Rick Graziani PPP authentication protocols 1. Link establishment - (LCPs) 2. Authentication - Optional (LCPs) 3. Link quality determination.

Slides:



Advertisements
Similar presentations
Authentication.
Advertisements

S4C4 PPP. Protocols Point to Point Protocol Link Control Protocol Network Control Program Password Authentication Protocol Challenge Handshake Authentication.
Point-to-Point Protocol
Gursharan Singh Tatla SLIP and PPP 27-Mar
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—5-1 Establishing Serial Point-To-Point Connections Configuring Serial Point-To-Point Encapsulation.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 4 Point to Point Protocol (PPP)
1 Data Communications Point-to-Point Protocol (PPP)
Serial Connections Connections over a WAN rather than a LAN This chapter describes the Cisco proprietary HDLC protocol and the PPP protocol.
Semester 4 - Chapter 4 – PPP WAN connections are controlled by protocols In a LAN environment, in order to move data between any two nodes or routers two.
Ariel Eizenberg PPP Security Features Ariel Eizenberg
Point to Point Protocol Operation. Point to Point Protocol Protocol Layers of PPP –Physical Layer –Data Link Layer – HDLC derivative –Other protocols.
PPP (Point to Point protocol).  On WAN connection, the protocol depends on the WAN technology and communicating equipment:  Examples:  HDLC –  The.
K. Salah 1 Chapter 12 Point-to-Point Access: PPP.
1 CCNA 4 v3.1 Module 3. 2 CCNA 4 v3.0 Module 3 PPP.
Georgy Melamed Eran Stiller
PPP Protocol PPP Stack -Establish a link (Link Control Protocol) -Authenticate Parties involved (Authentication Protocols) -Carry Network Layer (Network.
Giuseppe Bianchi Lecture 2: Basic PPP authentication mechanisms PAP, CHAP, +++ Recommended reading: RFC 1334, October 1992; RFC 1994, August 1996 Wiley.
RADIUS Server PAP & CHAP Protocols. Computer Security  In computer security, AAA protocol commonly stands for authentication, authorization and accounting.
Remote Networking Architectures
Point-to-Point Protocol (PPP) Security Connecting to remote access servers (RASs) PPP authentication PPP confidentiality Point-to-Point Tunneling Protocol.
Point-to-Point Access: PPP. In a network, two devices can be connected by a dedicated link or a shared link. In the first case, the link can be used by.
Ch. 3 - PPP CCNA 4 version 3.0. PPP PPP layered architecture PPP contains two sub-protocols: –Link Control Protocol – Used for establishing the point-to-point.
 It defines the format of the frame to be exchanged between devices.  It defines how two devices can negotiate the establishment of the link and the.
PPP (Point to Point Protocol)
CCNA Cisco Certified Network Associate. Point-to-point Protocol (PPP)
Robert E. Meyers CCNA, CCAI Youngstown State University Cisco Regional Academy Instructor Cisco Networking Academy Program Semester 4, v Chapter.
Troubleshooting WAN Implementation Issues
© 1999, Cisco Systems, Inc Chapter 12 Establishing Serial Point-to-Point Connections.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Point-to-Point Protocol (PPP) Accessing the WAN – Chapter 2.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 3 PPP.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition
Wide Area Networks(WANs) Lecture Week 2. Point-to-Point Protocol (PPP) Accessing the WAN.
Copyright Kenneth M. Chipps Ph.D. PPP Last Update
Point to Point Protocol
CCNA 4 version 3.0 Rick Graziani Cabrillo College
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Prepared by They Yu Shu Lee Ern Yu.  Motivation  Previous Work  Remaining Issues  Improvement.
Point-to-Point Access: PPP PPP Between Routers  Used for Point-to-Point Connections only  Used as data link control (encapsulates network layer.
1 Point-to-Point Protocol Cisco Networking Academy Semester 4.
Chap 1 – Point-to-Point Protocol (PPP) Learning Objectives
Prepared By: Dr. Mohamed Abdeldayem Reference: Chapter 24 Wade Edwards, CCNP Complete Study Guide, Experiment 12 Configuring PPP on a serial link.
4 Semester 4 CHAPTER 4 REVIEW JEOPARDY S2C04 Jeopardy Review.
Wide Area Networks (WAN) Terms that are commonly used by service providers: Customer premises equipment (CPE) Equipment that’s owned by the subscriber.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Services in a Converged WAN Accessing the WAN – Chapter 1.
PPP Configuration.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.1 Module 3 PPP.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 3 PPP.
Point-Point Protocol (PPP) by William F. Widulski.
© 2002, Cisco Systems, Inc. All rights reserved.
Point-to-Point Protocol (PPP)
Instructor Materials Chapter 2: Point-to-Point Connections
PPP Protocol.
PPP Protocol.
Lesson 6 Point to Point Protocol
Instructor Materials Chapter 2: Point-to-Point Connections
PPP – Point to Point Protocol
PPP PROTOCOL The First semester
ZyXEL Communications Corporation
Chapter 2: Point-to-Point Connections
Chapter 2: Point-to-Point Connections
Point-to-Point Protocol (PPP)
CCNA 4 Chapter 2 PPP.
Point-to-Point Protocol (PPP)
Point-to-Point Protocol (PPP)
© 2002, Cisco Systems, Inc. All rights reserved.
Point-to-Point Protocol (PPP)
PPP Protocol.
Virtual Private Networks (VPN)
Presentation transcript:

