亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? rfc2284.txt

?? 改文件中包含了三個協(xié)議
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
Network Working Group                                          L. BlunkRequest for Comments: 2284                                J. VollbrechtCategory: Standards Track                           Merit Network, Inc.                                                             March 1998              PPP Extensible Authentication Protocol (EAP)Status of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (1998).  All Rights Reserved.Abstract   The Point-to-Point Protocol (PPP) [1] provides a standard method for   transporting multi-protocol datagrams over point-to-point links.   PPP also defines an extensible Link Control Protocol, which allows   negotiation of an Authentication Protocol for authenticating its peer   before allowing Network Layer protocols to transmit over the link.   This document defines the PPP Extensible Authentication Protocol.Table of Contents   1.     Introduction ..........................................    2      1.1       Specification of Requirements ...................    2      1.2       Terminology .....................................    2   2.     PPP Extensible Authentication Protocol (EAP) ..........    3      2.1       Configuration Option Format .....................    4      2.2       Packet Format ...................................    6         2.2.1  Request and Response ............................    6         2.2.2  Success and Failure .............................    7   3.     Initial EAP Request/Response Types ....................    8      3.1       Identity ........................................    9      3.2       Notification ....................................   10      3.3       Nak .............................................   10Blunk & Vollbrecht          Standards Track                     [Page 1]RFC 2284                          EAP                         March 1998      3.4       MD5-Challenge ...................................   11      3.5       One-Time Password (OTP) .........................   11      3.6       Generic Token Card ..............................   12   REFERENCES ...................................................   13   ACKNOWLEDGEMENTS .............................................   14   CHAIR'S ADDRESS ..............................................   14   AUTHORS' ADDRESSES ...........................................   14   Full Copyright Statement .....................................   151.  Introduction   In order to establish communications over a point-to-point link, each   end of the PPP link must first send LCP packets to configure the data   link during Link Establishment phase.  After the link has been   established, PPP provides for an optional Authentication phase before   proceeding to the Network-Layer Protocol phase.   By default, authentication is not mandatory.  If authentication of   the link is desired, an implementation MUST specify the   Authentication-Protocol Configuration Option during Link   Establishment phase.   These authentication protocols are intended for use primarily by   hosts and routers that connect to a PPP network server via switched   circuits or dial-up lines, but might be applied to dedicated links as   well.  The server can use the identification of the connecting host   or router in the selection of options for network layer negotiations.   This document defines the PPP Extensible Authentication Protocol   (EAP).  The Link Establishment and Authentication phases, and the   Authentication-Protocol Configuration Option, are defined in The   Point-to-Point Protocol (PPP) [1].1.1.  Specification of Requirements   In this document, several words are used to signify the requirements   of the specification.  These words are often capitalized.  The key   words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",   "SHOULD NOT", "RECOMMENDED",  "MAY", and "OPTIONAL" in this document   are to be interpreted as described in RFC 2119 [6].1.2.  Terminology   This document frequently uses the following terms:Blunk & Vollbrecht          Standards Track                     [Page 2]RFC 2284                          EAP                         March 1998   authenticator             The end of the link requiring the authentication.  