亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? draft-cam-winget-eap-fast-03.txt

?? linux 下通過802.1認(rèn)證的安裝包
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
   order to facilitate the fall back to a full handshake the peer SHOULD
   include ciphersuites that allow for a full handshake and possibly PAC
   provisioning so the server can select one of this in case session
   resumption fails.  An example of the transition is shown in
   Appendix A.

3.3  EAP-FAST Authentication Phase 2: Tunneled Authentication

   The second portion of the EAP-FAST Authentication occurs immediately
   after successful completion of phase 1.  Phase 2 occurs even if both
   peer and authenticator are authenticated in the phase 1 TLS
   negotiation.  Phase 2 MUST NOT occur if the Phase 1 TLS handshake
   fails.  Phase 2 consists of a series of requests and responses formed
   of TLV objects defined in Section 4.2.  Phase 2 MUST always end with
   a protected termination exchange described in Section 3.3.2.  The TLV
   exchange may include the execution of zero or more EAP methods within
   the protected tunnel as described in Section 3.3.1.  A server MAY
   proceed directly to the protected termination exchange if it does not
   wish to request further authentication from the peer.  However, the
   peer and server must not assume that either will skip inner EAP
   methods or other TLV exchanges.  The peer may have roamed to a
   network which requires conformance with a different authentication
   policy or the peer may request the server take additional action
   through the use of the Request-Action TLV.

3.3.1  EAP Sequences

   EAP [RFC3748] prohibits use of multiple authentication methods within
   a single EAP conversation in order to limit vulnerabilities to man-
   in-the-middle attacks.  EAP-FAST addresses man-in-the-middle attacks
   through support for cryptographic protection of the inner EAP
   exchange and cryptographic binding of the inner authentication method
   to the protected tunnel.  EAP methods are executed serially in a
   sequence.  This version of EAP-FAST does not support initiating
   multiple EAP methods simultaneously in parallel.  The methods need
   not be distinct.  For example, EAP-TLS could be run twice as an inner
   method, initially with machine credentials followed by user
   credentials.

   EAP method messages are carried within EAP-Payload TLVs defined in
   Section 4.2.6.  Upon method completion of a method a server MUST send
   an Intermediate-Result TLV indicating the result.  The peer MUST
   respond to the Intermediate-Result TLV indicating its result.  If the
   result indicates success the Intermediate-Result TLV MUST be
   accompanied by a Crypto-Binding TLV.  The Crypto-Binding TLV is



Cam-Winget, et al.       Expires April 22, 2006                [Page 12]

Internet-Draft                  EAP-FAST                    October 2005


   further discussed in Section 4.2.8 and Section 5.3.  The
   Intermediate-Result TLVs can be included with other TLVs such as EAP-
   Payload TLVs starting a new EAP conversation or with the Result TLV
   used in the protected termination exchange.

   If both peer and server indicate success then the method is
   considered to have completed.  If either indicates failure then the
   method is considered to have failed.  The result of failure of a EAP
   method does not always imply a failure of the overall authentication.
   If one authentication method fails the server may attempt to
   authenticate the peer with a different method.

3.3.2  Protected Termination and Acknowledged Result Indication

   A successful EAP-FAST phase 2 conversation MUST always end in a
   successful Result TLV exchange.  An EAP-FAST server may initiate the
   Result TLV exchange without initiating any EAP conversation in EAP-
   FAST Phase 2.  After the final Result TLV exchange the TLS tunnel is
   terminated and a clear text EAP-Success or EAP-Failure is sent by the
   server.  The format of the Result TLV is described in Section 4.2.2.

   A server initiates a successful protected termination exchange by
   sending a Result TLV indicating success.  The server may send the
   Result TLV along with an Intermediate-Result TLV and a Crypto-Binding
   TLV.  If the peer requires nothing more from the server it will
   respond with a Result TLV indicating success accompanied by an
   Intermediate-Result TLV and Crypto-Binding TLV if necessary.  The
   server then tears down the tunnel and sends a clear text EAP-Success.

   If the peer receives a Result TLV indicating success from the server,
   but its authentication policies are not satisfied (for example it
   requires a particular authentication mechanism be run or it wants to
   request a PAC) it may request further action from the server using
   the Request-Action TLV.  The Request-Action TLV is sent along with
   the Result TLV indicating what EAP Success/Failure result peer would
   expect if the requested action is not granted.  The value of the
   Request-Action TLV indicates what the peer would like to do next.
   The format and values for the Request-Action TLV are defined in
   Section 4.2.9.

   Upon receiving the Request-Action TLV the server may process the
   request or ignore it, based on its policy.  If the server ignores the
   request, it proceeds with termination of the tunnel and send the
   clear text EAP Success or Failure message based on the value of the
   peer's result TLV.  If server honors and processes the request, it
   continues with the requested action.  The conversation completes with
   a Result TLV exchange.  The Result TLV may be included with the TLV
   that completes the requested action.



Cam-Winget, et al.       Expires April 22, 2006                [Page 13]

Internet-Draft                  EAP-FAST                    October 2005


   Error handling for phase 2 is discussed in Section 3.4.2.

3.4  Error Handling

   EAP-FAST uses the following error handling rules summarized below:

   1.  Errors in TLS layer are communicated via TLS alert messages in
       all phases of EAP-FAST.
   2.  The Intermediate-Result TLVs indicate success or failure
       indications of the individual EAP methods in EAP-FAST Phase 2.
       Errors within the EAP conversation in Phase 2 are expected to be
       handled by individual EAP methods.
   3.  Violations of the TLV rules are handled using Result TLVs
       together with Error TLVs.
   4.  Tunnel compromised errors (errors caused by Crypto-Binding failed
       or missing) are handled using Result TLVs and Error TLVs.

3.4.1  TLS Layer Errors

   If the EAP-FAST server detects an error at any point in the TLS
   Handshake or the TLS layer, the server SHOULD send an EAP-FAST
   request encapsulating a TLS record containing the appropriate TLS
   alert message rather than immediately terminating the conversation so
   as to allow the peer to inform the user of the cause of the failure
   and possibly allow for a restart of the conversation.  The peer MUST
   send an EAP-FAST response to an alert message.  The EAP-Response
   packet sent by the peer may encapsulate a TLS ClientHello handshake
   message, in which case the EAP-FAST server MAY allow the EAP-FAST
   conversation to be restarted, or it MAY contain an EAP-FAST response
   with a zero length message, in which case the server MUST terminate
   the conversation with an EAP-Failure packet.  It is up to the EAP-
   FAST server whether to allow restarts, and if so, how many times the
   conversation can be restarted.  An EAP-FAST Server implementing
   restart capability SHOULD impose a limit on the number of restarts,
   so as to protect against denial of service attacks.

   If the EAP-FAST peer detects an error at any point in the TLS layer,
   the EAP-FAST peer should send an EAP-FAST response encapsulating a
   TLS record containing the appropriate TLS alert message.  The server
   may restart the conversation by sending an EAP-FAST request packet
   encapsulating the TLS HelloRequest handshake message.  The peer may
   allow the EAP-FAST conversation to be restarted or it may terminate
   the conversation by sending an EAP-FAST response with an zero length
   message.

3.4.2  Phase 2 Errors

   Any time the peer or the server finds a fatal error outside of the



Cam-Winget, et al.       Expires April 22, 2006                [Page 14]

Internet-Draft                  EAP-FAST                    October 2005


   TLS layer during phase 2 TLV processing it MUST send a Result TLV of
   failure and an Error TLV with the appropriate error code.  For errors
   involving the processing the sequence of exchanges, such as a
   violation of TLV rules (e.g., multiple EAP-Payload TLVs) the error
   code is Unexpected_TLVs_Exchanged.  For errors involving a tunnel
   compromise the error-code is Tunnel_Compromise_Error.  Upon sending a
   Result TLV with a fatal Error TLV the sender terminates the TLS
   tunnel.

   If a server receives a Result TLV of failure with a fatal Error TLV
   it SHOULD send a clear text EAP-Failure.  If a peer receives a Result
   TLV of failure it MUST respond with a Result TLV indicating failure.
   If the server has sent a Result TLV of failure it ignores the peer
   response and it SHOULD send a clear text EAP-Failure.

3.5  Fragmentation

   A single TLS record may be up to 16384 octets in length, but a TLS
   message may span multiple TLS records, and a TLS certificate message
   may in principle be as long as 16MB.  This is larger than the maximum
   size for a message on most media types, therefore it is desirable to
   support fragmentation.  Note that in order to protect against
   reassembly lockup and denial of service attacks, it may be desirable
   for an implementation to set a maximum size for one such group of TLS
   messages.  Since a typical certificate chain is rarely longer than a
   few thousand octets, and no other field is likely to be anywhere near
   as long, a reasonable choice of maximum acceptable message length
   might be 64 KB.  This is still a fairly large message packet size so
   an EAP-FAST implementation MUST provide its own support for
   fragmentation and reassembly.

   Since EAP is an lock-step protocol, fragmentation support can be
   added in a simple manner.  In EAP, fragments that are lost or damaged
   in transit will be retransmitted, and since sequencing information is
   provided by the Identifier field in EAP, there is no need for a
   fragment offset field as is provided in IPv4.

