IEEE 802.1X

IEEE 802.1X is an IEEE Standard for port-based network access control (PNAC). It is part of the IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN.

The standard directly addresses an attack technique called Hardware Addition [1] where an attacker posing as a guest, customer or staff smuggles a hacking device into the building that they then plug into the network giving them full access. A notable example of the issue occurred in 2005 when a machine attached to Walmart's network hacked thousands of their servers.[2]

IEEE 802.1X defines the encapsulation of the Extensible Authentication Protocol (EAP) over wired IEEE 802 networks[3] and over 802.11 wireless networks,[4] which is known as "EAP over LAN" or EAPOL.[5] EAPOL was originally specified for IEEE 802.3 Ethernet, IEEE 802.5 Token Ring, and FDDI (ANSI X3T9.5/X3T12 and ISO 9314) in 802.1X-2001,[6] but was extended to suit other IEEE 802 LAN technologies such as IEEE 802.11 wireless in 802.1X-2004.[7] The EAPOL was also modified for use with IEEE 802.1AE ("MACsec") and IEEE 802.1AR (Secure Device Identity, DevID) in 802.1X-2010[8][9] to support service identification and optional point to point encryption over the internal LAN segment.

  1. ^ "Hardware Additions, Technique T1200". attack.mitre.org. 2018-04-18. Retrieved 2024-04-10.
  2. ^ Zetter, Kim. "Big-Box Breach: The Inside Story of Wal-Mart's Hacker Attack". Wired. ISSN 1059-1028. Retrieved 2024-02-07.
  3. ^ "EAP Usage Within IEEE 802". Extensible Authentication Protocol (EAP). sec. 3.3. doi:10.17487/RFC3748. RFC 3748.
  4. ^ "Link Layer". Extensible Authentication Protocol (EAP). sec. 7.12. doi:10.17487/RFC3748. RFC 3748.
  5. ^ IEEE 802.1X-2001, § 7
  6. ^ IEEE 802.1X-2001, § 7.1 and 7.2
  7. ^ IEEE 802.1X-2004, § 7.6.4
  8. ^ IEEE 802.1X-2010, page iv
  9. ^ IEEE 802.1X-2010, § 5

© MMXXIII Rich X Search. We shall prevail. All rights reserved. Rich X Search