Merit Network, Incorporated Bernard Aboba Microsoft March 1997

Size: px
Start display at page:

Download "Merit Network, Incorporated Bernard Aboba Microsoft March 1997"

Transcription

1 Internet Draft Category: Experimental expires in six months Pat R. Calhoun US Robotics Access Corp. Allan Rubens Merit Network, Incorporated Bernard Aboba Microsoft March 1997 DIAMETER Extensible Authentication Protocol Support <draft-calhoun-diameter-eap-00.txt> Status of this Memo Distribution of this memo is unlimited. This document is an Internet-Draft. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as work in progress. To learn the current status of any Internet-Draft, please check the 1id-abstracts.txt listing contained in the Internet-Drafts Shadow Directories on ds.internic.net (US East Coast), nic.nordu.net (Europe), ftp.isi.edu (US West Coast), or munnari.oz.au (Pacific Rim). Abstract The Extensible Authentication Protocol (EAP) is a PPP extension that provides support for additional authentication methods within PPP. This document describes how the EAP Protocl may be used in conjunction with the DIAMETER protocol. Calhoun, Rubens & Aboba [Page 1]

2 1. Introduction The Extensible Authentication Protocol (EAP), described in [1], provides a standard mechanism for support of additional authentication methods within PPP. Through the use of EAP, support for a number of authentication schemes may be added, including token cards, Kerberos, Public Key, One Time Passwords, and others. In order to provide for support of EAP within DIAMETER, new messages are being introduced in this document. The scheme described here is similar to that proposed in [2], in that the DIAMETER server is used to shuttle DIAMETER-encapsulated EAP Packets between the NAS and a backend security server. While the conversation between the DIAMETER server and the backend security server will typically occur using a proprietary protocol developed by the backend security server vendor, it is also possible to use DIAMETER-encapsulated EAP via the new commands defined in this document. This has the advantage of allowing the DIAMETER server to support EAP without the need for authentication-specific code, which can instead reside on a backend security server. 2. Requirements language This specification uses the same words as [6] for defining the significance of each particular requirement. These words are: MUST This word, or the adjectives "REQUIRED" or "SHALL", means that the definition is an absolute requirement of the specification. MUST NOT This phrase, or the phrase "SHALL NOT", means that the definition is an absolute prohibition of the specification. SHOULD This word, or the adjective "RECOMMENDED", means that there may exist valid reasons in particular circumstances to ignore a particular item, but the full implications must be understood and carefully weighed before choosing a different course. SHOULD NOT This phrase means that there may exist valid reasons in particular circumstances when the particular behavior is acceptable or even useful, but the full implications should be understood and the case carefully weighed before implementing any behavior described with this label. Calhoun, Rubens & Aboba [Page 2]

3 MAY This word, or the adjective "OPTIONAL", means that an item is truly optional. One vendor may choose to include the item because a particular marketplace requires it or because the vendor feels that it enhances the product while another vendor may omit the same item. An implementation which does not include a particular option MUST be prepared to interoperate with another implementation which does include the option, though perhaps with reduced functionality. In the same vein an implementation which does include a particular option MUST be prepared to interoperate with another implementation which does not include the option. (except, of course, for the feature the option provides) An implementation is not compliant if it fails to satisfy one or more of the must or must not requirements for the protocols it implements. An implementation that satisfies all the must, must not, should and should not requirements for its protocols is said to be "unconditionally compliant"; one that satisfies all the must and must not requirements but not all the should or should not requirements for its protocols is said to be "conditionally compliant." 3. Protocol overview The EAP conversation between the authenticating peer and the NAS begins with the negotiation of EAP within LCP. Once EAP has been negotiated, the NAS will typically send to the DIAMETER server a DIAMETER Access-Request packet containing the DIAMETER-EAP-Request Command signifying an EAP-Start. EAP-Start is indicated by sending an DIAMETER-EAP-Request Command with an EAP-Packet attribute with a length of 7 (no data). The Port number and NAS Identifier MUST be included in the attributes issued by the NAS in the DIAMETER-EAP-Request packet. If the DIAMETER server supports EAP, it MUST respond with an DIAMETER-EAP-Response packet containing an EAP-Packet attribute. The EAP-Packet attribute includes an encapsulated EAP packet which is then passed on to the authenticating peer. The DIAMETER-EAP-Response typically will contain an EAP-Packet attribute encapsulating an EAP-Request/Identity message, requesting the authenticating peer to identify itself. The NAS will then respond with a DIAMETER-EAP-Request packet containing an EAP-Packet attribute encapsulating an EAP-Response, etc. The conversation continues until either a DIAMETER-EAP-Reject packet is received (with an EAP-Packet attribute encapsulating EAP-Failure) which results in the NAS disconnecting the user, or a DIAMETER-EAP-Ack packet is received (with an EAP-Packet attribute encapsulating EAP-Success) successfully ending the authentication Calhoun, Rubens & Aboba [Page 3]

4 phase. Note that if a DIAMETER-EAP-Reject packet with an EAP-Packet attribute encapsulating EAP-Failure is received from the DIAMETER Server, the NAS SHOULD issue an LCP Terminate Request to the authenticating peer. The above scenario creates a situation in which the NAS never needs to manipulate an EAP packet. An alternative may be used in situations where an EAP-Request/Identity message will always be sent by the NAS to the authenticating peer. This involves having the NAS send an EAP- Request/Identity message to the authenticating peer, and forwarding the Identity packet to the DIAMETER server in the EAP-Packet attribute of a DIAMETER-EAP-Request packet. While this approach will save a round-trip, it cannot be universally employed. There are circumstances in which the user s identity may not be needed (such as when authentication and accounting is handled based on the calling or called phone number), and therefore an EAP-Request/Identity packet may not necessarily be issued by the NAS to the authenticating peer. Unless the NAS interprets the Identity packet returned by the authenticating peer, it will not have access to the user s identity. Therefore, the DIAMETER Server SHOULD return the user s identity by inserting it in the User-Name attribute of subsequent DIAMETER-EAP-Response and DIAMETER-EAP-Ack packets. Without the user s identity, accounting and billing becomes very difficult to manage. In cases where a backup DIAMETER servers is available, were the primary server to fail at any time during the EAP conversation, it would be desirable for the NAS to be able to redirect the conversation to an alternate DIAMETER server. However, for the backup server to be able to pick up the conversation, it must be provided with the state of the EAP conversation prior to the interruption. This can be accomplished by having the DIAMETER-EAP-Request include the series of EAP-Packet attributes representing the previous history of the EAP conversation. Similarly, the DIAMETER-EAP-Response returned by the DIAMETER server must also include all previous EAP-Packet attributes. The sequence number field in the EAP-Packet attribute MUST be used in order to determine which attribute is to be processed. The attribute with the highest sequence number is the most recent attribute. The DIAMETER-EAP-Ack/EAP-Packet/EAP-Success packet MUST contain all of the expected attributes which are currently returned in an Access-Accept packet. Calhoun, Rubens & Aboba [Page 4]