The             authenticator specifies the authentication protocol to be             used in the Configure-Request during Link Establishment             phase.   peer             The other end of the point-to-point link; the end which is             being authenticated by the authenticator.   silently discard             This means the implementation discards the packet without             further processing.  The implementation SHOULD provide the             capability of logging the error, including the contents of             the silently discarded packet, and SHOULD record the event             in a statistics counter.   displayable message             This is interpreted to be a human readable string of             characters, and MUST NOT affect operation of the protocol.             The message encoding MUST follow the UTF-8 transformation             format [5].2.  PPP Extensible Authentication Protocol (EAP)   The PPP Extensible Authentication Protocol (EAP)  is a general   protocol for PPP authentication which supports multiple   authentication mechanisms.  EAP does not select a specific   authentication mechanism at Link Control Phase, but rather postpones   this until the Authentication Phase.  This allows the authenticator   to request more information before determining the specific   authentication mechanism.  This also permits the use of a "back-end"   server which actually implements the various mechanisms while the PPP   authenticator merely passes through the authentication exchange.   1. After the Link Establishment phase is complete, the authenticator      sends one or more Requests to authenticate the peer.  The Request      has a type field to indicate what is being requested.  Examples of      Request types include Identity,  MD5-challenge, One-Time      Passwords, Generic Token Card, etc.  The MD5-challenge type      corresponds closely to the CHAP authentication protocol.      Typically, the authenticator will send an initial Identity Request      followed by one or more Requests for authentication information.      However, an initial Identity Request is not required, and MAY be      bypassed in cases where the identity is presumed (leased lines,      dedicated dial-ups, etc.).Blunk & Vollbrecht          Standards Track                     [Page 3]RFC 2284                          EAP                         March 1998   2. The peer sends a Response packet in reply to each Request.  As      with the Request packet, the Response packet contains a type field      which corresponds to the type field of the Request.   3. The authenticator ends the authentication phase with a Success or      Failure packet.Advantages   The EAP protocol can support multiple authentication mechanisms   without having to pre-negotiate a particular one during LCP Phase.   Certain devices (e.g. a NAS) do not necessarily have to understand   each request type and may be able to simply act as a passthrough   agent for a "back-end" server on a host.  The device only need look   for the success/failure code to terminate the authentication phase.Disadvantages   EAP does require the addition of a new authentication type to LCP and   thus PPP implementations will need to be modified to use it.  It also   strays from the previous PPP authentication model of negotiating a   specific authentication mechanism during LCP.2.1.  Configuration Option Format   A summary of the Authentication-Protocol Configuration Option format   to negotiate the EAP Authentication Protocol is shown below.  The   fields are transmitted from left to right.    0                   1                   2                   3    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |     Type      |    Length     |     Authentication-Protocol   |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   Type      3   Length      4   Authentication-Protocol      C227 (Hex) for PPP Extensible Authentication Protocol (EAP)Blunk & Vollbrecht          Standards Track                     [Page 4]RFC 2284                          EAP                         March 19982.2.  Packet Format   Exactly one PPP EAP packet is encapsulated in the Information field   of a PPP Data Link Layer frame where the protocol field indicates   type hex C227 (PPP EAP).  A summary of the EAP packet format is shown   below.  The fields are transmitted from left to right.    