<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.sarg.dev/index.php?action=history&amp;feed=atom&amp;title=Lightweight_Extensible_Authentication_Protocol</id>
	<title>Lightweight Extensible Authentication Protocol - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.sarg.dev/index.php?action=history&amp;feed=atom&amp;title=Lightweight_Extensible_Authentication_Protocol"/>
	<link rel="alternate" type="text/html" href="https://wiki.sarg.dev/index.php?title=Lightweight_Extensible_Authentication_Protocol&amp;action=history"/>
	<updated>2026-04-17T20:05:40Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.44.2</generator>
	<entry>
		<id>https://wiki.sarg.dev/index.php?title=Lightweight_Extensible_Authentication_Protocol&amp;diff=533592&amp;oldid=prev</id>
		<title>imported&gt;Sauer202 at 10:50, 18 March 2022</title>
		<link rel="alternate" type="text/html" href="https://wiki.sarg.dev/index.php?title=Lightweight_Extensible_Authentication_Protocol&amp;diff=533592&amp;oldid=prev"/>
		<updated>2022-03-18T10:50:33Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Lightweight Extensible Authentication Protocol&amp;#039;&amp;#039;&amp;#039; (&amp;#039;&amp;#039;&amp;#039;LEAP&amp;#039;&amp;#039;&amp;#039;) is a proprietary wireless LAN authentication method developed by [[Cisco Systems]].  Important features of LEAP are dynamic [[Wired Equivalent Privacy|WEP]] keys and [[mutual authentication]] (between a wireless client and a [[RADIUS]] server).  LEAP allows for clients to re-authenticate frequently; upon each successful authentication, the clients acquire a new WEP key (with the hope that the WEP keys don&amp;#039;t live long enough to be cracked). LEAP may be configured to use TKIP instead of dynamic WEP.&lt;br /&gt;
&lt;br /&gt;
Some 3rd party vendors also support LEAP through the Cisco Compatible Extensions Program.&amp;lt;ref&amp;gt;{{cite web|title=Cisco Compatible Extensions Program|url= http://www.cisco.com/web/partners/pr46/pr147/partners_pgm_concept_home.html |publisher= Cisco |accessdate=2008-02-22}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
An unofficial description of the protocol is available.&amp;lt;ref&amp;gt;{{cite web |last1=MacNally |first1=Cameron |title=Cisco LEAP protocol description |url=http://www.missl.cs.umd.edu/wireless/ethereal/leap.txt |archiveurl=https://web.archive.org/web/20070623090417/http://www.missl.cs.umd.edu/wireless/ethereal/leap.txt |archivedate=23 June 2007 |date=6 September 2001 |access-date=11 August 2019 |url-status=dead }}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Security considerations ==&lt;br /&gt;
Cisco LEAP, similar to [[Wired Equivalent Privacy|WEP]], has had well-known security weaknesses since 2003 involving offline [[password cracking]].&amp;lt;ref&amp;gt;{{cite web| title = Cisco LEAP dictionary password guessing|url=http://xforce.iss.net/xforce/xfdb/12804|publisher= ISS |accessdate=2008-03-03}}&amp;lt;/ref&amp;gt;  LEAP uses a modified version of [[MS-CHAP]], an [[authentication]] protocol in which user credentials are not strongly protected.  Stronger authentication protocols employ a [[salt (cryptography)|salt]] to strengthen the credentials against eavesdropping during the authentication process. Cisco&amp;#039;s response to the weaknesses of LEAP suggests that network administrators either force users to have stronger, more complicated [[passwords]] or move to another authentication protocol also developed by Cisco, [[EAP-FAST]], to ensure security.&amp;lt;ref&amp;gt;{{cite web|title=Cisco Security Notice: Dictionary Attack on Cisco LEAP Vulnerability |url=http://www.cisco.com/warp/public/707/cisco-sn-20030802-leap.shtml |publisher=Cisco |accessdate=2008-02-22 |url-status=dead |archiveurl=https://web.archive.org/web/20080509070724/http://www.cisco.com/warp/public/707/cisco-sn-20030802-leap.shtml |archivedate=2008-05-09 }}&amp;lt;/ref&amp;gt;  Automated tools like ASLEAP demonstrate the simplicity of getting unauthorized access in networks protected by LEAP implementations.&amp;lt;ref&amp;gt;{{cite web|title=asleap|url= http://www.willhackforsushi.com/?page_id=41| publisher= Joshua Wright | accessdate = 2018-01-09}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
{{Reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cisco protocols]]&lt;br /&gt;
[[Category:Wireless networking]]&lt;/div&gt;</summary>
		<author><name>imported&gt;Sauer202</name></author>
	</entry>
</feed>