亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-cam-winget-eap-fast-03.txt

?? linux 下通過802.1認證的安裝包
?? TXT
?? 第 1 頁 / 共 5 頁
字號:



Network Working Group                                      N. Cam-Winget
Internet-Draft                                                 D. McGrew
Expires: April 22, 2006                                       J. Salowey
                                                                 H. Zhou
                                                           Cisco Systems
                                                        October 19, 2005


      The Flexible Authentication via Secure Tunneling Extensible
               Authentication Protocol Method (EAP-FAST)
                    draft-cam-winget-eap-fast-03.txt

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on April 22, 2006.

Copyright Notice

   Copyright (C) The Internet Society (2005).

Abstract

   This document defines the Extensible Authentication Protocol (EAP)
   based Flexible Authentication via Secure Tunneling (EAP-FAST)
   protocol.  EAP-FAST is an EAP method that enables secure
   communication between a peer and a server by using the Transport
   Layer Security (TLS) to establish a mutually authenticated tunnel.



Cam-Winget, et al.       Expires April 22, 2006                 [Page 1]

Internet-Draft                  EAP-FAST                    October 2005


   Within the tunnel, Type-Length-Value (TLV) objects are used to convey
   authentication related data between the peer and the EAP server.

Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  4
     1.1   Specification Requirements . . . . . . . . . . . . . . . .  5
     1.2   Terminology  . . . . . . . . . . . . . . . . . . . . . . .  5
   2.  Protocol Overview  . . . . . . . . . . . . . . . . . . . . . .  5
     2.1   Architectural Model  . . . . . . . . . . . . . . . . . . .  6
     2.2   Protocol Layering Model  . . . . . . . . . . . . . . . . .  7
   3.  EAP-FAST Protocol  . . . . . . . . . . . . . . . . . . . . . .  7
     3.1   Version Negotiation  . . . . . . . . . . . . . . . . . . .  8
     3.2   EAP-FAST Authentication Phase 1: Tunnel Establishment  . .  9
       3.2.1   TLS Session Resume using Server State  . . . . . . . . 10
       3.2.2   TLS Session Resume Using a PAC . . . . . . . . . . . . 10
       3.2.3   Transition between Abbreviated and Full TLS
               Handshake  . . . . . . . . . . . . . . . . . . . . . . 11
     3.3   EAP-FAST Authentication Phase 2: Tunneled
           Authentication . . . . . . . . . . . . . . . . . . . . . . 12
       3.3.1   EAP Sequences  . . . . . . . . . . . . . . . . . . . . 12
       3.3.2   Protected Termination and Acknowledged Result
               Indication . . . . . . . . . . . . . . . . . . . . . . 13
     3.4   Error Handling . . . . . . . . . . . . . . . . . . . . . . 14
       3.4.1   TLS Layer Errors . . . . . . . . . . . . . . . . . . . 14
       3.4.2   Phase 2 Errors . . . . . . . . . . . . . . . . . . . . 14
     3.5   Fragmentation  . . . . . . . . . . . . . . . . . . . . . . 15
   4.  Message Formats  . . . . . . . . . . . . . . . . . . . . . . . 16
     4.1   EAP-FAST Message Format  . . . . . . . . . . . . . . . . . 16
       4.1.1   Authority ID Data  . . . . . . . . . . . . . . . . . . 18
     4.2   EAP-FAST TLV Format and Support  . . . . . . . . . . . . . 19
       4.2.1   General TLV Format . . . . . . . . . . . . . . . . . . 19
       4.2.2   Result TLV . . . . . . . . . . . . . . . . . . . . . . 20
       4.2.3   NAK TLV  . . . . . . . . . . . . . . . . . . . . . . . 21
       4.2.4   Error TLV  . . . . . . . . . . . . . . . . . . . . . . 23
       4.2.5   Vendor-Specific TLV  . . . . . . . . . . . . . . . . . 24
       4.2.6   EAP-Payload TLV  . . . . . . . . . . . . . . . . . . . 25
       4.2.7   Intermediate-Result TLV  . . . . . . . . . . . . . . . 26
       4.2.8   Crypto-Binding TLV . . . . . . . . . . . . . . . . . . 27
       4.2.9   Request-Action TLV . . . . . . . . . . . . . . . . . . 29
     4.3   Table of TLVs  . . . . . . . . . . . . . . . . . . . . . . 30
   5.  Cryptographic Calculations . . . . . . . . . . . . . . . . . . 31
     5.1   EAP-FAST Authentication Phase 1: Key Derivations . . . . . 31
     5.2   Intermediate Compound Key Derivations  . . . . . . . . . . 32
     5.3   Computing the Compound MAC . . . . . . . . . . . . . . . . 32
     5.4   EAP Master Session Key Generation  . . . . . . . . . . . . 33
     5.5   T-PRF  . . . . . . . . . . . . . . . . . . . . . . . . . . 33
   6.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 34



