top button
Flag Notify
    Connect to us
      Site Registration

Site Registration

LTE: Difference between PAP and CHAP protocol ?

+1 vote
6,448 views
LTE: Difference between PAP and CHAP protocol ?
posted Mar 24, 2014 by Ganesh Kumar

Share this question
Facebook Share Button Twitter Share Button LinkedIn Share Button

1 Answer

+1 vote

These two protocols are used in PPP, where each system may require its peer to authenticate itself.

When a connection is established, each end can request the other to authenticate itself, regardless of whether it is the caller or the callee. A PPP daemon can ask its peer for authentication by sending yet another LCP configuration request identifying the desired authentication protocol.

Password Authentication Protocol (PAP) is a simple authentication protocol in which the user name and password is sent to the remote access server in a plaintext (unencrypted) form. Using PAP is strongly discouraged because your passwords are easily readable from the Point-to-Point Protocol (PPP) packets exchanged during the authentication process. PAP is typically used only when connecting to older UNIX-based remote access servers that do not support more secure authentication protocols.

Challenge Handshake Authentication Protocol (CHAP) is a widely supported authentication method in which a representation of the user's password, rather than the password itself, is sent during the authentication process. With CHAP, the remote access server sends a challenge to the remote access client. The remote access client uses a hash algorithm (also known as a hash function) to compute a Message Digest-5 (MD5) hash result based on the challenge and a hash result computed from the user's password. The remote access client sends the MD5 hash result to the remote access server. The remote access server, which also has access to the hash result of the user's password, performs the same calculation using the hash algorithm and compares the result to the one sent by the client. If the results match, the credentials of the remote access client are considered authentic. A hash algorithm provides one-way encryption, which means that calculating the hash result for a data block is easy, but determining the original data block from the hash result is mathematically in-feasible.

answer Mar 24, 2014 by Salil Agrawal
Similar Questions
+3 votes

Is there any way to implement fast path for the data passing through PGW ?

+2 votes

Can someone point out the difference between SGW initiated and PGW initiated dedicated bearer?

+1 vote

Here assumption is PGW serves both the APN and UE will get IP addresses for both the default bearers using the DHCP server.
I am not sure, DHCP messages for both the PDNs will be transmitted using the first default bearer or DHCP messages for each PDN will use its associated default bearer.
Case 1 :
IP addresses for both the APN assigned by same DHCP server

Case 2:
IP address for each APN assigned by different DHCP server.

In both the cases, I want to know how PGW will deal with DHCP message and also on what basis a particular IP will be associated with a default bearer at UE if its uses same default bearer for the DHCP message exchange.

+1 vote

GTP tunnel id is a 32-bit long value over one IP address combination. Suppose there are two nodes A and B which has IP addresses X and Y respectively. Is it possible when first GTP tunnel id range gets exhausted then both the nodes starts using different IP address combination and again GTP tunnel id range can be re-used ? If it is impossible then what could be the reason ?

+2 votes

Question 1.

In case 3 different bearers ( 1 Default + 1 dedicated for Youtube + 1 dedicated for Skype ) are established and after some time the Youtube Policy is removed from GGSN then will the established bearer will be terminated?

Question 2.

Suppose there is a requirement of giving the same QOS to set of application ( Youtube and Whatsapp ) then will there be only one dedicated bearer for both application or two dedicated bearers will be established? If one bearer is established for both the application then what if the user stops using one of the applications or the policy is removed from GGSN for one application, will the dedicated bearer be terminated?

...