📄 draft-kamath-pppext-peapv0-00.txt
字号:
1 - Mandatory AVPR Reserved, set to zero (0)AVP Type 3 - ResultLength 2Status The status field is two octets. Values include: 1 - Success 2 - Failure3. Security considerations3.1. Authentication and integrity protectionThe EAP Extension method is presumed to run before or after an EAPmethod that supports mutual authentication and establishes a protectedchannel. PEAP is such a method, and as a result the acknowledgedSuccess and Failure messages are always protected.Note however, that [IEEE8021X] manufactures clear-text EAP Success andEAP Failure messages, so that even though the Result AVP will beprotected, this will be followed by a clear-text EAP Success or EAPKamath, Palekar & Wodrich Informational [Page 7]INTERNET-DRAFT PEAP Version 0 25 October 2002Failure packet.3.2. OutcomesWithin the Microsoft PEAP Version 0 implementation, support for the EAPExtensions method and the Result AVP is required. The only outcome whichshould be considered a successful authentication is when an EAP Requestof Type=Extensions with Result AVP of Status=Success is answered by anEAP Response of Type=Extensions with Result AVP of Status=Success. Allother combinations (Extensions Success, Extensions Failure), (ExtensionsFailure, Extensions Success), (Extensions Failure, Extensions Failure),(No extensions exchange) should be considered failed authentications,both by the EAP Peer and EAP Server. This is true regardless of whetheran EAP Success or EAP Failure packet is subsequently sent, either inclear-text or within the PEAP tunnel. Because the EAP Extensions methodis protected within the PEAP channel, its messages cannot be spoofed,whereas clear-text Success and Failure messages can be sent by anattacker.While the [PEAP] specification permits a tunneled EAP Success or Failurepacket to be sent as the last message, this is not possible within theWindows XP SP1 implementation, which can only tunnel EAP packets ofcodes Request or Response within PEAP. Since the [IEEE8021X]specification requires that the switch or access point "manufacture" aclear-text EAP Success packet when an Access-Accept is received from thebackend authentication server, and a clear-text EAP Failure packet whenan Access-Reject is received. As a result, a tunneled EAP Success orFailure packet, if sent as the last message, would be thrown away byconformant [IEEE 8021X] implementations, and replaced with clear-text.This problem is being addressed within the IEEE 802.1aa revision to IEEE802.1X, but the fix may take a while to move through the standardsprocess and be implemented in commercial products.4. Normative references[PEAP] Andersson, H., et al. "Protected EAP Protocol", Internet draft (work in progress), draft-josefsson-pppext-eap-tls- eap-02.txt, February 2002.[RFC1661] Simpson, W., Editor, "The Point-to-Point Protocol (PPP)", STD 51, RFC 1661, July 1994.[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997.[RFC2284] Blunk, L., Vollbrecht, J., "PPP Extensible Authentication Protocol (EAP)", RFC 2284, March 1998.Kamath, Palekar & Wodrich Informational [Page 8]INTERNET-DRAFT PEAP Version 0 25 October 2002[IEEE8021X] IEEE Standards for Local and Metropolitan Area Networks: Port based Network Access Control, IEEE Std 802.1X-2001, June 2001.5. Informative references[IEEE80211] Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std. 802.11-1999, 1999.Kamath, Palekar & Wodrich Informational [Page 9]INTERNET-DRAFT PEAP Version 0 25 October 2002Appendix A - ExamplesIn the case where an identity exchange