Lecture 4b AAA protocols (Authentication Authorization Accounting)



Similar documents
Authentication, Authorization and Accounting (AAA) Protocols

UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU

Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks

Lecture 3. WPA and i

RADIUS Authentication and Accounting

Chapter 4: Security of the architecture, and lower layer security (network security) 1

3GPP TS V6.3.0 ( )

Review: Lecture 1 - Internet History

A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2

CENTRALIZED AUTHENTICATION SERVICES (RADIUS, TACACS, DIAMETER)

freeradius A High Performance, Open Source, Pluggable, Scalable (but somewhat complex) RADIUS Server Aurélien Geron, Wifirst, January 7th 2011

Network Security Essentials Chapter 5

Chapter 7 Transport-Level Security

7.1. Remote Access Connection

7750 SR OS System Management Guide

Diameter in the Evolved Packet Core

Transport Layer Security Protocols

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

Portal Authentication Technology White Paper

Network Security. Lecture 3

RadSec RADIUS improved. Stig Venaas

Signaling Delivery Controller : Control Your 4G Network

NAT TCP SIP ALG Support

Session Border Controller

7450 ESS OS System Management Guide. Software Version: 7450 ESS OS 10.0 R1 February 2012 Document Part Number: * *

Network Access Control and Cloud Security

This presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1.

Authentication and Security in IP based Multi Hop Networks

Network Access Control and Cloud Security

Network Security Part II: Standards

RADIUS: A REMOTE AUTHENTICATION DIAL-IN USER SERVICE

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia 2006 Cisco Systems, Inc. All rights reserved.

IP Security. Ola Flygt Växjö University, Sweden

Scenario: Remote-Access VPN Configuration

Communication Security for Applications

Cisco Which VPN Solution is Right for You?

VPN. Date: 4/15/2004 By: Heena Patel

VoIP Security. Seminar: Cryptography and Security Michael Muncan

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Security. AAA Identity Management. Premdeep Banga, CCIE # Cisco Press. Vivek Santuka, CCIE # Brandon J. Carroll, CCIE #23837

An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks

Mobile IP Part I: IPv4

Evaluation of EAP Authentication Methods in Wired and Wireless Networks

How To Create A Virtual Network With A Router And Network Operating System (Ip) For A Network (Ipv) (Ip V2) (Netv) And A Virtualization) (Network) (Wired) (Virtual) (Wire)

Web Security Considerations

EAP-WAI Authentication Protocol

Chapter 9. IP Secure

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Diameter Security. Ensuring the Transport and Application Layer Integrity of Diameter across Network Interconnections

Application Note User Groups

Application Note: Onsight Device VPN Configuration V1.1

Bit Chat: A Peer-to-Peer Instant Messenger

Network Access Security. Lesson 10

Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, Eschborn, Germany

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas

Configuring CSS Remote Access Methods

Configuring Wired 802.1x Authentication on Windows Server 2012

Chapter 17. Transport-Level Security

Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.

Computer Networks. Secure Systems

Cisco Certified Security Professional (CCSP)

3GPP TSG SA WG3 Security S3#25 S October 2002 Munich, Germany

ETM System SIP Trunk Support Technical Discussion

Scenario: IPsec Remote-Access VPN Configuration

Case Study for Layer 3 Authentication and Encryption

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

SIP : Session Initiation Protocol

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol

SonicOS 5.9 / / 6.2 Log Events Reference Guide with Enhanced Logging

10CS64: COMPUTER NETWORKS - II

RADIUS Vendor-Specific Attributes (VSA)

End-to-End Quality-of-Service Support in Next Generation Networks with NSIS

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Pulse Policy Secure. RADIUS Server Management Guide. Product Release 5.1. Document Revision 1.0. Published:

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Security Engineering Part III Network Security. Security Protocols (II): IPsec

Interconnecting Cisco Networking Devices Part 2

Securing Networks with PIX and ASA

Secure SCADA Network Technology and Methods

MOBILE VIDEO WITH MOBILE IPv6

radsecproxy 1.3-beta Stig Venaas

Cisco Secure Access Control Server Deployment Guide

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens

Interlink Networks RAD-Series AAA Server and RSA Security Two-Factor Authentication

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

: Interconnecting Cisco Networking Devices Part 2 v1.1

Belnet Networking Conference 2013

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1

This chapter describes how to set up and manage VPN service in Mac OS X Server.

