亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-cam-winget-eap-fast-03.txt

?? linux 下通過802.1認證的安裝包
?? TXT
?? 第 1 頁 / 共 5 頁
字號:



Network Working Group                                      N. Cam-Winget
Internet-Draft                                                 D. McGrew
Expires: April 22, 2006                                       J. Salowey
                                                                 H. Zhou
                                                           Cisco Systems
                                                        October 19, 2005


      The Flexible Authentication via Secure Tunneling Extensible
               Authentication Protocol Method (EAP-FAST)
                    draft-cam-winget-eap-fast-03.txt

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on April 22, 2006.

Copyright Notice

   Copyright (C) The Internet Society (2005).

Abstract

   This document defines the Extensible Authentication Protocol (EAP)
   based Flexible Authentication via Secure Tunneling (EAP-FAST)
   protocol.  EAP-FAST is an EAP method that enables secure
   communication between a peer and a server by using the Transport
   Layer Security (TLS) to establish a mutually authenticated tunnel.



Cam-Winget, et al.       Expires April 22, 2006                 [Page 1]

Internet-Draft                  EAP-FAST                    October 2005


   Within the tunnel, Type-Length-Value (TLV) objects are used to convey
   authentication related data between the peer and the EAP server.

Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  4
     1.1   Specification Requirements . . . . . . . . . . . . . . . .  5
     1.2   Terminology  . . . . . . . . . . . . . . . . . . . . . . .  5
   2.  Protocol Overview  . . . . . . . . . . . . . . . . . . . . . .  5
     2.1   Architectural Model  . . . . . . . . . . . . . . . . . . .  6
     2.2   Protocol Layering Model  . . . . . . . . . . . . . . . . .  7
   3.  EAP-FAST Protocol  . . . . . . . . . . . . . . . . . . . . . .  7
     3.1   Version Negotiation  . . . . . . . . . . . . . . . . . . .  8
     3.2   EAP-FAST Authentication Phase 1: Tunnel Establishment  . .  9
       3.2.1   TLS Session Resume using Server State  . . . . . . . . 10
       3.2.2   TLS Session Resume Using a PAC . . . . . . . . . . . . 10
       3.2.3   Transition between Abbreviated and Full TLS
               Handshake  . . . . . . . . . . . . . . . . . . . . . . 11
     3.3   EAP-FAST Authentication Phase 2: Tunneled
           Authentication . . . . . . . . . . . . . . . . . . . . . . 12
       3.3.1   EAP Sequences  . . . . . . . . . . . . . . . . . . . . 12
       3.3.2   Protected Termination and Acknowledged Result
               Indication . . . . . . . . . . . . . . . . . . . . . . 13
     3.4   Error Handling . . . . . . . . . . . . . . . . . . . . . . 14
       3.4.1   TLS Layer Errors . . . . . . . . . . . . . . . . . . . 14
       3.4.2   Phase 2 Errors . . . . . . . . . . . . . . . . . . . . 14
     3.5   Fragmentation  . . . . . . . . . . . . . . . . . . . . . . 15
   4.  Message Formats  . . . . . . . . . . . . . . . . . . . . . . . 16
     4.1   EAP-FAST Message Format  . . . . . . . . . . . . . . . . . 16
       4.1.1   Authority ID Data  . . . . . . . . . . . . . . . . . . 18
     4.2   EAP-FAST TLV Format and Support  . . . . . . . . . . . . . 19
       4.2.1   General TLV Format . . . . . . . . . . . . . . . . . . 19
       4.2.2   Result TLV . . . . . . . . . . . . . . . . . . . . . . 20
       4.2.3   NAK TLV  . . . . . . . . . . . . . . . . . . . . . . . 21
       4.2.4   Error TLV  . . . . . . . . . . . . . . . . . . . . . . 23
       4.2.5   Vendor-Specific TLV  . . . . . . . . . . . . . . . . . 24
       4.2.6   EAP-Payload TLV  . . . . . . . . . . . . . . . . . . . 25
       4.2.7   Intermediate-Result TLV  . . . . . . . . . . . . . . . 26
       4.2.8   Crypto-Binding TLV . . . . . . . . . . . . . . . . . . 27
       4.2.9   Request-Action TLV . . . . . . . . . . . . . . . . . . 29
     4.3   Table of TLVs  . . . . . . . . . . . . . . . . . . . . . . 30
   5.  Cryptographic Calculations . . . . . . . . . . . . . . . . . . 31
     5.1   EAP-FAST Authentication Phase 1: Key Derivations . . . . . 31
     5.2   Intermediate Compound Key Derivations  . . . . . . . . . . 32
     5.3   Computing the Compound MAC . . . . . . . . . . . . . . . . 32
     5.4   EAP Master Session Key Generation  . . . . . . . . . . . . 33
     5.5   T-PRF  . . . . . . . . . . . . . . . . . . . . . . . . . . 33
   6.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 34



