draft-haverinen-pppext-eap-sim-11.txt
来自「linux 下通过802.1认证的安装包」· 文本 代码 · 共 1,303 行 · 第 1/5 页
TXT
1,303 行
| | Pseudonym in AT_IDENTITY |
| +------------------------------+
| |
| EAP-Request/SIM/Start |
| (AT_PERMANENT_ID_REQ, AT_VERSION_LIST) |
|<------------------------------------------------------|
| |
| |
| EAP-Response/SIM/Start |
| (AT_IDENTITY with permanent identity, |
| AT_NONCE_MT, AT_SELECTED_VERSION) |
|------------------------------------------------------>|
| |
In the worst case, there are three EAP/SIM/Start round trips before
the server has obtained an acceptable identity: on the first round,
the client sends its re-authentication identity in AT_IDENTITY. The
server fails to accept it and request a full authentication identity
with a second EAP-Request/SIM/Start. The client responds with a
pseudonym identity in AT_IDENTITY. The server fails to decode the
pseudonym and has to issue a third EAP-Request/SIM/Start, including
AT_PERMANENT_ID_REQ. Finally, the server accepts the client's EAP-
Response/SIM/Start with the AT_IDENTITY attribute and proceeds with
full authentication. This is illustrated in the figure below.
Haverinen and Salowey Expires in six months [Page 18]
Internet Draft EAP SIM Authentication June 2003
Client Authenticator
| |
| +------------------------------+
| | Server does not have any |
| | Subscriber identity available|
| | When starting EAP/SIM |
| +------------------------------+
| |
| EAP-Request/SIM/Start |
| (Includes AT_ANY_ID_REQ, AT_VERSION_LIST) |
|<------------------------------------------------------|
| |
| EAP-Response/SIM/Start |
| (AT_IDENTITY with re-authentication identity) |
|------------------------------------------------------>|
| |
| +------------------------------+
| | Server does not accept |
| | The re-authentication |
| | Identity |
| +------------------------------+
| |
| EAP-Request/SIM/Start |
| (AT_FULLAUTH_ID_REQ, AT_VERSION_LIST) |
|<------------------------------------------------------|
| |
|EAP-Response/SIM/Start |
|(AT_IDENTITY with a pseudonym identity, AT_NONCE_MT, |
| AT_SELECTED_VERSION) |
|------------------------------------------------------>|
| |
| +------------------------------+
| | Server fails to decode the |
| | Pseudonym in AT_IDENTITY |
| +------------------------------+
| |
| EAP-Request/SIM/Start |
| (AT_PERMANENT_ID_REQ, AT_VERSION_LIST) |
|<------------------------------------------------------|
| |
| |
| EAP-Response/SIM/Start |
| (AT_IDENTITY with permanent identity, AT_NONCE_MT, |
| AT_SELECTED_VERSION) |
|------------------------------------------------------>|
| |
After the last EAP-Response/SIM/Start message, the full
authentication sequence proceeds as usual. If the EAP Server
recognizes the permanent identity and is able to proceed, the server
issues the EAP-Request/SIM/Challenge message. If the server does not
recognize the permanent identity, or if the server is not able to
continue the authentication exchange with the client after receiving
Haverinen and Salowey Expires in six months [Page 19]
Internet Draft EAP SIM Authentication June 2003
the permanent identity, then the server issues the EAP Failure
packet and the authentication exchange terminates.
6. Re-Authentication
In some environments, EAP authentication may be performed
frequently. Because the EAP SIM full authentication procedure makes
use of the GSM SIM A3/A8 algorithms, and it therefore requires 2 or
3 fresh triplets from the Authentication Centre, the full
authentication procedure is not very well suitable for frequent use.
Therefore, EAP SIM includes a more inexpensive re-authentication
procedure that does not make use of the SIM A3/A8 algorithms and
does not need new triplets from the Authentication Centre. Re-
authentication can be performed in fewer roundtrips than the full
authentication.
Re-authentication is optional to implement for both the EAP SIM
server and client. On each EAP authentication, either one of the
entities may also fall back on full authentication if they do not
want to use re-authentication.
Re-authentication is based on the keys derived on the preceding full
authentication. The same K_aut and K_encr keys as in full
authentication are used to protect EAP SIM packets and attributes,
and the original Master Key from full authentication is used to
generate a fresh Master Session Key, as specified in Section 17.
On re-authentication, the client protects against replays with an
unsigned 16-bit counter, included in the AT_COUNTER attribute. On
full authentication, both the server and the client initialize the
counter to one. The counter value of at least one is used on the
first re-authentication. On subsequent re-authentications, the
counter MUST be greater than on any of the previous re-
authentications. For example, on the second re-authentication,
counter value is two or greater etc. The AT_COUNTER attribute is
encrypted.
The server includes an encrypted server nonce (AT_NONCE_S) in the
re-authentication request. The AT_MAC attribute in the client's
response is calculated over NONCE_S to provide a challenge/response
authentication scheme. The NONCE_S also contributes to the new
Master Session Key.
