Wireless Authentication using EAP-TLS Protocol

Wireless Authentication using EAP-TLS Protocol

  • #wireless
  • #security
- Last updated on

Extensible Authentication Protocol-Transport Layer Security 

It’s well defined by the RFC 5216 as the most secure EAP standard available, EAP-TLS requires mutual certificate-based and key derivation in order to authenticate the supplicants, both “Supplicants and the Authentication server” will verify their identities and they must agree to succeed.

On the other hand, it’s a complete challenge to maintain a PKI infrastructure & manage client certs.

wireless packet capture

Let’s take a look at the following wireless packet capture that shows the entire process, the source MAC address: Alfa is the supplicant, and the MAC address ending: 37:b1 represents the Authenticator.

mac address in packet capture

Now, let’s take a look into the interesting frames there:

EAPOL Frame

Right after the 802.11 link negotiation, the supplicant sends an (optional) EAPOL frame to start the authentication.

optional EAPOL sent

Identity Request

The authenticator responds by requesting the identity of the supplicant.

EAPOL identity request

Identity Response 

The supplicant responds with an “identity response frame”, and the Authenticator will forward the frame, and encapsulated it in a Radius request packet to the Authenticator Server.

indentity response

EAP-TLS Start

The Authenticator Server sends a Radius challenge to the supplicant, the Authenticator receives the challenge and translate it in an EAP-TLS start frame.

EAP start

Client Hello

Supplicant sending a client hello to the server.

client hello

Server Hello 

The Authenticator Server will send a server hello to the supplicant accompanied with a server certificate, a certificate request, and Server key exchange.

server hello

Client Certificate

The supplicant sends to the Authenticator server its certificate, the supplicant will verify the previous server certificate and it will change the cipher spec.

server certificate sent

Sever Changing the Cipher Spec

The Authenticator server will reply to the supplicant changing the cipher spec as well.

cipher change by supplicant

Supplicant EAP-Response

The supplicant responds and accepts the cipher change from the Authenticator Server.

supplicant validation

EAP-Success or failure 

Depending on the case you will see the last frame regarding the EAP process as a success or failure.

EAP process result

4-Way Handshake

After sending the EAP Success Frame, the Authenticator will start the 4-way handshake using EAPOL protocol, and it will attempt to establish an encrypted session with the supplicant.

4-way handshake

If you want to run a test in your lab, the following link will provide some steps to play around with EAP-TLS.

As always, I hope that my short experience can answer any doubt during your CWDP journey, please stay safe, and protect yourself and others from Coronavirus (COVID-19)

Copyright © 2024 Darwin Castro