Learn how CHAP improves authentication over PPP using a secure challenge-response process and protects against replay attacks.
Challenge-Handshake Authentication Protocol (CHAP) was standardized by the Internet Engineering Task Force to âperiodically verify the identity of the peer using a three-way handshake.â It was originally designed for dial-up and WAN links using point-to-point protocol (PPP), but the same challenge-response pattern is still used in RADIUS, PPPoE, and various vendor implementations.
CHAP is a challenge-response method defined in IETF RFC 1994 for PPP links: the authenticator sends a random challenge, the peer returns a hash computed from the challenge, an identifier, and a shared secret, and the authenticator verifies before replying success or failure
CHAP isnât just a one-time login. Itâs designed to maintain trust throughout the life of a PPP connection. Once the protocol is negotiated, CHAP introduces a repeatable handshake that keeps both sides confident the peer is who they claim to be.
Hereâs the typical flow inside a PPP session:
Replay resistance comes from unpredictable challenges and the fact that only the digest crosses the wire, aligning with NISTâs guidance on replay attack resistance.
Hereâs a concrete walk-through of CHAP in action:
This âchallenge-responseâ deters simple replay attacks, since an intercepted response will not validate against a new challenge.
While CHAP has clear strengths, its trade-offs become apparent when compared against both its predecessor and more modern alternatives. Understanding these advantages and limitations helps explain why CHAP still appears in some environments but has been replaced in others.
Where PAP is straightforward, but highly exposed, CHAP adds a layer of protection by never sending the actual password across the link.
Here are the key contrasts between CHAP and PAP:
Frontegg supports modern authentication flows that build on the same challenge-response principles introduced by CHAP. Instead of passwords being sent directly, every request is validated through secure exchanges that resist replay attacks and credential theft.
This means product, security, and customer-facing teams get confidence that authentication events are verified in real time, without depending on engineering to configure or troubleshoot legacy protocols.
With support for advanced policies, role-based access controls, and audit logs, Frontegg ensures authentication is both secure and easy to manage. Teams get the visibility they need to enforce compliance, reduce risk, and keep users protected.