This article is a mirror article of machine translation, please click here to jump to the original article.

View: 12449|Reply: 1

[Source] Challenge the handshake authentication protocol CHAP

[Copy link]
Posted on 11/29/2014 10:31:03 PM | | |
CHAP: Challenge Handshake Authentication Protocol
Challenge the Handshake Authentication Agreement (CHAP) passedThree handshakesPeriodically verify the identity of the peer at the beginningLinkIt is done at establishment and can be repeated at any time after the link is established.
1. After the link establishment stage is over, the authenticator will send a message to the right personendpointSend a "challenge" message.
2. Answer the endpoint with the value calculated by the one-way hash function.
3. The certifier calculates it on its ownhash valueto check the response, if the values match, the authentication is recognized; Otherwise, the connection should be terminated.
4. After a certain random interval, the authenticator sends a new challenge to the endpoint, repeating steps 1 through 3.
By incrementing the changed identifier and the variable challenge value, CHAP prevents theReplay the attack, using repeated checksums to limit the time exposed to a single attack. The certifier controls the frequency and timing of validation.
This authentication method relies on something shared only by the authenticator and the peerkeykeyNot sent over that link.
Although the certification is one-way, CHAP negotiation is carried out in both directions, the samekeyMutual authentication can be easily achieved.
Since CHAP can be used in many different system authentications, it can be used with a NAMEfieldAs an index to find the correct key in a large key table, it also supports multiple NAME/ key pairs in one system and can change keys at any time in a session.
CHAP requirementskeyIt exists in plaintext and cannot use the usual database of unrepliable encrypted passwords.
CHAP is not applicable in large networks because every possible onekeyIt is maintained by both ends of the link.
Protocol structure
The configuration options for CHAP are formatted as follows:
8 16 32 40 bit
Type Length Authentication-Protocol Algorithm
· Type ― 3
· Length ― 5
· Authentication-Protocol — For CHAP, C223 (Hex).
· The Algorithm — Algorithm field isoctets, indicates the authentication method used.
The CHAP packet structure looks like this:
8 16 32 bit Variable
Code> Identifier Length Data . . .
· Code — Identifies the CHAP packet type. CHAP codes have the following types: 1. Challenge; 2、Response; 3、Success; 4、Failure。
· Identifier — Used to match Challenges, Responses, and Replies information.
· Length — The length of the CHAP packet, including the Code, Identifier, Length, and Data fields.
· Data — 0 or moreoctets。 The field format depends on the Code field. For Success and Failure, the Data field includes a variable information field that performs independently




Previous:Forgotten Malaysia Airlines, US officials revealed the shocking inside story!!
Next:[November 29, 21:30] Share 20 Thunder member accounts
Posted on 11/29/2014 10:38:45 PM |
learned
Disclaimer:
All software, programming materials or articles published by Code Farmer Network are only for learning and research purposes; The above content shall not be used for commercial or illegal purposes, otherwise, users shall bear all consequences. The information on this site comes from the Internet, and copyright disputes have nothing to do with this site. You must completely delete the above content from your computer within 24 hours of downloading. If you like the program, please support genuine software, purchase registration, and get better genuine services. If there is any infringement, please contact us by email.

Mail To:help@itsvse.com