Cam-Winget, et al.       Expires April 22, 2006                 [Page 2]

Internet-Draft                  EAP-FAST                    October 2005


   7.  Security Considerations  . . . . . . . . . . . . . . . . . . . 34
     7.1   Mutual Authentication and Integrity Protection . . . . . . 35
     7.2   Method Negotiation . . . . . . . . . . . . . . . . . . . . 35
     7.3   Separation of the EAP Server and the Authenticator . . . . 36
     7.4   Separation of Phase 1 and Phase 2 Servers  . . . . . . . . 36
     7.5   Mitigation of Known Vulnerabilities and Protocol
           Deficiencies . . . . . . . . . . . . . . . . . . . . . . . 37
       7.5.1   User Identity Protection and Verification  . . . . . . 38
       7.5.2   Dictionary Attack Resistance . . . . . . . . . . . . . 39
       7.5.3   Protection against MitM Attacks  . . . . . . . . . . . 39
       7.5.4   PAC Validation with User Credentials . . . . . . . . . 40
     7.6   Protecting against Forged Clear Text EAP Packets . . . . . 41
     7.7   Implementation . . . . . . . . . . . . . . . . . . . . . . 42
     7.8   Server Certificate Validation  . . . . . . . . . . . . . . 42
     7.9   Security Claims  . . . . . . . . . . . . . . . . . . . . . 42
   8.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 43
   9.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 43
     9.1   Normative References . . . . . . . . . . . . . . . . . . . 43
     9.2   Informative References . . . . . . . . . . . . . . . . . . 44
       Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 44
   A.  Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
     A.1   Successful Authentication  . . . . . . . . . . . . . . . . 45
     A.2   Failed Authentication  . . . . . . . . . . . . . . . . . . 46
     A.3   Full TLS Handshake using Certificate-based Cipher Suite  . 48
     A.4   Client authentication during Phase 1 with identity
           privacy  . . . . . . . . . . . . . . . . . . . . . . . . . 49
     A.5   Fragmentation and Reassembly . . . . . . . . . . . . . . . 51
     A.6   Sequence of EAP Methods  . . . . . . . . . . . . . . . . . 53
     A.7   Failed Crypto-binding  . . . . . . . . . . . . . . . . . . 55
     A.8   Stateless Session Resume Using Authorization PAC . . . . . 57
     A.9   Sequence of EAP Method with Vendor-Specific TLV
           Exchange . . . . . . . . . . . . . . . . . . . . . . . . . 58
   B.  Test Vectors . . . . . . . . . . . . . . . . . . . . . . . . . 60
     B.1   Key Derivation . . . . . . . . . . . . . . . . . . . . . . 60
     B.2   Crypto-Binding MIC . . . . . . . . . . . . . . . . . . . . 62
       Intellectual Property and Copyright Statements . . . . . . . . 63















Cam-Winget, et al.       Expires April 22, 2006                 [Page 3]