Cam-Winget, et al.       Expires April 22, 2006                 [Page 2]

Internet-Draft                  EAP-FAST                    October 2005


   7.  Security Considerations  . . . . . . . . . . . . . . . . . . . 34
     7.1   Mutual Authentication and Integrity Protection . . . . . . 35
     7.2   Method Negotiation . . . . . . . . . . . . . . . . . . . . 35
     7.3   Separation of the EAP Server and the Authenticator . . . . 36
     7.4   Separation of Phase 1 and Phase 2 Servers  . . . . . . . . 36
     7.5   Mitigation of Known Vulnerabilities and Protocol
           Deficiencies . . . . . . . . . . . . . . . . . . . . . . . 37
       7.5.1   User Identity Protection and Verification  . . . . . . 38
       7.5.2   Dictionary Attack Resistance . . . . . . . . . . . . . 39
       7.5.3   Protection against MitM Attacks  . . . . . . . . . . . 39
       7.5.4   PAC Validation with User Credentials . . . . . . . . . 40
     7.6   Protecting against Forged Clear Text EAP Packets . . . . . 41
     7.7   Implementation . . . . . . . . . . . . . . . . . . . . . . 42
     7.8   Server Certificate Validation  . . . . . . . . . . . . . . 42
     7.9   Security Claims  . . . . . . . . . . . . . . . . . . . . . 42
   8.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 43
   9.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 43
     9.1   Normative References . . . . . . . . . . . . . . . . . . . 43
     9.2   Informative References . . . . . . . . . . . . . . . . . . 44
       Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 44
   A.  Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
     A.1   Successful Authentication  . . . . . . . . . . . . . . . . 45
     A.2   Failed Authentication  . . . . . . . . . . . . . . . . . . 46
     A.3   Full TLS Handshake using Certificate-based Cipher Suite  . 48
     A.4   Client authentication during Phase 1 with identity
           privacy  . . . . . . . . . . . . . . . . . . . . . . . . . 49
     A.5   Fragmentation and Reassembly . . . . . . . . . . . . . . . 51
     A.6   Sequence of EAP Methods  . . . . . . . . . . . . . . . . . 53
     A.7   Failed Crypto-binding  . . . . . . . . . . . . . . . . . . 55
     A.8   Stateless Session Resume Using Authorization PAC . . . . . 57
     A.9   Sequence of EAP Method with Vendor-Specific TLV
           Exchange . . . . . . . . . . . . . . . . . . . . . . . . . 58
   B.  Test Vectors . . . . . . . . . . . . . . . . . . . . . . . . . 60
     B.1   Key Derivation . . . . . . . . . . . . . . . . . . . . . . 60
     B.2   Crypto-Binding MIC . . . . . . . . . . . . . . . . . . . . 62
       Intellectual Property and Copyright Statements . . . . . . . . 63















Cam-Winget, et al.       Expires April 22, 2006                 [Page 3]

