📄 draft-josefsson-pppext-eap-tls-eap-05.txt
字号:
0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| Code | Identifier | Length |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| Type | Flags |Ver| Data...+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+Code 1 - Request 2 - ResponseIdentifier The Identifier field is one octet and aids in matching responses with requests.Length The Length field is two octets and indicates the length of the EAP packet including the Code, Identifier, Length, Type, and Data fields. Octets outside the range of the Length field should be treated as Data Link Layer padding and should be ignored on reception.Type 25 - PEAPFlags 0 1 2 3 4 5 +-+-+-+-+-+-+ |L M S R R R| +-+-+-+-+-+-+ L = Length included M = More fragments S = PEAP start R = Reserved (must be zero)Andersson et al. Standards Track [Page 18]INTERNET-DRAFT PEAP September 2002 The L bit (length included) is set to indicate the presence of the four octet TLS Message Length field, and MUST be set for the first fragment of a fragmented TLS message or set of messages. The M bit (more fragments) is set on all but the last fragment. The S bit (PEAP start) is set in a PEAP Start message. This differentiates the PEAP Start message from a fragment acknowledgment.Version 0 1 +-+-+ |R 1| +-+-+ R = Reserved (must be zero)Data The format of the Data field is determined by the Code field.Andersson et al. Standards Track [Page 19]INTERNET-DRAFT PEAP September 20023.2. PEAP Request PacketA summary of the PEAP Request packet format is shown below. The fieldsare transmitted from left to right. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| Code | Identifier | Length |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| Type | Flags |Ver| TLS Message Length+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| TLS Message Length | TLS Data...+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+Code 1Identifier The Identifier field is one octet and aids in matching responses with requests. The Identifier field MUST be changed on each Request packet.Length The Length field is two octets and indicates the length of the EAP packet including the Code, Identifier, Length, Type, and TLS Response fields.Type 25 - PEAPFlags 0 1 2 3 4 5 +-+-+-+-+-+-+ |L M S R R R| +-+-+-+-+-+-+ L = Length included M = More fragments S = PEAP start R = Reserved (must be zero) The L bit (length included) is set to indicate the presence of theAndersson et al. Standards Track [Page 20]INTERNET-DRAFT PEAP September 2002 four octet TLS Message Length field, and MUST be set for the first fragment of a fragmented TLS message or set of messages. The M bit (more fragments) is set on all but the last fragment. The S bit (PEAP start) is set in a PEAP Start message. This differentiates the PEAP Start message from a fragment acknowledgment.Version 0 1 +-+-+ |R 1| +-+-+ R = Reserved (must be zero)TLS Message Length The TLS Message Length field is four octets, and is present only if the L bit is set. This field provides the total length of the TLS message or set of messages that is being fragmented.TLS data The TLS data consists of the encapsulated packet in TLS record format.Andersson et al. Standards Track [Page 21]INTERNET-DRAFT PEAP September 20023.3. PEAP Response PacketA summary of the PEAP Response packet format is shown below. The fieldsare transmitted from left to right. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| Code | Identifier | Length |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| Type | Flags |Ver| TLS Message Length+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| TLS Message Length | TLS Data...+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+Code 2Identifier The Identifier field is one octet and MUST match the Identifier field from the corresponding request.Length The Length field is two octets and indicates the length of the EAP packet including the Code, Identifier, Length, Type, and TLS data fields.Type 25 - PEAPFlags 0 1 2 3 4 5 +-+-+-+-+-+-+ |L M S R R R| +-+-+-+-+-+-+ L = Length included M = More fragments S = PEAP start R = Reserved (must be zero) The L bit (length included) is set to indicate the presence of the four octet TLS Message Length field, and MUST be set for the firstAndersson et al. Standards Track [Page 22]INTERNET-DRAFT PEAP September 2002 fragment of a fragmented TLS message or set of messages. The M bit (more fragments) is set on all but the last fragment. The S bit (PEAP start) is set in a PEAP Start message. This differentiates the PEAP Start message from a fragment acknowledgment.Version 0 1 +-+-+ |R 1| +-+-+ R = Reserved (must be zero)TLS Message Length The TLS Message Length field is four octets, and is present only if the L bit is set. This field provides the total length of the TLS message or set of messages that is being fragmented.TLS data The TLS data consists of the encapsulated TLS packet in TLS record format.4. Security Considerations4.1. Method negotiationIf the peer does not support PEAP, or does not wish to utilize PEAPauthentication, it MUST respond to the initial EAP-Request/PEAP-Startwith a NAK, suggesting an alternate authentication method. Since the NAKis sent in cleartext with no integrity protection or authentication, itis subject to spoofing. Unauthentic NAK packets can be used to trickthe peer and Authenticator into "negotiating down" to a weaker form ofauthentication, such as EAP-MD5 (which only provides one wayauthentication and does not derive a key).Since a subsequent protected EAP conversation can take place within theTLS session, selection of PEAP as an authentication method does notlimit the potential secondary authentication methods. As a result, theonly legitimate reason for a peer to NAK PEAP as an authenticationmethod is that it does not support it. Where the additional security ofPEAP is required, server implementations SHOULD respond to a NAK with anEAP-Failure, terminating the authentication conversation.
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -