CN1277396C - Re-auditting method in 802.1X audit system - Google Patents

Re-auditting method in 802.1X audit system Download PDF

Info

Publication number
CN1277396C
CN1277396C CNB031050832A CN03105083A CN1277396C CN 1277396 C CN1277396 C CN 1277396C CN B031050832 A CNB031050832 A CN B031050832A CN 03105083 A CN03105083 A CN 03105083A CN 1277396 C CN1277396 C CN 1277396C
Authority
CN
China
Prior art keywords
authentication
equipment end
port
session
timeout
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CNB031050832A
Other languages
Chinese (zh)
Other versions
CN1527558A (en
Inventor
高江海
邹婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB031050832A priority Critical patent/CN1277396C/en
Publication of CN1527558A publication Critical patent/CN1527558A/en
Application granted granted Critical
Publication of CN1277396C publication Critical patent/CN1277396C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Abstract

The present invention discloses a method for realizing re-authentication in an 802.1X authentication system. When a user terminal logs on a network, a client end sends an authentication start message to a device end for triggering an 802.1X authentication process. After the authentication is successful, an authentication server sends an authentication success message to the device end. The method also comprises the device end judges whether a re-authentication time interval attribute Session-Timeout and a terminal operation attribute Termination-Action are carried in the authentication success message after receiving the authentication success message sent by the authentication server; if true, the device end judges whether the Termination-Action attribute value is 1 or not; if true, the re-authentication is triggered when the Session-Timeout attribute value is reached; otherwise, the connection of the current user is cut off when the Session-Timeout attribute value is reached. If only Session-Timeout attribute is carried or both of the two attributes are not carried, the device end controls whether to originate the re-authentication according to self parameter configuration. The method can make the 802.1X device end and the re-authentication mechanism of the authentication server organically combined to perfect the re-authentication in the 802.1X authentication system and can make the realization of the re-authentication more flexible.

