210 likes | 443 Views
Chapter 17 Remote Authentication Dial-In User Service (RADIUS). RADIUS Messages RADIUS Message Structure RADIUS Attributes Vendor-Specific Attributes RADIUS Message Exchanges Authentication of Network Access Accounting of Network Access RADIUS Proxy Forwarding Summary.
E N D
Chapter 17 Remote Authentication Dial-In User Service (RADIUS) RADIUS Messages RADIUS Message StructureRADIUS Attributes Vendor-Specific Attributes RADIUS Message Exchanges Authentication of Network Access Accounting of Network Access RADIUS Proxy Forwarding Summary
RADIUS Messages • Access-Request • Access-Challenge • Access-Accept • Access-Reject • Accounting-Request • Accounting-Response
RADIUSAttribute RADIUS attributes carry data values that are used in the authentication, authorization, and accounting functions carried out by RADIUS clients, servers, and proxies. These attributes can appear in network access and accounting requests and in response messages. An attribute represents a specific data item, such as a user name or the tunneling protocol in use, sent between the RADIUS client and server. Some attributes can be included more than once, the effect of which is dependent on the specific attribute. When used as RADIUS proxy, NPS preserves the order of the attributes received from the client in messages transmitted to a RADIUS server. There are two types of RADIUS attributes: standard attributes and vendor-specific attributes (VSAs). Standard attributes are defined in RFCs 2865 through 2869 and are used by all RADIUS clients and servers. VSAs are proprietary. Not all RADIUS clients and servers imple-ment all VSAs. For more information, see the section “Vendor-Specific Attributes” later in this chapter.
RADIUS Message Exchanges This section describes common RADIUS message exchanges for the following: ■Authentication of network access ■Accounting of network access ■RADIUS proxy forwarding
Authentication of Network Access ■ Access-Request followed by Access-Accept ■ Access-Request followed by Access-Reject ■ Access-Request followed by Access-Challenge
An example of an Access-Request/Access-Accept message exchange is Capture 17-01 (Frame 1) Frame: + Ethernet: Etype = Internet IP (IPv4) + Ipv4: Next Protocol = UDP, Packet ID = 30882, Total IP Length = 277 - Udp: SrcPort = 3065, DstPort = 1812, Length = 257 SourcePort: 3065, 3065(0xbf9) DestinationPort: 1812, 1812(0x714) TotalLength: 257 (0x101) Checksum: 42833 (0xA751) - Radius: Access Request, Id = 12, Length = 249 MessageType: Access Request, 1(0x01) Identifier: 12 (0xC) AllLength: 249 (0xF9) Authenticator: DB 60 44 6A 2B 19 83 57 FF 75 F1 1D 19 2C 1A 7F + AttributeNasIPAddress: 10.10.1.150 + AttributeServiceType: Framed, 2(0x2) + AttributeFramedProtocol: PPP, 1(0x1)
+ AttributeNasPort: 128 + AttributeVendorSpecific: + AttributeVendorSpecific: + AttributeRadiusNASPortType: Virtual, 5(0x5) + AttributeTunnelType: Point-to-Point Tunneling Protocol (PPTP), 1(0x1) + AttributeTunnelMediumType: IPv4, 1(0x1) + AttributeStationID: 10.10.1.62 + AttributeTunnelClientEndpoint: + AttributeVendorSpecific: + AttributeVendorSpecific: + AttributeUserName: KAPOHO\tfl + AttributeVendorSpecific: + AttributeVendorSpecific:
the corresponding Access-Accept message from Capture 17-01 (Frame 2) Frame: + Ethernet: Etype = Internet IP (IPv4) + Ipv4: Next Protocol = UDP, Packet ID = 39615, Total IP Length = 242 + Udp: SrcPort = 1812, DstPort = 3065, Length = 222 - Radius: Access Accept, Id = 12, Length = 214 MessageType: Access Accept, 2(0x02) Identifier: 12 (0xC) AllLength: 214 (0xD6) Authenticator: 5F C7 93 40 22 EA 31 7A A3 4F 82 B1 FA DE 15 77 + AttributeFramedProtocol: PPP, 1(0x1) + AttributeServiceType: Framed, 2(0x2) + AttributeClass: + AttributeVendorSpecific: + AttributeVendorSpecific: + AttributeVendorSpecific: + AttributeVendorSpecific:
Accounting of Network Access An example of an Accounting-Request/Accounting-Response message exchange is Capture 17-03 (Frame 1) Frame: + Ethernet: Etype = Internet IP (IPv4) + Ipv4: Next Protocol = UDP, Packet ID = 30899, Total IP Length = 303 + Udp: SrcPort = 3066, DstPort = 1813, Length = 283 - Radius: Accounting Request, Id = 3, Length = 275 MessageType: Accounting Request, 4(0x04) Identifier: 3 (0x3) AllLength: 275 (0x113) Authenticator: EA BB 33 E2 85 8D F8 D5 A6 5C 40 76 54 73 49 09 + AttributeAcctStatusType: Start, 1(0x1) + AttributeAcctDelayTime: 0 + AttributeNasIPAddress: 10.10.1.150 + AttributeServiceType: Framed, 2(0x2) + AttributeFramedProtocol: PPP, 1(0x1)
+ AttributeNasPort: 128 + AttributeVendorSpecific: + AttributeVendorSpecific: + AttributeRadiusNASPortType: Virtual, 5(0x5) + AttributeTunnelType: Point-to-Point Tunneling Protocol (PPTP),1(0x1) + AttributeTunnelMediumType: IPv4, 1(0x1) + AttributeStationID: 10.10.1.62 + AttributeTunnelClientEndpoint: + AttributeVendorSpecific: + AttributeVendorSpecific: + AttributeClass: + AttributeVendorSpecific: + AttributeAcctSessionID: 4 + AttributeUserName: KAPOHO\tfl + AttributeFramedIPAddress: 10.10.1.177 + AttributeFramedMTU: 1400 + AttributeAcctMultiSessionID: 27 + AttributeAcctLinkCount: 1 + AttributeEventTimestamp: 1010156648 + AttributeAcctAuthentic: RADIUS, 1(0x1) + AttributeVendorSpecific:
the corresponding Accounting-Response message from Capture 17-03 (Frame 2) Frame: + Ethernet: Etype = Internet IP (IPv4) + Ipv4: Next Protocol = UDP, Packet ID = 40023, Total IP Length = 48 + Udp: SrcPort = 1813, DstPort = 3066, Length = 28 - Radius: Accounting Response, Id = 3, Length = 20 MessageType: Accounting Response, 5(0x05) Identifier: 3 (0x3) AllLength: 20 (0x14) Authenticator: F0 A9 27 34 0D 42 36 4B 7E C7 8A 83 E4 B6 98 41
RADIUS Proxy Forwarding An example of an Access-Request message that is forwarded by a RADIUS proxy is Capture 17-04 (Frame 1) Frame: + Ethernet: Etype = Internet IP (IPv4) - Ipv4: Next Protocol = UDP, Packet ID = 7567, Total IP Length = 278 + Versions: IPv4, Internet Protocol; Header Length = 20 + DifferentiatedServicesField: DSCP: 0, ECN: 0 TotalLength: 278 (0x116) Identification: 7567 (0x1D8F) + FragmentFlags: 0 (0x0) TimeToLive: 128 (0x80) NextProtocol: UDP, 17(0x11) Checksum: 1238 (0x4D6) SourceAddress: 10.10.1.150 DestinationAddress: 10.10.1.201 + Udp: SrcPort = 1711, DstPort = 1812, Length = 258
