Router Charts

Router Charts

Router Ranker

Router Ranker

Router Chooser

Router Chooser

NAS Charts

NAS Charts

NAS Ranker

NAS Ranker

More Tools

More Tools

Wireless How To

Introduction

FreeRadius - Get it?

Authentication is an essential part of securing any service or network, and one of the heavyweights of network authentication is RADIUS. RADIUS, which is an acronym for "Remote Authentication Dial In User Service", is a network authentication protocol that widely implemented for a number of different services.

According to Wikipedia, RADIUS was originally specified in an RFI by Merit Network in 1991 to control dial-in access to NSFnet. Livingston Enterprises was awarded the contract and delivered their PortMaster series of Network Access Servers and the initial RADIUS server to Merit. RADIUS was published as RFC 2058 in 1997 and RFC 2059 (current versions are RFC 2865 and RFC 2866).

Among its many uses, RADIUS is used by the 802.1X security standard, which is incorporated into the WPA and WPA2 wireless security protocols. But home and small business networks frequently use the PSK (Pre-Shared Key) form of WPA and WPA2, since those versions don't require the RADIUS server that most of us don't have access to. But many users don't use strong WPA passwords, which leaves their wireless LANs open to being compromised via dictionary attacks.

In this two-part series I'll show you how to use the most popular (and free) RADIUS server, FreeRADIUS, with your wireless router or AP that supports WPA or WPA2 "Enterprise". This installment will provide some background on the methods, standards and protocols used.

Why Authentication?

Encryption is obviously an important part of security. But why is authentication so important as well? Consider the following situation:

You're at a coffee shop, surfing the Internet connected to its AP. But then all of a sudden, you lose connection to the AP. No problem. Wireless can be ornery at times and sometimes the wireless signal just gets disrupted, right? You reconnect, and start surfing again. If you're running Windows, it probably spewed forth a mountain of re-authentication packets in an attempt to reconnect you to the AP. But how do you know that the AP you reconnected to is who it claims to be?

Generally we just assume that an AP belongs to its obvious owner. But the scenario above could be the start to a classic "man-in-the-middle" attack. In this exploit, the attacker deauthenticates a wireless client, then masquerades as the AP. The new AP then proxies all the client's traffic through the attacker's computer, reading everything the client sends and receives—including secure webpages.

So authentication provides a two-way benefit. It lets a service provider confidently identify users in order to grant network access only to authorized personnel. But it also provides users with the security of knowing that they are really connecting to the intended network.

Amazon Top-Selling Wireless Routers

More Wireless

Win This!

TP-LINK Archer C9 AC1900 Router

 

You could win a TP-LINK Archer C9 AC1900 Router

Learn How!

Top Performing Routers

AC3200
AC2350
AC1900
AC1750
AC1200

Top Performing NASes

NoRAID
RAID1
RAID5

Over In The Forums

Hi I have Asus N66 sitting between the comcast modem and the server, which actually handles DHCP. So the N66 is really just acting as a WAP. The cables go in...
Highlights of this release: Official support for the RT-N16 is being dropped. This last model based on SDK5 requires too much efforts to maintain. New features such as the...
I am opening this thread to start a discussion on how Smart Connect Rues can be adjusted. I have spent some time trying different things and have come up...
One thing I really miss from Tomato that I wish were available in Asuswrt-Merlin is the ability to show recently visited web sites and web searches (Under Status->Web Usage). It...
Good morning, I've been living off of cellular internet for over a year. Where I am located, the options are limited - DSL (which maxes out at 1.3 Mbps down)...