|
|||
Part I Network Services Topics Part II Accessing Network File Systems Topics 4. Managing Network File Systems (Overview) 5. Network File System Administration (Tasks) 6. Accessing Network File Systems (Reference) 8. Planning and Enabling SLP (Tasks) 10. Incorporating Legacy Services Part V Serial Networking Topics 15. Solaris PPP 4.0 (Overview) 16. Planning for the PPP Link (Tasks) 17. Setting Up a Dial-up PPP Link (Tasks) 18. Setting Up a Leased-Line PPP Link (Tasks) 19. Setting Up PPP Authentication (Tasks) 20. Setting Up a PPPoE Tunnel (Tasks) 21. Fixing Common PPP Problems (Tasks) 22. Solaris PPP 4.0 (Reference) Using PPP Options in Files and on the Command Line Configuring User-Specific Options Specifying Information for Communicating With the Dial-in Server Configuring Modem Speed for a Dial-up Link Defining the Conversation on the Dial-up Link How to Invoke a Chat Script (Task) How to Create an Executable Chat Program Creating an IP Addressing Scheme for Callers Creating PPPoE Tunnels for DSL Support 23. Migrating From Asynchronous Solaris PPP to Solaris PPP 4.0 (Tasks) 25. Administering UUCP (Tasks) Part VI Working With Remote Systems Topics 27. Working With Remote Systems (Overview) 28. Administering the FTP Server (Tasks) 29. Accessing Remote Systems (Tasks) Part VII Monitoring Network Services Topics |
Authenticating Callers on a LinkThis section explains how the PPP authentication protocols work and explains the databases that are associated with the authentication protocols. Password Authentication Protocol (PAP)PAP authentication is somewhat similar in operation to the UNIX login program, though PAP does not grant shell access to the user. PAP uses the PPP configuration files and PAP database in the form of the /etc/ppp/pap-secrets file for setting up authentication. PAP also uses /etc/ppp/pap-secrets for defining PAP security credentials. These credentials include a peer name, a “user name” in PAP parlance, and a password. PAP credentials also contain related information for each caller who is permitted to link to the local machine. The PAP user names and passwords can be identical to or different from the UNIX user names and passwords in the password database. /etc/ppp/pap-secrets FileThe PAP database is implemented in the /etc/ppp/pap-secrets file. Machines on both sides of the PPP link must have properly configured PAP credentials in their /etc/ppp/pap-secrets files for successful authentication. The caller (authenticatee) supplies credentials in the user and password columns of the /etc/ppp/pap-secrets file or in the obsolete +ua file. The server (authenticator) validates these credentials against information in /etc/ppp/pap-secrets, through the UNIX passwd database, or in the PAM facility. The /etc/ppp/pap-secrets file has the following syntax. myclient ISP-server mypassword * The parameters have the following meaning.
Creating PAP PasswordsPAP passwords are sent over the link in the clear, that is, in readable ASCII format. For the caller (authenticatee), the PAP password must be stored in the clear in any of the following locations:
On the server (authenticator), the PAP password can be hidden by doing one of the following:
What Happens During PAP AuthenticationPAP authentication occurs in the following sequence. Figure 22-1 PAP Authentication Process
Using the login Option With /etc/ppp/pap-secretsYou can add the login option for authenticating PAP credentials to any PPP configuration file. When login is specified, for example, in /etc/ppp/options, pppd verifies that the caller's PAP credentials exist in the Solaris password database. The following shows the format of a /etc/ppp/pap-secrets file with the login option. joe * "" * sally * "" * sue * "" * The parameters have the following meanings.
Challenge-Handshake Authentication Protocol (CHAP)CHAP authentication uses the notion of the challenge and response, which means that the peer (authenticator) challenges the caller (authenticatee) to prove its identity. The challenge includes a random number and a unique ID that is generated by the authenticator. The caller must use the ID, random number, and its CHAP security credentials to generate the proper response (handshake) to send to the peer. CHAP security credentials include a CHAP user name and a CHAP “secret.” The CHAP secret is an arbitrary string that is known to both the caller and the peer before they negotiate a PPP link. You configure CHAP security credentials in the CHAP database, /etc/ppp/chap-secrets. /etc/ppp/chap-secrets FileThe CHAP database is implemented in the /etc/ppp/chap-secrets file. Machines on both sides of the PPP link must have each others' CHAP credentials in their /etc/ppp/chap-secrets files for successful authentication. Note - Unlike PAP, the shared secret must be in the clear on both peers. You cannot use crypt, PAM, or the PPP login option with CHAP. The /etc/ppp/chap-secrets file has the following syntax. myclient myserver secret5748 * The parameters have the following meanings:
What Happens During CHAP AuthenticationCHAP authentication occurs in the following sequence. Figure 22-2 CHAP Authentication Sequence
|
||
|