Rick Graziani PPP authentication protocols 1. Link establishment - (LCPs) 2. Authentication - Optional (LCPs) 3. Link quality determination - Optional (LCPs) 4. Network layer protocol configuration (NCPs) 5. Link termination (LCPs) Encrypted password Repeated challenges

Rick Graziani Password Authentication Protocol (PAP) PAP provides a simple method for a remote node to establish its identity, using a two-way handshake. After the PPP link establishment phase is complete, a username/password pair is repeatedly sent by the remote node across the link until authentication is acknowledged or the connection is terminated. PAP is not a strong authentication protocol. Passwords are sent across the link in clear text and there is no protection from playback or repeated trial-and-error attacks. The remote node is in control of the frequency and timing of the login attempts.

Rick Graziani Challenge Handshake Authentication Protocol (CHAP) CHAP is used at the startup of a link and periodically verifies the identity of the remote node using a three-way handshake. After the PPP link establishment phase is complete, the local router sends a "challenge" message to the remote node. The remote node responds with a value calculated using a one-way hash function, which is typically Message Digest 5 (MD5). This response is based on the password and challenge message. The local router checks the response against its own calculation of the expected hash value. If the values match, the authentication is acknowledged, otherwise the connection is immediately terminated.

Rick Graziani Challenge Handshake Authentication Protocol (CHAP) CHAP provides protection against playback attack through the use of a variable challenge value that is unique and unpredictable. Since the challenge is unique and random, the resulting hash value will also be unique and random. The use of repeated challenges is intended to limit the time of exposure to any single attack. The local router or a third-party authentication server is in control of the frequency and timing of the challenges.

Rick Graziani CHAP Operation Note: A simpler version will be shown when we configure CHAP.

Rick Graziani LCP establishes and negotiates the link 1. The call comes in to HQ. The incoming interface is configured with the ppp authentication chap command. 2. LCP negotiates CHAP and MD5. 3. A CHAP challenge from HQ to the calling router is required on this call.

Rick Graziani CHAP Challenge This figure illustrates the following steps in the CHAP authentication between the two routers: 1. A CHAP challenge packet is built with the following characteristics: –01 = challenge packet type identifier. –ID = sequential number that identifies the challenge. –random = a reasonably random number generated by the router. –HQ = the authentication name of the challenger. 2. The ID and random values are kept on the called router. 3. The challenge packet is sent to the calling router. A list of outstanding challenges is maintained.

Rick Graziani Receipt of the CHAP Challenge 1. The ID value is fed into the MD5 hash generator. 2. The random value is fed into the MD5 hash generator. 3. The name HQ is used to look up the password. The router looks for an entry matching the username in the challenge. In this example, it looks for: username HQ password boardwalk 4. The password is fed into the MD5 hash generator. 5. The result is the one-way MD5-hashed CHAP challenge that will be sent back in the CHAP response. This diagram illustrates the receipt and MD5 processing of the challenge packet from the peer. The router processes the incoming CHAP challenge packet in the following manner:

Rick Graziani CHAP Response 1. The response packet is assembled from the following components: –02 = CHAP response packet type identifier. –ID = copied from the challenge packet. –hash = the output from the MD5 hash generator (the hashed information from the challenge packet). –SantaCruz = the authentication name of this device. This is needed for the peer to look up the username and password entry needed to verify identity (this is explained in more detail below). 2. The response packet is then sent to the challenger. This diagram illustrates how the CHAP response packet sent to the authenticator is built. The following steps are shown in this figure:

Rick Graziani Receive CHAP Response 1. The ID is used to find the original challenge packet. 2. The ID is fed into the MD5 hash generator. 3. The original challenge random value is fed into the MD5 hash generator. 4. The name SantaCruz is used to look up the password from one of the following sources: –Local username and password database username SantaCruz password boardwalk –RADIUS or TACACS+ server. 5. The password is fed into the MD5 hash generator. 6. The hash value received in the response packet is then compared to the calculated MD5 hash value. CHAP authentication succeeds if the calculated and the received hash values are equal. This diagram shows how the challenger processes the response packet. The CHAP response packet is processed (on the authenticator) in the following manner:

Rick Graziani Success Message Sent 1. If authentication is successful, a CHAP success packet is built from the following components: –03 = CHAP success message type. –ID = copied from the response packet. –“Welcome in” is simply a text message providing a user-readable explanation. 2. If authentication fails, a CHAP failure packet is built from the following components: –04 = CHAP failure message type. –ID = copied from the response packet. –“Authentication failure” or other text message, providing a user- readable explanation. 3. The success or failure packet is then sent to the calling router. This diagram illustrates the success message being sent to the calling router.

Rick Graziani Configuring Authentication (PAP or CHAP) Peer routers exchange authentication messages. Two alternatives are: –Password Authentication Protocol (PAP) –Challenge Handshake Authentication Protocol (CHAP) In general, CHAP is the preferred protocol but PAP is still very common. Encrypted password Repeated challenges

Rick Graziani Configuring PAP Rtr(config)# username remote-host password remote- password This needs to match the ppp pap sent-username on the remote host. Rtr(config-if)# ppp pap sent-username this-host username password this-host-password The passwords do not need to match between the remote and the host. It should not need to be the same as the enable-secret password. Router(config-if)#ppp authentication {chap | chap pap | pap chap | pap} Two choices: first choice | second choice If both methods are enabled, then the first method specified will be requested during link negotiation. If the peer suggests using the second method or simply refuses the first method, then the second method will be tried.

Rick Graziani Notes: sent-username and password must match remote username and password. Passwords are case-sensitive, but usernames are not. Hostnames are not involved. Configuring PAP hostname SantaCruz username HQ password HQpass interface Serial0 ip address encapsulation ppp ppp authentication pap ppp pap sent-username SantaCruz password SantaCruzpass hostname HQ username SantaCruz password SantaCruzpass interface Serial0 ip address encapsulation ppp ppp authentication pap ppp pap sent-username HQ password HQpass

Rick Graziani 1 PPP establish link 2 Configuration Request: PAP 3 SantaCruz looks up sent- username and password for this interface: ppp pap sent-username SantaCruz password SantaCruzpass 4 5 sent-username Santa Cruz and password SantaCruzpass 6 HQ looks up username SantaCruz and retrieves the password: username SantaCruz password SantaCruzpass Same? Yes, generate ACK message. No, generate NACK message. PAP Configuration ACK

Rick Graziani Notes: Hostnames are involved unless the ppp chap hostname command is used, and must match remote router’s username command (not case-sensitive). Passwords are case-sensitive and must match Configuring CHAP hostname SantaCruz username HQ password boardwalk ppp chap hostname SantaCruz (optional) interface Serial0 ip address encapsulation ppp ppp authentication chap hostname HQ username SantaCruz password boardwalk ppp chap hostname HQ (optional) interface Serial0 ip address encapsulation ppp ppp authentication chap

Rick Graziani 1 SantaCruz initiates call 2 Challenge labeled from HQ (authentication name) 3 SantaCruz looks up username HQ and retrieves the password: username HQ password boardwalk 4 MD5 Hash Password fed into MD5 Hash and generates a Hash value Hash Value 5 Hash Value sent with authentication name Santa Cruz 6 HQ looks up username SantaCruz and retrieves the password: username SantaCruz password boardwalk MD5 Hash Hash ValueSame? Password fed into MD5 Hash and generates a Hash value Yes, generate SUCCESS message. No, generate FAILURE message. CHAP hostname HQ or ppp chap hostname HQ hostname SantaCruz or ppp chap hostname SantaCruz