that	O
uses	O
EAP	O
defines	O
a	O
way	O
to	O
encapsulate	B-Protocol
EAP	O
messages	O
within	O
that	O
protocol	O
's	O
messages	O
.	O
</s>
<s>
The	O
encapsulation	B-Protocol
of	O
EAP	O
over	O
IEEE	O
802	O
is	O
defined	O
in	O
IEEE	O
802.1X	O
and	O
known	O
as	O
"	O
EAP	O
over	O
LANs	O
"	O
or	O
EAPOL	B-Protocol
.	O
</s>
<s>
EAPOL	B-Protocol
was	O
originally	O
designed	O
for	O
IEEE	O
802.3	O
ethernet	O
in	O
802.1X-2001	O
,	O
but	O
was	O
clarified	O
to	O
suit	O
other	O
IEEE	O
802	O
LAN	O
technologies	O
such	O
as	O
IEEE	O
802.11	O
wireless	O
and	O
Fiber	B-Protocol
Distributed	I-Protocol
Data	I-Protocol
Interface	I-Protocol
(	O
ANSI	O
X3T9.5/X3T12	O
,	O
adopted	O
as	O
ISO	B-Protocol
9314	I-Protocol
)	O
in	O
802.1X-2004	O
.	O
</s>
<s>
The	O
EAPOL	B-Protocol
protocol	O
was	O
also	O
modified	O
for	O
use	O
with	O
IEEE	O
802.1AE	O
(	O
MACsec	O
)	O
and	O
IEEE	O
802.1AR	O
(	O
Initial	O
Device	O
Identity	O
,	O
IDevID	O
)	O
in	O
802.1X-2010	O
.	O
</s>
<s>
When	O
EAP	O
is	O
invoked	O
by	O
an	O
802.1X	O
enabled	O
Network	O
Access	O
Server	O
(	O
NAS	O
)	O
device	O
such	O
as	O
an	O
IEEE	B-Protocol
802.11i-2004	I-Protocol
Wireless	O
Access	O
Point	O
(	O
WAP	O
)	O
,	O
modern	O
EAP	O
methods	O
can	O
provide	O
a	O
secure	O
authentication	O
mechanism	O
and	O
negotiate	O
a	O
secure	O
private	B-Application
key	I-Application
(	O
Pair-wise	O
Master	O
Key	O
,	O
PMK	O
)	O
between	O
the	O
client	O
and	O
NAS	O
which	O
can	O
then	O
be	O
used	O
for	O
a	O
wireless	O
encryption	O
session	O
utilizing	O
TKIP	B-Protocol
or	O
CCMP	B-Protocol
(	O
based	O
on	O
AES	B-Algorithm
)	O
encryption	O
.	O
</s>
<s>
The	O
Protected	O
Extensible	B-Protocol
Authentication	I-Protocol
Protocol	I-Protocol
,	O
also	O
known	O
as	O
Protected	O
EAP	O
or	O
simply	O
PEAP	O
,	O
is	O
a	O
protocol	O
that	O
encapsulates	O
EAP	O
within	O
a	O
potentially	O
encrypted	O
and	O
authenticated	O
Transport	B-Protocol
Layer	I-Protocol
Security	I-Protocol
(	O
TLS	B-Protocol
)	O
tunnel	B-Protocol
.	O
</s>
<s>
PEAPv0	O
was	O
the	O
version	O
included	O
with	O
Microsoft	B-Application
Windows	I-Application
XP	I-Application
and	O
was	O
nominally	O
defined	O
in	O
.	O
</s>
<s>
PEAPv1	O
and	O
PEAPv2	O
were	O
defined	O
in	O
different	O
versions	O
of	O
draft-josefsson-pppext-eap-tls-eap	O
.	O
</s>
<s>
Use	O
of	O
the	O
EAP-MSCHAPv2	O
and	O
EAP-GTC	O
methods	O
are	O
the	O
most	O
commonly	O
supported	O
.	O
</s>
<s>
Both	O
the	O
RADIUS	B-Protocol
and	O
Diameter	B-Protocol
AAA	O
protocols	O
can	O
encapsulate	B-Protocol
EAP	O
messages	O
.	O
</s>
<s>
They	O
are	O
often	O
used	O
by	O
Network	O
Access	O
Server	O
(	O
NAS	O
)	O
devices	O
to	O
forward	O
EAP	O
packets	O
between	O
IEEE	O
802.1X	O
endpoints	O
and	O
AAA	B-Protocol
servers	I-Protocol
to	O
facilitate	O
IEEE	O
802.1X	O
.	O
</s>
<s>
The	O
Protocol	B-Protocol
for	I-Protocol
Carrying	I-Protocol
Authentication	I-Protocol
for	I-Protocol
Network	I-Protocol
Access	I-Protocol
(	O
PANA	O
)	O
is	O
an	O
IP-based	O
protocol	O
that	O
allows	O
a	O
device	O
to	O
authenticate	O
itself	O
with	O
a	O
network	O
to	O
be	O
granted	O
access	O
.	O
</s>
<s>
PANA	O
will	O
not	O
define	O
any	O
new	O
authentication	B-Protocol
protocol	I-Protocol
,	O
key	O
distribution	O
,	O
key	O
agreement	O
or	O
key	O
derivation	O
protocols	O
;	O
for	O
these	O
purposes	O
,	O
EAP	O
will	O
be	O
used	O
,	O
and	O
PANA	O
will	O
carry	O
the	O
EAP	O
payload	O
.	O
</s>
<s>
EAP	O
was	O
originally	O
an	O
authentication	O
extension	O
for	O
the	O
Point-to-Point	B-Protocol
Protocol	I-Protocol
(	O
PPP	O
)	O
.	O
</s>
<s>
PPP	O
has	O
supported	O
EAP	O
since	O
EAP	O
was	O
created	O
as	O
an	O
alternative	O
to	O
the	O
Challenge-Handshake	B-Protocol
Authentication	I-Protocol
Protocol	I-Protocol
(	O
CHAP	O
)	O
and	O
the	O
Password	B-Protocol
Authentication	I-Protocol
Protocol	I-Protocol
(	O
PAP	B-Protocol
)	O
,	O
which	O
were	O
eventually	O
incorporated	O
into	O
EAP	O
.	O
</s>
