Joint Research Activity 5 Task Force Mobility



Similar documents
A practical guide to Eduroam

RadSec RADIUS improved. Stig Venaas

Belnet Networking Conference 2013

Case Study - Configuration between NXC2500 and LDAP Server

Using Windows NPS as RADIUS in eduroam

UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU

ClickShare Network Integration

Configuring PEAP / LDAP based authentication using FreeRADIUS on Debian Sarge and Cisco AP1200, with WPA2 AES encryption

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

How To Set Up An Ipa 1X For Aaa On A Ipa 2.1X On A Network With Aaa (Ipa) On A Computer Or Ipa (Ipo) On An Ipo 2.0.1

Connecting to Secure Wireless (iitk-sec) on Fedora

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia 2006 Cisco Systems, Inc. All rights reserved.

FreeRADIUS server. Defining clients Access Points and RADIUS servers

Monitoring of RADIUS Infrastructure Best Practice Document

vwlan External RADIUS 802.1x Authentication

Application Note: Onsight Device VPN Configuration V1.1

freeradius A High Performance, Open Source, Pluggable, Scalable (but somewhat complex) RADIUS Server Aurélien Geron, Wifirst, January 7th 2011

Configuring Wired 802.1x Authentication on Windows Server 2012

A Federated Authorization and Authentication Infrastructure for Unified Single Sign On

Exam Questions SY0-401

Network Access Security It's Broke, Now What? June 15, 2010

Cisco TrustSec How-To Guide: Guest Services

Product Summary RADIUS Servers

Mobility Task Force. Deliverable D. Inventory of 802.1X-based solutions for inter-nrens roaming

IDENTITY MANAGEMENT OF USERS IN eduroam

On-boarding and Provisioning with Cisco Identity Services Engine

Configuring Global Protect SSL VPN with a user-defined port

7.1. Remote Access Connection

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Network Security and AAA

Supported Platforms. Supported Standards, MIBs, and RFCs. Prerequisites. Related Features and Technologies. Related Documents. Improved Server Access

Application Note User Groups

Configuring Timeout, Retransmission, and Key Values Per RADIUS Server

This chapter describes how to set up and manage VPN service in Mac OS X Server.

Evaluation of EAP Authentication Methods in Wired and Wireless Networks

Scenario: IPsec Remote-Access VPN Configuration

Authentication, Authorization and Accounting (AAA) Protocols

Network Access Control and Cloud Security

Interlink Networks Secure.XS and Cisco Wireless Deployment Guide

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

Abstract. Avaya Solution & Interoperability Test Lab

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Sample. Configuring the RADIUS Server Integrated with ProCurve Identity Driven Manager. Contents

Pulse Policy Secure. RADIUS Server Management Guide. Product Release 5.1. Document Revision 1.0. Published:

Security. AAA Identity Management. Premdeep Banga, CCIE # Cisco Press. Vivek Santuka, CCIE # Brandon J. Carroll, CCIE #23837

TrustSec How-To Guide: On-boarding and Provisioning

How To Test An Eap Test On A Network With A Testnet (Networking) On A Pc Or Mac Or Ipnet (For A Network) On An Ipnet Or Ipro (For An Ipro) On Pc Or Ipo

What information will you find in this document?

Lecture 3. WPA and i

2.1.1 This policy and any future changes requires ratification by CAUDIT.

802.1x Networking. tommee pickles Moloch Industries. Moloch.org tommee.net

Cisco on Cisco Best Practices Cisco Wireless LAN Design

1 About eduroam Wired eduroam... 1

AAA & Captive Portal Cloud Service TM and Virtual Appliance

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Step-by-step Guide for Configuring Cisco ACS server as the Radius with an External Windows Database

Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller

Authentication. Authentication in FortiOS. Single Sign-On (SSO)

Cisco TrustSec 3.0 How-To Guide: Introduction to MACSec and NDAC

Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Digital Certificates. July 2011 Revision 1.0

eduroam wireless setup guide for Windows 7, XP and Vista

Switch Configuration Required to Support Cisco ISE Functions

Application Note Secure Enterprise Guest Access August 2004

Deploying and Configuring Polycom Phones in 802.1X Environments

Network Virtualization Network Admission Control Deployment Guide

Secure WiFi Access in Schools and Educational Institutions. WPA2 / 802.1X and Captive Portal based Access Security

Web Authentication Application Note

Wireless Technology Seminar

802.1X Authentication

Using LiveAction with Cisco Secure ACS (TACACS+ Server)

Authentication and Security in IP based Multi Hop Networks

Scenario: Remote-Access VPN Configuration

vcloud Director User's Guide

Network Access Control and Cloud Security

DAMe Deploying Authorization Mechanisms for Federated Services in the eduroam Architecture

Lab Configuring LEAP/EAP using Local RADIUS Authentication

CCT vs. CCENT Skill Set Comparison

Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks

Application Note. Onsight Device Certificate Management

CISCO IOS NETWORK SECURITY (IINS)