Description

The implementation method of re-authentication in a kind of 802.1X Verification System
Technical field
The present invention relates to a kind of re-authentication technology, be meant the implementation method of re-authentication in a kind of 802.1X Verification System especially.
Background technology
802.1X agreement is the access to netwoks control protocol based on port that Institute of Electrical and Electric Engineers in June calendar year 2001 (IEEE) standardization body formally passes through.IEEE 802.1X has defined the network insertion control protocol based on port, and wherein, port can be a physical port, also can be logic port.
The architecture of IEEE 802.1X as shown in Figure 1, the 802.1X system has three entities: FTP client FTP (Supplicant System), equipment end system (Authenticator System), certificate server system (Authentication Server System).Further comprise the client port ontology of states (PAE) in client, further comprise service and the equipment end port status entity that the equipment end system provides, in the certificate server system, further comprise certificate server in equipment end; This certificate server links to each other with the port status entity of equipment end, come authentication information between switching equipment end and certificate server by Extensible Authentication Protocol (EAP), the port status entity of client is directly linked on the Local Area Network, the service of equipment end and port status entity are connected on the local area network (LAN) by controlled ports (Controlled Port) and uncontrolled port respectively, and client and equipment end communicate by the authentication protocol between client and equipment end (EAPoL).Wherein, Controlled Port is responsible for Control Network resource and professional visit.
As shown in Figure 1, there are controlled ports (Controlled Port) and uncontrolled port (Uncontrolled Port) in the inside of equipment end system, this uncontrolled port is in the diconnected state all the time, is mainly used to transmit the EAPoL protocol frame, can guarantee to receive at any time and send the EAPoL protocol frame; And controlled ports only passes through in authentication, be just to open under the licensing status, be used for delivery network resource and service, that is to say, the authentication not by the time this controlled ports be unauthorized port, that controlled ports can be configured to is bi-direction controlled, only import controlled dual mode, to adapt to the needs of different application environment.
Based on structure shown in Figure 1, with equipment end the EAP message being carried out the relaying forwarding is example, and the specific implementation process of IEEE802.1X authentication as shown in Figure 2.Wherein, communicate by the EAPoL agreement between client and the equipment end, in the present embodiment, adopting user's remote dial certificate server (RADIUS) is certificate server, communicates by EAPoR (EAP over Radius) agreement between equipment end and the radius server.So, this verification process may further comprise the steps:
Step 201: when user's logging in network, after client is received user login information, send authentication start message EAPoL-Start, triggering authentication process to equipment end.Here, if client is a dynamically allocate address, the authentication start message also may be the DHCP request message; If client is the manual configuration address, the authentication start message also may be the ARP request message.
Step 202: after equipment end is received the EAPoL-Start message that client sends, send request user name message EAPoL-Request[Identity to client], the request user name.
Step 203: client is received the EAPoL-Request[Identity that equipment end is sent] behind the message, with user name by response user name message EAPoL-Response[Identity] issue equipment end.
Step 204: equipment end is received the EAPoL-Response[Identity that client is sent] behind the message, user name is passed through radius server by inserting request message RADIUS Access-Request (EAPoL-Response[Identity]).
Step 205:RADIUS server is received the EAPoL-Response[Identity that the equipment end transparent transmission is come] behind the message, send request user cipher message EAP-Request[MD5 Challenge to equipment end], and pass through equipment end by password request message RADIUS Access-Challenge (EAP-Request[MD5 Challenge]), carry out MD5 to client and address inquires to.
Step 206: equipment end is received the EAP-Request[MD5 Challenge that radius server is sent] behind the message, by EAPoL-Request[MD5 Challenge] pass through client.
Step 207: client is received the EAPoL-Request[MD5 Challenge that equipment end is sent] behind the message, with password by response user cipher message EAPoL-Response[MD5 Challenge] issue equipment end.
Step 208: equipment end is received the EAPoL-Response[MD5 Challenge that client is sent] behind the message, give by RADIUS Access-Request (EAP-Response[MD5 Challenge]) message transmission.
Step 209:RADIUS server is received the EAP-Response[MD5Challenge that the equipment end transparent transmission is come] authenticate behind the message, if authentication success sends to equipment end with authentication success message EAP-Success by allowing to insert message RADIUS Access-Accept (EAP-Success); Otherwise, send out authentification failure message EAP-Failure.
Step 210: after equipment end is received the EAP-Success message that radius server sends, give client by the EAPoL-Success message transmission; After client is received the EAPoL-Success message that equipment end sends, the success of notice authentification of user; If receive the authentification failure message, then notify user authentication failure.
Though, 802.1X behind the authentication success, the user can carry out proper communication, but in communication process, validated user might roll off the production line because of abnormal conditions, and the disabled user also might occur and substitute the situation that validated user communicates, so, in order to guarantee the security reliability of communication system, the 802.1X Verification System adopts re-authentication mechanism.So-called re-authentication just is meant at 802.1X first behind the authentication success, can once authenticate the user who is connected through certificate server after a while, to judge whether whether also online the and current user who is connected is validated user to this user again.Certainly, re-authentication can carry out repeatedly, and concrete re-authentication number of times and blanking time are set as required by certificate server or equipment end.