Internet-Draft                  EAP-FAST                    October 2005


1.  Introduction

   The need to provide user friendly and easily deployable network
   access solutions has heightened the need for strong mutual
   authentication protocols that internally use weak user credentials.
   This document defines the base protocol which consists of
   establishing a Transport Layer Security (TLS) tunnel as defined in
   [RFC2246] and then exchanging data in the form of type, length, value
   objects (TLV) to perform further authentication.  [I-D.cam-winget-
   eap-fast-provisioning] defines extensions to provision an additional
   credential called a protected access credential (PAC) to optimize the
   EAP-FAST exchange.  In addition to regular TLS ciphersuites and
   handshakes, EAP-FAST supports using a PAC with the TLS extension
   defined in [I-D.salowey-tls-ticket] in order to support fast re-
   establishment of the secure tunnel without having to maintain per-
   session state on the server as described in Section 3.2.2.

   EAP-FAST's design motivations included:

   o  Mutual Authentication: an EAP Server must be able to verify the
      identity and authenticity of the peer, and the peer must be able
      to verify the authenticity of the EAP server.

   o  Immunity to passive dictionary attacks: as many authentication
      protocols require the password to be explicitly provided (either
      in the clear or hashed) by the peer to the EAP server; at minimum,
      the communication of the weak credential (e.g. password) must be
      immune from eavesdropping.

   o  Immunity to man-in-the-middle (MitM) attacks: in establishing a
      mutually authenticated protected tunnel, the protocol must prevent
      adversaries from successfully interjecting information into the
      conversation between the peer and the EAP server.

   o  Flexibility to enable support for most password authentication
      interfaces: as many different password interfaces (e.g.  MSCHAP,
      LDAP, OTP, etc) exist to authenticate a peer, the protocol must
      provide this support seamlessly.

   o  Efficiency: specifically when using wireless media, peers will be
      limited in computational and power resources.  The protocol must
      enable the network access communication to be computationally
      lightweight.

   With these motivational goals defined, further secondary design
   criteria are imposed:





Cam-Winget, et al.       Expires April 22, 2006                 [Page 4]

Internet-Draft                  EAP-FAST                    October 2005


   o  Flexibility to extend the communications inside the tunnel: with
      the growing complexity in network infrastructures the need to gain
      authentication, authorization and accounting is also evolving.
      For instance, there may be instances in which multiple (already
      existent) authentication protocols are required to achieve mutual
      authentication.  Similarly, different protected conversations may
      be required to achieve the proper authorization once a peer has
      successfully authenticated.

   o  Minimize the authentication server's per user authentication state
      requirements: with large deployments, it is typical to have many
      servers acting as the authentication servers for many peers.  It
      is also highly desirable for a peer to use the same shared secret
      to secure a tunnel much the same way it uses the username and
      password to gain access to the network.  The protocol must
      facilitate the use of a single strong shared secret by the peer
      while enabling the servers to minimize the per user and device
      state it must cache and manage.

1.1  Specification Requirements

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119] .

1.2  Terminology

   Much of the terminology in this document comes from [RFC3748].
   Additional terms are defined below:

   Protected Access Credential (PAC)

      Credentials distributed to a peer for future optimized network
      authentication.  The PAC consists of at most three components: a
      shared secret, an opaque element and optionally other information.
      The shared secret part contains the pre-shared key between the
      peer and the authentication server.  The opaque part is provided
      to the peer and is presented to the authentication server when the
      peer wishes to obtain access to network resources.  Finally, a PAC
      may optionally include other information that may be useful to the
      peer.  The opaque part of the PAC is the same type of data as the
      ticket in [I-D.salowey-tls-ticket].

2.  Protocol Overview

   EAP-FAST is an authentication protocol similar to EAP-TLS [RFC2716]
   that enables mutual authentication and cryptographic context
   establishment by using the TLS handshake protocol.  EAP-FAST allows



Cam-Winget, et al.       Expires April 22, 2006                 [Page 5]

Internet-Draft                  EAP-FAST                    October 2005


   for the established TLS tunnel to be used for further authentication
   exchanges.  EAP-FAST makes use of TLVs to carry out the inner
   authentication exchanges.  The tunnel is then used to protect weaker
   inner authentication methods, which may be based on passwords, and to
   communicate the results of the authentication.

