⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 draft-josefsson-pppext-eap-tls-eap-05.txt

📁 Linux上的802.1x 的supplicant的实现。很多supplicant程序都是基于它开发的
💻 TXT
📖 第 1 页 / 共 5 页
字号:
 0                   1                   2                   3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+|     Code      |   Identifier  |            Length             |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+|     Type      |   Flags   |Ver|  Data...+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+Code   1 - Request   2 - ResponseIdentifier   The Identifier field is one octet and aids in matching responses with   requests.Length   The Length field is two octets and indicates the length of the EAP   packet including the Code, Identifier, Length, Type, and Data fields.   Octets outside the range of the Length field should be treated as   Data Link Layer padding and should be ignored on reception.Type   25 - PEAPFlags    0 1 2 3 4 5   +-+-+-+-+-+-+   |L M S R R R|   +-+-+-+-+-+-+   L = Length included   M = More fragments   S = PEAP start   R = Reserved (must be zero)Andersson et al.             Standards Track                   [Page 18]INTERNET-DRAFT                    PEAP                    September 2002   The L bit (length included) is set to indicate the presence of the   four octet TLS Message Length field, and MUST be set for the first   fragment of a fragmented TLS message or set of messages. The M bit   (more fragments) is set on all but the last fragment. The S bit (PEAP   start) is set in a PEAP Start message. This differentiates the PEAP   Start message from a fragment acknowledgment.Version    0 1   +-+-+   |R 1|   +-+-+   R = Reserved (must be zero)Data   The format of the Data field is determined by the Code field.Andersson et al.             Standards Track                   [Page 19]INTERNET-DRAFT                    PEAP                    September 20023.2.  PEAP Request PacketA summary of the PEAP Request packet format is shown below.  The fieldsare transmitted from left to right. 0                   1                   2                   3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+|     Code      |   Identifier  |            Length             |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+|     Type      |   Flags   |Ver|      TLS Message Length+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+|     TLS Message Length        |       TLS Data...+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+Code   1Identifier   The Identifier field is one octet and aids in matching responses with   requests.  The Identifier field MUST be changed on each Request   packet.Length   The Length field is two octets and indicates the length of the EAP   packet including the Code, Identifier, Length, Type, and TLS Response   fields.Type   25 - PEAPFlags    0 1 2 3 4 5   +-+-+-+-+-+-+   |L M S R R R|   +-+-+-+-+-+-+   L = Length included   M = More fragments   S = PEAP start   R = Reserved (must be zero)   The L bit (length included) is set to indicate the presence of theAndersson et al.             Standards Track                   [Page 20]INTERNET-DRAFT                    PEAP                    September 2002   four octet TLS Message Length field, and MUST be set for the first   fragment of a fragmented TLS message or set of messages. The M bit   (more fragments) is set on all but the last fragment. The S bit (PEAP   start) is set in a PEAP Start message. This differentiates the PEAP   Start message from a fragment acknowledgment.Version    0 1   +-+-+   |R 1|   +-+-+   R = Reserved (must be zero)TLS Message Length   The TLS Message Length field is four octets, and is present only if   the L bit is set.  This field provides the total length of the TLS   message or set of messages that is being fragmented.TLS data   The TLS data consists of the encapsulated packet in TLS record   format.Andersson et al.             Standards Track                   [Page 21]INTERNET-DRAFT                    PEAP                    September 20023.3.  PEAP Response PacketA summary of the PEAP Response packet format is shown below.  The fieldsare transmitted from left to right. 0                   1                   2                   3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+|     Code      |   Identifier  |            Length             |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+|     Type      |   Flags   |Ver|      TLS Message Length+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+|     TLS Message Length        |       TLS Data...+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+Code   2Identifier   The Identifier field is one octet and MUST match the Identifier field   from the corresponding request.Length   The Length field is two octets and indicates the length of the EAP   packet including the Code, Identifier, Length, Type, and TLS data   fields.Type   25 - PEAPFlags    0 1 2 3 4 5   +-+-+-+-+-+-+   |L M S R R R|   +-+-+-+-+-+-+   L = Length included   M = More fragments   S = PEAP start   R = Reserved (must be zero)   The L bit (length included) is set to indicate the presence of the   four octet TLS Message Length field, and MUST be set for the firstAndersson et al.             Standards Track                   [Page 22]INTERNET-DRAFT                    PEAP                    September 2002   fragment of a fragmented TLS message or set of messages. The M bit   (more fragments) is set on all but the last fragment. The S bit (PEAP   start) is set in a PEAP Start message. This differentiates the PEAP   Start message from a fragment acknowledgment.Version    0 1   +-+-+   |R 1|   +-+-+   R = Reserved (must be zero)TLS Message Length   The TLS Message Length field is four octets, and is present only if   the L bit is set. This field provides the total length of the TLS   message or set of messages that is being fragmented.TLS data   The TLS data consists of the encapsulated TLS packet in TLS record   format.4.  Security Considerations4.1.  Method negotiationIf the peer does not support PEAP, or does not wish to utilize PEAPauthentication, it MUST respond to the initial EAP-Request/PEAP-Startwith a NAK, suggesting an alternate authentication method. Since the NAKis sent in cleartext with no integrity protection or authentication, itis subject to spoofing.  Unauthentic NAK packets can be used to trickthe peer and Authenticator into "negotiating down" to a weaker form ofauthentication, such as EAP-MD5 (which only provides one wayauthentication and does not derive a key).Since a subsequent protected EAP conversation can take place within theTLS session, selection of PEAP as an authentication method does notlimit the potential secondary authentication methods. As a result, theonly legitimate reason for a peer to NAK PEAP as an authenticationmethod is that it does not support it. Where the additional security ofPEAP is required, server implementations SHOULD respond to a NAK with anEAP-Failure, terminating the authentication conversation.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -