One document matched: draft-urien-kiennert-emu-bio-00.txt
EMU Working Group P. Urien
Internet Draft Telecom ParisTech
Intended status: Informational C.Kiennert
Telecom ParisTech
October 15, 2009
Expires: April 15, 2010
EAP BIO
draft-urien-kiennert-emu-bio-00.txt
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with
the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on May 2010.
Copyright Notice
Copyright (c) 2009 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with
respect to this document. Code Components extracted from this
document must include Simplified BSD License text as described in
Section 4.e of the Trust Legal Provisions and are provided without
warranty as described in the BSD License.
Urien & All Informational - Expires April 2010 [Page 1]
Abstract
EAP-TTLS is an EAP method that provides secured authentication as
described in RFC 5281. This method makes generally use of two phases
in order to complete authentication. The first one consists in the
authentication of the TTLS server to the client, established by a
TLS handshake between the client and the TTLS server. The handshake
may be either mutual or one-way. The authentication of the client to
the server may then be negotiated during phase two of EAP-TTLS,
thanks to widely-deployed authentication mechanisms such as CHAP,
PAP, MS-CHAP or MS-CHAP-V2.
The purpose of EAP-BIO is to define how to use a biometric
authentication mechanism during phase two of EAP-TTLS. This
authentication mechanism ranges from physiological characteristics
such as fingerprint identification, to behavioral characteristics
such as voice or signature analysis. Hence, EAP-BIO combines the
security features of EAP-TTLS and biometric authentication.
Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119.
Urien & All Informational - Expires April 2010 [Page 2]
Table of Contents
Copyright Notice.................................................. 1
Abstract.......................................................... 2
Conventions used in this document................................. 2
1 Overview........................................................ 4
2 Terminology..................................................... 5
3 Functional Architecture......................................... 6
3.1 Carrier Protocols.......................................... 7
3.2 Security Overview.......................................... 7
4 EAP-BIO Overview................................................ 8
4.1 Phase 1: Handshake......................................... 8
4.2 Phase 2: Tunneled Authentication........................... 8
4.3 AVP format................................................. 9
4.4 AVP sequences............................................. 10
5 Signatures and Smart Cards..................................... 11
5.1 Elements to be secured.................................... 11
5.2 PKCS #1 signature......................................... 11
6 Biometric formats.............................................. 12
6.1 Fingerprint format........................................ 11
6.2 Fingerprint card format................................... 12
7 PKCS #7 capsule................................................ 13
8 AVP Examples................................................... 14
8.1 AVP containing biometric data............................. 14
8.2 AVP containing a PKCS #7 capsule.......................... 14
9 Protocol details............................................... 16
10 IANA Considerations........................................... 17
11 Security Considerations....................................... 17
12 Normative References.......................................... 17
13 Non Normative References...................................... 18
14 Authors' Addresses............................................ 18
Urien & All Informational - Expires April 2010 [Page 3]
1 Overview
The Extensible Authentication Protocol (EAP) [RFC 3748] defines a
standard message exchange that allows a server to authenticate a
client using an authentication method agreed upon by both parties.
EAP may be extended with additional authentication methods by
registering such methods with IANA or by defining vendor specific
methods.
EAP Tunneled TLS (EAP-TTLS) [RFC 5281] defines an authentication
protocol performing mutual authentication between the client and the
server. This authentication can be directly negotiated during the
TLS handshake if the client uses a certificate, but contrary to EAP-
TLS such a configuration is not required from the client. If the
client cannot authenticate to the server with a certificate, then
the TLS handshake is used as a first phase allowing the client and
the server to implicitly generate keying material in order to create
a secure tunnel where the following data are to be transferred. The
second phase of EAP-TTLS allows the client to securely authenticate
to the server using common protocols such as CHAP, PAP, MS-CHAP or
MS-CHAP-V2. Nevertheless, any authentication protocol, such as
biometric mechanisms, may be defined.
Biometric authentication involves the use of physical and/or
behavioural characteristics of individuals to identify them and to
control access to places or things, such as computerized equipment,
or more specifically, applications running on that equipment.
Biometrics has some advantages over more conventional authentication
techniques (login and password, PIN codes, etc.) since nothing has
to be carried or remembered that might be stolen. Among the many
biometric technologies in use are fingerprint analysis, hand
geometry analysis, retina scanning, iris scanning, signature
analysis, facial recognition, keystroke analysis, and voice
analysis.
