CWSP - Wireless Security
CWSP - Wireless Security
≈ 3 Comments
Tags
EAP, EAP-FAST
EAP-FAST (Flexible Authentication via Secure Tunneling) initially developed by Cisco. Later in 2007, IETF
ratified this in RFC 4851. Cisco developed this as replacement for LEAP. EAP-FAST provide both mutual
authentication & tunnelled authentication without using standard based X.509 digital certificate to create TLS
tunnels, instead use PACs (Protected Access Credentials)
Below shows the EAP-FAST process diagram (page 155-CWSP Official Study Guide) which consist of 3
phases.
https://mrncciew.com/2014/08/26/cwsp-eap-fast/ 1/11
26/04/2023, 18:01 CWSP- EAP FAST | mrn-cciew
https://mrncciew.com/2014/08/26/cwsp-eap-fast/ 2/11
26/04/2023, 18:01 CWSP- EAP FAST | mrn-cciew
EAP-FAST Phase-1 process start with Authenticator sends an “Identity Request” frame to supplicant (step 4a).
Then supplicant respond with “Identity Response” with outer identity detail in cleartext (step 4b). In here
Supplicant use “anonymous” as Identity which is not real username.
https://mrncciew.com/2014/08/26/cwsp-eap-fast/ 3/11
26/04/2023, 18:01 CWSP- EAP FAST | mrn-cciew
Then Authenticating Server send the EAP-FAST start message. (step 6). Note that EAP type is 43 which is
EAP-FAST.
Below diagram(source) shows the details packet flow of rest of phase 1 (step 7 & 8 of process diagram).
https://mrncciew.com/2014/08/26/cwsp-eap-fast/ 4/11
26/04/2023, 18:01 CWSP- EAP FAST | mrn-cciew
Then supplicant start sending client PAC (Protected Access Credential) information starting with Client Hello.
https://mrncciew.com/2014/08/26/cwsp-eap-fast/ 5/11
26/04/2023, 18:01 CWSP- EAP FAST | mrn-cciew
Then Supplicant send “Change Cipher Spec” frame to AS to complete the TLS tunnels establishment part (step
8).
https://mrncciew.com/2014/08/26/cwsp-eap-fast/ 6/11
26/04/2023, 18:01 CWSP- EAP FAST | mrn-cciew
That point onwards all EAP frame exchange will be TLS encrypted. Phase 2 start with Identity Request &
Identity Response where real username is send inside TLS tunnel. Here are those 2 frames.
https://mrncciew.com/2014/08/26/cwsp-eap-fast/ 7/11
26/04/2023, 18:01 CWSP- EAP FAST | mrn-cciew
Then two more EAP-Request & Response frame exchange in optional PAC refresh.
https://mrncciew.com/2014/08/26/cwsp-eap-fast/ 8/11
26/04/2023, 18:01 CWSP- EAP FAST | mrn-cciew
EAP-FAST phase 2 is ends with Successful result communicate to Supplicant & Supplicant send ACK for
within TLS tunnel. Here are those two frames in my capture.
Once the above frame exchanged, TLS tunnel torn down & RADIUS Accept is coming from AS. Then
Authenticator will pass it to Supplicant as normal EAP-Success frame (step 13)
Note that when using Automatic PAC provisioning, it is subject to man in the middle attack where supplicant
simply trust anyone who provide PAC. If you install PAC manually on client side you can overcome this, but it
becomes administrative burden.
Reference
1. EAP-FAST-7921 sample packet capture.
2. CWSP Official Study Guide – Chapter 4
https://mrncciew.com/2014/08/26/cwsp-eap-fast/ 9/11
26/04/2023, 18:01 CWSP- EAP FAST | mrn-cciew
Related Posts
1. CWSP- EAP Basics
2. CWSP- EAP PEAP
3. CWSP- EAP LEAP
4. CWSP- EAP TLS
5. CWSP- EAP TTLS
6. CWSP- EAP MD5
1. said:Narendar
Hi Rasika,
Here is my problem ,
I am using Eap -peap ,Mschapv2 for authentication.
wireshark capture based on tcpdump shows that the server hello message (comprising of Server Hello,
Certificate, Server Key Exchange, Certificate Request, Server Hello Done) is sent as 5 fragments as the
length of the message is large.
The large size is mainly due to the certificate request message sent from NPS
the NPS sends 5 fragments of size 1286,1290,1290,1290,488
Howeverwpa_supplicant is able to read only 3 fragments(ignoring header) of size 1286 1290,1290 and the
4th fragment 1107 bytes
My questions are :
1.What might be the route cause for this. Checked Framed MTU value and its < 1344.
2. if we are using peap -mschapv2 ,why server is requesting for certficate .(distingueshed name length =
2048 bytes)
3. When i try with other NPS with selfsigned certs. everything is working fine eventhough server is
requesting for certs.(but here distingueshed name length =0)
4. How to get distingueshed names in capture.
REPLY
2. said:chaitanya
From the article above PAC can be pre-shared manually between supplicant and authentication server or it
can be exchanged automatically.
i.e. EAP-FAST fails initially because a PAC is exchanged and a EAP-FAST is initiated again. Is my
understanding correct ?
https://mrncciew.com/2014/08/26/cwsp-eap-fast/ 10/11
26/04/2023, 18:01 CWSP- EAP FAST | mrn-cciew
REPLY
3. said:praveen
Please share the wpa_supplicant configuration file to connect by outer method ‘EAP-MD5’
REPLY
Blog at WordPress.com.
https://mrncciew.com/2014/08/26/cwsp-eap-fast/ 11/11