   EAP-FAST fragmentation support is provided through addition of flag
   bits within the EAP-Response and EAP-Request packets, as well as a
   TLS Message Length field of four octets.  Flags include the Length
   included (L), More fragments (M), and EAP-FAST Start (S) bits.  The L
   flag is set to indicate the presence of the four octet TLS Message
   Length field, and MUST be set for the first fragment of a fragmented
   TLS message or set of messages.  The M flag is set on all but the
   last fragment.  The S flag is set only within the EAP-FAST start
   message sent from the EAP server to the peer.  The TLS Message Length
   field is four octets, and provides the total length of the TLS
   message or set of messages that is being fragmented; this simplifies



Cam-Winget, et al.       Expires April 22, 2006                [Page 15]

Internet-Draft                  EAP-FAST                    October 2005


   buffer allocation.

   When an EAP-FAST peer receives an EAP-Request packet with the M bit
   set, it MUST respond with an EAP-Response with EAP-Type of EAP-FAST
   and no data.  This serves as a fragment ACK.  The EAP server must
   wait until it receives the EAP-Response before sending another
   fragment.  In order to prevent errors in processing of fragments, the
   EAP server MUST increment the Identifier field for each fragment
   contained within an EAP-Request, and the peer must include this
   Identifier value in the fragment ACK contained within the EAP-
   Response.  Retransmitted fragments will contain the same Identifier
   value.

   Similarly, when the EAP-FAST server receives an EAP-Response with the
   M bit set, it must respond with an EAP-Request with EAP-Type of EAP-
   FAST and no data.  This serves as a fragment ACK.  The EAP peer MUST
   wait until it receives the EAP-Request before sending another
   fragment.  In order to prevent errors in the processing of fragments,
   the EAP server MUST increment the Identifier value for each fragment
   ACK contained within an EAP-Request, and the peer MUST include this
   Identifier value in the subsequent fragment contained within an EAP-
   Response.

4.  Message Formats

   The following sections describe the message formats used in EAP-FAST.
   The fields are transmitted from left to right in network byte order.

4.1  EAP-FAST Message Format

   A summary of the EAP-FAST Request/Response packet format is shown
   below.

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     Code      |   Identifier  |            Length             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     Type      |   Flags | Ver |        Message Length         +
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |         Message Length        |           Data...             +
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+









Cam-Winget, et al.       Expires April 22, 2006                [Page 16]

Internet-Draft                  EAP-FAST                    October 2005


      Code

         1  Request
         2  Response

      Identifier

         The Identifier field is one octet and aids in matching
         responses with requests.  The Identifier field MUST be changed
         on each Request packet.  The Identifier field in the Response
         packet MUST match the Identifier field from the corresponding
         request.

      Length

         The Length field is two octets and indicates the length of the
         EAP packet including the Code, Identifier, Length, Type, Flags,
         Ver, Message Length and Data fields.  Octets outside the range
         of the Length field should be treated as Data Link Layer
         padding and should be ignored on reception.

