亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-cam-winget-eap-fast-provisioning-02.txt

?? linux 下通過802.1認證的安裝包
?? TXT
?? 第 1 頁 / 共 2 頁
字號:

 
 
 
  Network Working Group                             N. Cam-Winget 
  Internet Draft                                        D. McGrew 
  Category: Informational                              J. Salowey 
  Expires: September 5, 2006                              H. Zhou 
                                                     Cisco Sytems 
                                                    March 5, 2006 
   
   
                 Dynamic Provisioning using EAP-FAST 
          draft-cam-winget-eap-fast-provisioning-02.txt 
                                 
   
   
Status of this Memo 
   
  By submitting this Internet-Draft, each author represents that any 
  applicable patent or other IPR claims of which he or she is aware 
  have been or will be disclosed, and any of which he or she becomes 
  aware will be disclosed, in accordance with Section 6 of BCP 79.      
       
  Internet-Drafts are working documents of the Internet Engineering 
  Task Force (IETF), its areas, and its working groups.  Note that 
  other groups may also distribute working documents as Internet-
  Drafts.  
        
  Internet-Drafts are draft documents valid for a maximum of six months 
  and may be updated, replaced, or obsoleted by other documents at any 
  time.  It is inappropriate to use Internet-Drafts as reference 
  material or to cite them other than as "work in progress."  
        
  The list of current Internet-Drafts can be accessed at  
           http://www.ietf.org/ietf/1id-abstracts.txt  
        
  The list of Internet-Draft Shadow Directories can be accessed at 
  http://www.ietf.org/shadow.html.  
   
 
Copyright Notice  
      
  Copyright (C) The Internet Society (2006). All Rights Reserved.  
      
    
 
 
 
 
Cam-Winget, et al.   Expires September 5, 2006            [Page 1] 
 
 
 
 
 
Internet-Draft   Dynamic Provisioning using EAP-FAST      March 2006 
 
 
 
  
Abstract  
      
  EAP-FAST is an extensible EAP method that enables secure     
  communication between a client and a server by using the Transport 
  Layer Security (TLS) to establish a mutually authenticated tunnel.   
  EAP-FAST also enables the provisioning credentials or other  
  information thru this protected tunnel. This document describes the 
  use of EAP-FAST for dynamic provisioning.    
        
   
Table of Contents 
   
  1. Introduction...................................................3 
     1.1.  Specification Requirements...............................3 
     1.2.  Terminology..............................................3 
  2. EAP-FAST Provisioning Modes....................................4 
  3. Dynamic Provisioning using EAP-FAST Conversation...............5 
     3.1 Network Access after EAP-FAST Provisioning.................7 
     3.2 Authenticating Using EAP-MSCHAPv2..........................9 
     3.3 Use of other Inner EAP Methods for EAP-FAST Provisioning..10 
     3.4 Key Derivations Used in the EAP-FAST Provisioning Exchange11 
     3.5 Provisioning or Refreshment of a PAC......................12 
  4. Types of Information Provisioned in EAP-FAST..................13 
     4.1 PAC Types.................................................13 
     4.2 Provisioning PACs through PAC TLV.........................16 
4.2.1 Formats for PAC TLV Attributes...............................17 
4.2.2 PAC-Key......................................................17 
4.2.3 PAC-Opaque...................................................18 
4.2.4 PAC-Info.....................................................19 
4.2.5 PAC-Acknowledgement TLV......................................21 
4.2.6 PAC-Type TLV.................................................22 
     4.3 Server Trusted Root Certificate...........................23 
4.3.1 Server-Trusted-Root TLV......................................23 
4.3.2 PKCS #7 TLV..................................................25 
  5. Security Considerations.......................................26 
     5.1 User Identity Protection and Validation...................26 
     5.2 Mitigation of Dictionary Attacks..........................27 
     5.3 Mitigation of Man-in-the-middle (MitM) attacks............28 
     5.4 PAC Validation and User Credentials.......................29 
     5.5 Generation of Diffie-Hellman Groups.......................29 
     5.6 PAC Storage Considerations................................30 
  6. IANA Considerations...........................................31 
 
 
Cam-Winget, et al.   Expires September 5, 2006            [Page 2] 
 
 
 
 
 