As discussed in Section 5.3, in some environments the client may
assume that the network can reliably store pseudonyms and therefore
the client may fail to respond to the AT_PERMANENT_ID_REQ attribute.
The network SHOULD store pseudonyms on a reliable database. Because
one of the objectives of the re-authentication procedure is to
reduce load on the network, the re-authentication procedure does not
require the EAP server to contact a reliable database. Therefore,
the re-authentication procedure makes use of separate re-
authentication user identities. Pseudonyms and the permanent
identity are reserved for full authentication only. The network does
Haverinen and Salowey Expires in six months [Page 20]
Internet Draft EAP SIM Authentication June 2003
not need to store re-authentication identities as carefully as
pseudonyms. If a re-authentication identity is lost and the network
does not recognize it, the EAP server can fall back on full
authentication.
If the EAP server supports re-authentication, it MAY include the
skippable AT_NEXT_REAUTH_ID attribute in the encrypted data of EAP-
Request/SIM/Challenge message (Section 11). This attribute contains
a new re-authentication identity for the next re-authentication. The
client MAY ignore this attribute, in which case it will use full
authentication next time. If the client wants to use re-
authentication, it uses this re-authentication identity on next
authentication. Even if the client has a re-authentication identity,
the client MAY discard the re-authentication identity and use a
pseudonym or the permanent identity instead, in which case full
authentication will be performed.
The re-authentication identity received in AT_NEXT_REAUTH_ID
contains both the username portion and the realm portion of the
Network Access Identifier. The EAP Server can choose an appropriate
realm part in order to have the AAA infrastructure route subsequent
re-authentication related requests to the same AAA server. For
example, the realm part MAY include a portion that is specific to
the AAA server. Hence, it is sufficient to store the context
required for re-authentication in the AAA server that performed the
full authentication.
The client MAY use the re-authentication identity in the EAP-
Response/Identity packet or, in response to server's AT_ANY_ID_REQ
attribute, the client MAY use the re-authentication identity in the
AT_IDENTITY attribute of the EAP-Response/SIM/Start packet.
Even if the client uses a re-authentication identity, the server may
want to fall back on full authentication, for example because the
server does not recognize the re-authentication identity or does not
want to use re-authentication. In this case, the server starts the
full authentication procedure by issuing an EAP-Request/SIM/Start
packet. This packet always starts a full authentication sequence if
it does not include the AT_ANY_ID_REQ attribute. If the server was
not able to recover the client's identity from the re-authentication
identity, the server includes either the AT_FULLAUTH_ID_REQ or the
AT_PERMANENT_ID_REQ attribute in this EAP request. (As specified in
Sections 5.2 and 5.3, the server MAY use AT_ANY_ID_REQ,
AT_FULLAUTH_ID_REQ or AT_PERMANENT_ID_REQ attributes if it does not
know the client's identity.)
Both the client and the server SHOULD have an upper limit for the
number of subsequent re-authentications allowed before a full
authentication needs to be performed. Because a 16-bit counter is
used in re-authentication, the theoretical maximum number of re-
authentications is reached when the counter value reaches 0xFFFF.
Haverinen and Salowey Expires in six months [Page 21]
Internet Draft EAP SIM Authentication June 2003
In order to use re-authentication, the client and the server need to
store the following values: Master Key, K_aut, K_encr, latest
counter value and the next re-authentication identity.
The following figure illustrates the re-authentication procedure.
Encrypted attributes are denoted with '*'. The client uses its re-
authentication identity in the EAP-Response/Identity packet. As
discussed above, an alternative way to communicate the re-
authentication identity to the server is for the client to use the
AT_IDENTITY attribute in the EAP-Response/SIM/Start message. This
latter case is not illustrated in the figure below, and it is only
possible when the server requests the client to send its identity by
including the AT_ANY_ID_REQ attribute in the EAP-Request/SIM/Start
packet.
If the server recognizes the re-authentication identity and agrees
on using re-authentication, then the server sends the EAP-
Request/SIM/Re-authentication packet to the client. This packet MUST
include the encrypted AT_COUNTER attribute, with a fresh counter
value, the encrypted AT_NONCE_S attribute that contains a random
number chosen by the server, the AT_ENCR_DATA and the AT_IV
attributes used for encryption, and the AT_MAC attribute that
contains a message authentication code over the packet. The packet
MAY also include an encrypted AT_NEXT_REAUTH_ID attribute that
contains the next re-authentication identity.
Re-authentication identities are one-time identities. If the client
does not receive a new re-authentication identity, it MUST use
either the permanent identity or a pseudonym identity on the next
authentication to initiate full authentication.
The client verifies that the counter value is fresh (greater than
any previously used value). The client also verifies that AT_MAC is
correct. The client MAY save the next re-authentication identity
from the encrypted AT_NEXT_REAUTH_ID for next time. If all checks
are successful, the client responds with the EAP-Response/SIM/Re-
authentication packet, including the AT_COUNTER attribute with the
same counter value and the AT_MAC attribute.
The server verifies the A
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?