CORD : Test Plan - EAP TLS Authentication using Radius

IDTitleFunction NameTest StepsExpected Result
Auth_1Verify EAP-MD5 authenticationtest_eap_md51. Send EAPOL start message from the client. 2. Send EAP response with identity. 3. Send EAP response with MD5 challenge1. Got EAP Request for identity. 2. Got EAP request for MD5 challenge. 3. EAP success message should be seen.
Auth_2Verify EAP-MD5 authentication with wrong passwordtest_eap_md5_wrg_password1. Send EAPOL start message from the client. 2. Send EAP response. 3. Send EAP response with MD5 challenge with wrong password1. Got EAP Request for identity. 2. Got EAP request for MD5 challenge. 3. EAP failure message should be seen.
Auth_3Verify EAP-MD5 authentication with wrong challenge 1. Send EAPOL start message from the client. 2. Send EAP response. 3. Send EAP response with MD5 challenge with wrong challenge1. Got EAP Request for identity. 2. Got EAP request for MD5 challenge. 3. EAP failure message should be seen.
Auth_4Verify EAP-TLS authenticationtest_eap_tls1. Send EAPOL start message from the client. 2. Send EAP response with identity. 3. Send Client Hello TLS payload . 4. Send Client Hello TLS Certificate. 5. Send Client TLS Finished1. Got EAP Request for identity. 2. Got hello request for id. 3. Got cert request. 4. Got change cipher request from server 5. EAP-TLS success message should be seen.
Auth_5Verify EAP-TLS authentication with empty TLS client certificationtest_eap_tls_noCrt1. Send EAPOL start message from the client 2. Send EAP response with identity. 3. Send Client Hello TLS payload . 4. Send an empty Client Hello TLS Certificate1. Got EAP Request for identity. 2. Got hello request for id. 3. Got cert request. 4. Access reject message should be seen from ONOS or socket should get timed out.
Auth_6Verify EAP-TLS authentication with Invalid client certificationtest_eap_tls_InvalidCrt1. Send EAPOL start message from the client . 2. Send EAP response with identity. 3. Send Client Hello TLS payload . 4. Send an invalid Client Hello TLS Certificate1. Got EAP Request for identity. 2. Got hello request for id. 3. Got cert request. 4. Access reject message should be seen from ONOS or socket should get timed out.
Auth_7Verify EAP-TLS authentication with self signed client certificationtest_eap_tls_Self_Signed_Crt1. Send EAPOL start message from the client . 2. Send EAP response with identity. 3. Send Client Hello TLS payload . 4. Send Self signed Client Hello TLS Certificate.1. Got EAP Request for identity. 2. Got hello request for id. 3. Got cert request. 4. Access reject message should be seen from ONOS or socket should get timed out.
Auth_8Verify EAP-TLS authentication with 2 RGs having the same valid TLS certificatetest_eap_tls_2RGs_SameValid_Crt1.Let one RG start with EAPOL message using the valid TLS certificate. 2. Let 2nd RG start with EAPOL message using the same TLS certificate.Access reject message should be seen from ONOS or socket should get timed out.
Auth_9Verify tls authentication fails with invalid session idtest_eap_tls_invalid_session_id1. Initiate tls authentication process with invalid session idAuthentication should get fail
Auth_10Verify random gmt_unit_time field in tls hellotest_eap_tls_random_gmt_unix_timeInitiate tla authentication process with gmt_unix_time value set to random valueAuthentication should get success if gmt_unix_time in within range
Auth_11Verify authentication with invalid content type in tls hellotest_eap_tls_invalid_content_typeInitiate tls authentication with invalid content type in tls helloAuthentication should get failed
Auth_12Verify tls authentication with invalid fragment length field in tls record packettest_eap_tls_invalid_record_fragment_lengthInitiate tls authentication process with invalid fragment length in tls recordAuthentication should get failed
Auth_13Verify tls authentication with invalid id in identifier response packettest_eap_tls_with_invalid_id_in_identifier_response_packetInitiate tls authentication process with invalid id in identifier response packetAuthentication should get failed
Auth_14Verify tls authentication with invalid id in client hello packettest_eap_tls_with_invalid_id_in_client_hello_packetInitiate tls authentication process with invalid id in client hello packetAuthentication should get failed
Auth_15Verify tls authentication without sending client hello packettest_eap_tls_without_sending_client_helloInitiate tls authentication without sending client hello packetAuthentication should get failed
Auth_16Verify tls authentication with app deactivatedtest_eap_tls_aaa_app_deactivateInitiate tls authentication with app deactivationAuthentication should get failed
Auth_17Verify tls authentication with incorrect cipher suite length fieldtest_eap_tls_incorrect_cipher_suite_length_fieldInitiate tls authentication with invalid cipher suite length fieldAuthentication should get failed
Auth_18Verify tls authentication with incorrect compression method field length in tls hellotest_eap_tls_incorrect_compression_methods_length_fieldInitiate tls authentication with incorrect compression length field in tls helloAuthentication should get failed
Auth_19Verify tls authentication with broadcast source mactest_eap_tls_invalid_source_mac_broadcastInitiate tls authentication process with client mac broadcastAuthentication should get failed
Auth_20Verify tls authentication with multicast source mactest_eap_tls_invalid_source_mac_multicastInitiate tls authentication process with client mac multicastAuthentication should get failed
Auth_21Verify tls authentication with all 0’s source mactest_eap_tls_invalid_source_mac_zeroInitiate tls authentication process with client mac all 0’sAuthentication should get failed
Auth_22Verify tls authentication if radius server restarts in middle of auth processtest_eap_tls_restart_radius_serverInitiate tls authentication process and restart radius server in middle of auth processAuthentication should get failed
Auth_23Verify tls authentication with incorrect tls hello handshake typetest_eap_tls_with_incorrect_handshake_type_client_helloInitiate tls authentication process with incorrect hello handshake typeAuthentication should get failed
Auth_24Verify tls authentication with incorrect tls hello handshake type certificate requesttest_eap_tls_with_incorrect_handshake_type_certificate_requestInitiate tls authentication process with incorrect hello handshake typeAuthentication should get failed
Auth_25Verify tls authentication with incorrect tls hello tls record certificate requesttest_eap_tls_with_incorrect_tlsrecord_certificate_requestInitiate tls authentication process with incorrect tls record certificate requestAuthentication should get failed
Auth_26Verify tls authentication with invalid handshake length in client hellotest_eap_tls_invalid_handshake_length_client_helloInitiate tls authentication with invalid handshake length in client helloAuthentication should get failed
Auth_27Verify tls authentication with client key exchange with server key exchangetest_eap_tls_clientkeyex_replace_with_serverkeyexInitiate tls authentication process with client key exchange replaced with server key exchangeAuthentication should get failed
Auth_28Verify tls authentication for 1000 userstest_eap_tls_1k_with_diff_macInitiate tls authentication for 1000 clientsAuthentication should get success for all 1000 clients
Auth_29Verify tls authentication for 5000 clientstest_eap_tls_5k_with_diff_macInitiate tls authentication for 5000 clientsAuthentication should get success for all 5000 clients