Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

PPP Authentication Protocols (RFC1334)

IP.com Disclosure Number: IPCOM000002157D
Original Publication Date: 1992-Oct-01
Included in the Prior Art Database: 2000-Sep-12
Document File: 14 page(s) / 31K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

B. Lloyd: AUTHOR [+2]

Abstract

The Point-to-Point Protocol (PPP) [1] provides a standard method of encapsulating Network Layer protocol information over point-to-point links. PPP also defines an extensible Link Control Protocol, which allows negotiation of an Authentication Protocol for authenticating its peer before allowing Network Layer protocols to transmit over the link.

This text was extracted from a ASCII document.
This is the abbreviated version, containing approximately 9% of the total text.

Network Working Group B. Lloyd

Request for Comments: 1334 L&A

W. Simpson

Daydreamer

October 1992

PPP Authentication Protocols

Status of this Memo

This RFC specifies an IAB standards track protocol for the Internet

community, and requests discussion and suggestions for improvements.

Please refer to the current edition of the "IAB Official Protocol

Standards" for the standardization state and status of this protocol.

Distribution of this memo is unlimited.

Abstract

The Point-to-Point Protocol (PPP) [1] provides a standard method of

encapsulating Network Layer protocol information over point-to-point

links. PPP also defines an extensible Link Control Protocol, which

allows negotiation of an Authentication Protocol for authenticating

its peer before allowing Network Layer protocols to transmit over the

link.

This document defines two protocols for Authentication: the Password

Authentication Protocol and the Challenge-Handshake Authentication

Protocol. This memo is the product of the Point-to-Point Protocol

Working Group of the Internet Engineering Task Force (IETF).

Comments on this memo should be submitted to the ietf-ppp@ucdavis.edu

mailing list.

Table of Contents

1. Introduction ............................................... 2

1.1 Specification Requirements ................................. 2

1.2 Terminology ................................................ 3

2. Password Authentication Protocol ............................ 3

2.1 Configuration Option Format ................................ 4

2.2 Packet Format .............................................. 5

2.2.1 Authenticate-Request ..................................... 5

2.2.2 Authenticate-Ack and Authenticate-Nak .................... 7

3. Challenge-Handshake Authentication Protocol.................. 8

3.1 Configuration Option Format ................................ 9

3.2 Packet Format .............................................. 10

3.2.1 Challenge and Response ................................... 11

3.2.2 Success and Failure ...................................... 13

SECURITY CONSIDERATIONS ........................................ 14

REFERENCES ..................................................... 15

ACKNOWLEDGEMENTS ............................................... 16

CHAIR'S ADDRE...