Based on original measurement of a biometric characteristic (i.e.
enrolment), a person's identity can thereafter be verified
automatically when requesting access to a computer application or to
any other resource by re-sampling the characteristic and comparing
the biometric data with the enrolment. If a sufficiently close match
is found, then the identity is verified.
However, the time needed for biometric comparisons with samples in
database is much longer than the time required for more widely-
deployed authentication mechanisms. Thus, the protocol MUST ask a
login from the user before processing its biometric characteristic.
Such an implementation will significantly reduce the time required
for the authentication since the server only needs to compare the
biometric characteristic with one sample from the database.
Urien & All Informational - Expires April 2010 [Page 4]
2 Terminology
AAA
Authentication, Authorization and Accounting - functions that are
generally required to control access to a network and support
billing and auditing.
AAA protocol
A network protocol used to communicate with AAA servers; examples
include RADIUS and Diameter.
AAA server
A server which performs one or more AAA functions: authenticating a
user prior to granting network service, providing authorization
(policy) information governing the type of network service the user
is to be granted, and accumulating accounting information about
actual usage.
AAA/H
A AAA server in the user's home domain, where authentication and
authorization for that user are administered.
Access Point
A network device providing users with a point of entry into the
network, and which may enforce access control and policy based on
information returned by a AAA server. Since the access point
terminates the server side of the EAP conversation, for the purposes
of this document it is therefore equivalent to the "authenticator"
as used in the EAP specification [RFC 3748].
Since the access point acts as a client to a AAA server, for the
purposes of this document it is therefore also equivalent to the
"NAS", as used in AAA specifications such as [RFC 2865].
Access Domain
The domain, including access points and other devices, that provides
users with an initial point of entry into the network; for example,
a wireless hot spot.
Client
A host or device that connects to a network through an access point;
since it terminates the client side of the EAP conversation, for the
purposes of this document, it is therefore equivalent to the "peer",
as used in the EAP specification [RFC 3748].
Urien & All Informational - Expires April 2010 [Page 5]
Domain
A network and associated devices that are under the administrative
control of an entity such as a service provider or the user's home
organization.
Minutia
A generic term in biometrics that designates specific points in a
fingerprint record such as ridge bifurcations or endpoints.
TTLS server
A AAA server which implements EAP-TTLS. This server may also be
capable of performing user authentication, or it may proxy the user
authentication to a AAA/H.
User
The person operating the client device; though the line is often
blurred, "user" is intended to refer to the human being who is
possessed of an identity (username), password or other
authenticating information, and "client" is intended to refer to the
device which makes use of this information to negotiate network
access. There may also be clients with no human operators; in this
case the term "user" is a convenient abstraction.
3 Functional Architecture
+-----------+ +----------+ +----------+ +----------+
| | | | | | | |
| client |<--->| access |<--->| TTLS AAA |<---->| AAA/H |
| | | point | | server | | server |
| | | | | | | |
+---------+-+ +----------+ +----------+ +----------+
| random |
| Cert |pkcs#7 CMS
| |
+-v----------+
| |
| Biometric |
| Reader |
| |
+------------+
<---- secure password authentication tunnel --->
<---- secure data tunnel ---->
Urien & All Informational - Expires April 2010 [Page 6]
The architecture depicted above only displays the general
organization for message transmission, which means that additional
security features are not visible. An overview of the security
offered by this architecture will be described below.
3.1 Carrier Protocols
As explained in RFC 5281, the entities shown above, except the
biometric reader and the client, communicate with each other using
carrier protocols capable of encapsulating EAP. The client and the
access point communicate typically using a link layer carrier
protocol such as PPP or EAPOL. The access point, TTLS server and
AAA/H server communicate using a AAA carrier protocol such as RADIUS
or Diameter.
EAP, and therefore EAP-TTLS, must be initiated via the carrier
protocol between the client and the access point. In PPP or EAPOL,
for example, EAP is initiated when the access point sends an EAP-
Request/Identity packet to the client.
The keying material used to encrypt and authenticate the data
connection between the client and the access point is developed
implicitly between the client and TTLS server as a result of EAP-
TTLS negotiation. This keying material must be communicated to the
access point by the TTLS server using the AAA carrier protocol.
3.2 Security overview
The architecture inherits all the security features of EAP-TTLS, and
as such allows secure authentication between the client and the TTLS
server. However, the biometric elements have to be implemented with
proper security in order not to compromise the whole new
authentication protocol.