Internet-Draft   Dynamic Provisioning using EAP-FAST      March 2006 
 
 
  7. References...................................................32 
     7.1 Normative................................................32 
     7.2 Informative..............................................32 
  8. Acknowledgments..............................................33 
  9. Author's Addresses...........................................33 
  10. Appendix: Examples..........................................34 
     10.1 Example 1: Successful Tunnel PAC Provisioning...........34 
     10.2 Example 2: Successful Tunnel PAC Provisioning with Password 
     Change.......................................................36 
     10.3 Example 3: Failed Provisioning..........................38 
     10.4 Example 4: Provisioning a Authentication Server抯 Trusted 
     Root Certificate.............................................39 
     10.5 Example 5: Provisioning a User Authorization PAC........41 
  11. Intellectual Property Statement.............................43 
  12. Disclaimer of Validity......................................43
  13. Copyright Statement.........................................44 
  14. Expiration Date.............................................44 
    
1. Introduction 
   
  [EAP-FAST] is an extensible EAP method that can be used to mutually 
  authenticate peer and server. However, to mutually authenticate with 
  EAP-FAST, credentials such as a preshared key, trusted anchor or a 
  Tunnel PAC MUST be provisioned to the peer before it can establish a 
  secure association with the server. In some cases, the provisioning 
  of such information present deployment hurdles.  Through the use of 
  the protected tunnel, EAP-FAST can also be used to enable the means 
  for dynamic or in-band provisioning to address such deployment 
  obstacles. 
   
1.1.  Specification Requirements  
      
  The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 
  "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this 
  document are to be interpreted as described in [RFC2119].  
      
1.2.  Terminology  
      
  Much of the terminology in this document comes from [RFC3748]. 
  Additional terms are defined below: 
   
   
 
 
Cam-Winget, et al.   Expires September 5, 2006            [Page 3] 
 
 
 
 
 
Internet-Draft   Dynamic Provisioning using EAP-FAST      March 2006 
 
 
  Man in the Middle (MitM) 
    An adversary that can successfully inject itself between a peer and 
    EAP server. The MitM succeeds by impersonating itself as a valid 
    peer, authenticator or authentication server.  
 
 
  Provisioning 
    Providing peer with a trust anchor, shared secret or other                                                                                                                               
    appropriate information based on which a security association can 
    be established.  
   
  Protected Access Credential (PAC) 
    Credentials distributed to a peer for future optimized network 
    authentication.  The PAC consists of at most three components:  a 
    shared secret, an opaque element and optionally other information. 
    The shared secret part contains the pre-shared key between the peer 
    and authentication server.  The opaque part is provided to the peer 
    and is presented to the authentication server when the peer wishes 
    to obtain access to network resources.  Finally, a PAC may 
    optionally include other information that may be useful to the 
    peer.  
 
      
   
2. EAP-FAST Provisioning Modes 
   
  EAP-FAST supports two modes for provisioning: 
   
    1) Server-Authenticated Mode: Provisioning inside a server 
      authenticated (TLS) tunnel.   
   
    2) Server-Unauthenticated Mode: Provisioning inside an 
      unauthenticated (TLS) tunnel 
 
  In the Server-Authenticated Provisioning mode, the peer has 
  successfully authenticated the EAP server as part of the TLS 
  handshake of EAP-FAST Phase 1 (e.g. tunnel establishment).  
  Additional exchanges MAY be needed inside the tunnel for the EAP 
  Server to authenticate the peer before any information can be 
  provisioned.    
   
  In the Server-Unauthenticated Provisioning mode, an unauthenticated 
  tunnel is established in the EAP-FAST Phase 1.  This provisioning 
  mode is defined to enable bootstrapping or initial configuration of 
 
 
Cam-Winget, et al.   Expires September 5, 2006            [Page 4] 
 
 
 
 
 
Internet-Draft   Dynamic Provisioning using EAP-FAST      March 2006 
 
 
  peers where the peer lacks strong credentials (if any) to mutually 
  authenticate with the server and configuration through out-of-band 
  mechanisms are prohibitive. 
   
  In the Server-Unauthenticated Provisioning mode, the peer and server 
  do not achieve mutual authentication during EAP-FAST Phase 1.  It is 
  expected that the peer negotiates TLS_DH_anon_WITH_AES_128_CBC_SHA to 
  signal that it can not provide proof of authenticity.  While other 
  cipher suites such as those requiring the use of server certificates 
  may be used, the peer may lack the necessary trust anchors to 
  validate the certificate and authenticate the server. 
   
  Since the server is not authenticated in the Server-Unauthenticated 
  Provisioning mode, it is possible that the TLS tunnel may be 
  terminated by an attacker. It is strongly recommended that an inner 
  EAP method be used to provide some authenticity assurances and MitM 
  detection and warning outlined in Section 5 MUST be applied.  
 
