ALL >> Business >> View Article
Designing Secure Communications
The following user authentication information should be considered 70-291 Exam in making authentication choices:
User authentication is via PPP authentication protocols. Password authentication protocol (PAP), which sends a plain-text password across the network, is very rarely used.
Challenge Handshake Authentication Protocol (CHAP) uses the MD5 hashing protocol to encrypt challenge strings. Only the user name crosses the network in plaintext. The server must store a plain-text copy of the password, or store the password using a reversible encryption algorithm, as is the case in Windows Server2003. CHAP is generally used only when UNIX clients are present.
Microsoft CHAP (MS-CHAP) uses an MD4 hash, and the server can store a hashed password. The protocol provides more sophisticated error messages—including a
password-expired error code, which then provides the ability to change a password during the authentication phase. The client and server independently create
the encryption key MS CHAP requires for MPPE encryption based on the user's password. MCSA Certification ...
... should be used only if you have Windows 95 clients.
MS CHAPv2 provides for mutual authentication—both client and server identify that each have knowledge of the user's password. Two encryption keys are used:
one for sending text and the other for receiving text. As with MS-CHAP, the encryption keys are based on the user's password. Consequently, the strength of
the encryption key is directly proportional to the strength of the user's password.
Extensible Authentication Protocol (EAP) is an IETF (RFC 2284) extension to PPP.A choice of authentication algorithms known as EAP types can be made.
EAP is negotiated during the authentication phase of PPP.Because EAP allows arbitrary authentication mechanisms for PPP authentication,the dynamic addition of authentication component modules is supported. This means vendors can supply new authentication protocols at any time.
When new,stronger authentication processes are identified, the PPP protocol does not have to be rewritten the vendor simply write an EAP type that is compatible with PPP.
O EAP-TLS is based on a public-key certificate and enables mutual authentica-tion between the client and server computers that make up the VPN connec-tion. Before data can be transmitted, a client certificate must be provided to and validated by the dial-in server and the server must provide its own, which must be validated by the client. EAP-TLS can be used with PPTP. In this case, the server must have a Network+ certification, but the client computers do not require one. User certificates can be installed on client computers or smart cards.
Add Comment
Business Articles
1. Why High Quality Wrench Tools Matter For Every Professional TechnicianAuthor: Chrishjordan
2. Affordable Minibus Rental | Safe & Comfortable Group Travel
Author: Pakistan China Cargo
3. Lead Recycling Plant Manufacturer
Author: mettherm inc
4. What Are The Safety Precautions For Handling Calcium Hydroxide?
Author: Shaurya Minerals
5. Narang Group: Pioneering Innovation, Quality & Growth Across Sectors
Author: Narang Group Ltd
6. Spinal Decompression Therapy For Chronic Spine Pain Relief
Author: ajay
7. Top Bpo Outsourcing Company In Noida | Best Bpo Solutions By Zoetic Bpo Services
Author: mohan
8. Why Businesses Require Esg And Environmental Sustainability Consulting Services In Dubai For Sustained Growth
Author: sweta
9. Achieve Certification With Assurance: Collaborate With The Best Iso Certification Company In Ksa
Author: Riya
10. Unlocking Software Quality: Why Software Testing Consultancy And Quality Acceptance Testing (qat) Matter For Modern Businesses
Author: kohan
11. Assault Lawyer Milton, Newmarket, And North York: Local Defence For Serious Allegations
Author: michellumb44
12. Criminal Lawyer Vaughan And Assault Lawyers In Markham And Midland: Local Defence You Can Rely On
Author: michellumb44
13. Criminal Lawyer North York, Ottawa, And Toronto: Local Defence For Serious Charges
Author: michellumb44
14. Criminal Lawyer Midland, Milton, And Newmarket: Local Defence When Your Future Is At Risk
Author: michellumb44
15. Criminal Lawyer Brampton, Hamilton, And Markham: Your Local Defence For Serious Charges
Author: michellumb44