Some of the potential attacks related to biometrics may indeed
compromise the security of the protocol and may result in
unauthorized access:
- If the user gives a false sample to the biometric reader (false
finger, mask, eye picture), the reader may grant access according to
the false credentials it was given.
- If the user manages to send previously acquired samples from
another user, the protocol may grant access if it has no protection
against replay attacks.
These are two potential attacks that are not covered by the security
offered by EAP-TTLS. The security features addressing these flaws
mainly rely on smart cards and digital signatures, and will be
discussed in later sections.
Urien & All Informational - Expires April 2010 [Page 7]
4 EAP-BIO Overview
Since EAP-BIO relies on EAP-TTLS, the authentication process is the
same as EAP-TTLS protocol. It consists of two phases, where phase 1
is a TLS handshake that either performs mutual authentication, or
authenticates the TTLS server to the client and allows a secure
tunnel to be created, in which authentication data and other
significant information will be exchanged during phase 2 of the
protocol.
4.1 Phase 1: Handshake
In phase 1, the TLS handshake protocol is used to authenticate the
TTLS server to the client and, optionally, to authenticate the
client to the TTLS server.
The TTLS server initiates the EAP-TTLS method with an EAP-TTLS/Start
packet, which is an EAP-Request with Type = EAP-TTLS and the S
(Start) bit set. This indicates to the client that it should begin
TLS handshake by sending a ClientHello message.
EAP packets continue to be exchanged between client and TTLS server
to complete the TLS handshake, as described in [RFC 5216]. Phase 1
is completed when the client and the TTLS server exchange
ChangeCipherSpec and Finished messages. At this point, additional
information may be securely tunnelled.
As part of the TLS handshake protocol, the TTLS server will send its
certificate along with a chain of certificates leading to the
certificate of a trusted CA. The client will need to be configured
with the certificate of the trusted CA in order to perform the
authentication.
If certificate-based authentication of the client is desired, the
client must have been issued a certificate and must have the private
key associated with that certificate.
4.2 Phase 2: Tunneled Authentication
In phase 2, the TLS Record Layer is used to securely tunnel
information between the client and the TTLS server. This information
is encapsulated in sequences of attribute-value pairs (AVPs), whose
use and format are described in the next paragraph.
The server will ask the client to send its credentials for
authentication, and before asking for biometric data, the server
MUST ask the user's login. The user will then be asked to submit his
biometric characteristic to the reader.
Urien & All Informational - Expires April 2010 [Page 8]
Such a procedure will allow the biometric characteristic to be
compared only with the sample of the specified user, instead of
testing all the database samples. Since the comparison algorithm may
be complex, a significant amount of time may be saved for the
authentication.
The login and the biometric characteristic are encapsulated in AVPs,
and then transmitted to the server through the secured TLS tunnel.
In accordance with the EAP-TTLS protocol, other data may be
exchanged between the client and the server using AVPs.
The TTLS server recovers the AVPs in clear text from the TLS record
layer. If the AVP sequence includes authentication information, it
forwards this information to the AAA/H server using the AAA carrier
protocol. Note that the EAP-TTLS and AAA/H servers may be one and
the same, in which case it simply processes the information locally.
When the TTLS server has gathered enough information, it issues
either an EAP-Success or EAP-Failure. Thus, if the AAA/H rejects the
client based on forwarded authentication information, the TTLS
server MUST issue an EAP-Failure. If the AAA/H accepts the client,
the TTLS server MUST issue an EAP-Success.
The TTLS server distributes data connection keying information and
other authorization information to the access point in the same AAA
carrier protocol message that carries the EAP-Success.
4.3 AVP format
The format of an AVP is shown below. All items are in network, or
big-endian, order; that is, they have most significant octet first.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| AVP Code |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|V M r r r r r r| AVP Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Vendor-ID (opt) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Data...
+-+-+-+-+-+-+-+-+
AVP Code
The AVP Code is four octets and, combined with the Vendor-ID field
if present, identifies the attribute uniquely. The first 256 AVP
numbers represent attributes defined in RADIUS. AVP numbers 256 and
Urien & All Informational - Expires April 2010 [Page 9]
above are defined in Diameter. The codes used in EAP-BIO are yet to
be defined.
AVP Flags
The AVP Flags field is one octet, and provides the receiver with
information necessary to interpret the AVP.
The 'V' (Vendor-Specific) bit indicates whether the optional
Vendor-ID field is present. When set to 1, the Vendor-ID field is
present and the AVP Code is interpreted according to the namespace
defined by the vendor indicated in the Vendor-ID field.
The 'M' (Mandatory) bit indicates whether support of the AVP is
required. If this bit is set to 0, this indicates that the AVP may
be safely ignored if the receiving party does not understand or
support it. If set to 1, this indicates that the receiving party
must fail the negotiation if it does not understand the AVP; for a
TTLS server, this would imply returning EAP-Failure, for a client,
this would imply abandoning the negotiation.
The 'r' (reserved) bits are unused and must be set to 0.
AVP Length
The AVP Length field is three octets, and indicates the length of
this AVP including the AVP Code, AVP Length, AVP Flags, Vendor-ID
(if present) and Data.
Vendor-ID
The Vendor-ID field is present if the 'V' bit is set in the AVP
Flags field. It is four octets, and contains the vendor's IANA-
assigned "SMI Network Management Private Enterprise Codes" [9]
value. Vendors defining their own AVPs must maintain a consistent
namespace for use of those AVPs within RADIUS, Diameter and EAP-
TTLS.
A Vendor-ID value of zero is equivalent to absence of the Vendor-ID
field altogether.
4.4 AVP Sequences
Data encapsulated within the TLS Record Layer must consist entirely
of a sequence of zero or more AVPs. Each AVP must begin on a 4-octet
boundary relative to the first AVP in the sequence. If an AVP is not
a multiple of 4 octets, it must be padded with 0s to the next 4-
octet boundary.
Note that the AVP Length does not include the padding.
Urien & All Informational - Expires April 2010 [Page 10]
5 Signatures and Smart Cards
Though EAP-TTLS offers high security for authentication, the
biometric equipments might be flawed and compromise the whole EAP-
BIO protocol. The potential security flaws described in section 3.2
MUST be addressed with smart cards and cryptographic solutions such
as digital signatures. The number of signatures used in the protocol
will depend on the level of security required.
5.1 Elements to be secured
The most important element to be secured should be the biometric
reader. In order to prevent material flaws, the reader MUST be
certified as secure. If it is not, a signature from the reader would
have no meaning. The secure biometric reader should then be affected
a smart card in order to store the private key required for the
signature. Thus, the biometric characteristic SHOULD be signed by
the reader, along with a trusted timestamp in order to prevent
replay attacks.
The client, whose the biometric characteristic is transmitted to,
SHOULD also sign the characteristic before sending it to the TTLS
server through the TLS record layer.
The third element which may require specific security is the user.
Depending on the use case of the EAP-BIO protocol, the
authentication may require a smart card from the user, containing
his personal public-key certificate. Such a security level may be
required in places such as airports.
Hence, the biometric authentication requires two or three
signatures, depending of the security requested.
5.2 PKCS #1 Signature
The signature of the biometric characteristic, along with a trusted
timestamp in the case of the biometric reader, is computed according
to the PKCS #1 specifications [RFC 3447]. It is here encapsulated in
the data field of EAP-TTLS phase 2 AVPs (fourth octet and
following).
The signature is generated from two steps. The first one consists in
encoding the message using EMSA-PSS, described in section 9.1.1 of
RFC 3447. Since this is a probabilistic function, the signer has to
choose not only a hash function, but also a mask generation function
and a salt. The second one consists in the output of the RSA
signature. This signature is calculated out of three steps:
a. Converting the hashed message to an integer message
representative.
Urien & All Informational - Expires April 2010 [Page 11]
b. Applying a RSA signature primitive (described in section 5.2.1 of
RFC 3447) to the private key and the message representative to
produce an integer signature representative.
c. Converting the signature representative to a signature of k
octets, where k is the length in octets of the RSA modulus n.
6 Biometric Formats
Many biometric formats, protocols and definitions have been
standardized by international organizations such as ISO
(International Organization for Standardization), IEC (International
Electrotechnical Commission) or JTC1 (Joint Technical Committee
One).
EAP-BIO shall use the CBEFF (Common Biometric Exchange Formats
Framework) data structure, a standard regarding biometrics which
describes the necessary data to be inserted in the headers so that
different systems may exchange biometric data within only one file.
The CBEFF data structure is composed of three parts: the Standard
Biometric Header, the Biometric Data Block, and the Signature Block.
This data structure is used as a reference in the standards defined
for the different biometric characteristics.
6.1 Fingerprint format
The requirements for fingerprint analysis are described in the
[ISO/IEC 19794] standard. It specifies the content, format and
measure units from a fingerprint picture to be used in
identification or authentication of a user.
The basic entities for fingerprint analysis are ridges and valleys
of the finger pattern, and more particularly specific points such as
ridge bifurcations (where a ridge is divided in two) and ridge
endpoints (where a ridge suddenly stops). The layout of these points
is specific to each individual, and as such represents significant
information for identification or authentication.
The format of a Finger Minutiae Record is described in the ISO/IEC
19794-2 standard, and can be represented as follows:
+------------------+------------------------+-------------------+
| Record Header | Single Finger Record | Extended Data |
| (24 bytes) | Format | (variable length) |
| | (variable length) | |
+------------------+------------------------+-------------------+
The header contains information about the characteristics and
options of the recording process (equipment, image size, resolution,
number of views).
Urien & All Informational - Expires April 2010 [Page 12]
The Single Finger Record Format block is divided in two parts: the
Finger Header block (4 bytes) and the Finger Minutiae Data blocks (6
bytes per block). The Finger Header contains information about the
finger position, its quality, as well as the number of minutiae,
i.e. bifurcations or endpoints recorded on the fingerprint. The
Finger Minutiae Data blocks contain technical data about each
minutia recorded (position, angle, quality). One block is added for
each minutia.
The Extended Data fields may contain any relevant information about
the finger minutiae or about the record that could be of use to the
equipment retrieving the fingerprint data. The length of these
fields (there may be several of them) should be as small as
possible.
6.2 Fingerprint Card format
The ISO/IEC 19794 standard also defines two possible formats for
cards: the Normal Size Finger Minutiae Format, in which the minutiae
data are encoded on five octets for each minutia (containing the
type, coordinates and angle), and the Compact Size Finger Minutiae
Format, in which these data are encoded with lower resolution on
three octets.
7 PKCS #7 capsule
The biometric characteristic will be signed by two or three signers
before being sent to the TTLS server through AVPs. The format
described in [RFC 2315] defines two main types for the signature:
SignerInfo and SignedData.
For each signer, the encrypted message digest and other signer-
specific information are collected into a SignerInfo value.
Certificates and certificate-revocation lists for each signer, and
those not corresponding to any signer, are collected in this step.
The defined format is the following:
SignerInfo ::= SEQUENCE {
version Version,
issuerAndSerialNumber IssuerAndSerialNumber,
digestAlgorithm DigestAlgorithmIdentifier,
authenticatedAttributes [0] IMPLICIT Attributes OPTIONAL,
digestEncryptionAlgorithm DigestEncryptionAlgorithmIdentifier,
encryptedDigest EncryptedDigest,
unauthenticatedAttributes [1] IMPLICIT Attributes OPTIONAL
}
EncryptedDigest ::= OCTET STRING
The timestamp required for the biometric reader signature may be
inserted in the authenticatedAttributes field.
Urien & All Informational - Expires April 2010 [Page 13]
The message-digest algorithms and the SignerInfo values for all the
signers are collected together with the content into a PKCS#7
SignedData structure (Object Identifier 1.2.840.113549.1.7.2), the
format of which is defined as follows:
SignedData ::= SEQUENCE {
version Version,
digestAlgorithms DigestAlgorithmIdentifiers,
contentInfo ContentInfo,
certificates [0] IMPLICIT ExtendedCertificatesAndCertificates
OPTIONAL,
crls[1] IMPLICIT CertificateRevocationLists OPTIONAL,
signerInfos SignerInfos
}
DigestAlgorithmIdentifiers ::= SET OF DigestAlgorithmIdentifier
SignerInfos ::= SET OF SignerInfo
ContentInfo ::= SEQUENCE {
contentType ContentType,
content
[0] EXPLICIT ANY DEFINED BY contentType OPTIONAL }
ContentType ::= OBJECT IDENTIFIER
8 AVP examples
The EAP-BIO protocol makes use of AVPs in the second phase of the
EAP-TTLS protocol. These AVPs contain information as described in
the preceding sections, and can be represented as follows:
8.1 AVP containing biometric data
This example displays an AVP containing CBEFF fingerprint data
comprised of two minutiae block of the same finger:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| AVP Code (TBD) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|V M r r r r r r| AVP Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Vendor-ID (opt) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Record Header |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Record Header |
Urien & All Informational - Expires April 2010 [Page 14]
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Record Header |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Record Header |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Record Header |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Record Header |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Finger Header |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Finger Minutiae |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Data Block 1 | Finger Minutiae |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Data Block 2 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Extended Data...