0                   1                   2                   3    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |     Code      |  Identifier   |            Length             |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |    Data ...   +-+-+-+-+   Code      The Code field is one octet and identifies the type of EAP packet.      EAP Codes are assigned as follows:         1       Request         2       Response         3       Success         4       Failure   Identifier          The Identifier field is one octet and aids in matching          responses with requests.   Length          The Length field is two octets and indicates the length of the          EAP packet including the Code, Identifier, Length and Data          fields.  Octets outside the range of the Length field should          be treated as Data Link Layer padding and should be ignored on          reception.   Data          The Data field is zero or more octets.  The format of the Data          field is determined by the Code field.Blunk & Vollbrecht          Standards Track                     [Page 5]RFC 2284                          EAP                         March 19982.2.1.  Request and Response   Description      The Request packet is sent by the authenticator to the peer.  Each      Request has a type field which serves to indicate what is being      requested.  The authenticator MUST transmit an EAP packet with the      Code field set to 1 (Request).  Additional Request packets MUST be      sent until a valid Response packet is received, or an optional      retry counter expires.  Retransmitted Requests MUST be sent with      the same Identifier value in order to distinguish them from new      Requests.  The contents of the data field is dependent on the      Request type.  The peer MUST send a Response packet in reply to a      Request packet.  Responses MUST only be sent in reply to a      received Request and never retransmitted on a timer.  The      Identifier field of the Response MUST match that of the Request.         Implementation Note: Because the authentication process will         often involve user input, some care must be taken when deciding         upon retransmission strategies and authentication timeouts.  It         is suggested a retransmission timer of 6 seconds with a maximum         of 10 retransmissions be used as default.  One may wish to make         these timeouts longer in certain cases (e.g. where Token Cards         are involved).  Additionally, the peer must be prepared to         silently discard received retransmissions while waiting for         user input.   A summary of the Request and Response packet format is shown below.   The fields are transmitted from left to right.    0                   1                   2                   3    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |     Code      |  Identifier   |            Length             |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |     Type      |  Type-Data ...   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-   Code      1 for Request;      2 for Response.Blunk & Vollbrecht          Standards Track                     [Page 6]RFC 2284                          EAP                         March 1998   Identifier      The Identifier field is one octet.  The Identifier field MUST be      the same if a Request packet is retransmitted due to a timeout      while waiting for a Response.  Any new (non-retransmission)      Requests MUST modify the Identifier field.  If a peer recieves a      duplicate Request for which it has already sent a Response, it      MUST resend it's Response.  If a peer receives a duplicate Request      before it has sent a Response to the initial Request (i.e. it's      waiting for user input), it MUST silently discard the duplicate      Request.   Length      The Length field is two octets and indicates the length of the EAP      packet including the Code, Identifier, Length, Type, and Type-Data      fields.  Octets outside the range of the Length field should be      treated as Data Link Layer padding and should be ignored on      reception.   Type      The Type field is one octet.  This field indicates the Type of      Request or Response.  Only one Type MUST be specified per EAP      Request or Response.  Normally, the Type field of the Response      will be the same as the Type of the Request.  However, there is      also a Nak Response Type for indicating that a Request type is      unacceptable to the peer.  