occurs withinPEAP Part 1, the conversation will appear as follows:Authenticating Peer Authenticator------------------- ------------- <- EAP-Request/ IdentityEAP-Response/Identity (MyID) -> <- EAP-Request/ EAP-Type=PEAP, V=0 (PEAP Start, S bit set)EAP-Response/EAP-Type=PEAP, V=0(TLS client_hello)-> <- EAP-Request/ EAP-Type=PEAP, V=0 (TLS server_hello, TLS certificate, [TLS server_key_exchange,] [TLS certificate_request,] TLS server_hello_done)EAP-Response/EAP-Type=PEAP, V=0([TLS certificate,] TLS client_key_exchange,[TLS certificate_verify,] TLS change_cipher_spec, TLS finished) -> <- EAP-Request/ EAP-Type=PEAP, V=0 (TLS change_cipher_spec, TLS finished)EAP-Response/EAP-Type=PEAP ->TLS channel established(messages sent within the TLS channel) <- EAP-Request/ IdentityEAP-Response/Identity (MyID) -> <- EAP-Request/ EAP-Type=XKamath, Palekar & Wodrich Informational [Page 10]INTERNET-DRAFT PEAP Version 0 25 October 2002EAP-Response/EAP-Type=X or NAK -> <- EAP-Request/ EAP-Type=XEAP-Response/EAP-Type=X -> <- EAP-Request/ EAP-Type=Extensions Result=SuccessEAP-Response/EAP-Type=ExtensionsResult=Success ->TLS channel torn down(messages sent in clear-text) <- EAP-SuccessIn the case where the PEAP fragmentation is required, the conversationwill appear as follows:Authenticating Peer Authenticator------------------- ------------- <- EAP-Request/ IdentityEAP-Response/Identity (MyID) -> <- EAP-Request/ EAP-Type=PEAP, V=0 (PEAP Start, S bit set)EAP-Response/EAP-Type=PEAP, V=0(TLS client_hello)-> <- EAP-Request/ EAP-Type=PEAP, V=0 (TLS server_hello, TLS certificate, [TLS server_key_exchange,] [TLS certificate_request,] TLS server_hello_done) (Fragment 1: L, M bits set)EAP-Response/EAP-Type=PEAP, V=0 -> <- EAP-Request/ EAP-Type=PEAP, V=0 (Fragment 2: M bit set)Kamath, Palekar & Wodrich Informational [Page 11]INTERNET-DRAFT PEAP Version 0 25 October 2002EAP-Response/EAP-Type=PEAP, V=0 -> <- EAP-Request/ EAP-Type=PEAP, V=0 (Fragment 3)EAP-Response/EAP-Type=PEAP, V=0([TLS certificate,] TLS client_key_exchange,[TLS certificate_verify,] TLS change_cipher_spec, TLS finished) (Fragment 1: L, M bits set)-> <- EAP-Request/ EAP-Type=PEAP, V=0EAP-Response/EAP-Type=PEAP, V=0(Fragment 2)-> <- EAP-Request/ EAP-Type=PEAP, V=0 (TLS change_cipher_spec, TLS finished)EAP-Response/EAP-Type=PEAP, V=0 ->TLS channel established(messages sent within the TLS channel) <- EAP-Request/ IdentityEAP-Response/Identity (MyID) -> <- EAP-Request/ EAP-Type=XEAP-Response/EAP-Type=X or NAK -> <- EAP-Request/ EAP-Type=XEAP-Response/EAP-Type=X -> <- EAP-Request/ EAP-Type=Extensions Result=SuccessEAP-Response/EAP-Type=ExtensionsKamath, Palekar & Wodrich Informational [Page 12]INTERNET-DRAFT PEAP Version 0 25 October 2002Result=Success ->TLS channel torn down(messages sent in clear-text) <- EAP-SuccessIn the case where the server authenticates to the clientsuccessfully in PEAP Part 1, but the client fails to authenticateto the server in PEAP Part 2, the conversation will appear as follows:Authenticating Peer Authenticator------------------- ------------- <- EAP-Request/ IdentityEAP-Response/Identity (MyID) -> <- EAP-Request/ EAP-Type=PEAP, V=0 (PEAP Start, S bit set)EAP-Response/EAP-Type=PEAP, V=0(TLS client_hello)-> <- EAP-Request/ EAP-Type=PEAP, V=0 (TLS server_hello, TLS certificate, [TLS server_key_exchange,] [TLS certificate_request,] TLS server_hello_done)EAP-Response/EAP-Type=PEAP, V=0([TLS certificate,] TLS client_key_exchange,[TLS certificate_verify,] TLS change_cipher_spec,
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -