One document matched: draft-mancini-pppext-eap-ldap-00.txt



   EAP Working Group                                                    
   INTERNET-DRAFT                                            H. Mancini 
   <draft-mancini-pppext-eap-ldap-00.txt>           Bridgewater Systems 
   Expires: December 23, 2003                                 June 2003 
    
    
                             EAP-LDAP Protocol 
    
    
   Status of this Memo 
    
   This document is an Internet-Draft and is in full conformance with 
   all provisions of Section 10 of RFC2026. Internet-Drafts are working 
   documents of the Internet Engineering Task Force (IETF), its areas, 
   and its working groups. Note that other groups may also distribute 
   working documents as Internet-Drafts.  
    
   Internet-Drafts are draft documents valid for a maximum of six 
   months and may be updated, replaced, or made obsolete by other 
   documents at any time. It is inappropriate to use Internet-Drafts as 
   reference material or to cite them other than as work in progress.  
    
   The list of current Internet-Drafts may be found at 
   http://www.ietf.org/ietf/1id-abstracts.txt  
    
   The list of Internet-Draft Shadow Directories may be found at 
   http://www.ietf.org/shadow.html.  
    
   This Internet-Draft will expire on December 23, 2003.  
    
   Abstract 
    
   This document specifies an Extensible Authentication Protocol (EAP) 
   mechanism for a challenge-based authentication using MD5 in 
   conjunction with the hash algorithm used to store the password 
   within an identity store.  
    
   This document defines the EAP-LDAP method, which provides one-way 
   authentication and MD5 key generation. As a result, the EAP-LDAP 
   method, when used by it self, is only appropriate for use on 
   networks where physical security can be assumed. These methods 
   SHOULD NOT be used on wireless networks, or over the Internet, 
   unless the EAP conversation is protected. This can be accomplished 
   using technologies such as IPsec or TLS.  
    
   Table of Contents 
    

   Status of this Memo................................................1 

   Abstract...........................................................1 

   Table of Contents..................................................1 

   Overview...........................................................2 

   Introduction.......................................................2 
    
    
   Mancini                  Internet Draft                    [page 1] 
                          EAP-LDAP Protocol                 June 2003 
    
    

   Requirements language..............................................3 

   Terminology........................................................3 

   Protocol Overview..................................................3 

   Overview of the EAP-LDAP Authentication............................3 

   Examples...........................................................4 

   Security Considerations............................................4 

   References.........................................................5 

   IANA Considerations................................................6 

   Intellectual Property Right Notices................................6 

   Acknowledgements...................................................6 

   Authors Addresses..................................................6 

   Expiration Date....................................................7 

    

Overview 
    
   EAP, defined in [RFC2284], is an authentication protocol, which 
   supports multiple authentication mechanisms. EAP typically runs 
   directly over the link layer without requiring IP and therefore 
   includes its own support for in-order delivery and re-transmission. 
   While EAP was originally developed for use with PPP [RFC1661], it is 
   also now in use with IEEE 802 [IEEE802]. The encapsulation of EAP on 
   IEEE 802 link layers is defined in [IEEE8021X]. This document 
   defines the EAP-LDAP method.  
    
Introduction 
    
   EAP-LEAP and EAP-MD5-Challenge, among other EAP implementations, 
   require the back-end server to hold the users password either in 
   clear text or a reversible encryption. This is a major drawback in 
   particular for LDAP directories where the user password may be 
   stored in SHA or CRYPT, for example. 
    
   The EAP-LDAP method provides a means for supporting other EAP 
   methods when the EAP server has no knowledge of or access to the 
   users cleartext password. For any unseeded method of 
   encryption/hashing, this EAP method SHALL allow the user passwords 
   to remain in their encrypted format and SHALL allow for validation 
   of the LDAP user without passing the cleartext password or the value 
   stored in the LDAP directory.    
     
   This document describes a method for encapsulating the password 
   encryption method used in the LDAP directory within EAP, while using 
   EAP-MD5-Challenge as the final security measure. It is recommended 
   that EAP-LDAP be used in conjunction with a tunneled authentication 
   method, such as PEAP, to provide integrity protection, mutual 
   authentication, and address most security vulnerabilities listed in 
   the Security Considerations section. 
    
    


    
    
   Mancini                  Internet Draft                    [page 2] 
                          EAP-LDAP Protocol                 June 2003 
    
    
Requirements language 
    
   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 
   "SHOULD", "SHOULD NOT", "RECOMMENDED",  "MAY", and "OPTIONAL" in 
   this document are to be interpreted as described in RFC-2119. 
    
Terminology 
    
   AAA Server  
   Authentication, Authorization and Accounting Server  
    
   Authenticator  
   Access device to which client desires connection  
    
   EAP  
   Extensible Authentication Protocol [3]  
    
   EAP Server  
   For the purpose of this document, see AAA Server  
    
   LDAP 
   Lightweight Directory Access Protocol 
    
   Peer/Client  
   Device (software or hardware) requiring access to/via the 
   Authenticator.  
      
Protocol Overview 
Overview of the EAP-LDAP Authentication 
    
   The EAP-LDAP conversation will typically begin with the 
   authenticator and the peer negotiating EAP. The authenticator will 
   then typically send an EAP-Request/Identity packet to the peer, and 
   the peer will respond with an EAP-Response/Identity packet to the 
   authenticator, containing the clients userId.  
    
   Unless otherwise stated, all EAP challenge/response messages MUST 
   have an EAP-Type of EAP-LDAP. Upon receipt of the users identity the 
   EAP Server MUST respond with an EAP-LDAP request. The EAP-LDAP 
   request MUST contain an EAP-LDAP attribute that identifies the LDAP 
   encryption type, such as SHA, CRYPT, NTLM, or PLAIN. The peer SHOULD 
   then reply with an EAP-Response/EAP-Type=LDAP or NAK.  
    
   Upon receipt of the EAP-Response/EAP-Type=LDAP the EAP Server SHALL 
   send an EAP-MD5 challenge request. The challenge should be 
   cryptographically random. The EAP Server remembers the challenge for 
   later authentication of the computed MD5-Challenge Response.  
    
   The EAP Client MUST then apply the LDAP encryption type to the users 
   password and followed by applying the MD5 challenge. The EAP Client 
   MUST then reply with the MD5-Challenge Response generated from the 
   users encrypted credentials.   
    
    
   Mancini                  Internet Draft                    [page 3] 
                          EAP-LDAP Protocol                 June 2003 
    
    
    
   The EAP Server then re-computes the MD5-Challenge Response using the 
   users encrypted password. The EAP Server MUST then send an EAP 
   Request with either MD5-Challenge Success or MD5-Challenge Failure 
   packets depending on the result of the authentication.  
     
Examples 
    
   In the case where the EAP-LDAP authentication is successful, the 
   conversation will appear as follows:  
   Authenticating Peer                                Authenticator  
   -------------------                                ------------- 
                   <- PPP EAP-Request/ Identity PPP  
    
   EAP-Response/ Identity (MyID) ->  
    
                   <- PPP EAP-Request/ EAP-Type=EAP-LDAP (Challenge)  
    
   PPP EAP-Response/ EAP-Type=EAP-LDAP (Response)-> 
    
                   <- PPP EAP-Request/ EAP-Type=EAP-LDAP (Success)  
    
   PPP EAP-Response/ EAP-Type=EAP-LDAP (Ack) ->  
    
                   <- PPP EAP-Success  
    
   In the case where the EAP-LDAP authentication is not successful, the 
   conversation will appear as follows:  
   Authenticating Peer                                 Authenticator 
   -------------------                                 -------------  
                   <- PPP EAP-Request/ Identity PPP  
    
   EAP-Response/ Identity (MyID) ->  
    
                   <- PPP EAP-Request/ EAP-Type=EAP-LDAP (Challenge)  
    
   PPP EAP-Response/ EAP-Type=EAP- LDAP (Response)->  
    
                   <- PPP EAP-Request/ EAP-Type=EAP-LDAP (Failure =                  
   failed)  
    
   PPP EAP-Response/ EAP-Type=EAP-LDAP (Ack) ->  
    
                   <- PPP EAP-Failure  
    
 
Security Considerations  
    
   The revised EAP base protocol [RVC 2284bis] highlights several 
   attacks that are possible against the EAP. This section discusses 
   the claimed security properties of EAP-LDAP as well as 
   vulnerabilities and security recommendations. It is recommended that 
    
    
   Mancini                  Internet Draft                    [page 4] 
                          EAP-LDAP Protocol                 June 2003 
    
    
   EAP-LDAP be used in conjunction with a tunneled authentication 
   method, such as PEAP. 
    
   Intended use: EAP-LDAP is intended for use over both physically 
   insecure networks and physically or otherwise secure networks. It is 
   recommended that EAP-LDAP be used in conjunction with a tunneled 
   authentication method, such as PEAP. Applicable media include but 
   are not limited to PPP, IEEE 802 wired networks and IEEE 802.11. 
   Mechanism: Double-encrypted password.  
   EAP-LDAP is based on a primary password hash/encryption method, 
   followed by a secondary MD5 challenge/response authentication. The 
   primary password hash/encryption methods include but are not limited 
   to SHA and CRYPT.  
   Security claims. 
   Identity Protection: No 
   If the client and server cannot guarantee that the identity will be 
   maintained reliably and identity privacy is required then additional 
   protection from an external security mechanism such as Protected 
   Extensible Authentication Protocol (PEAP) [PEAP] may be used.  
   Mutual Authentication: No  
   Key Derivation: No 
   Key Strength: N/A 
   Key Hierarchy: N/A 
   Dictionary Attack Protection: Yes. The password is encrypted twice, 
   first using an irreversible encryption method, and then secondly 
   using MD5. 
   Credentials Reuse: Yes 
   Integrity Protection, Replay Protection and Confidentiality: No 
   Negotiation Attacks  
   Fast Reconnect: No 
   Acknowledged Result Indications: No 
   Man-in-the-middle Resistance: No 
   Generating Random Numbers: No  
    
    
References 
    
   [RFC2026]Bradner, S., ôThe Internet Standards Process -- Revision 
   3ö, RFC 2026, October 1996.  
    
   [RFC2284] Blunk, L. and J. Vollbrecht, "PPP Extensible 
   Authentication Protocol (EAP)", RFC 2284, March 1998.  
    
   [RFC2284bis] Blunk L., Vollbrecht, J., Aboba, B., and H. Levkowetz,  
   "Extensible Authentication Protocol (EAP)", draft-ietf-eap-
   rfc2284bis-02.txt (work-in-progress), January 2003.  
      
   [PEAP] Andersson, H., Josefsson, S., Zorn, G., Simon, D., and A. 
   Palekar, "Protected EAP Protocol (PEAP)", draft-josefsson-pppext-
   eap- tls-eap-05.txt, work-in-progress, September 2002.  
    

    
    
   Mancini                  Internet Draft                    [page 5] 
                          EAP-LDAP Protocol                 June 2003 
    
    
   [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate 
   Requirement Levels", BCP 14, RFC 2119, March 1997.  
    
   [RFC2434] Narten, T. and H. Alvestrand, "Guidelines for Writing an 
   IANA Considerations Section in RFCs", BCP 26, RFC 2434, October 
   1998.  
    
   [RFC1661] Simpson, W., "The Point-to-Point Protocol (PPP)", STD 51, 
   RFC 1661, July 1994.  
    
   [RFC2869bis] Aboba, B. and P. Calhoun, "RADIUS Support For 
   Extensible Authentication Protocol (EAP)", draft-aboba-radius-
   rfc2869bis-09 (work in progress), February 2003. 
    
    
IANA Considerations 
    
   An application to IANA should be made for a new PPP Extensible 
   Authentication Protocol (EAP) Type: EAP-LDAP  
    
    
Acknowledgements 
    
   Thanks to Yong Li and Avi Lior (Bridgewater Systems) for their 
   comments and help.  
    
Authors Addresses 
    
   Helena Mancini 
   Bridgewater Systems Corporation 
   303 Terry Fox Drive, Suite 100       
   Kanata, ON. Canada  
    
   Email: helena.mancini@bridgewatersystems.com  
    
Intellectual Property Right Notices 
    
   On IPR related issues, Bridgewater Systems Corporation and/or its 
   affiliates hereby declare that they are in conformity with Section 
   10 of RFC 2026. Bridgewater Systems contributions may contain one or 
   more patents or patent applications. To the extent Bridgewater 
   Systems contribution is adopted to the specification, Bridgewater 
   Systems undertakes to license patents technically necessary to 
   implement the specification on fair, reasonable and 
   nondiscriminatory terms based on reciprocity.  
    
Full Copyright Statement  
    
   Copyright (C) The Internet Society (2003). All Rights Reserved. This 
   document and translations of it may be copied and furnished to 
   others, and derivative works that comment on or otherwise explain it 
   or assist in its implementation may be prepared, copied, published 
    
    
   Mancini                  Internet Draft                    [page 6] 
                          EAP-LDAP Protocol                 June 2003 
    
    
   and distributed, in whole or in part, without restriction of any 
   kind, provided that the above copyright notice and this paragraph 
   are included on all such copies and derivative works. However, this 
   document itself may not be modified in any way, such as by removing 
   the copyright notice or references to the Internet Society or other 
   Internet organizations, except as needed for the purpose of 
   developing Internet standards in which case the procedures for 
   copyrights defined in the Internet Standards process must be 
   followed, or as required to translate it into languages other than 
   English. The limited permissions granted above are perpetual and 
   will not be revoked by the Internet Society or its successors or 
   assigns. This document and the information contained herein is 
   provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE 
   INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR 
   IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF 
   THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED 
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE."  
    
    
Expiration Date  
    
   This memo is filed as <draft-mancini-pppext-eap-ldap-00.txt>, and 
   expires December 23, 2003.  
    




























    
    
   Mancini                  Internet Draft                    [page 7] 


PAFTECH AB 2003-20262026-04-24 01:37:16