Just when you thought the Winter Solstice, Hanukkah, Kwanzaa or Christmas couldn’t get any better, Healthy Paranoia’s Mrs. Y rustles up some wireless experts for an episode on 802.1X!
Joining the Packetpushers Posse:
- Matthew “Rowdy” Gast, author of multiple O’Reilly books and chair of the security task group at the Wi-Fi Alliance.
- “Buffalo” Blake Krone, CCIE-Wireless and host of the “No Strings Attached” podcast.
- Jennifer “Widowmaker” Huber, blogger and CWNE.
As usual, you’ll hear Greg Ferro prancing with unicorns, mocking storage protocols and ranting about Windows XP.
From the 802.1X IEEE standard,
This standard specifies the use of EAP, the Extensible Authentication Protocol (IETF RFC 3748), to support authentication using a centrally administered Authentication Server and defines EAP encapsulation over LANs (EAPOL, Clause 11) to convey the necessary exchanges between peer PAEs (Port Access Entity) attached to a LAN.
From EAP RFC 3748,
Extensible Authentication Protocol, an authentication framework which supports multiple authentication methods. EAP typically runs directly over data link layers such asPoint-to-Point Protocol (PPP) or IEEE 802, without requiring IP. EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees. EAP encapsulation on IEEE 802 wired media is described in [IEEE-802.1X], and encapsulation on IEEE wireless LANs in [IEEE-802.11i].