⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 draft-beaulieu-ike-xauth-02.txt

📁 ipsec vpn
💻 TXT
📖 第 1 页 / 共 4 页
字号:
   or assist in its implmentation may be prepared, copied, published   and distributed, in whole or in part, without restriction of any   kind, provided that the above copyright notice and this paragraph   are included on all such copies and derivative works. However, this   document itself may not be modified in any way, such as by removing   the copyright notice or references to the Internet Society or other   Internet organizations, except as needed for the purpose of   developing Internet standards in which case the procedures for   copyrights defined in the Internet Standards process must be   followed, or as required to translate it intoBeaulieu, Pereira                                                   16       Extended Authentication with ISAKMP/Oakley October 2001Beaulieu, Pereira                                                   17       Extended Authentication with ISAKMP/Oakley October 2001Appendix A   This appendix gives more useful examples of Extended Authentication.   SDI through RADIUS   ==================   The following 3 examples show examples of SDI running through   RADIUS.  Since the edge device does not necessarily know that we are   indeed doing SDI, the edge device will typically send everything in   terms of Username and Password.  This of course results in the user   being prompted with a password dialog when it isn't really a   password which is required.  This tends to be a little confusing,   but it is really a limitation of RADIUS.   NOTE: The edge device may choose to try and detect these situations   and send better suited XAUTH attributes (such as XAUTH ANSWER or   XAUTH NEXT PIN).  The Client is typically protocol agnostic and will   prompt the user for whatever attributes the edge device requests.   Example A-1:   ============   Secure ID Next PIN mode via RADIUS (Scenario 1 - SDI generated next   pin)   IPsec Client                                          IPsec Gateway   ------------                                          -------------                             <-- REQUEST(Username = '', Password = '')   REPLY(Username = 'joe', Password = '1637364856') -->                        <-- REQUEST(Username = '', Password = '',                        XAUTH_MESSAGE = 'The system has assigned you a                        new PIN of '1234', please re-enter your                        username and password')   REPLY(Username = 'joe', Password = '1234764456') -->                                            <-- SET(XAUTH_STATUS = OK)   ACK(XAUTH_STATUS) -->   Example A-2:   ============   Secure ID Next PIN mode via RADIUS (Scenario 2 - User generated next   pin)   IPsec Client                                          IPsec Gateway   ------------                                          -------------                             <-- REQUEST(Username = '', Password = '')   REPLY(Username = 'joe', Password = '1637364856') -->                        <-- REQUEST(Username = '', Password = '',                        XAUTH_MESSAGE = 'Enter your new PIN containing                        4-6 digits')   REPLY(Username = 'joe', Password = '1234') -->Beaulieu, Pereira                                                   18       Extended Authentication with ISAKMP/Oakley October 2001                              <-- REQUEST(Username = '', Password = '')   REPLY(Username = 'joe', Password = '1234764456') -->                                            <-- SET(XAUTH_STATUS = OK)   ACK(XAUTH_STATUS) -->   Example A-3:   ============   Secure ID Next PIN mode via RADIUS (Scenario 3 - RADIUS server   offers choice of generating new PIN)   IPsec Client                                          IPsec Gateway   ------------                                          -------------                             <-- REQUEST(Username = '', Password = '')   REPLY(Username = 'joe', Password = '1637364856') -->                        <-- REQUEST(Username = '', Password = '',                        XAUTH_MESSAGE = 'You must start using a new                        PIN.  Would you like to generate your own PIN                        (y/n)?)   REPLY(Username = 'joe', Password = 'y') -->                        <-- REQUEST(Username = '', Password = '', XAUTH                        MESSAGE = 'Enter your new PIN containing 4-6                        digits')   REPLY(Username = 'joe', Password = '1234') -->                              <-- REQUEST(Username = '', Password = '')   REPLY(Username = 'joe', Password = '1234764456'                                            <-- SET(XAUTH_STATUS = OK)   ACK(XAUTH_STATUS) -->   Native SDI   ==========   When doing native SDI between the edge device and the SDI server,   the edge device has more information about what type of information   is required from the user.  The edge device can therefore use more   intuitive attributes in certain situations as compared with the   RADIUS examples above.   Example A-4:   ============   Secure ID Next PIN mode(Scenario 1 - SDI generated next pin)   IPsec Client                                          IPsec Gateway   ------------                                          -------------                             <-- REQUEST(Username = '', Passcode = '')   REPLY(Username = 'joe', Passcode = '1637364856') -->                        <-- REQUEST(Username = '', Passcode = '',                        XAUTH_MESSAGE = 'The system has assigned you aBeaulieu, Pereira                                                   19       Extended Authentication with ISAKMP/Oakley October 2001                        new PIN of '1234', please re-enter your                        username and passcode')   REPLY(Username = 'joe', Passcode = '1234764456') -->                                                 <-- SET(STATUS = OK)   ACK(STATUS) -->   Example A-5:   ============   Secure ID Next PIN mode(Scenario 2 - User generated next pin)   IPsec Client                                          IPsec Gateway   ------------                                          -------------                             <-- REQUEST(Username = '', Passcode = '')   REPLY(Username = 'joe', Passcode = '1637364856') -->                        <-- REQUEST(NEXT PIN = '', XAUTH_MESSAGE =                        'Enter your new PIN containing 4-6 digits')   REPLY(NEXT_PIN = '1234') -->                              <-- REQUEST(Username = '', Passcode = '')   REPLY(Username = 'joe', Passcode = '1234764456') -->                                                   <-- SET(STATUS = OK)   ACK(STATUS) -->   Example A-6:   ============   Secure ID Next PIN mode(Scenario 3 - SDI server offers choice of   generating new PIN)   IPsec Client                                          IPsec Gateway   ------------                                          -------------                             <-- REQUEST(Username = '', Passcode = '')   REPLY(Username = 'joe', Passcode = '1637364856') -->                        <-- REQUEST(ANSWER = '', XAUTH_MESSAGE = 'You                        must start using a new PIN.  Would you like to                        generate your own PIN (y/n)?)   REPLY(ANSWER = 'y') -->                        <-- REQUEST(NEXT_PIN = '', XAUTH MESSAGE =                        'Enter your new PIN containing 4-6 digits')   REPLY(NEXT PIN = '1234') -->                              <-- REQUEST(Username = '', Passcode = '')   REPLY(Username = 'joe', Passcode = '1234764456'                                                 <-- SET(STATUS = OK)   ACK(STATUS) -->   Example A-7:   ============   SDI next cardcode   IPsec Client                                          IPsec GatewayBeaulieu, Pereira                                                   20       Extended Authentication with ISAKMP/Oakley October 2001   ------------                                          -------------                             <-- REQUEST(Username = '', Passcode = '')   REPLY(Username = 'joe', Passcode = '1637364856') -->                        <-- REQUEST(Username = '', Passcode = '',                        XAUTH_MESSAGE = 'Your token is out of sync with                        the server, please enter a new passcode.')   REPLY(Username = 'joe', Passcode = '1637904324') -->                                                   <-- SET(STATUS = OK)   ACK(STATUS) -->   RADIUS Chap Challenge   =====================   Example A-8:   ============   IPsec Client                                          IPsec Gateway   ------------                                          -------------         <-- REQUEST(TYPE = RADIUS-CHAP, Username = '', Password = '',                       Challenge = 0x01020304050607080910111213141516)   REPLY(TYPE = RADIUS-CHAP, Username = 'joe', Password =   '0xaa11121314151617181920212223242526') -->                                                 <-- SET(STATUS = OK)   ACK(STATUS) -->   where the Challenge in the REQUEST is the random number generated by   the edge device, and the Password in the reply contains the ID used   to calculate the hash 'aa' concatenated with the hash of the   (ID+secret+challenge).Beaulieu, Pereira                                                   21

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -