next up previous contents
Next: Encryption option Up: Authentication option Previous: Sub-option command meanings

Example

This section describes the negotiation and sub-negotiation of an authentication procedure. Please refer to figure 3.2 while reading this.

   figure270
Figure 3.2: Typical PGP authentication procedure

1a),2a)
Initial negotiation to use the AUTHENTICATION option.
2b)
The sub-negotiation then begin as the server sends the list of supported authentication types. This server prefers one-way client to server authentication, but is also willing to do mutual authentication where the client sends its authentication information first.
1b,1c)
The client picks an authentication type and sends the name of the user it wants to log in as and the selected authentication type. These two messages may be sent in any order.
2c)
The server then sends the challenge, which the client must include in the authentication information.
1d)
Now the client builds the PGP authentication information and sends it.
2d)
For this particular client the server did not have the public key, so it asks for it by sending a QUERYPUBKEY.
1e)
The client responds by sending its public key.
2e)
The server verifies the signature in the authentication information message and any signatures on the public key. As these tests are OK and the owner of the key is granted access it responds with an ACCEPT message.



Asgaut Eng
Wed Apr 10 14:07:30 MET DST 1996