Lab a Configure Remote Access Using Cisco Easy VPN

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

VLANs. Application Note

SecureW2 Client for Windows User Guide. Version 3.1

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

802.1x in the Enterprise Network

Wireless security. Any station within range of the RF receives data Two security mechanism

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

Borderware Firewall Server Version 7.1. VPN Authentication Configuration Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved

Transcription:

Joint Research Activity 5 Task Force Mobility Network authentication with Network Roaming with eduroam Stefan Winter <stefan.winter@restena.lu> TREFpunkt 13, Örebro, Sweden 12 Oct 2005 1

Overview Differences to other network admission techniques Message flow in Communication on first hop: EAP Further communication: RADIUS (et al.) End-to-end security NAS-side: configuration examples Client-side: supplicant overview eduroam RADIUS hierarchies (general) The eduroam hierarchy Policies, Participants Future development (TF-Mobility and JRA5) How to join 2

Overview / Differences to other techniques VPN uses ISO/OSI layer 4 (encapsulates payload in UDP or TCP packets)... (higher layers) 4 Transport 3 Network Web-redirection uses layer Link 2 3 (after authentication, IP Physical 1 address gets unrestricted access) Goals: LAN admission control on ISO/OSI layer 2 no IP traffic involved End-to-end security between user device and authentication server Does not enforce a particular authentication mechanism Can impose constraints after authentication and thus provide different service levels on per-user basis 3

the big picture performs authentication insists on authentication grants access when ok wants access to internet authentication credentials travel end-to-end internet 4

Message flow The standard denotes three roles for devices: Supplicant: the end-user device that wants to enter the network Authenticator: the device to which the supplicant is directly connected (Switch, Router or Access Point) Authentication Server: device that can verify the authenticity of the user and/or his supplicant EAP (supplicant) RADIUS (authenticator) (authentication server) 5

Communication at first hop: EAP EAP (Extensible Authentication Protocol) is a container protocol that can carry arbitrary authentication protocols (most well-known for its use in PPP) Supplicant can encapsulate his desired protocol in EAP and send the auth data to the authenticator Data is sent directly on layer 2; therefore, the term EAPoL (EAP over LAN) is used Authentication will only succeed if authentication method is accepted by authentication server(!) When using an auth protocol that encrypts user data, content is opaque to authenticator Q: how does authenticator know of success? 6

Communication at first hop: EAP (2) A: gets meta-info from authentication server (supplicant) [ tart EAPoL-S EAPoL d ata (authenticator) uccess EAPoL-S ] ey [EAPoL-K Derive keys for dynamic encryption encapsu lated EAPoL d ata (authentication server) lated u s p a enc data L o P A E -info a t e m + ] 7

Communication behind authenticator Authenticator is part of network infrastructure, has IP address Can transfer EAP payload in other protocols to authentication server at arbitrary place Protocols suited for that purpose: TACACS+ (Cisco, deprecated) Diameter (in development) RADIUS (most commonly used) server to use must be configured in authenticator (examples for IOS follow) authentication server evaluates encapsulated EAP payload -or- delegates decision to other authentication servers Delegation done via routing hints as part of user names (this is where eduroam comes in) 8

Communication behind authenticator - RADIUS Connection between authenticator and authentication server based on IP address + shared secret (a static trust relationship) RADIUS authentication server validates identity (note: it can easily re-use existing user databases like LDAP, AD, SQL databases, even plain text files) Upon successful authentication, a RADIUS packet Access-Accept is sent, which can be seen by authenticator This packet may contain further information: maximum session time, VLAN for the user, bandwidth restrictions etc. Authenticator evaluates this packet, sets connection parameters and sends the EAP success message to the supplicant 9

Protocols within EAP Common protocols within EAP: EAP-TLS: both supplicant and server validate their identity with certificates EAP-TTLS: server presents certificate, establishes TLS tunnel supplicant uses username+password (PAP) PEAP-MSCHAPv2: similar to EAP-TTLS, but additionally encrypts username+password These protocols provide mutual authentication User authentication Server authentication RADIUS server for university.se tunnel using strong cryptography john.doe@university.se 10

Protocols within EAP TLS and TTLS support more privacy for the user: outer vs. inner identity RADIUS packet User-Name = anonymous@dep1.uni.au EAP payload User-Name = han.solo@dep1.uni.au Password = falcon By checking server certificate, the supplicant can verify to whom he is going to send his credentials checking in this sense means that both the certificate must be valid and the Common Name is really the expected one This requires either well-educated users for proper client configuration or means of enforcing the right configuration 11

End-to-end security Encapsulating EAP in RADIUS in conjunction with TLS ensures that no intermediate hop can look into traffic Supplicant needs to verify the last hop (authentication server): Is server certificate valid? Is it derived from the root CA in charge? Consult an (offline copy of) CRLs? Is the server name (CN) the expected one? (this needs to be user-configured unlike in HTTPS...) Users need to be well educated to configure their supplicant software properly A possible future: provide a branded client that has fixed settings, so users can connect easily 12

