⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 draft-beaulieu-ike-xauth-02.txt

📁 ipsec vpn
💻 TXT
📖 第 1 页 / 共 4 页
字号:
7. XAUTH Notification   It is important the edge device be able to notify the remote device   of its intent to prompt for extended authentication.  If such a   mechanism were not present, the remote device would send a Quick   Mode message, or a Mode-Cfg message before authentication was   complete, and the state machines would get pretty complicated.   We present here two methods of accomplishing this.  The first is the   simplest, and most intuitive.  However it is not possible to achieve   this within the [IKE] protocol as it stands today, and is therefore   not recommended.  It has been added to this document for   completeness, and may be used in future versions of this document.7.1 Notification payloads within a phase 1 exchange   The following method is used to notify the remote device that an   XAUTH exchange will follow the phase 1 exchange.  Once the edge   device does a policy lookup for the peer, the edge device appends a   notify payload to any phase 1 exchange packet, indicating that an   XAUTH exchange will follow.  Note, that this notify payload is   unauthenticated unless both devices support the mechanisms described   in [KIV].  Therefore, implementations MUST NOT use this method   unless they are also using the mechanisms described in [KIV].Beaulieu, Pereira                                                   11       Extended Authentication with ISAKMP/Oakley October 2001   Once again, this method is not part of the XAUTH protocol in its   present form.  It has only been added here for completeness, and may   be used in future versions of this document.   No payload definitions, assigned numbers, or vendor ID payloads will   be provided for this method, as it is currently not part of the   XAUTH protocol.  These may be defined in the future if enough   interest is shown, and if [KIV] becomes a standardized within the   IPsec working group.7.2 Notification via Authentication Method Types   The following method is used to negotiate the use of XAUTH via the   SA payload.  New authentication methods are defined which allow the   edge device to choose an authentication method which mandates XAUTH.   This allows the edge device to notify the remote device that an   XAUTH exchange will follow the phase 1 exchange.  Edge devices which   conform to this document MUST support this method.   The following values relate to the ISAKMP authentication method   attribute used in proposals.  They optionally allow an XAUTH   implementation to propose use of extended authentication after the   initial phase 1 authentication.  Values are taken from the private   use range defined in [IKE] and should be used among mutually   consenting parties.  To ensure interoperability and avoid   collisions, a Vendor ID is provided in the "Vendor ID" section of   this document.    Method                                            Value   ------------------------------                     -----    XAUTHInitPreShared                                65001    XAUTHRespPreShared                                65002    XAUTHInitDSS                                      65003    XAUTHRespDSS                                      65004    XAUTHInitRSA                                      65005    XAUTHRespRSA                                      65006    XAUTHInitRSAEncryption                            65007    XAUTHRespRSAEncryption                            65008    XAUTHInitRSARevisedEncryption                     65009    XAUTHRespRSARevisedEncryption                     65010   An Extended Authentication proposal has two characteristics.   The first is the direction of the authentication.  Each type   identifies whether the Initiator or the Responder is the device   which should be authenticated using XAUTH.  For example   XAUTHInitPreShared is a type which demands that the Initiator be   authenticated.   Note that an edge device would typically initiate with one of the   following:Beaulieu, Pereira                                                   12       Extended Authentication with ISAKMP/Oakley October 2001   o XAUTHRespPreShared   o XAUTHRespDSS   o XAUTHRespRSA   o XAUTHRespRSAEncryption   o XAUTHRespRSARevisedEncryption   and would typically only accept proposals with the following   authentication methods:   o XAUTHInitPreShared   o XAUTHInitDSS   o XAUTHInitRSA   o XAUTHInitRSAEncryption   o XAUTHInitRSARevisedEncryption   The second characteristic is the IKE Authentication method to be   used.  The following table illustrates which keywords in the methods   described above relate to which Authentication Methods described in   [IKE] Appendix A.   "PreShared"            -> pre-shared key   "DSS"                  -> DSS signatures   "RSA"                  -> RSA signatures   "RSAEncryption"        -> Encryption with RSA   "RSARevisedEncryption" -> Revised encryption with RSA8. Other Scenarios for Extended Authentication   Although this document described a scenario where an IPsec host (eg.   mobile user) was being authenticated by an edge device (eg.   firewall/gateway), the methods described can also be used for edge   device to edge device authentication as well as IPsec host to IPsec   host authentication.9. Extensibility   Although this protocol was initially developed for the corporate   "Road Warrior" with a dynamic IP address to connect to a corporate   Net, there may be certain applications where static IP addresses are   used by the "Road Warrior" or where this protocol is used in a non   remote-user environment where the IP address is static.  There are   Security Considerations for certain applications of this protocol in   certain deployment scenarios.  Please consult the "Security   Considerations" section below for more detail.   [IKE] defines many different ways to authenticate a user and   generate keying material.  There are two basic phase 1 modes   defined: Main Mode and Aggressive Mode.  