- Radius: Access Request, Id = 8, Length = 250 MessageType: Access Request, 1(0x01) Identifier: 8 (0x8) AllLength: 250 (0xFA) Authenticator: B2 3F 8A 21 54 25 F4 14 4C 30 08 4E 34 5A 82 27 + AttributeNasIPAddress: 10.10.1.150 + AttributeServiceType: Framed, 2(0x2) + AttributeFramedProtocol: PPP, 1(0x1) + AttributeNasPort: 128 + AttributeVendorSpecific: + AttributeVendorSpecific: + AttributeRadiusNASPortType: Virtual, 5(0x5) + AttributeTunnelType: Point-to-Point Tunneling Protocol (PPTP), 1(0x1) + AttributeTunnelMediumType: IPv4, 1(0x1) + AttributeStationID: 10.10.1.62 + AttributeTunnelClientEndpoint: + AttributeVendorSpecific: + AttributeVendorSpecific: + AttributeUserName: TCP1\rebecca + AttributeVendorSpecific: + AttributeVendorSpecific:
The Access-Request message as forwarded by the RADIUS proxy to a RADIUS server (at the IP address 10.10.1.151) from Capture 17-04 (Frame 2) Frame: + Ethernet: Etype = Internet IP (IPv4) - Ipv4: Next Protocol = UDP, Packet ID = 2894, Total IP Length = 288 + Versions: IPv4, Internet Protocol; Header Length = 20 + DifferentiatedServicesField: DSCP: 0, ECN: 0 TotalLength: 288 (0x120) Identification: 2894 (0xB4E) + FragmentFlags: 0 (0x0) TimeToLive: 128 (0x80) NextProtocol: UDP, 17(0x11) Checksum: 0 (0x0) SourceAddress: 10.10.1.201 DestinationAddress: 10.10.1.151 + Udp: SrcPort = 2203, DstPort = 1812, Length = 268 - Radius: Access Request, Id = 2, Length = 260 MessageType: Access Request, 1(0x01) Identifier: 2 (0x2) AllLength: 260 (0x104)
Authenticator: B2 3F 8A 21 54 25 F4 14 4C 30 08 4E 34 5A 82 27 + AttributeNasIPAddress: 10.10.1.150 + AttributeServiceType: Framed, 2(0x2) + AttributeFramedProtocol: PPP, 1(0x1) + AttributeNasPort: 128 + AttributeRadiusNASPortType: Virtual, 5(0x5) + AttributeTunnelType: Point-to-Point Tunneling Protocol (PPTP), 1(0x1) + AttributeTunnelMediumType: IPv4, 1(0x1) + AttributeStationID: 10.10.1.62 + AttributeTunnelClientEndpoint: + AttributeUserName: TCP1\ rebecca + AttributeVendorSpecific: + AttributeVendorSpecific: + AttributeVendorSpecific: + AttributeVendorSpecific: + AttributeVendorSpecific: + AttributeVendorSpecific: - AttributeProxyState: Type: Proxy State, 33(0x21) Length: 10 (0xA) ProxyState: Binary Large Object (8 Bytes)
Summary RADIUS messages have a common structure consisting of a fixed-size portion and a variable-size portion. The fixed-size portion contains fields common to all RADIUS messages. The variable-size portion contains RADIUS attributes, which can be standard attributes or VSAs. RADIUS attributes carry data values that are used in authentication, authorization, and accounting of network access. An authentication exchange is one of the following: Access-Request/Access-Accept for a successful authentication and authorization, Access-Request/Access-Reject for an unsuccessful authentication or authorization, or Access-Request/Access-Challenge when the RADIUS server needs more information to evaluate authentication and authorization. An accounting exchange consists of an Accounting-Request and an Accounting-Response. When RADIUS proxies are between RADIUS clients and RADIUS servers, they modify RADIUS messages by adding or removing a Proxy-State attribute.
จัดทำโดย นางสาว ภาวิณี แก้วสุข รหัส 115130462031-3 กลุ่ม 51346CPE