I'm not sure it would help you to know how the Master Keys are generated or encoded - it's not simple.

It's a process involving the accumulated TLS handshake messages, random number generation, various sorts of key exchanges, cryptographic hashes, and the PRF function described in the TLS RFC's. Not really casual reading.

TTLS and TLS use different TLS PRF (Pseudo-Random Function) labels to generate the key material. The MMPE RFC 3079 describes the generation of the master MPPE keys from the PRF and how the supplicant should use them. Some of us find this casual reading :)

Encoding attribute data is done using a salt encoding described in RFC 2548 with a Microsoft modification described in some MPPE RFC.

The 'code' is scattered throughout the FR rlm source (those dealing with TLS and the many mschap's) and in the separate OpenSSL source dealing with SSL/TLS.

However, in FR, it just automagically works.

Khan Ferdous Wahid wrote:
Hi,
I want to know about the Master key (MK) encapsulation and Pairwise Master key (PMK) generation during EAP-TLS or EAP-TTLS methods. When the supplicant is authenticated, the server generates a MK and sends it in encrypted format to the supplicant. How this MK (I think it is a random number) is encrypted? Which algorithm is used and which parameters are included (input) to disguise the MK? Then how the PMK is generated independently inside server and supplicant? What algorithm and parameters are used to cryptically pass the PMK to authenticator (Access point)? Please tell me clearly because I am a newbie. Which source codes include these operations, where should I look?

Thank you.

/Khan


------------------------------------------------------------------------

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to