There are also at least 5   different authentication schemes which can be used with each mode.Beaulieu, Pereira                                                   13       Extended Authentication with ISAKMP/Oakley October 2001   New authentication schemes are being developed and surely more will   be standardized in the future.  Similarly new phase 1 modes are   being proposed to address weaknesses or missing functionality in   Main Mode and/or Aggressive mode.   It is for this reason that XAUTH was designed to be fully   extensible.  Since XAUTH extends the phase 1 authentication provided   by [IKE], it is an important design goal that a legacy user   authentication scheme in IPsec be able to use the strengths of   current and future authentication and key generation schemes.   XAUTH accomplishes this by working with all modes which allow the   negotiation of a phase 1 authentication method in ISAKMP.  Any new   authentication methods defined in the future which are not addressed   by this document need simply to take values from the "consenting   parties" ranges of [IKE].  Such an example would be the introduction   of Encryption with El-Gamal and Revised Encryption with El-Gamal,   and [HYBRID].  Furthermore, any new modes defined such as Base Mode,   will automatically be able to use the functionality of XAUTH as no   new numbers are needed.   Finally, any new or forgotten Legacy User Authentication Schemes   which are not part of XAUTH can be easily incorporated by taking   numbers from the "consenting parties" ranges of XAUTH, or by   requesting reserved numbers from IANA.10. Security Considerations   Care should be taken when sending sensitive information over public   networks such as the Internet.  A user's password should never be   sent in the clear and when sent encrypted, the destination MUST have   been previously authenticated.  The use of ISAKMP-Config [IKECFG]   addresses these issues.   The protocol described in this memo strictly extends the   authentication methods described in [IKE].  It does not in any way   affect the authenticated nature of the phase 1 security association.   In fact, this protocol heavily relies on the authenticated nature of   the phase 1 SA.  Without complete phase 1 authentication, this   protocol does not provide protection against man-in-the-middle   attacks.  Therefore it MUST NOT be used without normal phase 1   authentication.  This protocol was designed to be extensible, and   can be used in many possible combinations of phase 1 Modes and   authentication methods.  However, certain combinations of scenarios   could lead to weaker than desired security, and are therefore   discouraged.   When using XAUTH with Pre-Shared keys, where the peer's IP address   is dynamic, Main Mode SHOULD NOT be used, and is     STRONGLY   DISCOURAGED. In this particular scenario, the phase 1 authentication   becomes suspect as the administrator has little choice but to useBeaulieu, Pereira                                                   14       Extended Authentication with ISAKMP/Oakley October 2001   one single Shared-Key for all users, and group-shared keys are   susceptible to "social engineering attacks".   However, the choice of implementation of this functionality is left   up to the implementers of this protocol.  There may be some   applications where this functionality is desired.  Some examples   are: proof of concept deployments and small deployments where the   proper management of a group shared-key is less difficult.   If at some point restrictions are introduced in one of the IPsec   Standard RFC documents which prohibit the use of group pre-shared   keys, then this protocol will, by default, conform, and these   Security Considerations will no longer be of concern.11. References   [1]  Bradner, S., "The Internet Standards Process -- Revision 3",        BCP 9, RFC 2026, October 1996.   [2]  Bradner, S., "Key words for use in RFCs to Indicate Requirement        Levels", BCP 14, RFC 2119, March 1997   [CHAP]  W. Simpson, "PPP Challenge Handshake Authentication Protocol           (CHAP)", RFC1994   [DIAMETER]  P. Calhoun, A. Rubens, "DIAMETER - Base Protocol",               draft-calhoun-diameter-02.txt   [HYBRID]  M. Litvin, R. Shamir, T. Zegman, "A Hybrid Authentication             Mode for IKE", draft-ietf-ipsec-isakmp-hybrid-auth-05   [IKE]  D. Harkins, D. Carrel, "The Internet Key Exchange (IKE)",          RFC2409   [IKECFG]  D. Dukes, R. Pereira, "The ISAKMP Configuration Method",             draft-dukes-ike-mode-cfg-01.txt   [KIV]  Kivinen, T., "Fixing IKE Phase 1 & 2 Authentication HASHs",          "draft-ietf-ipsec-ike-hash-revised-01.txt", work in progress.   [OTP]  N. Haller, C. Metz, P. Nesser, M. Straw, "A One-Time Password          System", RFC2289   [OTPEXT]  C. Metz, "OTP Extended Responses", RFC 2243   [RADIUS]  C. Rigney, A. Rubens, W. Simpson, S. Willens,  "Remote             Authentication Dial In User Service (RADIUS)", RFC2138Beaulieu, Pereira                                                   15       Extended Authentication with ISAKMP/Oakley October 2001   [SKEY]  N. Haller,   "The S/KEY One-Time Password System", RFC1760   [TACACS]  C. Finseth, "An Access Control Protocol, Sometimes Called             TACACS", RFC1492   [TACACS+]  D. Carrel, L. Grant, "The TACACS+ Protocol Version 1.77",              draft-grant-tacacs-01.txt12.     Acknowledgments   The authors would like to thank Tamir Zegmen, Moshe Litvin, Dan   Harkins and all those from the IPsec community who have helped   improve the XAUTH protocol.  We would also like to thank Tim   Jenkins, Ajai Puri, Laurie Shields, Andrew Krywaniuk, Gabriela   Dinescu, Paul Kierstead and Scott Fanning for their continued   support, and many sanity checks along the way.13. Author's Addresses   Stephane Beaulieu   <stephane@cisco.com>   Cisco Systems Co.   +1 (613) 721-3678   Roy Pereira   <royp@cisco.com>   Cisco Systems   +1 (408) 526-679314. Expiration    This draft expires April, 2002Full Copyright Statement   "Copyright (C) The Internet Society (date). All Rights Reserved.   This document and translations of it may be copied and furnished to   others, and derivative works that comment on or otherwise explain it

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -