⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 draft-arkko-pppext-eap-aka-15.txt

📁 Linux上的802.1x 的supplicant的实现。很多supplicant程序都是基于它开发的
💻 TXT
📖 第 1 页 / 共 5 页
字号:
   NOT modify the username part of the fast re-authentication identity   received in AT_NEXT_REAUTH_ID, except in cases when username   decoration is required.  Even in these cases, the "root" fast   re-authentication username must not be modified, but it may be   appended or prepended with another string.4.1.2  Communicating the Peer Identity to the Server4.1.2.1  General   The peer identity MAY be communicated to the server with the   EAP-Response/Identity message.  This message MAY contain the   permanent identity, a pseudonym identity, or a fast re-authentication   identity.  If the peer uses the permanent identity or a pseudonym   identity, which the server is able to map to the permanent identity,   then the authentication proceeds as discussed in the overview of   Section 3.  If the peer uses a fast re-authentication identity, and   if the fast re-authentication identity matches with a valid fast   re-authentication identity maintained by the server , then a fast   re-authentication exchange is performed, as described in Section 5.   The peer identity can also be transmitted from the peer to the server   using EAP-AKA messages instead of EAP-Response/Identity.  In this   case, the server includes an identity requesting attribute   (AT_ANY_ID_REQ, AT_FULLAUTH_ID_REQ or AT_PERMANENT_ID_REQ) in the   EAP-Request/AKA-Identity message, and the peer includes the   AT_IDENTITY attribute, which contains the peer's identity, in the   EAP-Response/AKA-Identity message.  The AT_ANY_ID_REQ attribute is a   general identity requesting attribute, which the server uses if it   does not specify which kind of an identity the peer should return in   AT_IDENTITY.  The server uses the AT_FULLAUTH_ID_REQ attribute to   request either the permanent identity or a pseudonym identity.  The   server uses the AT_PERMANENT_ID_REQ attribute to request the peer to   send its permanent identity.  The EAP-Request/AKA-Challenge,   EAP-Response/AKA-Challenge, or the packets used on fast   re-authentication may optionally include the AT_CHECKCODE attribute,   which enables the protocol peers to ensure the integrity of the   AKA-Identity packets.  AT_CHECKCODE is specified in Section 9.13.Arkko & Haverinen        Expires June 21, 2005                 [Page 22]Internet-Draft           EAP-AKA Authentication            December 2004   The identity format in the AT_IDENTITY attribute is the same as in   the EAP-Response/Identity packet (except that identity decoration is   not allowed).  The AT_IDENTITY attribute contains a permanent   identity, a pseudonym identity or a fast re-authentication identity.   Please note that the EAP-AKA peer and the EAP-AKA server only process   the AT_IDENTITY attribute and entities that only pass through EAP   packets do not process this attribute.  Hence, the authenticator and   other intermediate AAA elements (such as possible AAA proxy servers)   will continue to refer to the peer with the original identity from   the EAP-Response/Identity packet unless the identity authenticated in   the AT_IDENTITY attribute is communicated to them in another way   within the AAA protocol.4.1.2.2  Relying on EAP-Response/Identity Discouraged   The EAP-Response/Identity packet is not method specific so in many   implementations it may be handled by an EAP Framework.  This   introduces an additional layer of processing between the EAP peer and   EAP server.  The extra layer of processing may cache identity   responses or add decorations to the identity.  A modification of the   identity response will cause the EAP peer and EAP server to use   different identities in the key derivation which will cause the   protocol to fail.   For this reason, it is RECOMMENDED that the EAP peer and server use   the method specific identity attributes in EAP-AKA and the server is   strongly discouraged from relying upon the EAP-Response/Identity.   In particular, if the EAP server receives a decorated identity in   EAP-Response/Identity, then the EAP server MUST use the   identity-requesting attributes to request the peer to send an   unmodified and undecorated copy of the identity in AT_IDENTITY.4.1.3  Choice of Identity for the EAP-Response/Identity   If EAP-AKA peer is started upon receiving an EAP-Request/Identity   message, then the peer performs the following steps.   If the peer has maintained fast re-authentication state information   and if the peer wants to use fast re-authentication, then the peer   transmits the fast re-authentication identity in   EAP-Response/Identity.   Else, if the peer has a pseudonym username available, then the peer   transmits the pseudonym identity in EAP-Response/Identity.   In other cases, the peer transmits the permanent identity inArkko & Haverinen        Expires June 21, 2005                 [Page 23]Internet-Draft           EAP-AKA Authentication            December 2004   EAP-Response/Identity.4.1.4  Server Operation in the Beginning of EAP-AKA Exchange   If the EAP server has not received any EAP-AKA peer identity   (permanent identity, pseudonym identity or fast re-authentication   identity) from the peer when sending the first EAP-AKA request, or if   the EAP server has received an EAP-Response/Identity packet but the   contents do not appear to be a valid permanent identity, pseudonym   identity or a re-authentication identity, then the server MUST   request an identity from the peer using one of the methods below.   The server sends the EAP-Request/AKA-Identity message with the   AT_PERMANENT_ID_REQ attribute to indicate that the server wants the   peer to include the permanent identity in the AT_IDENTITY attribute   of the EAP-Response/AKA-Identity message.  This is done in the   following cases:   o  The server does not support fast re-authentication or identity      privacy.   o  The server received an identity that it recognizes as a pseudonym      identity but the server is not able to map the pseudonym identity      to a permanent identity.   The server issues the EAP-Request/AKA-Identity packet with the   AT_FULLAUTH_ID_REQ attribute to indicate that the server wants the   peer to include a full authentication identity (pseudonym identity or   permanent identity) in the AT_IDENTITY attribute of the   EAP-Response/AKA-Identity message.  This is done in the following   cases:   o  The server does not support fast re-authentication and the server      supports identity privacy   o  The server received an identity that it recognizes as a      re-authentication identity but the server is not able to map the      re-authentication identity to a permanent identity   The server issues the EAP-Request/AKA-Identity packet with the   AT_ANY_ID_REQ attribute to indicate that the server wants the peer to   include an identity in the AT_IDENTITY attribute of the   EAP-Response/AKA-Identity message, and the server does not indicate   any preferred type for the identity.  This is done in other cases,   such as when the server does not have any identity, or the server   does not recognize the format of a received identity.4.1.5  Processing of EAP-Request/AKA-Identity by the Peer   Upon receipt of an EAP-Request/AKA-Identity message, the peer MUSTArkko & Haverinen        Expires June 21, 2005                 [Page 24]Internet-Draft           EAP-AKA Authentication            December 2004   perform the following steps.   If the EAP-Request/AKA-Identity includes AT_PERMANENT_ID_REQ, and if   the peer does not have a pseudonym available, then the peer MUST   respond with EAP-Response/AKA-Identity and include the permanent   identity in AT_IDENTITY.  If the peer has a pseudonym available, then   the peer MAY refuse to send the permanent identity; hence in this   case the peer MUST either respond with EAP-Response/AKA-Identity and   include the permanent identity in AT_IDENTITY or respond with   EAP-Response/AKA-Client-Error packet with code "unable to process   packet".   If the EAP-Request/AKA-Identity includes AT_FULL_AUTH_ID_REQ, and if   the peer has a pseudonym available, then the peer SHOULD respond with   EAP-Response/AKA-Identity and include the pseudonym identity in   AT_IDENTITY.  If the peer does not have a pseudonym when it receives   this message, then the peer MUST respond with   EAP-Response/AKA-Identity and include the permanent identity in   AT_IDENTITY.  The Peer MUST NOT use a fast re-authentication identity   in the AT_IDENTITY attribute.   If the EAP-Request/AKA-Identity includes AT_ANY_ID_REQ, and if the   peer has maintained fast re-authentication state information and the   peer wants to use fast re-authentication, then the peer responds with   EAP- Response/AKA-Identity and includes the fast re-authentication   identity in AT_IDENTITY.  Else, if the peer has a pseudonym identity   available, then the peer responds with EAP-Response/AKA-Identity and   includes the pseudonym identity in AT_IDENTITY.  Else, the peer   responds with EAP-Response/AKA-Identity and includes the permanent   identity in AT_IDENTITY.   An EAP-AKA exchange may include several EAP/AKA-Identity rounds.  The   server may issue a second EAP-Request/AKA-Identity, if it was not   able to recognize the identity the peer used in the previous   AT_IDENTITY attribute.  At most three EAP/AKA-Identity rounds can be   used, so the peer MUST NOT respond to more than three   EAP-Request/AKA-Identity messages within an EAP exchange.  The peer   MUST verify that the sequence of EAP-Request/AKA-Identity packets the   peer receives comply with the sequencing rules defined in this   document.  That is, AT_ANY_ID_REQ can only be used in the first   EAP-Request/AKA-Identity, in other words AT_ANY_ID_REQ MUST NOT be   used in the second or third EAP-Request/AKA-Identity.   AT_FULLAUTH_ID_REQ MUST NOT be used if the previous   EAP-Request/AKA-Identity included AT_PERMANENT_ID_REQ.  The peer   operation in cases when it receives an unexpected attribute or an   unexpected message is specified in Section 6.3.1.Arkko & Haverinen        Expires June 21, 2005                 [Page 25]Internet-Draft           EAP-AKA Authentication            December 20044.1.6  Attacks against Identity Privacy   The section above specifies two possible ways the peer can operate   upon receipt of AT_PERMANENT_ID_REQ.  This is because a received   AT_PERMANENT_ID_REQ does not necessarily originate from the valid   network, but an active attacker may transmit an   EAP-Request/AKA-Identity packet with an AT_PERMANENT_ID_REQ attribute   to the peer, in an effort to find out the true identity of the user.   If the peer does not want to reveal its permanent identity, then the   peer sends the EAP-Response/AKA-Client-Error packet with the error   code "unable to process packet", and the authentication exchange   terminates.   Basically, there are two different policies that the peer can employ   with regard to AT_PERMANENT_ID_REQ.  A "conservative" peer assumes   that the network is able to maintain pseudonyms robustly.  Therefore,   if a conservative peer has a pseudonym username, the peer responds   with EAP-Response/AKA-Client-Error to the EAP packet with   AT_PERMANENT_ID_REQ, because the peer believes that the valid network   is able to map the pseudonym identity to the peer's permanent   identity.  (Alternatively, the conservative peer may accept   AT_PERMANENT_ID_REQ in certain circumstances, for example if the   pseudonym was received a long time ago.) The benefit of this policy   is that it protects the peer against active attacks on anonymity.  On   the other hand, a "liberal" peer always accepts the   AT_PERMANENT_ID_REQ and responds with the permanent identity.  The   benefit of this policy is that it works even if the valid network   sometimes loses pseudonyms and is not able to map them to the   permanent identity.4.1.7  Processing of AT_IDENTITY by the Server   When the server receives an EAP-Response/AKA-Identity message with   the AT_IDENTITY (in response to the server's identity requesting   attribute), the server MUST operate as follows.   If the server used AT_PERMANENT_ID_REQ, and if the AT_IDENTITY does   not contain a valid permanent identity, then the server sends an   EAP-Request/AKA-Notification packet with AT_NOTIFICATION code   "General failure" (16384) to terminate the EAP exchange.  If the   server recognizes the permanent identity and is able to continue,   then the server proceeds with full authentication by sending   EAP-Request/AKA-Challenge.   If the server used AT_FULLAUTH_ID_REQ, and if AT_IDENTITY contains a   valid permanent identity or a pseudonym identity that the server can   map to a valid permanent identity, then the server proceeds with full   authentication by sending EAP-Request/AKA-Challenge.  If AT_IDENTITYArkko & Haverinen        Expires June 21, 2005                 [Page 26]Internet-Draft           EAP-AKA Authentication            December 2004   contains a pseudonym identity that the server is not able to map to a   valid permanent identity, or an identity that the server is not able   to recognize or classify, then the server sends EAP-Request/   AKA-Identity with AT_PERMANENT_ID_REQ.   If the server used AT_ANY_ID_REQ, and if the AT_IDENTITY contains a   valid permanent identity or a pseudonym identity that the server can   map to a valid permanent identity, then the server proceeds with full   authentication by sending EAP-Request/ AKA-Challenge.   If the server used AT_ANY_ID_REQ, and if AT_IDENTITY contains a valid   fast re-authentication identity and the server agrees on using   re-authentication, then the server proceeds with fast   re-authentication by sending EAP-Request/AKA-Reauthentication   (Section 5).   If the server used AT_ANY_ID_REQ, and if the peer sent an   EAP-Response/AKA-Identity with AT_IDENTITY that contains an identity   that the server recognizes as a fast re-authentication identity, but   the server is not able to map the identity to a permanent identity,   then the server sends EAP-Request/AKA-Identity with   AT_FULLAUTH_ID_REQ.   If the server used AT_ANY_ID_REQ, and if AT_IDENTITY contains a valid   fast re-authentication identity, which the server is ab

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -