Okta's cloud-based authentication gives users high-assurance with simple-to-use factors like biometrics and push notifications.
Updated: 08/27/2024 - 4:46 Time to read: 5 minutesPAP, or password authentication protocol, is a point-to-point protocol (PPP) authentication method that uses passwords to validate users. It is an internet standard (RFC 1334), password-based authentication protocol.
Using PAP, data is not encrypted. It is sent to the authentication server as plain text. PAP uses a two-way handshake to authenticate users based on their provided username and password.
When used in PPP, the password authentication protocol is considered a weak authentication scheme. Since data is unencrypted, it is vulnerable and visible to a bad actor who is able to view the PPP session.
Using CHAP (challenge-handshake authentication protocol) can add an extra layer of security to the PPP session by adding a three-way handshake process. PAP is a standard login procedure used as a PPP method for authenticating users.
A PPP authentication method, password authentication protocol is a password-based, client-server authentication protocol. It is easy to implement and a simple authentication method.
Using a two-way handshake, PAP authenticates users in two steps, which are as follows:
The password authentication protocol sends data in plain text, which can then be vulnerable to packet sniffer attacks where bad actors intercept network traffic, are able to view the PPP session, and can steal usernames and passwords. There are ways to send PAP authentication requests through encrypted channels, but alternative methods such as CHAP are often used instead.
With PAP, instead of the server sending a login request prompt and then waiting for the user to respond, the username and password are sent to a remote access server in an LCP (link control protocol) packet. Some uses for PAP include the following:
PAP uses a two-way handshake process where the client sends their credentials to the server, the server verifies them, and the user is authenticated. CHAP uses a three-way handshake process. This adds an extra layer of security in the authentication process over password authentication protocol, helping to protect credentials from bad actors.
CHAP was created to address security vulnerabilities within the PAP point-to-point authentication method.
Unlike PAP, CHAP does not send the password across the network. Instead, CHAP uses cryptographic methods, which include the use of an encrypted hash for which both the server and client have the secret key.
CHAP can also be set up to run authentications repeatedly mid-session to keep threat actors from picking up a PPP connection mid-session when a port has been left open after the remote device was disconnected. CHAP adds security features to the PPP session that PAP does not have.
The CHAP three-way handshake process works through the following three steps:
PPP can use either PAP or CHAP for authentication. While they cannot work directly together, protocols can interact with either. For example, an administrator can configure their communications protocol to try to authenticate using the more secure CHAP first, falling back to PAP when needed.
For details on the point-to-point protocol, see here. Check here for more information on the differences between PAP and CHAP, and here for information on how to edit the PPP path configuration file (ppp.conf).
CHAP is considered to be more secure than password authentication protocol. Whenever possible, CHAP should be enabled first with PAP as the backup.
PPP Authentication Protocols. (October 1992). Internet Engineering Task Force (IETF).