When sending a Nak in response to a      Request, the peer MAY indicate an alternative desired      authentication Type which it supports. An initial specification of      Types follows in a later section of this document.   Type-Data      The Type-Data field varies with the Type of Request and the      associated Response.2.2.2.  Success and Failure   Description      The Success packet is sent by the authenticator to the peer to      acknowledge successful authentication.  The authenticator MUST      transmit an EAP packet with the Code field set to 3 (Success).      If the authenticator cannot authenticate the peer (unacceptable      Responses to one or more Requests) then the implementation MUST      transmit an EAP packet with the Code field set to 4 (Failure).  AnBlunk & Vollbrecht          Standards Track                     [Page 7]RFC 2284                          EAP                         March 1998      authenticator MAY wish to issue multiple Requests before sending a      Failure response in order to allow for human typing mistakes.         Implementation Note: Because the Success and Failure packets         are not acknowledged, they may be potentially lost.  A peer         MUST allow for this circumstance.  The peer can use a Network         Protocol packet as an alternative indication of Success.         Likewise, the receipt of a LCP Terminate-Request can be taken         as a Failure.   A summary of the Success and Failure packet format is shown below.   The fields are transmitted from left to right.    0                   1                   2                   3    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |     Code      |  Identifier   |            Length             |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   Code      3 for Success;

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
99国产精品久久久久久久久久久| 欧美精品一区二| 日韩欧美在线不卡| 国产精品丝袜久久久久久app| 亚洲国产视频网站| 国产河南妇女毛片精品久久久| 欧美综合视频在线观看| 国产视频911| 日韩精品成人一区二区在线| 色婷婷一区二区三区四区| 精品国产麻豆免费人成网站| 亚洲成a人片在线观看中文| av在线播放不卡| 国产天堂亚洲国产碰碰| 日韩精品免费视频人成| 欧美偷拍一区二区| 亚洲欧美日韩在线不卡| 岛国一区二区三区| 久久久久久久久伊人| 裸体一区二区三区| 7777精品伊人久久久大香线蕉超级流畅| 亚洲欧洲日韩av| 国产成人av一区二区三区在线 | 亚洲午夜久久久久久久久电影院 | 日韩一区二区电影网| 亚洲午夜久久久久久久久久久| 成人免费高清视频在线观看| 精品国产乱码久久久久久久久| 日韩国产在线观看一区| 欧美日韩久久久| 亚洲国产欧美在线人成| 欧美性猛片aaaaaaa做受| 一片黄亚洲嫩模| 色呦呦网站一区| 亚洲伦理在线精品| 在线精品视频小说1| 亚洲综合无码一区二区| 色噜噜狠狠色综合欧洲selulu| 国产精品久久久久久久久久久免费看 | 亚洲欧洲www| 99在线精品观看| 亚洲乱码日产精品bd| 91丨porny丨国产入口| 日韩伦理av电影| 一本到高清视频免费精品| 亚洲天堂免费看| 欧美视频日韩视频在线观看| 天堂精品中文字幕在线| 日韩一级免费观看| 国产999精品久久| 亚洲欧洲国产日韩| 欧美麻豆精品久久久久久| 日韩专区中文字幕一区二区| 欧美成人精品二区三区99精品| 国产曰批免费观看久久久| 中文字幕乱码亚洲精品一区 | 国产精品久久久久久久蜜臀| 99免费精品在线| 亚洲123区在线观看| 久久综合99re88久久爱| 成人av集中营| 香蕉影视欧美成人| 精品国产三级a在线观看| 99国产精品久久| 日韩中文字幕91| 久久精品综合网| 在线一区二区三区四区五区| 麻豆精品久久久| 亚洲日本免费电影| 日韩一区二区三区视频在线| 成人网页在线观看| 亚洲丶国产丶欧美一区二区三区| 亚洲精品在线免费观看视频| 91亚洲男人天堂| 麻豆精品视频在线观看免费| 亚洲少妇30p| 精品国产乱码久久久久久影片| 91久久人澡人人添人人爽欧美| 男男视频亚洲欧美| 综合精品久久久| 久久蜜臀中文字幕| 欧美日韩一区 二区 三区 久久精品| 国产一区二区在线观看免费 | 亚洲欧洲国产日本综合| 欧美电影免费观看高清完整版在线观看 | 日韩精品一区二区三区老鸭窝| 色哦色哦哦色天天综合| 国产在线精品一区二区| 亚洲成人在线观看视频| 中文字幕中文字幕在线一区| 欧美成人a∨高清免费观看| 欧美三级韩国三级日本一级| 成人av片在线观看| 韩国v欧美v日本v亚洲v| 青青草国产成人av片免费| 亚洲欧洲制服丝袜| 久久久不卡影院| 26uuu精品一区二区三区四区在线| 欧美性大战久久久| 一本到不卡免费一区二区| 风流少妇一区二区| 国产揄拍国内精品对白| 秋霞影院一区二区| 日日夜夜免费精品视频| 亚洲高清不卡在线| 亚洲夂夂婷婷色拍ww47| 亚洲欧美偷拍三级| 国产精品成人在线观看| 国产精品另类一区| 国产欧美一区二区三区网站| 亚洲成人你懂的| 中文字幕成人av| 久久久精品免费免费| 久久影视一区二区| 精品国产制服丝袜高跟| 精品少妇一区二区三区在线视频| 91精品国产免费| 91精品综合久久久久久| 91精品国产综合久久精品性色| 欧美挠脚心视频网站| 4438x成人网最大色成网站| 欧美喷潮久久久xxxxx| 欧美乱妇15p| 91精品国产综合久久久久| 日韩欧美一区在线观看| 精品免费一区二区三区| 国产亚洲综合性久久久影院| 日本一区二区免费在线观看视频 | 成人动漫av在线| 国产福利一区二区三区| 成人av资源下载| 91丨九色丨蝌蚪富婆spa| 欧洲国内综合视频| 欧美一区二区三区啪啪| 久久久久久电影| 中文字幕日韩一区| 亚洲国产人成综合网站| 免费观看在线综合| 国产91清纯白嫩初高中在线观看| 国产精品白丝jk白祙喷水网站 | 国产精品久久精品日日| 亚洲免费观看在线观看| 午夜精品久久久久久久久| 全部av―极品视觉盛宴亚洲| 国产黄人亚洲片| 色婷婷av一区二区三区之一色屋| 欧美日韩国产在线观看| 日韩欧美国产综合在线一区二区三区| 久久一区二区三区四区| 国产精品入口麻豆原神| 一级女性全黄久久生活片免费| 日本三级亚洲精品| 成人一区二区三区在线观看| 欧美日韩午夜影院| 久久综合色鬼综合色| 亚洲日本va午夜在线电影| 日本视频一区二区三区| 成人黄色小视频在线观看| 欧美肥胖老妇做爰| 国产精品久久久久9999吃药| 日本欧美一区二区三区乱码| 波多野结衣中文字幕一区二区三区 | 日韩精品国产精品| 成人深夜在线观看| 337p亚洲精品色噜噜| 国产精品免费视频一区| 秋霞午夜鲁丝一区二区老狼| 99久久精品国产精品久久| 91精品国产综合久久香蕉的特点| 中文字幕一区二区三区蜜月| 奇米影视一区二区三区| 91传媒视频在线播放| 国产日韩欧美激情| 免费一级片91| 97se亚洲国产综合自在线不卡| 91精品国产综合久久久蜜臀粉嫩 | 亚洲欧美日韩综合aⅴ视频| 国内欧美视频一区二区| 欧美精品国产精品| 亚洲精品成人精品456| 国产精品一级片在线观看| 制服丝袜日韩国产| 一区二区三国产精华液| 国产69精品久久久久777| 欧美一区2区视频在线观看| 夜夜爽夜夜爽精品视频| www.综合网.com| 国产日韩精品一区二区浪潮av| 日韩不卡一区二区三区| 欧美优质美女网站| 亚洲日本一区二区三区| av亚洲精华国产精华| 国产三区在线成人av| 国产一区二区美女诱惑| 欧美岛国在线观看| 麻豆免费看一区二区三区| 91精品国产91久久久久久一区二区 | 成人小视频在线| 欧美高清一级片在线观看| 国产麻豆9l精品三级站|