Claims
- 1. A method for an IP host to authenticate to an IP network, comprising the steps of:
(a) receiving a DHCP_DISCOVERY message from the IP host, the DHCP_DISCOVERY message including an option specifying at least one of a host-to-network authentication method, network-to-host authentication method, key exchange algorithm, and encryption algorithm; (b) sending the IP host a DHCP_OFFER message including an option confirming at least one of the host-to-network authentication method, network-to-host authentication method, key exchange algorithm, and encryption algorithm, wherein the DHCP_OFFER message does not allocate an IP address to the IP host; (c) receiving a DHCP_REQUEST message including authentication credentials II for the IP host; and (d) sending a DHCP_ACK message to the IP host.
- 2. The method recited in claim 1, wherein the DHCP_DISCOVERY message includes a NETWORK_AUTH option containing a challenge number A and D-H key exchange triplet <g, P, X>, where, X=gx mod P; x is a random secret generated by a server on the network; g is a generator; P is a prime number yielding P=2Q+1; and Q is a prime number.
- 3. The method recited in claim 1, wherein the DHCP_REQUEST message includes a HOST_AUTH option including at least one of a wireless host identifier, a challenge number B, a D-H key exchange parameter Y, where Y=gy mod P and y is a random secret generated by the IP host.
- 4. The method recited in claim 3, further comprising the step of calculating a session key K=Yx mod P.
- 5. The method recited in claim 3, wherein the DHCP_ACK message includes a NETWORK_AUTH option comprising B∥Es(B).
- 6. The method recited in claim 3, wherein the DHCP_ACK message includes a NETWORK_FINISH option comprising EK(“SRVR”).
- 7. The method recited in claim 3, wherein the DHCP_ACK message includes a NETWORK_CONFIG option with network configuration parameters comprising at least one of an assigned IP address, subnet mask, default gateway router IP address.
- 8. A method for a first IP host to authenticate to a second IP host on the same link of an IP network, comprising the steps of:
(a) sending a DHCP_INFORM message including an option specifying the IP address of the second IP host; (b) receiving a DHCP_ACK message including an option containing a security token for establishing a secure data channel between the first and second IP hosts; (c) broadcasting an ARP request message including an option containing authentication credentials derived from the security token; and (d) receiving an ARP response message.
- 9. The method recited in 8, wherein a secure IP access server on the IP network receives a request for a security token from the initiating IP host.
- 10. The method recited in 8, wherein the security token is a Kerboros ticket.
- 11. A method for a secure IP access server to authenticate an IP host using a backend authentication server, comprising the steps of:
(a) receiving a DHCP_DISCOVER message with a HOST_HELLO option; (b) sending a DHCP_OFFER message with a NETWORK_HELLO option, a challenge nonce, and at least one key-exchange parameter; (c) receiving a DHCP_REQUEST message with a response to the challenge and the at least one key exchange parameter; (d) sending the challenge and response to an authentication server; (e) receiving an authentication_accept or an authentication_reject decision; (f) sending a DHCP_ACK message with Ek(“SRVR”) if authentication is accepted or a DHCP_NACK message if authentication is rejected; and (g) receiving a unicast gratuitous ARP message comprising Ek(“CLNT”);
- 12. The method recited in claim 11, wherein the HOST_HELLO option requests using a lightweight authentication protocol.
- 13. The method recited in claim 11, wherein the NETWORK_AUTH option contains a one-time challenge number A and D-H key exchange triplet <g, P, X>, where, X=gx mod P; x is a random secret generated by the secure IP access server; g is a generator; P is a prime number yielding P=2Q+1; and Q is a prime number.
- 14. The method recited in claim 11, wherein the DHCP_REQUEST message includes at least one of an IP host identifier, a challenge number B, a D-H key exchange parameter Y, where Y=gy mod P and y is a random secret generated by the IP host.
- 15. The method recited in claim 12, further comprising the step of calculating a session key K=Yx mod P.
- 16. The method recited in claim 12, wherein the DHCP_ACK message includes a NETWORK_AUTH option comprising B∥Es(B).
Parent Case Info
[0001] The present application claims priority to Provisional U.S. Appl. Serial No. 60/339,956, filed Dec. 12, 2001, entitled A CONFIDENTIAL IP ACCESS PROTOCOL FRAMEWORK AND SUPPORTING NETWORK ARCHITECTURE, the disclosure of which is hereby incorporated herein.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60339956 |
Dec 2001 |
US |