Chap authentication – H3C Technologies H3C SecPath F1000-E User Manual
Page 135
110
During PAP authentication, the password is transmitted on the link in plain text. In addition, the
authenticatee sends the username and the password repeatedly through the established PPP link until the
authentication is over. PAP is not a secure authentication protocol and cannot prevent attacks.
CHAP authentication
CHAP is a three-way handshake authentication protocol using cipher text password.
Two types of CHAP authentication exist: one-way CHAP authentication and two-way CHAP
authentication. In one-way CHAP authentication, one side of the link acts as the authenticator and the
other acts as the authenticatee. In two-way authentication, each side serves as both the authenticator and
the authenticatee. Normally, one-way CHAP authentication is adopted.
In one-way CHAP authentication, the authenticator may or may not be configured with a username. H3C
recommends that you configure a username for the authenticator to identify the authenticator more
easily.
If the authenticator is configured with a username, CHAP authentication is performed in the following
workflow:
1.
The authenticator initiates an authentication by sending a randomly-generated packet (Challenge)
to the authenticatee. The packet carries the local username with it in addition.
2.
When the authenticatee receives the authentication request, it searches the local user list for the
password of the username carried in the received packet, encrypts the packet by using the MD5
algorithm, with the packet ID and the password as the parameters, and then sends the encrypted
packet and the local username to the authenticator (Response).
3.
The authenticator encrypts the original randomly-generated packet using the MD5 algorithm, with
the password of the authenticatee it maintains as the parameter, compares the encrypted packet
with the one received from the authenticatee, and returns an Acknowledge or Not Acknowledge
packet depending on the comparison result.
If the authenticator is not configured with a username, CHAP authentication is performed in the following
workflow:
1.
The authenticator initiates an authentication by sending a randomly-generated packet (Challenge)
to the authenticatee.
2.
When the authenticatee receives the authentication request, it encrypts the packet by using the
MD5 algorithm, with the packet ID and the default CHAP password as the parameters, and then
sends the encrypted packet and its own username to the authenticator (Response).
3.
The authenticator encrypts the original randomly-generated packet by using the MD5 algorithm,
with the password of the authenticatee it maintains as the parameter, compares the encrypted
packet with the one received from the authenticatee, and returns an Acknowledge or Not
Acknowledge packet depending on the comparison result.
- H3C SecPath F5000-A5 Firewall H3C SecPath F1000-A-EI H3C SecPath F1000-E-SI H3C SecPath F1000-S-AI H3C SecPath F5000-S Firewall H3C SecPath F5000-C Firewall H3C SecPath F100-C-SI H3C SecPath F1000-C-SI H3C SecPath F100-A-SI H3C SecBlade FW Cards H3C SecBlade FW Enhanced Cards H3C SecPath U200-A U200-M U200-S H3C SecPath U200-CA U200-CM U200-CS H3C SecBlade LB Cards H3C SecPath L1000-A Load Balancer