At present, 802.1X there are two attributes relevant in the agreement with re-authentication mechanism, that is: re-authentication time interval attribute Session-Timeout and terminal operation attribute Termination-Action, simultaneously, 802.1X stipulate in the agreement: if certificate server has issued the Session-Timeout attribute when authorizing, just must be with the Termination-Action attribute, and the value of Termination-Action attribute is necessary for 1, and the time interval that this moment, equipment end was carried out re-authentication is the value of Session-Timeout attribute.That is to say, have only two kinds of situations in the message that issues: carry two attributes of Session-Timeout and Termination-Action simultaneously, or do not carry in these two attributes any one, and, if carried this two attributes, just must carry out re-authentication.
Though afore mentioned rules can be supported the realization of re-authentication,, there is the problem of following two aspects in this regulation: on the one hand, if the certificate server of current support 802.1X agreement does not want to carry out re-authentication, but stipulate that overtime back cuts off the user, so, just can not realize according to present agreement regulation; On the other hand, if current certificate server is not wanted to carry out re-authentication, and equipment end wants to carry out re-authentication, and present agreement regulation is not supported yet.As seen, 802.1X equipment end and 802.1X certificate server are imperfect as yet on re-authentication mechanism in the prior art, the control of counterweight authentication period fails to organically combine, so, not only make troubles, and limited the flexibility of re-authentication mechanism in the IEEE 802.1X Verification System to operator's management.
Summary of the invention
In view of this, main purpose of the present invention is to provide the implementation method of re-authentication in a kind of 802.1X Verification System, the re-authentication mechanism of 802.1X equipment end and the re-authentication mechanism of 802.1X certificate server can be organically combined, thereby improve the re-authentication technology in the 802.1X Verification System, and make the realization of re-authentication technology in the 802.1X Verification System have more flexibility.
For achieving the above object, technical scheme of the present invention is achieved in that
The implementation method of re-authentication in a kind of 802.1X Verification System, when user's logging in network, 802.1X client sends the authentication start message to the 802.1X equipment end, trigger the 802.1X verification process, behind authentication success, 802.1X certificate server is sent out the authentication success message to the 802.1X equipment end, this method also comprises:
After 802.1X equipment end is received the authentication success message that the 802.1X certificate server sends, judge and whether carry re-authentication time interval attribute Session-Timeout and terminal operation attribute Termination-Action in this authentication success message, if carry this two attributes, judge again whether the Termination-Action property value is 1, if trigger the re-authentication process when then arriving the Session-Timeout property value; Otherwise, cut off active user's connection when arriving the Session-Timeout property value; If only carry the Session-Timeout attribute in this message or two attributes all do not carry, then whether the 802.1X equipment end initiates re-authentication according to self parameter configuration control.
In the such scheme, whether described 802.1X equipment end initiates re-authentication according to self configuration control further comprises: the 802.1X equipment end judges whether the needs re-authentication according to the parameter configuration of self, if do not need, then be provided with when front port for being authorized to port, and communicate by this port; Otherwise, be provided with when front port for being authorized to port, and communicate by this port, the re-authentication time is set simultaneously, the time is then triggered the re-authentication process.
When the Termination-Action property value was 0, this method further comprised: forbid any end initiation re-authentication process in 802.1X equipment end and the 802.1X certificate server.
When carrying two attributes of Session-Timeout and Termination-Action in the authentication success message simultaneously, this method further comprises: be provided with when front port for being authorized to port, and communicate by this port.
This method also further comprises: after the re-authentication failure, it is unauthorized port that front port is worked as in setting, and cuts off active user's connection.
By such scheme as can be seen, key of the present invention is: control re-authentication by Session-Timeout and cooperatively interacting of two attributes of Termination-Action, specifically be after user log-in authentication success, judge whether to carry out and how to carry out re-authentication according to attribute entrained in the authentication success message and value thereof.
In Verification System based on IEEE 802.1X, the 802.1X agreement is expanded, change to the Termination-Action value be 0, the Session-Timeout attribute issues separately and Termination-Action attribute and Session-Timeout attribute all do not issue the definition of three kinds of situations.Therefore, the implementation method of re-authentication in the 802.1X Verification System provided by the present invention, increased the judgement that certificate server is issued entrained Session-Timeout and Termination-Action attribute and value thereof in the authentication success message, the carrying out that cooperatively interacts to determine how to control re-authentication by these two attributes, if i.e.: Termination-Action=1, then Session-Timeout expires and just triggers the re-authentication process; If Termination-Action=0, then Session-Timeout expires and just cuts off the user, and forbids certificate server or equipment end initiation re-authentication; If only carry the Session-Timeout attribute or do not carry this two attributes, then control the generation of re-authentication by 802.1X equipment end oneself.So; can improve the re-authentication mechanism in the IEEE 802.1X Verification System; make the control of server counterweight authentication period and the control of 802.1X equipment end counterweight authentication period be able to organic combination; thereby made things convenient for the management of operator; guarantee to use flexibly based on the re-authentication mechanism of IEEE 802.1X Verification System; efficiently solve the problems of the prior art, and implement simple, reliable, efficient.
Description of drawings
Fig. 1 is the architectural schematic of IEEE 802.1X;
Message flow chart when Fig. 2 carries out the relaying forwarding for equipment end in the 802.1X system to the EAP message;
The flow chart that Fig. 3 realizes for re-authentication process among the present invention.
Embodiment
The present invention is further described in more detail below in conjunction with drawings and the specific embodiments.
For guaranteeing that Session-Timeout and two values of Termination-Action can cooperatively interact, finish the re-authentication under the various situations, the value that will allow Termination-Action be 0 and the Session-Timeout attribute can issue separately.And setting the Termination-Action value is 1 o'clock, begins the re-authentication process after the arrival Session-Timeout value; The Termination-Action value is 0 o'clock, Session-Timeout expire just cut off the user and do not allow certificate server or equipment end either party carry out re-authentication; When only carrying the Session-Timeout attribute in the authentication success message that certificate server issues or not carrying in these two attributes any one, then by cycle of 802.1X equipment end control re-authentication.Based on this, the present invention has increased and has carried the judgement that relates to re-authentication attribute number and property value in this authentication success message after the 802.1X equipment end is received the authentication success message, whether needs to trigger re-authentication and how to trigger re-authentication with decision.
As shown in Figure 3, re-authentication process of the present invention may further comprise the steps:
Step 301~303: equipment end judges whether carry Session-Timeout and two attributes of Termination-Action in this authentication success message, if then enter step 304 after receiving the authentication success message that certificate server issues; Otherwise if two attributes all do not carry or only carry the Session-Timeout attribute, then by the equipment end of 802.1X, the authentication authorization and accounting access point controls whether carry out the re-authentication and the setting in re-authentication cycle.That is to say, in such cases, 802.1X equipment end can determine whether needs carry out re-authentication according to the parameter configuration of self, if desired, then set the required re-authentication time by equipment end oneself, such as: set in advance a re-authentication timer in equipment end, start timer when needing re-authentication, timer expiry promptly begins the re-authentication process.
Step 304~306: judge again whether entrained Termination-Action value is 1, if, then when Session-Timeout expires, the re-authentication process will begin in a minute, that is: again active user's information such as username and password are confirmed that this re-authentication process is with verification process is identical first; Otherwise, if the Termination-Action value is 0, then when Session-Timeout expires, cut off active user's connection immediately, and certificate server and 802.1X equipment end are not all supported re-authentication, that is: in this case, any end can not initiated re-authentication.
Still with equipment end the EAP message being carried out the relaying forwarding is example, in the present embodiment, certificate server is a radius server, again referring to shown in Figure 2, can carry EAP-Success and relevant re-authentication attribute information in the authentication success message that radius server issues, step 209a represents that with 210c radius server issues three kinds of situations of carrying relevant re-authentication property parameters in the authentication success message with 210b and step 209c respectively with 210a, step 209b:
1) step 209a and 210a represent: radius server sends among the authentication success message RADIUS Access-Accept (EAP-Success) of equipment end or the RADIUS Accounting-request (EAP-Success) and has Session-Timeout and two attributes of Termination-Action, and the value of Termination-Action is 0, so, the front port of working as of equipment end is authorized to, can be used to delivery network resource and service, but when Session-Timeout expires, the active user will be cut off, and will work as front port and change unauthorized into, and in this case, any end in certificate server and the 802.1X equipment end can not initiated re-authentication.
2) step 209b and 210b represent: radius server sends among the authentication success message RADIUS Access-Accept (EAP-Success) of equipment end or the RADIUS Accounting-request (EAP-Success) and has Session-Timeout and two attributes of Termination-Action, and the value of Termination-Action is 1, so, the controlled ports of equipment end is authorized to, can be used to delivery network resource and service, and when Session-Timeout expires, carry out re-authentication to the active user, the process of re-authentication is shown in step 211~step 219.If re-authentication success is authorized to state when front port still is in, the active user continues communication, if the re-authentication failure then is changed to unauthorizedly when front port, cut off active user's connection.
3) step 209c and 210c represent: radius server sends among the authentication success message RADIUS Access-Accept (EAP-Success) of equipment end or the RADIUS Accounting-request (EAP-Success) and only has attribute of Session-Timeout, so, whether need to carry out re-authentication by the own decision of equipment end, if desired, then set a re-authentication time, then promptly begin the re-authentication process, this re-authentication process is equally shown in step 211~step 219.If re-authentication success is authorized to state when front port still is in, the active user continues communication, if the re-authentication failure then is changed to unauthorizedly when front port, cut off active user's connection.In such cases, how many occurrences of not considering Session-Timeout is.
In addition, do not show among Fig. 2, if radius server sends to any one of not carrying among the authentication success message RADIUS Access-Accept (EAP-Success) of equipment end or the RADIUS Accounting-request (EAP-Success) in Session-Timeout and two attributes of Termination-Action, so, whether need to carry out re-authentication by the own decision of equipment end equally, if desired, then set a re-authentication time, then promptly begin the re-authentication process, this re-authentication process is equally shown in step 211~step 219.If re-authentication success is authorized to state when front port still is in, the active user continues communication, if the re-authentication failure then is changed to unauthorizedly when front port, cut off active user's connection.In such cases, how many occurrences of not considering Session-Timeout is.
Because present wlan network mainly adopts the 802.1X serial protocols, therefore, the re-authentication method among the present invention can be directly used in the communication process of wlan network.
The above is preferred embodiment of the present invention only, is not to be used for limiting protection scope of the present invention.