   EAP-FAST makes use of the TLS enhancements in [I-D.salowey-tls-
   ticket] to enable an optimized TLS tunnel session resume while
   minimizing server state.  In EAP-FAST the key and ticket used to
   establish the tunnel may be provisioned through mechanisms that do
   not involve the TLS handshake.  It is RECOMMENDED that
   implementations support the capability to distribute the ticket and
   secret key within the EAP-FAST tunnel as specified in [I-D.cam-
   winget-eap-fast-provisioning].  The pre-shared secret used in EAP-
   FAST is referred to as the protected access credential key (or PAC-
   Key); the PAC-Key is used to mutually authenticate the peer and the
   server when securing a tunnel.  The ticket is referred to as the
   protected access credential opaque data (or PAC-Opaque).

   The EAP-FAST conversation is used to establish or resume an existing
   session to typically establish network connectivity between a peer
   and the network.  Upon successful execution of EAP-FAST both EAP Peer
   and EAP Server derive strong session keys which can then communicated
   to the network access server (NAS).

2.1  Architectural Model

   The network architectural model for EAP-FAST usage is shown below:

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
人妖欧美一区二区| 国产精品久久一卡二卡| 欧美国产精品一区| 卡一卡二国产精品| 国产精品免费丝袜| 国产自产高清不卡| 不卡高清视频专区| 成人黄色免费短视频| 5566中文字幕一区二区电影| 日韩avvvv在线播放| 亚洲一级二级三级在线免费观看| 日韩影院在线观看| 成人免费毛片aaaaa**| 欧美日韩一区二区在线观看| 亚洲人吸女人奶水| 久久成人久久爱| 欧美日韩亚洲丝袜制服| 亚洲欧洲成人精品av97| 国产精一区二区三区| 欧美日韩情趣电影| 亚洲自拍偷拍九九九| av在线播放不卡| 亚洲欧美一区二区在线观看| 国产乱子伦视频一区二区三区| 日韩精品专区在线| 免费看欧美女人艹b| 欧美在线观看一二区| 自拍偷自拍亚洲精品播放| 丰满亚洲少妇av| 久久精品一区二区| 粉嫩av一区二区三区在线播放 | 91极品美女在线| 亚洲欧洲国产日韩| 色综合久久久久网| 亚洲最大成人网4388xx| 色婷婷综合久久久中文一区二区 | 日韩久久久精品| 美女网站色91| 精品成人在线观看| 国产精品99久久不卡二区| 精品久久久久久最新网址| 久久aⅴ国产欧美74aaa| 久久一留热品黄| 国产精品77777竹菊影视小说| 久久久久国产精品厨房| 国产美女精品人人做人人爽| 国产亚洲综合性久久久影院| 成人午夜激情片| 