Combination of the PEAP Protocol with EAP-Openid Connect

Combination of the PEAP Protocol with EAP-Openid Connect

University of Piraeus Department of Digital Systems Postgraduate Program «Digital Systems Security» Academic Year 2017-2018 (ΨΣ-ΑΦ-888) – MSc Dissertation Combination of the PEAP Protocol with EAP-OpenID Connect Bolgouras Vaios MTE1624, [email protected] Supervisor Professor Dr. Xenakis Christos Piraeus, March 2018 Special Thanks to Dr. Xenakis and Dr. Dadoyan for their guidance and to my fellow student Panagioti Bountaka for his help. 2 Contents Contents ........................................................................................................................................................ 3 Table of Figures ............................................................................................................................................. 4 Abstract ......................................................................................................................................................... 5 Introduction .................................................................................................................................................. 6 EAP - OpenID Connect Foundations ............................................................................................................. 6 OAuth 2.0 .................................................................................................................................................. 6 Authorization Grant .............................................................................................................................. 8 Authorization Code Flow................................................................................................................... 8 Implicit .............................................................................................................................................. 9 Resource Owner Password Credentials .......................................................................................... 10 Client Credentials ............................................................................................................................ 11 OpenID Connect ...................................................................................................................................... 11 Authorization Code Flow..................................................................................................................... 12 Implicit Flow ........................................................................................................................................ 14 Hybrid Flow ......................................................................................................................................... 15 ID Token .............................................................................................................................................. 15 Anatomy of a JSON Web Token (JWT) ............................................................................................ 15 Header ......................................................................................................................................... 16 Payload ........................................................................................................................................ 16 Signature ..................................................................................................................................... 17 Extensible Authentication Protocol (EAP) ............................................................................................... 17 Protected EAP (PEAP) .............................................................................................................................. 18 EAP-OIDC .............................................................................................................................................. 20 HTTP .................................................................................................................................................... 20 Encapsulating HTTP ............................................................................................................................. 21 Remote Dial in User Service (RADIUS) .................................................................................................... 21 RADIUS Packet Format...................................................................................................................... 22 EAP Encapsulation in RADIUS ............................................................................................................. 22 OpenAM ...................................................................................................................................................... 23 Related Work .............................................................................................................................................. 26 Eduroam .................................................................................................................................................. 26 Captive Portal .......................................................................................................................................... 27 3 WPA2 / 802.1X Authentication ............................................................................................................... 28 Motivation................................................................................................................................................... 28 Contribution ................................................................................................................................................ 29 Analysis as a Use Case ................................................................................................................................. 29 The Scenario ............................................................................................................................................ 29 PEAP with EAP-OIDC ............................................................................................................................... 31 Benefits/Advantages ................................................................................................................................... 31 Possible Drawbacks ..................................................................................................................................... 32 Conclusion ................................................................................................................................................... 33 References .................................................................................................................................................. 33 Table of Figures Figure 1: OAUTH2.0 overview ....................................................................................................................... 7 Figure 2: Authorization Code Flow................................................................................................................ 8 Figure 3: Implicit Flow ................................................................................................................................. 10 Figure 4: Authorization Code Flow.............................................................................................................. 12 Figure 5: Implicit Flow ................................................................................................................................. 14 Figure 6: EAP Packet Format ....................................................................................................................... 18 Figure 7: PEAP Packet Format ..................................................................................................................... 19 Figure 8: PEAP ............................................................................................................................................. 19 Figure 9: Radius Packet .............................................................................................................................. 22 Figure 10:OpenAM Social Authentication & Options................................................................................ 24 Figure 11: Configure Client Credentials .................................................................................................... 24 Figure 12:OpenAM Authentication Modules & Google Social Authentication Edit Page ........................ 25 Figure 13: OpenAM Login Page & Google 's Login Page ......................................................................... 25 Figure 14:OpenAM Profile Page ................................................................................................................ 26 Figure 15: Eduroam Infrastructure ............................................................................................................. 26 Figure 16: TLS Tunnel Establishment .......................................................................................................... 30 Figure 17: Overview of PEAP with OIDC ..................................................................................................... 31 Figure 18: Encapsulation Overview............................................................................................................. 33 4 Abstract Connecting to a wireless network in most cases requires either a password or a certificate. Enabling authentication

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    34 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us