      Type

         43 for EAP-FAST

      Flags

          0 1 2 3 4
         +-+-+-+-+-+
         |L M S R R|
         +-+-+-+-+-+

         L  Length included
         M  More fragments

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日本中文字幕不卡| 国产视频一区在线播放| 亚洲婷婷综合色高清在线| 国产一区二区三区蝌蚪| 欧美美女一区二区在线观看| 亚洲自拍与偷拍| 欧美日韩久久一区| 亚洲在线中文字幕| 99国产精品99久久久久久| 国产日韩精品久久久| 久久激情五月婷婷| 精品国产91亚洲一区二区三区婷婷 | 日韩一区二区三区观看| 免费久久99精品国产| 日韩一区二区在线看| 青草国产精品久久久久久| 日韩精品专区在线| 视频一区二区欧美| 欧美成人video| 国产美女精品人人做人人爽| 久久久久国色av免费看影院| 国产一区二区网址| 国产欧美一区二区精品性色| 成人蜜臀av电影| 国产精品久久久久久久久免费桃花| 国产高清不卡一区二区| 精品美女一区二区| 免费人成黄页网站在线一区二区| 欧美特级限制片免费在线观看| 亚洲一区二区三区影院| 日韩欧美国产小视频| aaa亚洲精品一二三区| 日韩中文字幕av电影| 国产精品福利一区二区三区| 欧美肥妇free| 97久久超碰精品国产| 韩国精品久久久| 亚洲福利一区二区三区| 精品不卡在线视频| 欧美二区在线观看| 97se狠狠狠综合亚洲狠狠| 美腿丝袜在线亚洲一区| 亚洲人快播电影网| 日韩女优制服丝袜电影| 在线免费亚洲电影| 99re热视频这里只精品| 国产99久久久国产精品潘金| 麻豆精品国产传媒mv男同| 亚洲 欧美综合在线网络| 亚洲人被黑人高潮完整版| 久久久久国产精品麻豆| 久久久精品一品道一区| 精品日韩一区二区三区| 久久久久久久综合日本| 欧美草草影院在线视频| 日韩午夜在线观看视频| 6080亚洲精品一区二区| 欧美日韩精品一区二区在线播放| 成人av网站在线观看| caoporm超碰国产精品| 丁香一区二区三区| 国产乱淫av一区二区三区| 五月激情丁香一区二区三区| 国产精品久久久久久久久图文区 | 欧美精品欧美精品系列| 欧美精品乱码久久久久久按摩| 91精品国产综合久久香蕉的特点| 欧美视频一区在线观看| 欧美视频精品在线观看| 日韩免费观看高清完整版| 久久久国产综合精品女国产盗摄| 欧美激情中文不卡| 亚洲综合色区另类av| 日韩av网站免费在线| 激情偷乱视频一区二区三区| 国产91丝袜在线18| 99久久久国产精品| 6080日韩午夜伦伦午夜伦| 国产天堂亚洲国产碰碰| 国产精品乱人伦一区二区| 26uuu国产电影一区二区| 国产拍揄自揄精品视频麻豆| 一区二区在线观看免费| 一区二区三区在线免费视频| 视频一区欧美日韩| 成人黄色小视频在线观看| 制服丝袜日韩国产| 国产精品国产三级国产专播品爱网| 亚洲在线视频一区| 国产传媒欧美日韩成人| 91精品国产日韩91久久久久久| 日韩理论片网站| 成人丝袜视频网| 精品日韩成人av| 天堂一区二区在线免费观看| 91美女片黄在线观看91美女| 久久久久成人黄色影片| 麻豆一区二区三区| 777午夜精品视频在线播放| 亚洲精品自拍动漫在线| av激情亚洲男人天堂| 久久久精品黄色| 高清av一区二区| 国产精品国产三级国产| 粉嫩一区二区三区在线看| 国产欧美一区二区三区沐欲 | 久久精品欧美一区二区三区麻豆| 五月婷婷色综合| 精品国产1区2区3区| 午夜久久久久久久久| 欧美视频一区二区| 免费欧美在线视频| 精品久久久久久久人人人人传媒| 亚洲二区在线观看| 日韩视频一区二区| 国产精品123区| 精品乱人伦小说| 国产大陆亚洲精品国产| 国产精品传媒在线| 91麻豆精品在线观看| 亚洲国产精品一区二区www在线| 在线免费精品视频| 美女一区二区视频| 中文字幕人成不卡一区| 51精品秘密在线观看| 麻豆国产一区二区| 国产精品美女视频| 欧美日韩在线播| 国产成人久久精品77777最新版本| 国产欧美一区二区三区在线老狼| 色网综合在线观看| 日本视频一区二区三区| 国产欧美日韩不卡| 制服丝袜在线91| 一道本成人在线| 国产精品88888| 图片区小说区区亚洲影院| 欧美国产97人人爽人人喊| 欧美疯狂性受xxxxx喷水图片| 成人h动漫精品一区二| 国产在线精品一区在线观看麻豆| 日韩毛片一二三区| 国产网红主播福利一区二区| 欧美一区午夜视频在线观看| 91一区一区三区| 成人av综合在线| 精品一区二区影视| 日韩精品五月天| 亚洲综合在线电影| 国产精品家庭影院| 久久精品夜色噜噜亚洲aⅴ| 欧美日韩在线三级| 欧美色图激情小说| 欧美无砖砖区免费| 欧美视频你懂的| 欧美肥大bbwbbw高潮| 欧美日韩视频专区在线播放| 99久久久无码国产精品| 99免费精品视频| 91网站黄www| 欧美视频一二三区| 欧美男女性生活在线直播观看| 欧美亚洲动漫精品| 欧美肥妇bbw| 欧美精品一区二区不卡| 精品久久久久久最新网址| 久久综合久色欧美综合狠狠| www日韩大片| 亚洲人亚洲人成电影网站色| 亚洲一区日韩精品中文字幕| 久久99九九99精品| av一区二区三区四区| 欧美日韩高清一区二区| 国产日韩综合av| 日韩精品免费视频人成| 九九久久精品视频| 91电影在线观看| 欧美揉bbbbb揉bbbbb| 日本一区二区免费在线观看视频 | 一区二区在线电影| 国内精品伊人久久久久av影院| 国产伦理精品不卡| 欧美一级二级三级乱码| 欧美激情一区二区三区不卡| 视频一区视频二区在线观看| 国产成人在线视频播放| 欧美日韩精品欧美日韩精品| 久久久久久亚洲综合| 五月天国产精品| 在线观看免费视频综合| 久久久99精品免费观看不卡| 亚洲一二三区不卡| 91蜜桃传媒精品久久久一区二区| 日韩无一区二区| 偷偷要91色婷婷| 欧美专区亚洲专区| 中文字幕在线不卡| 99视频一区二区三区| 国产欧美日韩在线| 97se亚洲国产综合自在线不卡 |