+-+-+-+-+-+-+-+-+-+-
8.2 AVP containing a PKCS #7 capsule
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| AVP Code (TBD) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|V M r r r r r r| AVP Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Vendor-ID (opt) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ +
| |
+ +
| |
+ +
| PKCS#7 Signed Data |
+ Structure +
| |
+ +
| |
+ +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Urien & All Informational - Expires April 2010 [Page 15]
9 Protocol details
client access point TTLS server AAA/H
------ ------------ ----------- ---
EAP-Request/Identity
<--------------------
EAP-Response/Identity
-------------------->
RADIUS Access-Request:
EAP-Response passthrough
-------------------->
RADIUS Access-Challenge:
EAP-Request/TTLS-Start
<--------------------
EAP-Request passthrough
<--------------------
EAP-Response/TTLS:
ClientHello
-------------------->
RADIUS Access-Request:
EAP-Response passthrough
-------------------->
RADIUS Access-Challenge:
EAP-Request/TTLS:
ServerHello
Certificate
ServerKeyExchange
ServerHelloDone
<--------------------
EAP-Request passthrough
<--------------------
EAP-Response/TTLS:
ClientKeyExchange
ChangeCipherSpec
Finished
-------------------->
RADIUS Access-Request:
EAP-Response passthrough
-------------------->
Urien & All Informational - Expires April 2010 [Page 16]
RADIUS Access-Challenge:
EAP-Request/TTLS:
ChangeCipherSpec
Finished
<--------------------
EAP-Request passthrough
<--------------------
EAP-Response/TTLS:
Pkcs#7 CMS
-------------------->
RADIUS Access-Request:
EAP-Response passthrough
-------------------->
RADIUS Access-Request:
pkcs#7 CMS
-------------------->
RADIUS Access-Accept
<--------------------
RADIUS Access-Accept:
EAP-Success
<--------------------
EAP-Success
<--------------------
10 IANA Considerations
11 Security Considerations
12 Normative References
[RFC 5281] Paul Funk, Simon Blake-Wilson, EAP Tunneled TLS
Authentication Protocol Version 0 (EAP-TTLSv0), August 2008
[RFC 5216] D. Simon, B. Aboba, R. Hurst, "The EAP-TLS
Authentication Protocol", March 2008.
[RFC 3748] B. Aboba, L. Blunk, J. Vollbrecht, J. C. Sun, H.
Levkowetz, "Extensible Authentication Protocol (EAP)" RFC 3748, June
2004
[RFC 3447] J. Jonsson, B. Kaliski, "Public-Key Cryptography
Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1",
February 2003
Urien & All Informational - Expires April 2010 [Page 17]
[RFC 2315] B. Kaliski, "PKCS #7: Cryptographic Message Syntax,
Version 1.5", March 1998.
[RFC 2865] C. Rigney, S. Willens, A. Rubens, W. Simpson, "Remote
Authentication Dial In User Service (RADIUS)", June 2000.
[ISO/IEC 19794] BS ISO/IEC 19794 series. "Information technology.
Biometric data interchange formats".
13 Non Normative References
14 Authors' Addresses
Pascal Urien
Telecom ParisTech
37/39 rue Dareau
75014 Paris Phone: NA
France Email: Pascal.Urien@enst.fr
Christophe Kiennert
Telecom ParisTech
37/39 rue Dareau
75014 Paris Phone: NA
France Email: Christophe.Kiennert@enst.fr
Full Copyright Statement
Copyright (c) 2009 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents in effect on the date of
publication of this document (http://trustee.ietf.org/license-info).
Please review these documents carefully, as they describe your
rights and restrictions with respect to this document.
All IETF Documents and the information contained therein are
provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION
HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY,
THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL
WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY
WARRANTY THAT THE USE OF THE INFORMATION THEREIN WILL NOT INFRINGE
ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE.
Urien & All Informational - Expires April 2010 [Page 18]
| PAFTECH AB 2003-2026 | 2026-04-24 01:32:46 |