5 For proxied DIAMETER requests there are two methods of processing. If the domain is determined based on the DNIS the DIAMETER Server may proxy the initial DIAMETER-EAP-Request/EAP-Start. If the domain is determined based on the user s identity, the local DIAMETER Server MUST respond with a DIAMETER-EAP-Identity packet. The response from the authenticating peer MUST be proxied to the final authentication server. For proxied DIAMETER requests, the NAS may receive an Command Unrecongnized packet in response to its DIAMETER-EAP-Request/EAP-Identity packet. This would occur if the message was proxied to a DIAMETER Server which does not support the DIAMETER EAP extensions. At this point, the NAS MUST re-open LCP with the authenticating peer and request either CHAP or PAP as the authentication protocol. If the NAS is unable to negotiate EAP with the authenticating peer, what happens next is a matter of policy. In circumstances where EAP is required of all users accessing the NAS, the NAS MUST disconnect the user. However, in circumstances where EAP is mandatory for some users, and optional or not required for others, the decision cannot be made until the user s identity is ascertained. In this case, the NAS will negotiate another authentication method, such as CHAP, and will pass the User-Name and CHAP-Password attributes to the DIAMETER Server in an Access-Request packet. If the user is not required to use EAP, then the DIAMETER Server will respond with an Access-Accept or Access-Reject packet as appropriate. However, should the user require EAP, then the DIAMETER Server will respond with an DIAMETER-EAP-Response packet containing an EAP-Packet attribute. The EAP-Packet attribute will either encapsulate an EAP-Request/Identity packet, or if the DIAMETER Server makes use of the User-Name attribute in the Access-Request, it may encapsulate an EAP challenge. On receiving the EAP-Packet attribute, the NAS will either attempt to negotiate EAP if it had not done so previously, or if negotiation had previously been attempted and failed, it MUST disconnect the user. The NAS is not responsible for the retransmission of any EAP messages. The authenticating peer and the DIAMETER Server are responsible for any retransmissions. The example below shows the conversation between the authenticating peer, NAS, and server, for the case of a One Time Password (OTP) authentication. OTP is used only for illustrative purposes; other authentication protocols could also have been used, although they would show somewhat different behavior. For brevity, the history of previous EAP messages (which will be transmitted in each DIAMETER-EAP-Request and DIAMETER-EAP-Response packet) has been left out. Calhoun, Rubens & Aboba [Page 5]

6 Authenticating Peer NAS DIAMETER Server PPP LCP ACK-EAP auth -> PPP Identity (MyID) -> PPP OTP, OTPpw -> PPP Authentication Phase complete, NCP Phase starts <- PPP LCP Request-EAP auth DIAMETER- EAP-Request/ EAP-Packet/Start -> <- PPP EAP-Request/ Identity DIAMETER- EAP-Request/ EAP-Packet/ (MyID) -> <- PPP EAP-Request/ OTP/OTP Challenge DIAMETER- EAP-Request/ EAP-Packet/ OTP, OTPpw -> <- PPP EAP-Success <- DIAMETER- EAP-Packet/Identity <- DIAMETER- EAP-Packet/EAP-Request OTP/OTP Challenge <- DIAMETER-EAP-Ack/ EAP-Packet/EAP-Success (other attributes) Calhoun, Rubens & Aboba [Page 6]

7 In the case where the NAS sends the authenticating peer an EAP-Request/Identity packet without first sending an EAP-Start packet to the DIAMETER server, the conversation would appear as follows: Authenticating Peer NAS DIAMETER Server PPP LCP ACK-EAP auth -> PPP Identity (MyID) -> PPP OTP, OTPpw -> PPP Authentication Phase complete, NCP Phase starts <- PPP LCP Request-EAP auth <- PPP EAP-Request/ Identity DIAMETER- EAP-Request/ EAP-Packet/ (MyID) -> <- PPP EAP-Request/ OTP/OTP Challenge DIAMETER- EAP-Request/ EAP-Packet/ OTP, OTPpw -> <- PPP EAP-Success <- DIAMETER- EAP-Packet/EAP-Request OTP/OTP Challenge <- DIAMETER-EAP-Ack/ EAP-Packet/EAP-Success (other attributes) Calhoun, Rubens & Aboba [Page 7]

8 In the case where the client fails EAP authentication, the conversation would appear as follows: Authenticating Peer NAS DIAMETER Server PPP LCP ACK-EAP auth -> PPP Identity (MyID) -> PPP OTP, OTPpw -> <- PPP LCP Request-EAP auth Access-Request/ EAP-Packet/Start -> <- PPP EAP-Request/ Identity DIAMETER- EAP-Request/ EAP-Packet/ (MyID) -> <- PPP EAP-Request/ OTP/OTP Challenge DIAMETER- EAP-Request/ EAP-Packet/ OTP, OTPpw -> <- PPP EAP-Failure (client disconnected) <- DIAMETER- EAP-Packet/Identity <- DIAMETER- EAP-Packet/EAP-Request OTP/OTP Challenge <- DIAMETER- EAP-Reject/ EAP-Packet/EAP-Failure Calhoun, Rubens & Aboba [Page 8]

9 In the case that the DIAMETER server or proxy does not support EAP extensions the conversation would appear as follows: Authenticating Peer NAS DIAMETER Server PPP LCP ACK-EAP auth -> PPP LCP ACK-CHAP auth -> PPP CHAP Response -> PPP Authentication Phase complete, NCP Phase starts <- PPP LCP Request-EAP auth DIAMETER Access-Request/ EAP-Packet/Start -> <- PPP LCP Request-CHAP auth <- PPP CHAP Challenge DIAMETER Access-Request-> <- PPP LCP CHAP-Success <- DIAMETER Command-Unrecognized <- DIAMETER Access-Accept In the case where the local DIAMETER Server does support the EAP extensions but the remote DIAMETER Server does not, the conversation would appear as follows: Authenticating Peer NAS DIAMETER Server PPP LCP ACK-EAP auth -> <- PPP LCP Request-EAP auth DIAMETER- EAP-Request/ EAP-Packet/Start -> Calhoun, Rubens & Aboba [Page 9]

10 PPP Identity (MyID) -> PPP LCP ACK-CHAP auth -> PPP CHAP Response -> PPP Authentication Phase complete, NCP Phase starts <- PPP EAP-Request/ Identity DIAMETER- EAP-Request/ EAP-Packet/ (MyID) -> <- PPP LCP Request-CHAP auth <- PPP CHAP Challenge DIAMETER Access-Request-> <- PPP LCP CHAP-Success <- DIAMETER- EAP-Packet/Identity <- DIAMETER- EAP-Reject (proxied from remote DIAMETER Server) <- DIAMETER Access-Accept (proxied from remote DIAMETER Server) In the case where the authenticating peer does not support EAP, but where EAP is required for that user, the conversation would appear as follows: Authenticating Peer NAS DIAMETER Server PPP LCP NAK-EAP auth -> <- PPP LCP Request-EAP auth <- PPP LCP Request-CHAP auth Calhoun, Rubens & Aboba [Page 10]

11 PPP LCP ACK-CHAP auth -> PPP CHAP Response -> <- PPP CHAP Challenge DIAMETER- Access-Request/ User-Name, CHAP-Password -> (User Disconnected) <- DIAMETER- EAP-Packet 5. Alternative uses Currently the conversation between the backend security server and the DIAMETER server is proprietary because of lack of standardization. In order to increase standardization and provide interoperability between DIAMETER vendors and backend security vendors, it is recommended that DIAMETER-encapsulated EAP be used for this conversation. This has the advantage of allowing the DIAMETER server to support EAP without the need for authentication-specific code within the DIAMETER server. Authentication-specific code can then reside on a backend security server instead. In the case where DIAMETER-encapsulated EAP is used in a conversation between a DIAMETER server and a backend security server, the Security Server will typically return an DIAMETER-EAP-Ack/EAP-Packet/EAP-Success message without inclusion of the expected attributes currently returned in an Access-Accept. This means that the DIAMETER server MUST add these attributes prior to sending an DIAMETER-EAP-Ack/EAP-Packet/EAP-Success message to the NAS. 2. Command Name and Command Code Command Name: DIAMETER-EAP-Request Command Code: 300 Command Name: DIAMETER-EAP-Response Command Code: 301 Command Name: DIAMETER-EAP-Ack Command Code: 302 Calhoun, Rubens & Aboba [Page 11]

12 Command Name: DIAMETER-EAP-Reject Command Code: Command Meanings 3.1 DIAMETER-EAP-Request Description DIAMETER-EAP-Request packets are sent by the DIAMETER Client to the DIAMETER Server, and convey EAP-Responses from the client through the NAS and on to the DIAMETER server. DIAMETER-EAP-Requests will normally include at least one EAP-Packet attribute which contains the EAP packets. A DIAMETER-EAP-Request sent from the NAS to the DIAMETER Server that does not contain an EAP-Packet attribute signals to the DIAMETER Server that it is to initiate EAP authentication with the client. Upon receipt of a DIAMETER-EAP-Request, A DIAMETER Server MUST issue a reply. The reply may be either: 1) a DIAMETER-EAP-Response containing an EAP-Request in at lease one EAP-Packet attribute, 2) a DIAMETER-EAP-Ack containing an EAP-Packet of type "success", or 3) a DIAMETER-EAP-Reject containing an EAP-Packet of type "failure". A Command-Unrecognized packet is returned if the server does not support the EAP extensions. A summary of the DIAMETER-EAP-Request packet format is shown below. The fields are transmitted from left to right Code Flags Ver Command Identifier Length Authenticator Message Integrity Code Attributes Calhoun, Rubens & Aboba [Page 12]

13 Code 254 for DIAMETER. Flags The Following bits MAY be used in the Access-Request: 0x1 - (Bit 12) TimeStamp is included in the Authenticator Field. 0x2 - (Bit 11) All attributes in packets are encrypted. 0x4 - (Bit 10) Authenticate-Only 0x8 - (Bit 9) Authorize-Only See [7] for more information on the encryption algorithm used. Version MUST be set to 2 Command 300 for DIAMETER-EAP-Request Identifier The Identifier field MUST be changed whenever the content of the Attributes field changes, and whenever a valid reply has been received for a previous request. For retransmissions, the Identifier MAY remain unchanged. Length The total length of the message, including this header. Authenticator The Authenticator field is a random 16 octet value. If the Timestamp option is supported, the first four octets contain a timestamp of when the packet was sent from the peer. Message Integrity Code This field contains an MD5 hash of the following: MD5( packet Shared Secret ) Calhoun, Rubens & Aboba [Page 13]

14 Attributes The Attribute field is variable in length, and contains a list of zero or more Attributes. It MAY contain one or more EAP-Packet attributes. If it does not contain an EAP-Packet attribute, it is an indication to the server that server that EAP should be initiated by the server. See the description on EAP-Packet attribute for more information on its use. DIAMETER attributes which are normally found in an Access-Request MAY be present in the request. 3.2 DIAMETER-EAP-Response Description DIAMETER-EAP-Response packets are sent by the DIAMETER Server to the NAS. They contain the next EAP-Request packet to be passed to the client. The DIAMETER-EAP-Response MUST contain at least one EAP-Packet attribute. After issuing the included EAP-Request to the client, the NAS remains in a state where it awaits further EAP-Responses from the client. A summary of the DIAMETER-EAP-Request packet format is shown below. The fields are transmitted from left to right Code Flags Ver Command Identifier Length Authenticator Message Integrity Code Attributes Calhoun, Rubens & Aboba [Page 14]

15 Code 254 for DIAMETER. Flags The Following bits MAY be used in the Access-Request: 0x1 - (Bit 12) TimeStamp is included in the Authenticator Field. 0x2 - (Bit 11) All attributes in packets are encrypted. 0x4 - (Bit 10) User Authenticated Only 0x8 - (Bit 9) User Authorized Only See [7] for more information on the encryption algorithm used. Version MUST be set to 2 Command 301 for DIAMETER-EAP-Response Identifier The Identifier field is a copy of the Identifier field of the DIAMETER-EAP-Request which caused this DIAMETER-EAP-Ack to be sent. Length The total length of the message, including this header. Authenticator The Authenticator field is a random 16 octet value. If the Timestamp option is supported, the first four octets contain a timestamp of when the packet was sent from the peer. Message Integrity Code This field contains an MD5 hash of the following: MD5( packet Shared Secret ) Calhoun, Rubens & Aboba [Page 15]

16 Attributes The Attribute field MUST contains at least one EAP-Packet attribute which contains an EAP-Request packet. 3.3 DIAMETER-EAP-Ack Description DIAMETER-EAP-Ack packets are sent by the DIAMETER Server to the NAS. They contain the next EAP-Request or EAP-Success packet to be passed to the client. The DIAMETER-EAP-Ack packet MUST contain at least one EAP-Packet attribute. After issuing the included EAP-Success packet to the client, the NAS should end the authentication phase with a positive response. A summary of the DIAMETER-EAP-Ack packet format is shown below. The fields are transmitted from left to right Code Flags Ver Command Identifier Length Authenticator Message Integrity Code Attributes Code 254 for DIAMETER. Calhoun, Rubens & Aboba [Page 16]

17 Flags The Following bits MAY be used in the Access-Request: 0x1 - (Bit 12) TimeStamp is included in the Authenticator Field. 0x2 - (Bit 11) All attributes in packets are encrypted. 0x4 - (Bit 10) User Authenticated Only 0x8 - (Bit 9) User Authorized Only See [7] for more information on the encryption algorithm used. Version MUST be set to 2 Command 302 for DIAMETER-EAP-Ack Identifier The Identifier field is a copy of the Identifier field of the DIAMETER-EAP-Request which caused this DIAMETER-EAP-Ack to be sent. Length The total length of the message, including this header. Authenticator The Authenticator field is a random 16 octet value. If the Timestamp option is supported, the first four octets contain a timestamp of when the packet was sent from the peer. Message Integrity Code This field contains an MD5 hash of the following: MD5( packet Shared Secret ) Attributes The Attribute field contains only a single EAP-Packet attribute which contains an EAP-Request packet. Calhoun, Rubens & Aboba [Page 17]

18 3.4 DIAMETER-EAP-Reject Description DIAMETER-EAP-Reject packets are sent by the DIAMETER Server to the NAS. They are sent in response to a DIAMETER-EAP-Request that results in an authentication failure. DIAMETER-EAP-Reject packets contain at least one EAP-Packet attribute containing an EAP failure packet. After issuing the included EAP failure packet to the client, the NAS should end the authentication phase with a negative result. A summary of the DIAMETER-EAP-Reject packet format is shown below. The fields are transmitted from left to right Code Flags Ver Command Identifier Length Authenticator Message Integrity Code Attributes Code 254 for DIAMETER. Flags The Flag field is used as defined in [7]. Version MUST be set to 2 Calhoun, Rubens & Aboba [Page 18]

19 Command 303 for DIAMETER-EAP-Reject Identifier The Identifier field is a copy of the Identifier field of the DIAMETER-EAP-Request which caused this DIAMETER-EAP-Reject to be sent. Length The total length of the message, including this header. Authenticator The Authenticator field is a random 16 octet value. If the Timestamp option is supported, the first four octets contain a timestamp of when the packet was sent from the peer. Message Integrity Code This field contains an MD5 hash of the following: MD5( packet Shared Secret ) Attributes The Attribute field contains only a single EAP-Packet attribute which contains an EAP-Request packet. Other attributes valid on an Access-Reject message may also be present. 4. Attribute Name and Attribute Code Attribute Name: EAP-Packet Attribute Code: Attribute Meanings 5.1 EAP-Packet Description This attribute is used to contain the actual EAP-Requests to be sent from the DIAMETER server to the client (DIAMETER-EAP-Ack and DIAMETER-EAP-Reject) and the EAP-Responses to be sent from the client to the DIAMETER server (DIAMETER-EAP-Requests). These EAP-Requests and Responses are exactly as defined in [1]. Calhoun, Rubens & Aboba [Page 19]

20 Attribute Type Length Flags Sequence Number String... Type 300 for EAP-Packet Length >= 6 Flags The Flags field indicates how the NAS or DIAMETER Server MUST react to the attribute. The following values are currently supported: 1 - The Device MUST support this attribute. If the attribute is NOT supported, the device MUST reject the Command. If this flag is not set, then the device MAY accept the command regardless of whether or not the particular attribute is recognized. This bit MUST be set. 2 - If this bit is set, the contents of the attributes are encrypted. Note that the attribute header is NOT encrypted in this case. See [7] for more information on the encryption algorithm. Sequence Number The Sequence Number field is used in order to build a "history" of the transaction. The EAP-Packet attribute with the highest Sequence Number represents the current packet to process. The history is passed along in each request/responses in order in order to support the concept of DIAMETER backup servers, as described earlier. String The String field is the exact EAP packet data to be transported from client to server or server to client. It is not Null terminated and may contain arbitrary binary values. Calhoun, Rubens & Aboba [Page 20]

21 7. Acknowledgments Thanks to Dave Dawson and Karl Fox of Ascend, and Glen Zorn and Narendra Gidwani of Microsoft for useful discussions of this problem space. 8. References [1] L. J. Blunk, J. R. Vollbrecht. "PPP Extensible Authentication Protocol (EAP)." draft-ietf-pppext-eap-auth-02.txt, Merit Network, Inc., June, [2] P.R. Calhoun, A. Rubens, B. Aboba. "Extensible Authentication Protocol Support in RADIUS" US Robotics Access Corp., Merit Network, Inc., Microsoft Corp, February, [3] C. Rigney, A. Rubens, W. Simpson, S. Willens. "Remote Authentication Dial In User Service (RADIUS)." RFC 2058, Livingston, Merit, Daydreamer, January, [4] C. Rigney. "RADIUS Accounting." RFC 2059, Livingston, January, [5] R. Rivest, S. Dusse. "The MD5 Message-Digest Algorithm", RFC 1321, MIT Laboratory for Computer Science, RSA Data Security Inc., [6] S. Bradner. "Key words for use in RFCs to Indicate Requirement Levels." draft-bradner-key-words-02.txt, Harvard University, August, [7] P.R. Calhoun, A. Rubens, "DIAMETER", Internet-Draft, March Calhoun, Rubens & Aboba [Page 21]

22 9. Authors Addresses Pat R. Calhoun US Robotics Access Corp N. McCormick Blvd. Skokie, IL Phone: Allan C. Rubens Merit Network, Inc Plymouth Rd. Ann Arbor, MI Phone: Bernard Aboba Microsoft Corporation One Microsoft Way Redmond, WA Phone: Calhoun, Rubens & Aboba [Page 22]

RADIUS Working Group Bernard Aboba. Category: Standards Track <draft-ietf-radius-auth-clientmib-01.txt> 12 February 1998

RADIUS Working Group Bernard Aboba. Category: Standards Track <draft-ietf-radius-auth-clientmib-01.txt> 12 February 1998 RADIUS Working Group Bernard Aboba INTERNET-DRAFT Microsoft Category: Standards Track Glen Zorn Microsoft 12 February 1998 RADIUS Authentication Client MIB 1.

More information

INTERNET-DRAFT IP Version 6 over PPP February Table of Contents. 1. Introduction Specification of Requirements...

INTERNET-DRAFT IP Version 6 over PPP February Table of Contents. 1. Introduction Specification of Requirements... HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 03:48:38 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Thu, 15 Feb 1996 23:00:00 GMT ETag: "2f52fa-4e8d-3123baf0" Accept-Ranges: bytes Content-Length: 20109 Connection:

More information

Network Working Group Request for Comments: 2059 Category: Informational January 1997

Network Working Group Request for Comments: 2059 Category: Informational January 1997 Network Working Group C. Rigney Request for Comments: 2059 Livingston Category: Informational January 1997 Status of this Memo RADIUS Accounting This memo provides information for the Internet community.

More information

Network Working Group. Category: Standards Track <draft-aboba-radius-iana-03.txt> 30 March 2003 Updates: RFC IANA Considerations for RADIUS

Network Working Group. Category: Standards Track <draft-aboba-radius-iana-03.txt> 30 March 2003 Updates: RFC IANA Considerations for RADIUS Network Working Group INTERNET-DRAFT Category: Standards Track 30 March 2003 Updates: RFC 2865 B. Aboba Microsoft IANA Considerations for RADIUS This document is an Internet-Draft

More information

Network Working Group Requests for Commments: 2716 Category: Experimental October 1999

Network Working Group Requests for Commments: 2716 Category: Experimental October 1999 Network Working Group Requests for Commments: 2716 Category: Experimental B. Aboba D. Simon Microsoft October 1999 Status of this Memo PPP EAP TLS Authentication Protocol This memo defines an Experimental

More information

Diameter NASREQ Application. Status of this Memo. This document is an Internet-Draft and is subject to all provisions of Section 10 of RFC2026.

Diameter NASREQ Application. Status of this Memo. This document is an Internet-Draft and is subject to all provisions of Section 10 of RFC2026. AAA Working Group Pat R. Calhoun Internet-Draft Black Storm Networks Category: Standards Track William Bulley Merit Network, Inc. Allan C. Rubens Tut Systems, Inc.

More information

Network Working Group. Category: Informational February 1997

Network Working Group. Category: Informational February 1997 Network Working Group K. Hamzeh Request for Comments: 2107 Ascend Communications Category: Informational February 1997 Status of this Memo Ascend Tunnel Management Protocol - ATMP This memo provides information

More information

Request for Comments: 1552 Category: Standards Track December The PPP Internetwork Packet Exchange Control Protocol (IPXCP)

Request for Comments: 1552 Category: Standards Track December The PPP Internetwork Packet Exchange Control Protocol (IPXCP) Network Working Group W. Simpson Request for Comments: 1552 Daydreamer Category: Standards Track December 1993 The PPP Internetwork Packet Exchange Control Protocol (IPXCP) Status of this Memo This document

More information

Network Working Group Request for Comments: 2866 Category: Informational June 2000 Obsoletes: 2139

Network Working Group Request for Comments: 2866 Category: Informational June 2000 Obsoletes: 2139 Network Working Group C. Rigney Request for Comments: 2866 Livingston Category: Informational June 2000 Obsoletes: 2139 Status of this Memo RADIUS Accounting This memo provides information for the Internet

More information

Network Working Group. Category: Standards Track June 1996

Network Working Group. Category: Standards Track June 1996 Network Working Group G. Meyer Request for Comments: 1968 Spider Systems Category: Standards Track June 1996 Status of this Memo The PPP Encryption Control Protocol (ECP) This document specifies an Internet

More information

Network Working Group Request for Comments: 2043 Category: Standards Track October 1996

Network Working Group Request for Comments: 2043 Category: Standards Track October 1996 Network Working Group A. Fuqua Request for Comments: 2043 IBM Category: Standards Track October 1996 Status of this Memo The PPP SNA Control Protocol (SNACP) This document specifies an Internet standards

More information

Internet Engineering Task Force. Obsoletes: draft-ietf-dhc-dhcpv6-05.txt 16 August 1996

Internet Engineering Task Force. Obsoletes: draft-ietf-dhc-dhcpv6-05.txt 16 August 1996 Internet Engineering Task Force INTERNET DRAFT DHC Working Group Obsoletes: draft-ietf-dhc-dhcpv6-05.txt J. Bound Digital Equipment Corp. C. Perkins IBM Research 16 August 1996 Dynamic Host Configuration

More information

Network Working Group Request for Comments: 1962 Category: Standards Track June 1996

Network Working Group Request for Comments: 1962 Category: Standards Track June 1996 Network Working Group D. Rand Request for Comments: 1962 Novell Category: Standards Track June 1996 Status of this Memo The PPP Compression Control Protocol (CCP) This document specifies an Internet standards

More information

Network Working Group Request for Comments: October 1996

Network Working Group Request for Comments: October 1996 Network Working Group Request for Comments: 2023 Category: Standards Track D. Haskin E. Allen Bay Networks, Inc. October 1996 IP Version 6 over PPP Status of this Memo This document specifies an Internet

More information

Network Working Group Request for Comments: 2058 Category: Standards Track. Merit W. Simpson Daydreamer S. Willens. Livingston.

Network Working Group Request for Comments: 2058 Category: Standards Track. Merit W. Simpson Daydreamer S. Willens. Livingston. Network Working Group Request for Comments: 2058 Category: Standards Track C. Rigney Livingston A. Rubens Merit W. Simpson Daydreamer S. Willens Livingston January 1997 Status of this Memo Remote Authentication

More information

Network Working Group. Category: Standards Track January 1999 Updates: 2284, 1994, PPP LCP Internationalization Configuration Option

Network Working Group. Category: Standards Track January 1999 Updates: 2284, 1994, PPP LCP Internationalization Configuration Option Network Working Group G. Zorn Request for Comments: 2484 Microsoft Corporation Category: Standards Track January 1999 Updates: 2284, 1994, 1570 Status of this Memo PPP LCP Internationalization Configuration

More information

Request for Comments: August PPP for Data Compression in Data Circuit-Terminating Equipment (DCE)

Request for Comments: August PPP for Data Compression in Data Circuit-Terminating Equipment (DCE) Network Working Group Request for Comments: 1976 Category: Informational K. Schneider S. Venters ADTRAN, Inc. August 1996 PPP for Data Compression in Data Circuit-Terminating Equipment (DCE) Status of

More information

Network Working Group Request for Comments: D. Mitton RSA, Security Division of EMC B. Aboba Microsoft Corporation January 2008

Network Working Group Request for Comments: D. Mitton RSA, Security Division of EMC B. Aboba Microsoft Corporation January 2008 Network Working Group Request for Comments: 5176 Obsoletes: 3576 Category: Informational M. Chiba G. Dommety M. Eklund Cisco Systems, Inc. D. Mitton RSA, Security Division of EMC B. Aboba Microsoft Corporation

More information

Request for Comments: B. Aboba Microsoft Corporation September RADIUS Attributes for Virtual LAN and Priority Support

Request for Comments: B. Aboba Microsoft Corporation September RADIUS Attributes for Virtual LAN and Priority Support Network Working Group Request for Comments: 4675 Category: Standards Track P. Congdon M. Sanchez Hewlett-Packard Company B. Aboba Microsoft Corporation September 2006 RADIUS Attributes for Virtual LAN

More information

Request for Comments: 1332 Obsoletes: RFC 1172 May The PPP Internet Protocol Control Protocol (IPCP)

Request for Comments: 1332 Obsoletes: RFC 1172 May The PPP Internet Protocol Control Protocol (IPCP) Network Working Group G. McGregor Request for Comments: 1332 Merit Obsoletes: RFC 1172 May 1992 The PPP Internet Protocol Control Protocol (IPCP) Status of this Memo This RFC specifies an IAB standards

More information

Independent Submission Request for Comments: 6218 Category: Informational. J. Walker Intel Corporation J. Salowey Cisco Systems April 2011

Independent Submission Request for Comments: 6218 Category: Informational. J. Walker Intel Corporation J. Salowey Cisco Systems April 2011 Independent Submission Request for Comments: 6218 Category: Informational ISSN: 2070-1721 G. Zorn Network Zen T. Zhang Advista Technologies J. Walker Intel Corporation J. Salowey Cisco Systems April 2011

More information

Network Working Group Request for Comments: Category: Standards Track Merit W. Simpson Daydreamer June 2000

Network Working Group Request for Comments: Category: Standards Track Merit W. Simpson Daydreamer June 2000 Network Working Group Request for Comments: 2865 Obsoletes: 2138 Category: Standards Track C. Rigney S. Willens Livingston A. Rubens Merit W. Simpson Daydreamer June 2000 Status of this Memo Remote Authentication

More information

Chapter 10 Security Protocols of the Data Link Layer

Chapter 10 Security Protocols of the Data Link Layer Chapter 10 Security Protocols of the Data Link Layer IEEE 802.1x Point-to-Point Protocol (PPP) Point-to-Point Tunneling Protocol (PPTP) [NetSec], WS 2005/06 10.1 Scope of Link Layer Security Protocols

More information

No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation.

No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation. [MS-CBCP]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,

More information

Network Working Group. Category: Informational DayDreamer August 1996

Network Working Group. Category: Informational DayDreamer August 1996 Network Working Group Request for Comments: 1974 Category: Informational R. Friend Stac Electronics W. Simpson DayDreamer August 1996 PPP Stac LZS Compression Protocol Status of this Memo This memo provides

More information

Request for Comments: August 1996

Request for Comments: August 1996 Network Working Group Request for Comments: 1963 Category: Informational K. Schneider S. Venters ADTRAN, Inc. August 1996 Status of This Memo PPP Serial Data Transport Protocol (SDTP) This memo provides

More information

Point-to-Point Extensions Working Group Internet Draft April EAP SIM Authentication (Version 1) draft-haverinen-pppext-eap-sim-01.

Point-to-Point Extensions Working Group Internet Draft April EAP SIM Authentication (Version 1) draft-haverinen-pppext-eap-sim-01. Point-to-Point Extensions Working Group Internet Draft H. Haverinen Nokia April 2001 EAP SIM Authentication (Version 1) draft-haverinen-pppext-eap-sim-01.txt Status of this Memo This document is an Internet-Draft

More information

Expiration Date: May 1997 Randy Bush RGnet, Inc. November Clarifications to the DNS Specification. draft-ietf-dnsind-clarify-02.

Expiration Date: May 1997 Randy Bush RGnet, Inc. November Clarifications to the DNS Specification. draft-ietf-dnsind-clarify-02. Network Working Group Internet Draft Expiration Date: May 1997 Robert Elz University of Melbourne Randy Bush RGnet, Inc. November 1996 Clarifications to the DNS Specification Status of this Memo draft-ietf-dnsind-clarify-02.txt

More information

Internet Engineering Task Force (IETF) Request for Comments: 5904 Category: Informational June 2010 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 5904 Category: Informational June 2010 ISSN: Internet Engineering Task Force (IETF) G. Zorn Request for Comments: 5904 Network Zen Category: Informational June 2010 ISSN: 2070-1721 Abstract RADIUS Attributes for IEEE 802.16 Privacy Key Management

More information

Expires: September 2, 2005 F. Bari Cingular Wireless P. Eronen Nokia March 2005

Expires: September 2, 2005 F. Bari Cingular Wireless P. Eronen Nokia March 2005 Network Working Group Internet-Draft Expires: September 2, 2005 F. Adrangi V. Lortz Intel F. Bari Cingular Wireless P. Eronen Nokia March 2005 Identity selection hints for Extensible Authentication Protocol

More information

Internet Engineering Task Force. Obsoletes: draft-ietf-dhc-dhcpv6-11.txt 13 March 1998

Internet Engineering Task Force. Obsoletes: draft-ietf-dhc-dhcpv6-11.txt 13 March 1998 HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 01:46:42 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Tue, 07 Apr 1998 05:45:55 GMT ETag: "2e7a4e-18fe3-3529bd93" Accept-Ranges: bytes Content-Length: 102371 Connection:

More information

Network Working Group. February 2005

Network Working Group. February 2005 Network Working Group Request for Comments: 4014 Category: Standards Track R. Droms J. Schnizlein Cisco Systems February 2005 Status of This Memo Remote Authentication Dial-In User Service (RADIUS) Attributes

More information

T.J. Watson Research Center IBM Corp Sue Thomson Bellcore. Dynamic Host Configuration Protocol for IPv6. draft-ietf-dhc-dhcpv6-01.

T.J. Watson Research Center IBM Corp Sue Thomson Bellcore. Dynamic Host Configuration Protocol for IPv6. draft-ietf-dhc-dhcpv6-01. HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 01:46:15 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Wed, 22 Mar 1995 23:00:00 GMT ETag: "2ed703-7c52-2f70abf0" Accept-Ranges: bytes Content-Length: 31826 Connection:

More information

Diameter. Term Paper Seminar in Communication Systems. Author: Christian Schulze Student ID: Date: February 4, 2003 Tutor: Martin Gutbrod

Diameter. Term Paper Seminar in Communication Systems. Author: Christian Schulze Student ID: Date: February 4, 2003 Tutor: Martin Gutbrod Diameter Term Paper Seminar in Communication Systems Author: Christian Schulze Student ID: 2611745 Date: February 4, 2003 Tutor: Martin Gutbrod Table of Contents Introduction... 3 AAA... 3 Authentication...

More information

Expires six months from November draft-ietf-urn-resolution-services-04.txt. URI Resolution Services Necessary for URN Resolution

Expires six months from November draft-ietf-urn-resolution-services-04.txt. URI Resolution Services Necessary for URN Resolution HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 08:59:39 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Thu, 04 Dec 1997 22:03:00 GMT ETag: "323dba-6002-34872894" Accept-Ranges: bytes Content-Length: 24578 Connection:

More information

Internet Engineering Task Force (IETF) Category: Standards Track. February 2012

Internet Engineering Task Force (IETF) Category: Standards Track. February 2012 Internet Engineering Task Force (IETF) Request for Comments: 6519 Category: Standards Track ISSN: 2070-1721 R. Maglione Telecom Italia A. Durand Juniper Networks February 2012 RADIUS Extensions for Dual-Stack

More information

PPP Configuration Options

PPP Configuration Options PPP Configuration Options 1 PPP Configuration Options PPP can be configured to support various functions including: Authentication using either PAP or CHAP Compression using either Stacker or Predictor

More information

Internet Engineering Task Force (IETF) Request for Comments: 5997 Updates: 2866 August 2010 Category: Informational ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 5997 Updates: 2866 August 2010 Category: Informational ISSN: Internet Engineering Task Force (IETF) A. DeKok Request for Comments: 5997 FreeRADIUS Updates: 2866 August 2010 Category: Informational ISSN: 2070-1721 Abstract Use of Status-Server Packets in the Remote

More information

March 1996 MIME Security with Pretty Good Privacy (PGP) Status of this Memo

March 1996 MIME Security with Pretty Good Privacy (PGP) Status of this Memo HTTP/1.1 200 OK Date: Mon, 08 Apr 2002 23:44:46 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Wed, 20 Mar 1996 23:00:00 GMT ETag: "2e98da-36ef-31508df0" Accept-Ranges: bytes Content-Length: 14063 Connection:

More information

Category: Standards Track Sun Microsystems Laboratories November 2000

Category: Standards Track Sun Microsystems Laboratories November 2000 Network Working Group Request for Comments: 3012 Category: Standards Track C. Perkins Nokia Research Center P. Calhoun Sun Microsystems Laboratories November 2000 Status of this Memo Mobile IPv4 Challenge/Response

More information

Internet Engineering Task Force (IETF) Request for Comments: 5749 Category: Standards Track. Toshiba March 2010

Internet Engineering Task Force (IETF) Request for Comments: 5749 Category: Standards Track. Toshiba March 2010 Internet Engineering Task Force (IETF) Request for Comments: 5749 Category: Standards Track ISSN: 2070-1721 K. Hoeper, Ed. M. Nakhjiri Motorola Y. Ohba, Ed. Toshiba March 2010 Distribution of EAP-Based

More information

Request for Comments: 1333 May 1992

Request for Comments: 1333 May 1992 Network Working Group Request for Comments: 1333 W. Simpson Daydreamer May 1992 PPP Link Quality Monitoring Status of this Memo This RFC specifies an IAB standards track protocol for the Internet community,

More information

Category: Informational Stac Technology August 1996

Category: Informational Stac Technology August 1996 Network Working Group Request for Comments: 1967 Category: Informational K. Schneider ADTRAN, Inc. R. Friend Stac Technology August 1996 Status of This Memo PPP LZS-DCP Compression Protocol (LZS-DCP) This

More information

draft-ietf-ipsec-nat-t-ike-00.txt W. Dixon, B. Swander Microsoft V. Volpe Cisco Systems L. DiBurro Nortel Networks 10 June 2001

draft-ietf-ipsec-nat-t-ike-00.txt W. Dixon, B. Swander Microsoft V. Volpe Cisco Systems L. DiBurro Nortel Networks 10 June 2001 IP Security Protocol Working Group (IPSEC) INTERNET-DRAFT draft-ietf-ipsec-nat-t-ike-00.txt Expires: 10 December 2001 T. Kivinen, M. Stenberg SSH Communications Security A. Huttunen F-Secure Corporation

More information

Request for Comments: Starent Networks A. Lior Bridgewater Systems K. Leung Cisco Systems October 2007

Request for Comments: Starent Networks A. Lior Bridgewater Systems K. Leung Cisco Systems October 2007 Network Working Group Request for Comments: 5030 Category: Informational M. Nakhjiri, Ed. Motorola K. Chowdhury Starent Networks A. Lior Bridgewater Systems K. Leung Cisco Systems October 2007 Mobile IPv4

More information

Request for Comments: P. Arberg Redback Networks, Inc. R. Rennison ECI Telecom September 2006

Request for Comments: P. Arberg Redback Networks, Inc. R. Rennison ECI Telecom September 2006 Network Working Group Request for Comments: 479 Category: Informational V. Mammoliti G. Zorn Cisco Systems P. Arberg Redback Networks, Inc. R. Rennison ECI Telecom September 200 Status of this Memo DSL

More information

RADIUS Attributes Overview and RADIUS IETF Attributes

RADIUS Attributes Overview and RADIUS IETF Attributes RADIUS Attributes Overview and RADIUS IETF Attributes Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements

More information

draft-ietf-ipsec-nat-t-ike-01.txt W. Dixon, B. Swander Microsoft V. Volpe Cisco Systems L. DiBurro Nortel Networks 23 October 2001

draft-ietf-ipsec-nat-t-ike-01.txt W. Dixon, B. Swander Microsoft V. Volpe Cisco Systems L. DiBurro Nortel Networks 23 October 2001 IP Security Protocol Working Group (IPSEC) INTERNET-DRAFT draft-ietf-ipsec-nat-t-ike-01.txt Expires: 23 April 2001 T. Kivinen, M. Stenberg SSH Communications Security A. Huttunen F-Secure Corporation W.

More information

Expires six months from July 1997

Expires six months from July 1997 HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 08:59:35 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Mon, 04 Aug 1997 17:25:00 GMT ETag: "323db8-5a2d-33e6106c" Accept-Ranges: bytes Content-Length: 23085 Connection:

More information

Category: Standards Track Microsoft May 2004

Category: Standards Track Microsoft May 2004 Network Working Group Request for Comments: 3770 Category: Standards Track R. Housley Vigil Security T. Moore Microsoft May 2004 Status of this Memo Certificate Extensions and Attributes Supporting Authentication

More information

Network Working Group Request for Comments: 1377 November The PPP OSI Network Layer Control Protocol (OSINLCP)

Network Working Group Request for Comments: 1377 November The PPP OSI Network Layer Control Protocol (OSINLCP) Network Working Group Request for Comments: 1377 D. Katz cisco November 1992 Status of this Memo The PPP OSI Network Layer Control Protocol (OSINLCP) This RFC specifies an IAB standards track protocol

More information

Configuring Security on the GGSN

Configuring Security on the GGSN CHAPTER 12 This chapter describes how to configure security features on the gateway GPRS support node (GGSN), including Authentication, Authorization, and Accounting (AAA), and RADIUS. IPSec on the Cisco

More information

Network Security. Chapter 10 Security Protocols of the Data Link Layer

Network Security. Chapter 10 Security Protocols of the Data Link Layer Network Security Chapter 10 Security Protocols of the Data Link Layer IEEE 802.1x Point-to-Point Protocol () Point-to-Point Tunneling Protocol (PPTP) Layer 2 Tunneling Protocol (L2TP) Virtual Private Networks

More information

expires in six months October 1997 Internet Public Key Infrastructure Operational Protocols: FTP and HTTP <draft-ietf-pkix-opp-ftp-http-01.

expires in six months October 1997 Internet Public Key Infrastructure Operational Protocols: FTP and HTTP <draft-ietf-pkix-opp-ftp-http-01. HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 06:26:48 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Tue, 21 Oct 1997 17:15:00 GMT ETag: "361b18-2953-344ce314" Accept-Ranges: bytes Content-Length: 10579 Connection:

More information

Network Access Flows APPENDIXB

Network Access Flows APPENDIXB APPENDIXB This appendix describes the authentication flows in Cisco Identity Services Engine (ISE) by using RADIUS-based Extensible Authentication Protocol (EAP) and non-eap protocols. Authentication verifies

More information

Network Working Group Request for Comments: 2486 Category: Standards Track WorldCom Advanced Networks January 1999

Network Working Group Request for Comments: 2486 Category: Standards Track WorldCom Advanced Networks January 1999 Network Working Group Request for Comments: 2486 Category: Standards Track B. Aboba Microsoft M. Beadles WorldCom Advanced Networks January 1999 The Network Access Identifier Status of this Memo This document

More information

April 24, 1998 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this memo

April 24, 1998 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this memo HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 00:24:41 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Mon, 27 Apr 1998 14:31:00 GMT ETag: "2e9b64-31dd-354496a4" Accept-Ranges: bytes Content-Length: 12765 Connection:

More information

L2TP Configuration. L2TP Overview. Introduction. Typical L2TP Networking Application

L2TP Configuration. L2TP Overview. Introduction. Typical L2TP Networking Application Table of Contents L2TP Configuration 1 L2TP Overview 1 Introduction 1 Typical L2TP Networking Application 1 Basic Concepts of L2TP 2 L2TP Tunneling Modes and Tunnel Establishment Process 4 L2TP Features

More information

Category:Best Current Practice December Administratively Scoped IP Multicast. Status of this Memo

Category:Best Current Practice December Administratively Scoped IP Multicast. Status of this Memo HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 04:57:56 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Tue, 24 Dec 1996 00:15:00 GMT ETag: "2f51c8-22cf-32bf2084" Accept-Ranges: bytes Content-Length: 8911 Connection:

More information

Expiration Date: July 1997 Randy Bush RGnet, Inc. January Clarifications to the DNS Specification. draft-ietf-dnsind-clarify-04.

Expiration Date: July 1997 Randy Bush RGnet, Inc. January Clarifications to the DNS Specification. draft-ietf-dnsind-clarify-04. Network Working Group Internet Draft Expiration Date: July 1997 Robert Elz University of Melbourne Randy Bush RGnet, Inc. January 1997 Clarifications to the DNS Specification Status of this Memo draft-ietf-dnsind-clarify-04.txt

More information

Part II. Raj Jain. Washington University in St. Louis

Part II. Raj Jain. Washington University in St. Louis Part II Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-07/ 19-1 Overview

More information

MIP4 Working Group. Generic Notification Message for Mobile IPv4 draft-ietf-mip4-generic-notification-message-16

MIP4 Working Group. Generic Notification Message for Mobile IPv4 draft-ietf-mip4-generic-notification-message-16 MIP4 Working Group Internet-Draft Intended status: Standards Track Expires: April 28, 2011 H. Deng China Mobile H. Levkowetz Netnod V. Devarapalli WiChorus S. Gundavelli Cisco Systems B. Haley Hewlett-Packard

More information

[MS-SSTP]: Secure Socket Tunneling Protocol (SSTP) Intellectual Property Rights Notice for Open Specifications Documentation

[MS-SSTP]: Secure Socket Tunneling Protocol (SSTP) Intellectual Property Rights Notice for Open Specifications Documentation [MS-SSTP]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation ( this documentation ) for protocols,

More information

Expires: October 2000 April 2000

Expires: October 2000 April 2000 INTERNET-DRAFT UPDATES RFC 2535 Donald E. Eastlake 3rd Motorola Expires: October 2000 April 2000 DNS Request and Transaction Signatures ( SIG(0)s ) --- ------- --- ----------- ---------- - ------- -

More information

Network Working Group Request for Comments: 1663 Category: Standards Track July 1994

Network Working Group Request for Comments: 1663 Category: Standards Track July 1994 Network Working Group D. Rand Request for Comments: 1663 Novell Category: Standards Track July 1994 Status of this Memo PPP Reliable Transmission This document specifies an Internet standards track protocol

More information

Request for Comments: 4072 Category: Standards Track Lucent Technologies G. Zorn Cisco Systems August 2005

Request for Comments: 4072 Category: Standards Track Lucent Technologies G. Zorn Cisco Systems August 2005 Network Working Group Request for Comments: 4072 Category: Standards Track P. Eronen, Ed. Nokia T. Hiller Lucent Technologies G. Zorn Cisco Systems August 2005 Diameter Extensible Authentication Protocol

More information

Overview. RADIUS Protocol CHAPTER

Overview. RADIUS Protocol CHAPTER CHAPTER 1 The chapter provides an overview of the RADIUS server, including connection steps, RADIUS message types, and using Cisco Access Registrar as a proxy server. Cisco Access Registrar is a RADIUS

More information

Vendor-Proprietary Attribute

Vendor-Proprietary Attribute RADIUS s The IETF draft standard for RADIUS specifies a method for communicating vendor-proprietary information between the network access server and the RADIUS server. However, some vendors have extended

More information

Csci388. Wireless and Mobile Security Access Control: 802.1X, EAP, and RADIUS. Importance of Access Control. WEP Weakness. Wi-Fi and IEEE 802.

Csci388. Wireless and Mobile Security Access Control: 802.1X, EAP, and RADIUS. Importance of Access Control. WEP Weakness. Wi-Fi and IEEE 802. WEP Weakness Csci388 Wireless and Mobile Security Access Control:, EAP, and Xiuzhen Cheng cheng@gwu.edu 1. IV is too short and not protected from reuse 2. The per packet key is constructed from the IV,

More information

Expires: August 1998 February DNS Operational Security Considerations Status of This Document

Expires: August 1998 February DNS Operational Security Considerations Status of This Document DNS Security Working Group Donald E. Eastlake 3rd INTERNET-DRAFT CyberCash Expires: August 1998 February 1998 DNS Operational Security Considerations --- ----------- -------- -------------- Status of This

More information

Network Working Group. Category: Informational July 2000

Network Working Group. Category: Informational July 2000 Network Working Group D. Mitton Request for Comments: 2882 Nortel Networks Category: Informational July 2000 Status of this Memo Network Access Servers Requirements: Extended RADIUS Practices This memo

More information

Network Working Group. Intended status: Standards Track. January 15, 2010

Network Working Group. Intended status: Standards Track. January 15, 2010 Network Working Group Internet-Draft Intended status: Standards Track Expires: July 19, 2010 G. Zorn Network Zen S. Comerica Cisco Systems January 15, 2010 Diameter Base Protocol MIB draft-ietf-dime-diameter-base-protocol-mib-04.txt

More information

October 4, 2000 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this Memo

October 4, 2000 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this Memo Internet Draft draft-hoffman-rfc2487bis-04.txt October 4, 2000 Expires in six months Paul Hoffman Internet Mail Consortium Status of this Memo SMTP Service Extension for Secure SMTP over TLS This document

More information

Expires in 6 months September Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP <draft-ietf-pkix-ocsp-00.

Expires in 6 months September Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP <draft-ietf-pkix-ocsp-00. HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 06:26:11 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Thu, 23 Oct 1997 15:29:00 GMT ETag: "304c31-471a-344f6d3c" Accept-Ranges: bytes Content-Length: 18202 Connection:

More information

Network Working Group

Network Working Group Network Working Group Request for Comments: 2868 Updates: RFC 2865 Category: Informational G. Zorn Cisco Systems, Inc. D. Leifer A. Rubens Ascend Communications J. Shriver Intel Corporation M. Holdrege

More information

itself as a cost effective, reliable alternative. Using the current quasi-associated SS7 networks also decreases the number of hops between SP's and t

itself as a cost effective, reliable alternative. Using the current quasi-associated SS7 networks also decreases the number of hops between SP's and t Internet Engineering Task Force Internet Draft William Bressler NORTEL Networks Expires in Six Months January 1999 Status of this Memo SS7 Level Two over IP This

More information

Network Working Group. Obsoletes: RFC 1103 October 1990

Network Working Group. Obsoletes: RFC 1103 October 1990 Network Working Group D. Katz Request for Comments: 1188 Merit/NSFNET Obsoletes: RFC 1103 October 1990 Status of this Memo A Proposed Standard for the Transmission of IP Datagrams over FDDI Networks This

More information

Expires in six months January 10, 2002

Expires in six months January 10, 2002 Network Working Group INTERNET-DRAFT Brian Bidulock OpenSS7 Corporation Expires in six months January 10, 2002 Signalling Gateway (SG) Information (SGINFO) Support for Signalling User Adaptation Layers

More information

Internet Engineering Task Force (IETF) Request for Comments: 6867 Category: Experimental ISSN: January 2013

Internet Engineering Task Force (IETF) Request for Comments: 6867 Category: Experimental ISSN: January 2013 Internet Engineering Task Force (IETF) Request for Comments: 6867 Category: Experimental ISSN: 2070-1721 Y. Nir Check Point Q. Wu Huawei January 2013 Abstract An Internet Key Exchange Protocol Version

More information

Operation Manual AAA RADIUS HWTACACS H3C S5500-EI Series Ethernet Switches. Table of Contents

Operation Manual AAA RADIUS HWTACACS H3C S5500-EI Series Ethernet Switches. Table of Contents Table of Contents Table of Contents... 1-1 1.1 AAA/RADIUS/HWTACACS Over... 1-1 1.1.1 Introduction to AAA... 1-1 1.1.2 Introduction to RADIUS... 1-3 1.1.3 Introduction to HWTACACS... 1-9 1.1.4 Protocols

More information

Network Working Group Request for Comments: October 1998

Network Working Group Request for Comments: October 1998 Network Working Group Request for Comments: 2433 Category: Informational G. Zorn S. Cobb Microsoft Corporation October 1998 Microsoft PPP CHAP Extensions Status of this Memo This memo provides information

More information

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track April 2019 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track April 2019 ISSN: Internet Engineering Task Force (IETF) A. DeKok Request for Comments: 8559 FreeRADIUS Updates: 5176, 5580 J. Korhonen Category: Standards Track April 2019 ISSN: 2070-1721 Abstract Dynamic Authorization

More information

Request for Comments: 4672 Category: Informational M. Chiba Cisco Systems, Inc. September 2006

Request for Comments: 4672 Category: Informational M. Chiba Cisco Systems, Inc. September 2006 Network Working Group Request for Comments: 4672 Category: Informational S. De Cnodder Alcatel N. Jonnala M. Chiba Cisco Systems, Inc. September 2006 Status of This Memo RADIUS Dynamic Authorization Client

More information

RADIUS - QUICK GUIDE AAA AND NAS?

RADIUS - QUICK GUIDE AAA AND NAS? RADIUS - QUICK GUIDE http://www.tutorialspoint.com/radius/radius_quick_guide.htm Copyright tutorialspoint.com AAA AND NAS? Before you start learning about Radius, it is important that you understand: What

More information

IP Security Protocol Working Group (IPSEC) draft-ietf-ipsec-nat-t-ike-03.txt. B. Swander Microsoft V. Volpe Cisco Systems 24 June 2002

IP Security Protocol Working Group (IPSEC) draft-ietf-ipsec-nat-t-ike-03.txt. B. Swander Microsoft V. Volpe Cisco Systems 24 June 2002 IP Security Protocol Working Group (IPSEC) INTERNET-DRAFT draft-ietf-ipsec-nat-t-ike-03.txt Expires: 24 December 2002 T. Kivinen SSH Communications Security A. Huttunen F- Secure Corporation B. Swander

More information

Network Security. Chapter 11 Security Protocols of the Data Link Layer. Scope of Link Layer Security Protocols

Network Security. Chapter 11 Security Protocols of the Data Link Layer. Scope of Link Layer Security Protocols Network Security Chapter 11 Security Protocols of the Data Link Layer! IEEE 802.1Q, IEEE 802.1X & IEEE 802.1AE! Point-to-Point Protocol (PPP)! Point-to-Point Tunneling Protocol (PPTP)! Layer 2 Tunneling

More information

Request for Comments: 3153 Category: Standards Track C. Fox Cisco Systems August 2001

Request for Comments: 3153 Category: Standards Track C. Fox Cisco Systems August 2001 Network Working Group Request for Comments: 3153 Category: Standards Track R. Pazhyannur I. Ali Motorola C. Fox Cisco Systems August 2001 PPP Multiplexing Status of this Memo This document specifies an

More information

Virtual Private Networks (VPNs)

Virtual Private Networks (VPNs) CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure

More information

RADIUS Configuration. Overview. Introduction to RADIUS. Client/Server Model

RADIUS Configuration. Overview. Introduction to RADIUS. Client/Server Model Table of Contents RADIUS Configuration 1 Overview 1 Introduction to RADIUS 1 Client/Server Model 1 Security and Authentication Mechanisms 2 Basic Message Exchange Process of RADIUS 2 RADIUS Packet Format

More information

WAP Provisioning Architecture Overview

WAP Provisioning Architecture Overview WAP Provisioning Architecture Overview WAP-182-PROVARCH Proposed Version 19-February-2000 Wireless Application Protocol WAP Provisioning Architecture Overview Wireless Application Protocol Forum Ltd.2000.

More information

A Diameter accounting application for the Session Initiation Protocol

A Diameter accounting application for the Session Initiation Protocol Internet Engineering Task Force INTERNET-DRAFT draft-narayanan-sipping-aaa-diameter-00.ps Narayanan/Schulzrinne/Kundaje Microsoft/Columbia University August 11, 2002 Expires: February 2003 A Diameter accounting

More information

Category: Standards Track Cisco Systems Inc. David Spence Interlink Networks Inc. David Mitton Circular Networks. Feb 2004

Category: Standards Track Cisco Systems Inc. David Spence Interlink Networks Inc. David Mitton Circular Networks. Feb 2004 AAA Working Group Internet-Draft Category: Standards Track Pat R. Calhoun Airespace Inc. Glen Zorn Cisco Systems Inc. David Spence Interlink Networks Inc. David Mitton Circular Networks Feb 2004 Diameter

More information

Updates: 6613, 6614 (if approved) February 13, 2014 Intended status: Experimental Expires: August 17, 2014

Updates: 6613, 6614 (if approved) February 13, 2014 Intended status: Experimental Expires: August 17, 2014 Network Working Group S. Hartman Internet-Draft Painless Security Updates: 6613, 6614 (if approved) February 13, 2014 Intended status: Experimental Expires: August 17, 2014 Abstract Larger Packets for

More information

Expiration Date: July RGnet Tony Li Juniper Networks Yakov Rekhter. cisco Systems

Expiration Date: July RGnet Tony Li Juniper Networks Yakov Rekhter. cisco Systems Last Version:draft-bates-bgp4-nlri-orig-verif-00.txt Tracker Entry Date:31-Aug-1999 Disposition:removed Network Working Group Internet Draft Expiration Date: July 1998 Tony Bates cisco Systems Randy Bush

More information

Network Working Group. Document: draft-myers-auth-sasl-05.txt September Simple Authentication and Security Layer. Status of this Memo

Network Working Group. Document: draft-myers-auth-sasl-05.txt September Simple Authentication and Security Layer. Status of this Memo HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 10:23:28 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Tue, 01 Oct 1996 22:19:00 GMT ETag: "361f1a-67f0-325198d4" Accept-Ranges: bytes Content-Length: 26608 Connection:

More information

Expires May 26, File: draft-ietf-rsvp-routing-01.ps November RSRR: A Routing Interface For RSVP

Expires May 26, File: draft-ietf-rsvp-routing-01.ps November RSRR: A Routing Interface For RSVP Internet Draft Daniel Zappala Expires May 26, 1997 USC/ISI File: draft-ietf-rsvp-routing-01.ps November 1996 RSRR: A Routing Interface For RSVP Status of Memo November 26, 1996 This document is an Internet-Draft.

More information

Network Working Group. February 1994

Network Working Group. February 1994 Network Working Group Request for Comments: 1575 Obsoletes: 1139 Category: Standards Track S. Hares Merit/NSFNET C. Wittbrodt Stanford University/BARRNet February 1994 Status of this Memo An Echo Function

More information

Chapter 4 Configuring 802.1X Port Security

Chapter 4 Configuring 802.1X Port Security Chapter 4 Configuring 802.1X Port Security Overview HP devices support the IEEE 802.1X standard for authenticating devices attached to LAN ports. Using 802.1X port security, you can configure an HP device

More information

Operational Security Capabilities for IP Network Infrastructure

Operational Security Capabilities for IP Network Infrastructure Operational Security Capabilities F. Gont for IP Network Infrastructure G. Gont (opsec) UTN/FRH Internet-Draft September 1, 2008 Intended status: Informational Expires: March 5, 2009 Status of this Memo

More information

Radius, LDAP, Radius, Kerberos used in Authenticating Users

Radius, LDAP, Radius, Kerberos used in Authenticating Users CSCD 303 Lecture 5 Fall 2018 Radius, LDAP, Radius, Kerberos used in Authenticating Users Kerberos Authentication and Authorization Previously Said that identification, authentication and authorization

More information