亚洲免费高清视频在线| 欧美视频在线播放| 日韩电影免费在线观看网站| 精品久久久久久久久久久院品网| 国产一区不卡视频| 国产精品久久三区| 欧美亚洲愉拍一区二区| 日本最新不卡在线| 久久精品亚洲一区二区三区浴池| 波多野结衣中文字幕一区| 亚洲欧美视频在线观看视频| 欧美日韩一级黄| 国产又粗又猛又爽又黄91精品| 国产精品日韩精品欧美在线| 欧美日韩视频一区二区| 看电视剧不卡顿的网站| 国产精品乱人伦中文| 欧美日韩国产综合一区二区三区| 日本在线播放一区二区三区| 欧美激情综合在线| 26uuu亚洲婷婷狠狠天堂| 狠狠色丁香久久婷婷综| 国产精品久久久久久久岛一牛影视 | 欧美草草影院在线视频| 成人黄色a**站在线观看| 亚洲一级二级在线| 久久久精品人体av艺术| 欧美亚洲一区二区在线观看| 亚洲少妇中出一区| 国产一区二区三区免费看| 成人av在线网| 久久综合资源网| 视频一区在线播放| 日本一区二区成人| 激情成人午夜视频| 精品剧情在线观看| 免费在线观看精品| 欧美zozozo| 国产麻豆午夜三级精品| 久久久五月婷婷| 国产在线精品一区二区三区不卡| 56国语精品自产拍在线观看| 亚洲女爱视频在线| 欧美午夜精品一区二区三区| 亚洲国产精品二十页| 国产精品一区二区黑丝| 亚洲欧洲在线观看av| 麻豆国产精品一区二区三区| www.视频一区| 26uuu另类欧美亚洲曰本| 精品一区二区精品| 国产日韩精品一区| 欧美日韩精品免费观看视频| 欧美一区二区黄色| 国产色产综合产在线视频| 国产精品综合二区| 综合久久一区二区三区| 国产欧美一区二区精品性色超碰| 欧美日韩中文精品| 色丁香久综合在线久综合在线观看| 国产99久久久精品| 国产成a人无v码亚洲福利| 国产一区二区在线观看免费| 久久精品国产色蜜蜜麻豆| 丝袜美腿亚洲色图| 日韩中文字幕不卡| 日韩精彩视频在线观看| 午夜影视日本亚洲欧洲精品| 一区二区三区中文免费| 一个色妞综合视频在线观看| 亚洲美女淫视频| 一区二区三区四区不卡在线 | 奇米亚洲午夜久久精品| 午夜视频在线观看一区| 亚洲大片在线观看| 午夜欧美大尺度福利影院在线看| 亚洲观看高清完整版在线观看| 亚洲制服丝袜在线| 日韩在线播放一区二区| 毛片一区二区三区| 国产真实乱对白精彩久久| 国产成人精品综合在线观看 | 自拍偷拍国产精品| 亚洲欧美日韩人成在线播放| 一区二区三区国产精品| 午夜精品视频在线观看| 美女一区二区三区| 国产69精品一区二区亚洲孕妇| www.综合网.com| 色综合中文字幕国产| 色哟哟精品一区| 91精品国产综合久久精品app| 精品久久久网站| 国产日本欧洲亚洲| 亚洲免费观看高清完整版在线观看 | 香港成人在线视频| 成人国产在线观看| 欧美色视频在线| 精品美女一区二区| 中文乱码免费一区二区| 玉米视频成人免费看| 蜜桃视频在线观看一区二区| 国产ts人妖一区二区| 欧洲激情一区二区| 26uuu久久天堂性欧美| 国产精品国产三级国产aⅴ入口 | 久久99精品国产| 91亚洲永久精品| 91精品国产手机| 国产精品欧美经典| 日韩av电影免费观看高清完整版| 粉嫩蜜臀av国产精品网站| 欧美日韩高清一区二区不卡| 久久久久久99久久久精品网站| 亚洲欧美二区三区| 国产伦精一区二区三区| 欧美日韩一区二区三区四区| 国产农村妇女毛片精品久久麻豆| 亚洲一卡二卡三卡四卡五卡| 福利电影一区二区| 4438x亚洲最大成人网| 亚洲免费观看高清完整版在线观看| 免费欧美在线视频| 色婷婷综合久久久中文字幕| 久久这里只有精品6| 三级在线观看一区二区| 成人免费观看视频| 精品国产a毛片| 五月激情综合色| 欧洲色大大久久| 国产精品免费视频观看| 精品一区二区在线播放| 欧美人体做爰大胆视频| 亚洲乱码中文字幕综合| 成人性视频免费网站| 久久综合99re88久久爱| 日韩成人伦理电影在线观看| 欧洲国产伦久久久久久久| 国产精品蜜臀av| 成人国产精品免费观看| 精品国产一区二区国模嫣然| 日本在线观看不卡视频| 欧美日韩黄色影视| 亚洲日本va在线观看| 99久久精品国产网站| 久久久久综合网| 国模套图日韩精品一区二区| 精品国产一区久久| 成人免费视频视频在线观看免费| 26uuu欧美| 国产成人亚洲综合a∨婷婷图片| 久久综合色婷婷|