Internet-Draft                  EAP-FAST                    October 2005


1.  Introduction

   The need to provide user friendly and easily deployable network
   access solutions has heightened the need for strong mutual
   authentication protocols that internally use weak user credentials.
   This document defines the base protocol which consists of
   establishing a Transport Layer Security (TLS) tunnel as defined in
   [RFC2246] and then exchanging data in the form of type, length, value
   objects (TLV) to perform further authentication.  [I-D.cam-winget-
   eap-fast-provisioning] defines extensions to provision an additional
   credential called a protected access credential (PAC) to optimize the
   EAP-FAST exchange.  In addition to regular TLS ciphersuites and
   handshakes, EAP-FAST supports using a PAC with the TLS extension
   defined in [I-D.salowey-tls-ticket] in order to support fast re-
   establishment of the secure tunnel without having to maintain per-
   session state on the server as described in Section 3.2.2.

   EAP-FAST's design motivations included:

   o  Mutual Authentication: an EAP Server must be able to verify the
      identity and authenticity of the peer, and the peer must be able
      to verify the authenticity of the EAP server.

   o  Immunity to passive dictionary attacks: as many authentication
      protocols require the password to be explicitly provided (either
      in the clear or hashed) by the peer to the EAP server; at minimum,
      the communication of the weak credential (e.g. password) must be
      immune from eavesdropping.

   o  Immunity to man-in-the-middle (MitM) attacks: in establishing a
      mutually authenticated protected tunnel, the protocol must prevent
      adversaries from successfully interjecting information into the
      conversation between the peer and the EAP server.

   o  Flexibility to enable support for most password authentication
      interfaces: as many different password interfaces (e.g.  MSCHAP,
      LDAP, OTP, etc) exist to authenticate a peer, the protocol must
      provide this support seamlessly.

   o  Efficiency: specifically when using wireless media, peers will be
      limited in computational and power resources.  The protocol must
      enable the network access communication to be computationally
      lightweight.

   With these motivational goals defined, further secondary design
   criteria are imposed:





Cam-Winget, et al.       Expires April 22, 2006                 [Page 4]

Internet-Draft                  EAP-FAST                    October 2005


   o  Flexibility to extend the communications inside the tunnel: with
      the growing complexity in network infrastructures the need to gain
      authentication, authorization and accounting is also evolving.
      For instance, there may be instances in which multiple (already
      existent) authentication protocols are required to achieve mutual
      authentication.  Similarly, different protected conversations may
      be required to achieve the proper authorization once a peer has
      successfully authenticated.

   o  Minimize the authentication server's per user authentication state
      requirements: with large deployments, it is typical to have many
      servers acting as the authentication servers for many peers.  It
      is also highly desirable for a peer to use the same shared secret
      to secure a tunnel much the same way it uses the username and
      password to gain access to the network.  The protocol must
      facilitate the use of a single strong shared secret by the peer
      while enabling the servers to minimize the per user and device
      state it must cache and manage.

1.1  Specification Requirements

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119] .

1.2  Terminology

   Much of the terminology in this document comes from [RFC3748].
   Additional terms are defined below:

   Protected Access Credential (PAC)

      Credentials distributed to a peer for future optimized network
      authentication.  The PAC consists of at most three components: a
      shared secret, an opaque element and optionally other information.
      The shared secret part contains the pre-shared key between the
      peer and the authentication server.  The opaque part is provided
      to the peer and is presented to the authentication server when the
      peer wishes to obtain access to network resources.  Finally, a PAC
      may optionally include other information that may be useful to the
      peer.  The opaque part of the PAC is the same type of data as the
      ticket in [I-D.salowey-tls-ticket].

2.  Protocol Overview

   EAP-FAST is an authentication protocol similar to EAP-TLS [RFC2716]
   that enables mutual authentication and cryptographic context
   establishment by using the TLS handshake protocol.  EAP-FAST allows



Cam-Winget, et al.       Expires April 22, 2006                 [Page 5]

Internet-Draft                  EAP-FAST                    October 2005


   for the established TLS tunnel to be used for further authentication
   exchanges.  EAP-FAST makes use of TLVs to carry out the inner
   authentication exchanges.  The tunnel is then used to protect weaker
   inner authentication methods, which may be based on passwords, and to
   communicate the results of the authentication.

