EAP-PEAP/OTP

What is Expansion of EAP-PEAP/OTP?

EAP-PEAP/OTP stands for Extensible Authentication Protocol – Protected Extensible Authentication Protocol with One-Time Password as inner authentication.

What is EAP-PEAP/OTP?

EAP-PEAP/OTP is an authentication protocol where EAP is encapsulated within a secure TLS tunnel and uses a One-Time Password (OTP) method inside the tunnel for user authentication.

Why is EAP-PEAP/OTP useful?

  • Protects OTP credentials using TLS encryption.

  • Avoids exposing OTP to eavesdroppers.

  • Server certificate ensures trusted communication.

  • Suitable for two-factor authentication setups.

  • Flexible and widely supported.

How it works?

  • Phase 1: TLS tunnel established using server certificate.

  • Phase 2: Client sends OTP credential inside encrypted tunnel.

  • Server validates OTP using backend (e.g., RADIUS with OTP module).

  • Upon success, session keys are derived for secure communication.

Where is EAP-PEAP/OTP used?

  • Enterprise Wi-Fi networks requiring strong authentication.

  • VPN access with time-based OTP (TOTP/HOTP).

  • Environments with MFA/2FA policies using OTPs.

Which OSI layer does this protocol belong to?

  • Application Layer (Layer 7).

  • EAP is encapsulated within TLS and transmitted over network transport.

Is EAP-PEAP/OTP Windows specific?

  • No, it is platform-independent.

  • Windows can support OTP-based PEAP with appropriate RADIUS server configuration.

Is EAP-PEAP/OTP Linux specific?

  • No, supported on Linux using tools like wpa_supplicant and FreeRADIUS with OTP modules (e.g., Google Authenticator, OPIE).

Which Transport Protocol is used by EAP-PEAP/OTP?

  • EAP over: * EAPOL (Ethernet) * RADIUS (UDP) * Diameter (TCP/SCTP)

Which Port is used by EAP-PEAP/OTP?

  • RADIUS: UDP port 1812

  • Diameter: TCP port 3868

Is EAP-PEAP/OTP using Client server model?

  • Yes.

  • Client (supplicant) communicates with authentication server via authenticator.

Whether EAP-PEAP/OTP protocol uses certificates?

  • Yes, server certificates are mandatory to establish the TLS tunnel.

  • Client certificates are not required for OTP authentication.

How many frame exchanges are seen during connection for EAP-PEAP/OTP protocol?

  • Around 10–12 EAP message exchanges depending on TLS handshake and OTP exchange.

Whether EAP-PEAP/OTP Protocol uses client certificates?

  • No, OTP-based authentication does not require client certificates.

Whether EAP-PEAP/OTP Protocol uses Server Certificates?

  • Yes, a valid server certificate is required to establish the TLS tunnel.

Does EAP-PEAP/OTP Protocol depend on TCP?

  • Indirectly, if Diameter is used as backend.

  • EAP and PEAP themselves are transport agnostic.

Does EAP-PEAP/OTP Protocol depend on UDP?

  • Yes, commonly uses RADIUS over UDP.

What are the roles involved when testing EAP-PEAP/OTP Protocol?

  • Supplicant (client)

  • Authenticator (e.g., Access Point)

  • Authentication Server (e.g., FreeRADIUS with OTP module)

  • Certificate Authority (for server certificate)

Does EAP-PEAP/OTP Protocol work with FreeRADIUS server on Linux?

  • Yes, FreeRADIUS supports EAP-PEAP and can integrate with OTP plugins.

Does EAP-PEAP/OTP Protocol work with internal RADIUS server of hostapd?

  • No, hostapd’s internal RADIUS server lacks full support for EAP-PEAP and OTP methods.

What is the RFC version used for EAP-PEAP/OTP Protocol?

  • PEAP is defined in drafts (e.g., draft-kamath-pppext-peapv0).

  • OTP mechanisms follow RFC 2289 (OPIE) or proprietary implementations (e.g., TOTP via RFC 6238).

During Connection Procedure which EAPOL Packets are encrypted?

  • EAPOL packets are not encrypted by themselves.

  • Inner OTP authentication is encrypted inside the TLS tunnel.

Can you Explain different stages of Connection Procedure for EAP-PEAP/OTP Protocol?

  • Client sends EAP identity.

  • Server initiates TLS handshake.

  • TLS tunnel is established with server certificate.

  • Client submits OTP inside TLS tunnel.

  • Server validates OTP using backend (e.g., RADIUS + Google Authenticator).

  • If successful, EAP Success is sent and session keys are derived.

What is the final output of Connection Procedure?

  • Generation of Master Session Key (MSK) and Extended MSK (EMSK).

What is the format of the key generated after the connection procedure?

  • MSK: 64 bytes (512 bits)

  • EMSK: 64

  • In this section, you are going to learn

  • Terminology

  • Version Info

  • rfc details

  • setup

  • setup

  • setup

  • packet details

  • usecases

  • features

  • Reference links