70 likes | 135 Views
TEAM is a robust authentication method derived from PEAP, offering enhanced security features like identity protection, ciphersuite negotiation, and dictionary attack protection. It provides fast reauthentication, cryptographic channel binding, and acknowledged success/failure indications. TEAM is compliant with WLAN authentication standards and easily customizable. No backward compatibility issues, ensuring security and flexibility. Join TEAM for a secure authentication experience today!
E N D
The Tunneled Extensible Authentication Method (TEAM) Glen Zorn Network Zen
TEAM Overview • Derived from Protected Extensible Authentication Protocol (PEAP) • Typical TLS-tunneled EAP protocol with a few twists • TLVs • including vendor-specific TLV support • “Built-in” facilities • Certificate installation • Plain-text password authentication & change
TEAM Features • Identity protection • Ciphersuite negotiation • Mutual authentication • Replay protection • Integrity protection • Confidentiality • Secure key derivation • Dictionary attack protection
TEAM Features (2) • Fast reauthentication • Cryptographic channel binding • Acknowledged success & failure indications • Session independence • Fragmentation • State syncronization
TEAM Advantages • The TEAM is unconditionally compliant with the requirements for WLAN authentication mechanisms, as specified in RFC 4017 • As of today, TEAM fulfills 90+% of the requirements specified in draft-ietf-emu-eaptunnel-req-08 • Easily customizable to be unconditionally compliant
TEAM Advantages (2) • No issues with backward-compatibility • Zero installed base • No existing implementations • But based upon a widely available code base • Complete IETF change control • No external pressures • Known & understood technology • Secure • Highly flexible