   EAP-FAST makes use of the TLS enhancements in [I-D.salowey-tls-
   ticket] to enable an optimized TLS tunnel session resume while
   minimizing server state.  In EAP-FAST the key and ticket used to
   establish the tunnel may be provisioned through mechanisms that do
   not involve the TLS handshake.  It is RECOMMENDED that
   implementations support the capability to distribute the ticket and
   secret key within the EAP-FAST tunnel as specified in [I-D.cam-
   winget-eap-fast-provisioning].  The pre-shared secret used in EAP-
   FAST is referred to as the protected access credential key (or PAC-
   Key); the PAC-Key is used to mutually authenticate the peer and the
   server when securing a tunnel.  The ticket is referred to as the
   protected access credential opaque data (or PAC-Opaque).

   The EAP-FAST conversation is used to establish or resume an existing
   session to typically establish network connectivity between a peer
   and the network.  Upon successful execution of EAP-FAST both EAP Peer
   and EAP Server derive strong session keys which can then communicated
   to the network access server (NAS).

2.1  Architectural Model

   The network architectural model for EAP-FAST usage is shown below:

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
麻豆视频观看网址久久| 成人免费毛片片v| 久久久久久综合| 欧美主播一区二区三区美女| 国产九色sp调教91| 日韩黄色在线观看| 亚洲精品免费电影| 欧美国产精品久久| 久久午夜国产精品| 欧美一区二区三区在线视频 | 国产大陆亚洲精品国产| 五月天中文字幕一区二区| 国产精品二三区| 久久久久高清精品| 91精品国产欧美一区二区18| 91国内精品野花午夜精品| 成人av在线一区二区| 久久99热狠狠色一区二区| 亚洲va天堂va国产va久| 一区二区在线观看av| 国产精品传媒视频| 中文字幕第一区综合| 久久伊99综合婷婷久久伊| 日韩亚洲欧美一区二区三区| 欧美岛国在线观看| 欧美日韩国产高清一区二区三区| 视频在线观看91| 日韩一区二区电影网| 亚洲v日本v欧美v久久精品| 欧美精品v国产精品v日韩精品 | 色菇凉天天综合网| 国产一区三区三区| 狠狠色狠狠色合久久伊人| 美脚の诱脚舐め脚责91| 石原莉奈在线亚洲二区| 亚洲国产精品久久人人爱| 亚洲一区二区三区三| 亚洲国产精品久久久男人的天堂| 怡红院av一区二区三区| 亚洲一区二区三区不卡国产欧美| 亚洲图片自拍偷拍| 首页国产丝袜综合| √…a在线天堂一区| 欧美伦理视频网站| 欧美精品一二三四| 制服丝袜中文字幕亚洲| 欧美电影免费观看高清完整版在线观看| 