Background technology
It is one that DynamicHost arranges agreement (Dynamic Host Configuration Protocol, DHCP)
Individual develop procotol from BOOTP agreement, for main frame dynamic IP address allocation and other relevant letter
Breath.DHCP uses customer end/server mode dhcp client to be used for proposing configuring request, Dynamic Host Configuration Protocol server
Configuration information, all of DHCP is returned according to predetermined policy to dhcp client in response to described configuring request
Message all uses user datagram protocol (User Datagram Protocol, UDP) to encapsulate.
DHCP monitors (DHCP Snooping) function and refers to that switch monitoring dhcp client passes through DHCP protocol
Obtain the process of IP.It is by arranging trusted port and untrusted port, prevents DHCP from attacking and setting up illegally
Dynamic Host Configuration Protocol server.The DHCP message received from trusted port can forward without verification.Typical arrange be by
Trusted port connects Dynamic Host Configuration Protocol server or dhcp relay agent (DHCP RELAY).Untrusted port connects
Dhcp client, switch will forward from untrusted port receive DHCP request message, do not forward from non-can
The DHCP back message that letter port receives.
Automatic tunnel addressing protocol (Intra-Site Automatic Tunnel Addressing in standing
Protocol, ISATAP) it is that a kind of address is distributed and host-to-host, main frame to router and router are to main
The automatic tunnel technology of machine, it is the clean culture IPv6 providing between IPv6 main frame and crossing over IPv4 internal network
Connective.The internodal communication of IPv6/IPv4 that ISATAP is generally used in IPv4 network.ISATAP makes
By the interface identifier of local management:: 0:5EFE:w.x.y.z, wherein: 0:5EFE part is by internet numbers
Fixing mechanism unit identifier (00-00-5E) and expression that distributing center (IANA) is distributed are embedded
The style number (FE) of IPv4 address style combines.W.x.y.z part is arbitrary clean culture IPv4 ground
Location, both can be private address, it is also possible to be public address.The 64 of any effective IPv6 unicast address
Position prefix can combine with ISATAP interface identifier and form ISATAP address, and described prefix includes chain
Road home address prefix (FE80: :/64), global prefix (including 6to4 prefix) and website this locality prefix.
IPv6/IPv4 dual stack main frame (at rear abbreviation dual stack main frame) with other main frames or router
Before communication, first have to obtain an ISATAP address.Dual stack main frame is first sent out to ISATAP server
Send route requests, obtain the IPv6 address prefix of 64, then add the interface identifier of 64
:: the 0:5EFE:X.X.X.X IPv4 unicast address of dual stack main frame (X.X.X.X here be), so
Just constitute an ISATAP address.After dual stack main frame is configured with ISATAP address, just become one
ISATAP client computer, and then just can communicate with other ISATAP client computer in IPv4 territory.
Meanwhile, Intra-site Automatic Tunnel Addressing Protocol uses very universal at the current IPv6 network application initial stage, and it makes remote double assist
View stack host node can arrive local IPv6 access network router through IPv4 network, obtains IPv6 ground
Location prefix, generates the legal address of local IPv6 network, it is achieved access the purpose of IPv6 network.
Intra-site Automatic Tunnel Addressing Protocol both can be at enterprise network internal implementation, it is also possible to implement in network-external.But ISATAP
As long as tunnel defect be remote double protocol stack host node in IPv4 route up to accessing IPv6 net
The Intra-site Automatic Tunnel Addressing Protocol router address of network, it is not necessary to authentication is obtained with the ground of this IPv6 access network
Location, this is inadequate in safety, and maliciously unauthorized user is easy for borrowing Intra-site Automatic Tunnel Addressing Protocol for jumping
IPv6 network is attacked by plate.
Summary of the invention
It is an object of the invention to provide Intra-site Automatic Tunnel Addressing Protocol authentication method and the system of more safety, with weaving
Maliciously unauthorized user accesses IPv6 network by Intra-site Automatic Tunnel Addressing Protocol.
In the invention discloses a kind of station monitored based on DHCP (DHCP), automatic tunnel is sought
The authentication method in location agreement (ISATAP) tunnel, including:
A, access switch monitor the DHCP request process of IPv4/IPv6 dual stack main frame, and foundation includes
Tying up of the MAC Address of described dual stack main frame, IP address, rental period, VLAN ID and port numbers
Determine information, this binding information is packaged in binding message and is sent to ISATAP router;
B, the dual stack main frame of IPv6 network to be accessed send router solicitation message to ISATAP router,
Request global I Pv6 address prefix;
C, ISATAP router is inquired about according to the dual stack host IP address in described router solicitation message
Binding information determines whether that sending router advertisement informs described pair of protocol host global I Pv6 address prefix.
Preferably, described step A also includes:
Described ISATAP router extracts described binding information, according to described binding from the binding message received
Information is set up and updates binding information table.
Preferably, described step C includes:
After receiving described router solicitation message, route requests message described in ISATAP router authentication
Whether the IPv4 address that IPv6 address, source includes has record at the binding information table of ISATAP router, as
Fruit has, then respond the router advertisement message (Router with IPv6 global address prefix
Advertisement) dual stack host ip v6 global address prefix is informed, if it is not, do not respond,
So that unauthorized remote double protocol stack main frame cannot obtain IPv6 address by ISATAP router,
IPv6 network can not be accessed.
Preferably, described step A includes:
Set up after the DHCP request message of A01, access switch intercepting and capturing dual stack main frame and include this pair of agreement
The interim binding of the MAC Address of stack main frame, access interface and VLAN ID;
A02, access switch are intercepted and captured and are sent to after the DHCP response message of dual stack main frame according to this message
In the interim binding of MAC Address inquiry extract described DHCP response message IP address and the rental period set up include double
The MAC Address of protocol stack main frame, IP address, rental period, VLAN ID and the binding information of port numbers;
After A03, access switch create and preserve binding information, binding information is encapsulated in binding message,
According to the ISATAP router address being pre-configured with, binding information is sent to ISATAP router;
A04, ISATAP router receives binding message, extracts binding information and preserve from described binding message
In local binding information table.
Preferably, described binding message is encrypted and hashes by access switch described in described step A03
Send to ISATAP router again after process.
Preferably, described encryption is des encryption, and described hashing is MD5 hashing.
The invention also discloses automatic tunnel in a kind of station monitored based on DHCP (DHCP)
Addressing protocol (ISATAP) tunnel authentication system, described system include dual stack main frame, access switch,
Dynamic Host Configuration Protocol server and ISATAP router, wherein:
Described dual stack main frame is for Dynamic Host Configuration Protocol server request IPv4 address and accessing IPv6 net at needs
Router solicitation is sent to ask global I Pv6 address prefix to described ISATAP router during network;
Described access switch, for monitoring the DHCP request process of IPv4/IPv6 dual stack main frame, is set up
MAC Address, IP address, rental period, VLAN ID and port numbers including described dual stack main frame
Binding information, this binding information is packaged in binding message in be sent to ISATAP router;
Described Dynamic Host Configuration Protocol server is for the request in response to described dual stack main frame, to described dual stack master
Machine distribution IPv4 address;
Described ISATAP router is for according to the dual stack host ip ground in described router solicitation message
Before location inquiry binding information determines whether that sending router advertisement informs described pair of protocol host global I Pv6 address
Sew.
Preferably, described ISATAP router extracts described binding information from the binding message received, according to
Described binding information is set up and updates binding information table.
Preferably, after receiving described router solicitation message, described in ISATAP router authentication, route please
IPv4 address that the IPv6 address, source of message includes is asked whether to have at the binding information table of ISATAP router
Record, if it has, then respond the router advertisement message (Router with IPv6 global address prefix
Advertisement) dual stack host ip v6 global address prefix is informed, if it is not, do not respond,
So that unauthorized remote double protocol stack main frame cannot obtain IPv6 address by ISATAP router,
IPv6 network can not be accessed.
The present invention believes by monitoring the binding of DHCP request Procedure Acquisition dual stack main frame at access switch
Breath, and binding information is uploaded the preservation of ISATAP router so that ISATAP router is receiving double association
When discussing the routing information request of stack main frame, it is possible to access IPv6 network according to request described in binding information list deciding
The legitimacy of main frame, thus avoid the disparate networks carried out as springboard and attack.
Detailed description of the invention
Further illustrate technical scheme below in conjunction with the accompanying drawings and by detailed description of the invention.
Fig. 1 is that the structure of the Verification System of the Intra-site Automatic Tunnel Addressing Protocol based on DHCP monitoring of the embodiment of the present invention is shown
It is intended to.As it is shown in figure 1, described system includes dual stack main frame based on the connection of IPv4 network, accesses and hand over
Change planes, Dynamic Host Configuration Protocol server and for make dual stack main frame access IPv6 network ISATAP router,
Wherein dual stack main frame is connected to access switch, and access switch is by IPv4 network and ISATAP road
Connected by device and Dynamic Host Configuration Protocol server, connect IPv4 and IPv6 network.
In the system, described access switch includes that DHCP monitors binding module, and described DHCP monitors
Binding module, for monitoring the DHCP request process of dual stack main frame, is set up and is included described dual stack main frame
MAC Address, IP address, rental period, VLAN ID (VLAN ID) and the binding information of port numbers,
This binding information is packaged in binding message and is sent to ISATAP router.
When dual stack main frame is wished from IPv4 network insertion IPv6 network, dual stack main frame generates ISTAP
Address, i.e. according to its IPv4 address w.x.y.z generation interface identifier:: 0:5EFE:w.x.y.z, then add
Upper link-local prefix fe80 to the ISTAP address fe80::0:5EFE:w.x.y.z of self, be consequently formed with
IPv6 between ISATAP router connects.
If IPv6 network to be accessed, then dual stack main frame needs to obtain the IPv6 address prefix of the overall situation,
Therefore dual stack main frame needs to send router solicitation message (Router to described ISATAP router
Solicitation) request ISATAP router informs global I Pv6 address prefix.
ISATAP router is set up and continuous updating binding information table according to the binding information in binding message.?
After receiving the router solicitation message that described dual stack main frame sends, road described in ISATAP router authentication
By the IPv4 address x.y.z.w contained in IPv6 address, the source fe80::5efe:x.y.z.w of request message it is
The no binding table at ISATAP router has record, if it has, then respond the route with global address prefix
Device advertisement message (Router Advertisement) informs dual stack host ip v6 global address prefix,
If it is not, do not respond, such unauthorized remote double protocol stack main frame cannot pass through ISATAP router
Obtain IPv6 address, it is impossible to access IPv6 network.
Fig. 2 shows the side of the authentication method of the Intra-site Automatic Tunnel Addressing Protocol based on DHCP monitoring of the embodiment of the present invention
Method flow chart.As in figure 2 it is shown, described method comprises the steps:
Step 100, access switch monitor the DHCP request process of dual stack main frame, set up described in including
The MAC Address of dual stack main frame, IP address, rental period, VLAN ID (VLAN ID) and port
Number binding information.This binding information is packaged in binding message and is sent to ISATAP router.ISATAP
Router is set up and continuous updating binding information table according to the binding information in binding message.
Specifically, access switch enables DHCP and monitors module, trusted port is set, and configuration connects
Receive the IP address of the ISATAP router of binding information, the interface of ISATAP router enables ISATAP tunnel
Road authentication module.
The DHCP monitoring module of access switch issues DHCP message and is redirected to switch DHCP monitoring module
Rule to exchange chip, after switch exchange chip receives DHCP message, do not perform hardware forward behavior,
But message redirecting to switch DHCP is monitored module.
Access switch monitors the DHCP request process of dual stack main frame, concrete mistake by DHCP
Journey is as follows:
101, after the DHCP of access switch monitors the DHCP request message that module intercepts and captures dual stack main frame,
Binding table is inquired about, if this MAC exists in binding table, from the trusted port being pre-configured with according to source MAC
Forward;Otherwise, exchange opportunity creates an interim binding, records the MAC of described main frame, port and VLAN
ID, forwards from the trusted port being pre-configured with.
102, the DHCP of access switch monitors module and intercepts and captures the DHCP response message (DHCP ACK) of user
After, bind according to the chaddr Field Inquiry in message temporarily, if there is same subscriber MAC in interim binding,
Then create a binding information, according to the IP address of distribution in described interim binding and described DHCP response message
The MAC Address of described dual stack main frame, IP address, rental period, vlan number and port numbers is recorded with the rental period.
103, after access switch creates and preserves binding information, binding information is encapsulated in binding message,
And binding message is encrypted and hashing, according to the ISATAP road receiving binding information being pre-configured with
By the IP address of device, binding information is sent to ISATAP router;
Binding information is joined in binding message, relay to ISATAP router.Switch and ISATAP
Binding message between router utilizes udp protocol to carry, and its message format is as it is shown on figure 3, each field solution
Release as follows:
Version: version number, is 1 at present
Type: type, is 1 at present, represents and comprises binding information
SeqNo: serial number, often sends a message, adds 1
SecretLen: the length of encrypted message
The MD5 hashed result of the Signature:DHCP SNOOPING binding all fields of message
The IP address of SwitchIPAddr: switch
SwitchID: switch ID, take switch CPU MAC Address
Count: binding quantity
ClientMAC: rent the PC terminal MAC address of address
Reserved: retain, fill out 0
The VLAN ID of ClientVlanId:DHCP user's access switch
The switch ports themselves number at PortNum:DHCP user place
ClientIP: IP address
ClientMask: address mask
ClientGateway: gateway parameter
ClientLease:DHCP address lease
BindingTimeStamp: the timestamp of distribution address
In order to prevent user profile from revealing and transmitting procedure be maliciously tampered, binding message can be carried out
Encryption and hashing, encryption and hashing select des encryption and MD5 hash in embodiments of the present invention
Processing, DES key is configured by user, and access switch must assure that consistent with the key of ISATAP router.
Send before message, be first encrypted, after carry out hashing, detailed process is as follows:
From SwitchIPAddr field, until the message content of ending carries out des encryption, ciphertext with
The most isometric, ciphertext puts into the message that in DHCP SNOOPING binding message, SwitchIPAddr field starts
Region, ciphertext length is placed in the SecretLen field of DHCP SNOOPING binding message, then gives scattered
Column processing module.Message is bound for the DHCP SNOOPING after switch des encryption, calculates MD5 and dissipate
During row, Signature field first resets, and then whole message is made hash operations, and Hash operation dissipates after completing
Train value inserts Signature field, and at this moment message can send switch.
104, ISATAP router receives binding message, extracts binding information and preserve from described binding message
In local binding information table.
After receiving binding message, ISATAP router first carries out hash and calculates, then deciphers, and detailed process is as follows:
First backing up the value of signature field during calculating, then signature field resets, then calculates whole
The MD5 hashed value of individual message, if hashed value is as the value of the signature field of backup, then hashes
It is proved to be successful, continues binding message is made DES decryption processing.If Hash verification failure, abandon this binding
Message.For the successful message of MD5 Hash verification received, switch to from Signature field it
Rear position starts, and the message content that length is specified by SecretLen field carries out DES decryption processing, reduction
Come from the binding message content that SwitchIPAddr field starts.
Step 200, the dual stack main frame of IPv6 network to be accessed are asked to ISATAP router transmission router
Seek message, ask global I Pv6 address prefix.
Step 300, receive described dual stack main frame send router solicitation message after, ISATAP
Whether the IPv4 address contained in the IPv6 address, source of route requests message described in router authentication is at ISATAP
The binding information table of router has record, if it has, then respond the router advertisement with global address prefix
Message (Router Advertisement) informs dual stack host ip v6 global address prefix, if do not had
Having, do not respond, such unauthorized remote double protocol stack main frame cannot obtain IPv6 by ISATAP router
Address, it is impossible to access IPv6 network.
The present invention believes by monitoring the binding of DHCP request Procedure Acquisition dual stack main frame at access switch
Breath, and binding information is uploaded the preservation of ISATAP router so that ISATAP router is receiving double association
When discussing the routing information request of stack main frame, it is possible to access IPv6 network according to request described in binding information list deciding
The legitimacy of main frame, thus avoid the disparate networks carried out as springboard and attack.
Above are only presently preferred embodiments of the present invention and institute's application technology principle, any be familiar with the art
Technical staff in the technical scope that the invention discloses, the change that can readily occur in or replacement, all should contain
In protection scope of the present invention.