NAS-side configuration aaa new-model! aaa group server radius rad_eap server 1.2.3.4 auth-port 1812 acct-port 1813 aaa authentication login eap_methods group rad_eap! radius-server host 1.2.3.4 auth-port 1812 acct-port 1813 key 7 1234...7890! dot11 ssid eduroam vlan 12345 authentication open eap eap_methods authentication network-eap eap_methods accounting default guest-mode! interface Dot11Radio0 encryption vlan 12345 mode ciphers wep128 ssid eduroam 13

Client side: supplicant overview 14

Client side: supplicant overview (2) SecureW2 (Windows) Separates outer and inner identity, features predistributed profiles for easier configuration) MacOS has a built-in supplicant as well (no screenshots, sorry) Command-line applications: Xsupplicant (Linux) wpa_supplicant (Linux, Windows) Commercial supplicants available as well (Example: Funk Odyssey) 15

Resources The standard: http://standards.ieee.org/getieee802/download/802.1x-2004.pdf Supplicants: SecureW2: http://www.securew2.com./ XSupplicant: http://www.open1x.org./ wpa_supplicant: http://hostap.epitest.fi/wpa_supplicant./ Funk Odyssey: http://www.funk.com/radius/wlan/wlan_c_radius.asp RADIUS servers: FreeRADIUS (Open Source): http://www.freeradius.org. Radiator (commercial product): http://www.open.com.au./radiator/index.html 16

eduroam The big picture Researchers all across Europe (ideally: the world) should be able to use each other's networks Currently realised with a hierarchy of RADIUS servers for distributed authentication 17

eduroam The current RADIUS hierarchy global root.de.lu.nl org1.lu org2.lu.au.... uni.au dep1.uni.au dep2.uni.au authenticator1 authenticator2 han.solo@dep1.uni.au 18

eduroam Delegation of auth decision User names indicate path to authoritative authentication server @ acts as a delimiter between user name (han.solo) and realm (dep1.uni.au) RADIUS messages (with encapsulated EAP payload) traverse hierarchy upward to the root and downward to the auth server in charge Again, intermediate hops can not look into encrypted EAP traffic Each level of hierarchy only needs to know the next level no global propagation of auth server pool necessary All connections are statically configured If a lot of traffic exchanged between certain institutions, shortcuts can be made 19

eduroam the non-technical issues Technically, the roaming problem is solved (at least for now, see later slides) Eduroam also addresses non-technical issues: Who can participate? What service levels are granted to roaming users? What if AUPs differ? What happens in a case of network abuse? Per-country legislation? EU legislation? Finally, further development work is done in various areas Find a solution where not all traffic flows through the root server (SPoF) Get away from static connections to allow direct endto-end authentication, but keep trustworthiness Integrate into JRA5 edugain framework 20

eduroam participation and services offered Confederation idea means that all participants are peers with equal rights What user groups are allowed? Some countries (like Luxembourg) could establish roaming also for secondary schools (i.e. pupils) Most countries have no means to do that, so it would be against confederation idea to include Rule of thumb: students in higher education, teachers, professors, scientific staff is allowed ( higher education and research ) What services should be granted? According to the local administration of the participating institution 21

eduroam Service separation Institution's own RADIUS server can send information like VLAN ids or ACLs to set specific rules for guest users - EAPoL - RADIUS - EAP Authenticator RADIUS server (AP or switch) for university.se RADIUS - EAP han.solo@dep1.uni.au Professor VLAN Guest VLAN Student VLAN RADIUS - EAP RADIUS server for dep1.uni.au 22

eduroam AUPs, abuse, the law(s) Every participant has some kind of Acceptable Use Policy in place If the home AUP and the visited AUP differ, only actions that conform to both are allowed If network is abused, user must be blocked Lock out station locally Notification of home network If home network doesn't properly react: block out entire realm Framework must respect European legislation Directive on data protection: ensure that privacy is ensured, dispose of logs after a time Local laws and implementations of EU directive must be respected by participating countries Still open: non-european countries' legislations 23

eduroam future development The RADIUS way of delegating requests puts great stress on the root (and possibly TLD) servers Message flow could be optimised: visited site directly contacts home site Several solutions are currently being evaluated: Diameter: a new replacement protocol for RADIUS with peer discovery options Using DNSSEC for service discovery and trust establishment? DNS for discovery and custom extensions to RADIUS for trust ( radsec )? Base network admission decision on more info than just home domain Solve the.edu routing problem 24

eduroam future development (2) Integration into the more general edugain framework edugain is an authentication and authorisation infrastructure developed within Geant2 JRA5 Framework that covers not only network admission, but also application access Can integrate Shibboleth, A-Select, PAPI,... Ultimate goal: a Single-Sign-On solution for arbitrary resources 25

eduroam How to join Set up country-level server (probably SUNET for.se) Statically connect all institutions that are willing to participate to that.se server Contact root server team for static connection with the root server Technical contacts for various RADIUS server implementations available Administrative contact (policies etc.): Klaas Wierenga, chair of TF-Mobility <klaas.wierenga@surfnet.nl> 26

eduroam Resources GEANT2 Joint Research Area 5 http://www.geant2.net./ TERENA Task Force Mobility http://www.terena.nl./mobility/ Eduroam homepage http://www.eduroam.org./ 27

28