Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Password Authentication Protocol

From Wikipedia, the free encyclopedia
(Redirected fromPassword authentication protocol)

Password Authentication Protocol (PAP) is apassword-basedauthentication protocol used byPoint-to-Point Protocol (PPP) to validate users.[1] PAP is specified inRFC 1334.

Almost allnetwork operating systems support PPP with PAP, as do mostnetwork access servers. PAP is also used inPPPoE, for authenticating DSL users.

As thePoint-to-Point Protocol (PPP) sends data unencrypted and "in the clear", PAP is vulnerable to any attacker who can observe the PPP session. An attacker can see the users name, password, and any other information associated with the PPP session. Some additional security can be gained on the PPP link by usingCHAP orEAP. However, there are always tradeoffs when choosing an authentication method, and there is no single answer for which is more secure.

When PAP is used in PPP, it is considered a weak authentication scheme. Weak schemes are simpler and have lightercomputational overhead than more complex schemes, such asTransport Layer Security (TLS), but they are much more vulnerable to attack. Weak schemes are used where the transport layer is expected to be physically secure, such as a homeDSL link. Where the transport layer is not physically secure a system such as TLS orInternet Protocol Security (IPsec) is used instead.

Other uses of PAP

[edit]

PAP is also used to describe password authentication in other protocols such asRADIUS andDiameter. However, those protocols provide for transport or network layer security, and therefore that usage of PAP does not have the security issues seen when PAP is used with PPP.

Benefits of PAP

[edit]

When the client sends a clear-text password, the authentication server will receive it, and compare it to a "known good" password. Since the authentication server has received the password in clear-text, theformat of the stored password can be chosen to be secure "at rest". If an attacker were to steal the entire database of passwords, it is computationally infeasible to reverse the function to recover a plaintext password.

As a result, while PAP passwords are less secure when sent over a PPP link, they allow for more secure storage "at rest" than with other methods such asCHAP.

Working cycle

[edit]

PAP authentication is only done at the time of the initial link establishment, and verifies the identity of the client using atwo-way handshake.

  1. Client sends username and password. This is sent repeatedly until a response is received from the server.
  2. Server sends authentication-ack (if credentials are OK) or authentication-nak (otherwise)[2]

PAP packets

[edit]

Description

1 byte1 byte2 bytes1 byteVariable1 byteVariable
Authentication-requestCode = 1IDLengthUsername lengthUsernamePassword lengthPassword
Authentication-ackCode = 2IDLengthMessage lengthMessage
Authentication-nakCode = 3IDLengthMessage lengthMessage

PAP packet embedded in a PPP frame. The protocol field has a value ofC023 (hex).

FlagAddressControlProtocol (C023 (hex))Payload (table above)FCSFlag

See also

[edit]

Notes

[edit]
  1. ^"Password Authentication Protocol (PAP)".GeeksforGeeks. 2018-07-17. Retrieved2020-11-08.
  2. ^Forouzan (2007).Data Commn & Networking 4E Sie. McGraw-Hill Education (India) Pvt Limited. pp. 352–.ISBN 978-0-07-063414-5. Retrieved24 November 2012.

References

[edit]
Authentication
APIs
Authentication
protocols
Retrieved from "https://en.wikipedia.org/w/index.php?title=Password_Authentication_Protocol&oldid=1282711323"
Categories:

[8]ページ先頭

©2009-2026 Movatter.jp