欧美高清视频在线高清观看mv色露露十八| 欧美色大人视频| 欧美一区二视频| 久久青草欧美一区二区三区| 久久噜噜亚洲综合| 国产精品成人一区二区三区夜夜夜| 国产精品色哟哟| 亚洲视频一区二区在线观看| 一区二区三区四区中文字幕| 亚洲图片欧美一区| 美腿丝袜亚洲一区| 国产福利91精品一区二区三区| 成人黄色在线看| 欧美视频在线观看一区| 欧美一区二区三区四区久久| 久久久久久久网| 亚洲精品视频在线看| 五月天网站亚洲| 国产自产视频一区二区三区| 成人高清在线视频| 91丨porny丨户外露出| 欧美日韩国产小视频在线观看| 亚洲蜜桃精久久久久久久| 一本大道久久精品懂色aⅴ| 成人av网站大全| 欧美色欧美亚洲另类二区| 欧美乱妇23p| 久久色视频免费观看| 亚洲欧洲无码一区二区三区| 午夜精品一区二区三区三上悠亚| 狂野欧美性猛交blacked| 丁香另类激情小说| 欧美色视频一区| 欧美一区二区在线看| 久久综合色婷婷| 亚洲黄色尤物视频| 捆绑变态av一区二区三区| 99久久综合99久久综合网站| 欧美日韩精品高清| 国产精品乱码一区二区三区软件 | 国产成人啪午夜精品网站男同| 波多野结衣在线一区| 欧美一区二区成人| 最好看的中文字幕久久| 蜜桃视频第一区免费观看| www.亚洲色图| 精品日韩在线观看| 亚洲福利视频一区| 成人午夜又粗又硬又大| 欧美一区午夜精品| 亚洲一区在线观看免费观看电影高清 | 欧美亚洲动漫精品| 国产精品剧情在线亚洲| 精品一区二区三区视频在线观看| 91麻豆视频网站| 国产婷婷色一区二区三区| 日韩高清电影一区| 日本韩国一区二区| 国产精品乱子久久久久| 国产乱码精品一区二区三区五月婷| 欧美日韩一级片网站| 亚洲特级片在线| 国产成人啪午夜精品网站男同| 日韩欧美一区二区不卡| 亚洲国产日韩精品| 色偷偷一区二区三区| 国产欧美一区二区在线观看| 麻豆国产精品视频| 在线观看91精品国产麻豆| 一区二区欧美视频| 91视频你懂的| 综合欧美亚洲日本| 成人av网址在线| 国产精品久久久久久久久久久免费看| 精品一区二区久久| 欧美videossexotv100| 日韩激情视频在线观看| 欧美精品亚洲一区二区在线播放| 亚洲高清视频在线| 欧美色倩网站大全免费| 亚洲国产精品影院| 欧美日韩一区二区不卡| 亚洲亚洲人成综合网络| 在线观看91精品国产入口| 亚洲综合一二区| 欧美日韩亚洲另类| 五月婷婷综合激情| 在线观看91av| 免费在线欧美视频| 精品久久久久久亚洲综合网 | 亚洲国产精品99久久久久久久久 | 精品伊人久久久久7777人| 欧美一区二区三区人| 蜜臀av一区二区在线观看| 日韩一区二区三区观看| 久久99精品国产麻豆婷婷洗澡| 欧美mv日韩mv亚洲| 成人妖精视频yjsp地址| 一区在线观看视频| 欧美午夜精品久久久| 日韩精品一二三区| 久久色视频免费观看| 成人免费视频视频在线观看免费 | 亚洲高清在线视频| 777午夜精品免费视频| 久久精品国产精品亚洲精品| 国产三级精品在线| 色婷婷激情久久| 日韩主播视频在线| 精品国产乱码久久久久久蜜臀 | 日韩影院免费视频| 久久午夜色播影院免费高清| 成人h动漫精品一区二| 亚洲国产美女搞黄色| 欧美一区二区久久| 国产v综合v亚洲欧| 亚洲一区二区精品久久av| 日韩午夜电影在线观看| 成人app在线| 午夜精品免费在线观看| 国产午夜亚洲精品羞羞网站| 一本色道综合亚洲| 美女视频黄频大全不卡视频在线播放| 欧美精品一区二区三| 99久久精品国产毛片| 日韩国产在线一| 中文字幕第一区二区| 欧美日韩国产高清一区二区三区 | 欧美日韩国产综合一区二区三区| 久久激情五月婷婷| 国产乱理伦片在线观看夜一区| 全部av―极品视觉盛宴亚洲| 精品久久国产97色综合| www.欧美.com| 裸体歌舞表演一区二区| 欧美激情综合在线| 欧美艳星brazzers| 国产成人午夜视频| 午夜伦理一区二区| 国产精品美女久久久久aⅴ | 石原莉奈在线亚洲三区| 久久精品一区二区三区不卡牛牛| 欧美色爱综合网| 成人av电影在线观看| 精品一区二区三区久久久| 亚洲激情在线激情| 国产视频在线观看一区二区三区| 欧美日韩专区在线| 成人av电影在线网| 国产精品夜夜爽| 久色婷婷小香蕉久久| 午夜欧美在线一二页| 亚洲桃色在线一区|