Claims (5)

1, the implementation method of re-authentication in a kind of 802.1X Verification System, when user's logging in network, 802.1X client sends the authentication start message to the 802.1X equipment end, trigger the 802.1X verification process, behind authentication success, 802.1X certificate server is sent out the authentication success message to the 802.1X equipment end, it is characterized in that, this method also comprises:
After 802.1X equipment end is received the authentication success message that the 802.1X certificate server sends, judge and whether carry re-authentication time interval attribute Session-Timeout and terminal operation attribute Termination-Action in this authentication success message, if carry this two attributes, judge again whether the Termination-Action property value is 1, if trigger the re-authentication process when then arriving the Session-Timeout property value; Otherwise, cut off active user's connection when arriving the Session-Timeout property value; If only carry the Session-Timeout attribute in this authentication success message or two attributes all do not carry, then whether the 802.1X equipment end initiates re-authentication according to self parameter configuration control.
2, method according to claim 1 is characterized in that, whether described 802.1X equipment end initiates re-authentication according to self configuration control further comprises:
802.1X equipment end judges whether the needs re-authentication according to the parameter configuration of self, if do not need, then be provided with when front port for being authorized to port, and communicate by this port; Otherwise, be provided with when front port for being authorized to port, and communicate by this port, the re-authentication time is set simultaneously, the time is then triggered the re-authentication process.
3, method according to claim 1 is characterized in that, when the Termination-Action property value was 0, this method further comprised: forbid any end initiation re-authentication process in 802.1X equipment end and the 802.1X certificate server.
4, method according to claim 1, it is characterized in that, when carrying two attributes of Session-Timeout and Termination-Action in the authentication success message simultaneously, this method further comprises: be provided with when front port for being authorized to port, and communicate by this port.
5, according to claim 2 or 4 described methods, it is characterized in that this method further comprises: after the re-authentication failure, it is unauthorized port that front port is worked as in setting, and cuts off active user's connection.
CNB031050832A 2003-03-06 2003-03-06 Re-auditting method in 802.1X audit system Expired - Lifetime CN1277396C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB031050832A CN1277396C (en) 2003-03-06 2003-03-06 Re-auditting method in 802.1X audit system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB031050832A CN1277396C (en) 2003-03-06 2003-03-06 Re-auditting method in 802.1X audit system

Publications (2)

Publication Number Publication Date
CN1527558A CN1527558A (en) 2004-09-08
CN1277396C true CN1277396C (en) 2006-09-27

Family

ID=34282508

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB031050832A Expired - Lifetime CN1277396C (en) 2003-03-06 2003-03-06 Re-auditting method in 802.1X audit system

Country Status (1)

Country Link
CN (1) CN1277396C (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101764693B (en) * 2009-12-24 2013-01-30 福建星网锐捷网络有限公司 Authentication method, system, client and network equipment
CN102447702B (en) * 2011-12-28 2016-03-30 华为技术有限公司 Based on re-authentication method and the device of strategy
CN105306458B (en) * 2015-10-08 2018-07-03 北京星网锐捷网络技术有限公司 Authentication method and device based on network access security equipment
CN106169989A (en) * 2016-05-19 2016-11-30 成都逸动无限网络科技有限公司 A kind of authentication gateway

Also Published As

Publication number Publication date
CN1527558A (en) 2004-09-08

Similar Documents

Publication Publication Date Title
Congdon et al. IEEE 802.1 X remote authentication dial in user service (RADIUS) usage guidelines
US8762726B2 (en) System and method for secure access
Asokan et al. Man-in-the-middle in tunnelled authentication protocols
US7788705B2 (en) Fine grained access control for wireless networks
US7774602B2 (en) Secure modem gateway concentrator
WO2007030398A2 (en) Dynamic network connection based on compliance
CN101695022B (en) Management method and device for service quality
CN1925399A (en) Distributed authentication functionality
US10492071B1 (en) Determining client device authenticity
WO2008079490A1 (en) Locking carrier access in a communication network
CN101272379A (en) Improving method based on IEEE802.1x safety authentication protocol
CN1277396C (en) Re-auditting method in 802.1X audit system
CN1235382C (en) A client authentication method based on 802.1X protocol
CN1266889C (en) Method for management of network access equipment based on 802.1X protocol
EP1602216A1 (en) Forced encryption for wireless local area networks
CN1486032A (en) Method and apparatus for VLAN based network access control
CN1688124A (en) Wireless network access controlling method based on port technique and authorization protocol
Cisco Switch Access: Using Authentication, Authorization, and Accounting
CN1274124C (en) Method for realizing 802.1X verification
US9119066B2 (en) Method and arrangement for position-dependent configuration of a mobile appliance
EP2529329B1 (en) Secure procedure for accessing a network and network thus protected
Lee et al. Performance of an efficient performing authentication to obtain access to public wireless LAN with a cache table
Congdon et al. RFC3580: IEEE 802.1 X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines
Kwan WHITE PAPER: 802.1 XAuthentication & EXTENSIBLE AUTHENTICATION PROTOCOL (EAP)
Yun-hua et al. Research on the security of IEEE 802.1× authentication mechanism in wireless LAN

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CX01 Expiry of patent term

Granted publication date: 20060927

CX01 Expiry of patent term