  The EAP-FAST Phase 2 conversation is unchanged in either Provisioning 
  mode.  However, if the server is not authenticated in Phase 1 the 
  peer MUST accept an EAP method supporting mutual authentication and 
  key derivation that is compatible with its initial or bootstrapping 
  credentials (such as a password-based EAP method). The peer then uses 
  the Crypto-Binding TLV to validate that the same server terminates 
  both the TLS tunnel and to successfully complete the EAP method, 
  thereby verifying that the exchange was not subject to a man-in-the-
  middle attack. Assuming that the Crypto-Binding TLV exchange is 
  successful, the server will subsequently provide the information such 
  as a shared key or the trusted root(s) of server 
  certificate using a PAC TLV or a Server Trusted Root TLV 
  respectively. 
 
  Once the EAP-FAST Provisioning conversation completes, the peer is 
  expected to use the provisioned credentials in subsequent EAP-FAST 
  authentications.   
     
   
3. Dynamic Provisioning using EAP-FAST Conversation 
   
  The provisioning EAP-FAST exchange uses same sequence as the EAP-FAST 
  Authentication Phase 1 to establish a protected tunnel.  Once a 
  tunnel is secured between the two parties, the client and server can 
  then execute an EAP authentication method by which both parties can 
  achieve mutual authentication. 
 
 
Cam-Winget, et al.   Expires September 5, 2006            [Page 5] 
 
 
 
 
 
Internet-Draft   Dynamic Provisioning using EAP-FAST      March 2006 
 
 
   
  Provisioning in EAP-FAST is negotiated solely by the client as the 
  first communication exchange when EAP-FAST is requested from the 
  server.  If the client does not have a Protected Access Credential 
  (PAC) or requires provisioning of other information (such as the 
  server抯 Trusted Root certificate), it can request to initiate a 
  provisioning EAP-FAST exchange and dynamically obtain one from the 
  server.   
   
  The EAP-FAST provisioning conversation will typically occur between 
  the peer and an authentication server; more specifically, the server 
  that can provision the peer with the requested information; typically, 
  a unique PAC.   
 
  The conversation between a peer and authentication server commences 

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
色婷婷久久99综合精品jk白丝| 91久久香蕉国产日韩欧美9色| 精品免费99久久| 日韩av一区二| 91福利资源站| 日韩成人av影视| 国产欧美日韩另类视频免费观看| 欧美少妇性性性| 免费一级片91| 国产日韩成人精品| 丰满放荡岳乱妇91ww| 一区二区三区免费在线观看| 678五月天丁香亚洲综合网| 黄色日韩三级电影| 亚洲欧美区自拍先锋| 欧美一级精品大片| 97se亚洲国产综合自在线观| 国产欧美一区二区三区网站 | 日韩黄色一级片| 一区二区三区精品在线| 日韩免费电影一区| 色久优优欧美色久优优| 久久精品国产精品亚洲红杏| 亚洲美女视频在线观看| 久久久99久久| 久久久99久久精品欧美| 制服丝袜在线91| 午夜久久福利影院| 久久丁香综合五月国产三级网站| 欧美国产一区视频在线观看| 欧美一级一区二区| 欧美在线啊v一区| 成人精品视频一区二区三区尤物| 青青草国产成人av片免费| 亚洲精品乱码久久久久久| 久久综合久久综合久久综合| 欧美一区午夜精品| 成人动漫精品一区二区| 欧美日韩精品二区第二页| 777a∨成人精品桃花网| 精品日韩成人av| 国产精品久久久久国产精品日日| 一区二区三区国产精品| 午夜成人免费视频| 韩国女主播一区二区三区| 国产v日产∨综合v精品视频| 91网上在线视频| 国产日韩欧美精品一区| 婷婷成人激情在线网| 国内精品视频666| 在线精品视频免费播放| 欧美变态tickling挠脚心| 亚洲日本va在线观看| 激情六月婷婷综合| 精品1区2区3区| 亚洲精品亚洲人成人网| 国产成人啪免费观看软件| 欧美日韩亚洲不卡| 亚洲欧美日韩中文字幕一区二区三区 | 337p日本欧洲亚洲大胆色噜噜| 亚洲精品亚洲人成人网在线播放| 国产激情视频一区二区三区欧美 | 亚洲图片有声小说| 色老汉一区二区三区| 精品少妇一区二区三区视频免付费 | 香蕉加勒比综合久久| 精品视频1区2区| 天堂va蜜桃一区二区三区漫画版| 色94色欧美sute亚洲线路二| 国产精品免费视频网站| 欧美大片国产精品| 日韩中文字幕区一区有砖一区 | 欧美日韩国产在线播放网站| 亚洲自拍欧美精品| 欧美精品tushy高清| 在线视频一区二区三区| 午夜亚洲福利老司机| 制服视频三区第一页精品| 麻豆成人久久精品二区三区红 | 欧美亚洲动漫制服丝袜| 亚洲国产乱码最新视频| 91麻豆精品91久久久久久清纯| 91小视频在线免费看| 亚洲日本欧美天堂| 日韩欧美美女一区二区三区| 日韩av午夜在线观看| 日本一区二区三级电影在线观看| 精品乱人伦一区二区三区| 国产一区亚洲一区| 一区二区三区四区不卡视频| 日韩亚洲欧美在线| 91蝌蚪porny| 国产成人h网站| 亚洲香肠在线观看| 国产偷国产偷亚洲高清人白洁| 欧美色中文字幕| 91浏览器打开| 国产精品538一区二区在线| 亚洲风情在线资源站| 国产精品国模大尺度视频| 日韩一区二区三区在线| 欧美亚洲愉拍一区二区| 成人小视频在线| 精品在线一区二区| 韩国一区二区视频| 免费亚洲电影在线| 激情图片小说一区| 激情五月激情综合网| 精品影视av免费| 久久精品99国产国产精| 精品综合免费视频观看| 国产老肥熟一区二区三区| 狠狠网亚洲精品| 成人在线一区二区三区| 波多野结衣中文字幕一区| 丁香亚洲综合激情啪啪综合| 国产1区2区3区精品美女| 国产成人在线影院| 成人黄色大片在线观看| 91丨九色丨黑人外教| 欧美性一级生活| 欧美性受极品xxxx喷水| 欧美精品精品一区| 欧美电影精品一区二区| 国产精品久久夜| 亚洲国产日韩a在线播放性色| 在线中文字幕一区二区| 欧美丰满少妇xxxxx高潮对白| 精品日本一线二线三线不卡 | 日韩亚洲欧美成人一区| 中文字幕电影一区| 美女性感视频久久| 亚洲精品中文字幕乱码三区| 奇米色777欧美一区二区| 欧美天堂一区二区三区| 日韩激情一区二区| 亚洲国产精品影院| 日韩欧美成人激情| 日韩欧美一级在线播放| 国产精品天干天干在观线| 偷拍与自拍一区| 成人小视频在线观看| 欧美精品一区二区三区一线天视频| 亚洲人成在线播放网站岛国| 成人av在线看| 亚洲欧美日韩国产另类专区| 波多野结衣中文字幕一区二区三区| 国产亚洲成aⅴ人片在线观看| 久久成人免费网| 日韩欧美国产综合| 国产激情视频一区二区三区欧美 | 日韩一区二区免费在线电影| 亚洲香肠在线观看| 日韩午夜激情电影| 国产不卡在线播放| 欧美成人一区二区三区在线观看 | 91在线看国产| 麻豆国产精品777777在线| 中文字幕中文字幕中文字幕亚洲无线| 国产成人一级电影| 偷窥国产亚洲免费视频| 精品免费视频一区二区| 99久久精品久久久久久清纯| 亚瑟在线精品视频| 精品国产一区二区三区久久久蜜月| 国产一区二区不卡| 亚洲午夜羞羞片| 久久婷婷成人综合色| 色综合久久九月婷婷色综合| 美女免费视频一区| 亚洲综合一区二区| 日韩一区二区高清| 欧美日韩一区二区三区四区五区| 久草中文综合在线| 欧美aaaaaa午夜精品| 亚洲黄色在线视频| 日韩一区二区三区三四区视频在线观看 | 国产在线不卡一卡二卡三卡四卡| 一片黄亚洲嫩模| 亚洲综合视频在线| 亚洲裸体xxx| 亚洲大片精品永久免费| 美腿丝袜亚洲一区| 狠狠色丁香久久婷婷综| 成人在线视频一区| 欧美午夜精品一区二区三区| 国产精品1024久久| 亚洲精品欧美在线| 精品剧情在线观看| 欧美另类高清zo欧美| av一区二区三区四区| 国产乱码精品一区二区三区忘忧草| 亚洲成人免费观看| 夜夜嗨av一区二区三区四季av| 一色屋精品亚洲香蕉网站| 国产亚洲欧美色| 国产精品欧美一级免费| 国产精品午夜春色av| 久久精品一二三| 中文字幕在线观看不卡视频|