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

z/os Firewall Technology Overview

Transcription:

Lecture 4b AAA protocols (Authentication Authorization Accounting) Network security (19265400 / 201000086) Lecturers: Aiko Pras Pieter-Tjerk de Boer Anna Sperotto Ramin Sadre Georgios Karagiannis

Lecture material to be found via Blackboard: Course Information => Course material that can be downloaded: => radius_diameter.txt file can also be downloaded via: http://wwwhome.ewi.utwente.nl/~karagian/network_security/radius_diameter.txt radius_diameter.txt includes text copied from RFC2865, RFC2866, RFC3588 AAA protocols - Lecture 4b 2

Outline Goal of this lecture What s AAA? Basic operation RADIUS (Remote Authentication Dial In User Service) Basic operation DIAMETER Main differences DIAMETER vs. RADIUS Summary & References AAA protocols - Lecture 4b 3

Goal of this lecture understanding what is the AAA concept and which main AAA protocols are used and how they are used AAA protocols - Lecture 4b 4

Outline Goal of this lecture What s AAA? Basic operation RADIUS Basic operation DIAMETER Main differences DIAMETER vs. RADIUS Summary & References AAA protocols - Lecture 4b 5

What s AAA Authentication, authorization and accounting processes are needed when user tries to access and use Internet Authentication: act of verifying identity of entity Authorization: act of determining whether requesting entity is allowed access to a resource Accounting: act of collecting info on resource usage for the purpose of capacity planning, auditing, billing or cost allocation Concept standardized by IETF, e.g.: Generic AAA architecture (RFC2903) AAA Authorization Examples (RFC2905) AAA Authorization Framework (RFC2904) Example use: AAA can be used in combination with IEEE 802.1x to enhance WLAN authentication & authorization AAA protocols - Lecture 4b 6

What s AAA (example scenario) AAA client AAA server Authentication Authorization AAA client AAA protocol Accounting Modem Modem pool (NAS) AAA protocol proxy AAA protocol AAA data AAA data AAA protocol: supports AAA communication between AAA client and AAA server(s): TACACS (RFC1492) RADIUS (RFC2865) DIAMETER (RFC3588) AAA protocols - Lecture 4b 7

Outline Goal of this lecture What s AAA? Basic operation RADIUS Basic operation DIAMETER Main differences DIAMETER vs. RADIUS Summary & References AAA protocols - Lecture 4b 8

Basic operation RADIUS RADIUS: AAA protocol used to carry AAA information between AAA client (e.g., Network Access Server) and a shared AAA server AAA protocols - Lecture 4b 9

Basic operation RADIUS (key features) Client/Server Model Client: NAS (Network Access Server): generates AAA request Server: RADIUS server handles request (operates also as proxy) Network Security: transactions authenticated using shared secret key, manually distributed, between client/server any user passwords, hidden using MD5 (RFC1321) + other End-to-end security (for non proxy RADIUS), but cannot be guaranteed Flexible Authentication Mechanisms, e.g.: PPP CHAP (Challenge Handshake Authentication Protocol), EAP (Extensible Authentication Protocol) Extensible protocol: AAA attribute information carried in Attribute- Length-Value; new attribute values added without disturbing existing implementations Uses UDP as transport protocol AAA protocols - Lecture 4b 10

Basic operation RADIUS (document architecture) (IPv4) base specification defining base protocol on authentication and authorization Accounting application for support of accounting RADIUS extensions for AAA application extensions EAP application for support of various authentication methods RADIUS operation when run over IPv6 Chargeable user identity attribute used in case of real time accounting RADIUS usage guidelines for IEEE 802.1x Accounting (RFC2866) RADIUS extensions (RFC2869) EAP (RFC3579) RADIUS and IPv6 (RFC3162) Chargeable User Identity (RFC4372) IEEE802.1x usage guidelines (RFC3580) RADIUS Base Protocol: IPv4 based (RFC2865) Transport (UDP) AAA protocols - Lecture 4b 11

Basic operation RADIUS (message types) Codes and message types: 1 Access-Request 2 Access-Accept 3 Access-Reject 4 Accounting-Request 5 Accounting-Response 11 Access-Challenge 12 Status-Server (experimental) 13 Status-Client (experimental) 255 Reserved AAA protocols - Lecture 4b 12

Basic operation RADIUS (session establishment/termination) Same session used for authentication/authorization and accounting RADIUS client RADIUS Server Authen/Authz established Accounting established (e.g., User-Password Attribute) Authen/Authz Success Accounting stopped AAA protocols - Lecture 4b 13

Why is RADIUS using for transport UDP instead of TCP? Advantages If request to primary authentication server fails, secondary server must be queried: copy of request must be kept above transport layer retransmission timers still required, above transport layer Stateless nature of RADIUS protocol within communication network simplifies use of UDP: transport connection between client/server remains even if network failures are occurring Disadvantages Transport is not reliable (layer above transport has to take care of packet losses) TCP adapt to network congestion, while UDP does not AAA protocols - Lecture 4b 14

Outline Goal of this lecture What s AAA? Basic operation RADIUS Basic operation DIAMETER Main differences DIAMETER vs. RADIUS Summary & References AAA protocols - Lecture 4b 15

Basic operation DIAMETER DIAMETER: AAA protocol supports similar AAA features as RADIUS but with enhanced and additional capabilities AAA protocols - Lecture 4b 16

Basic operation DIAMETER (key features) Capabilities negotiation Carry AAA information in AVPs (Attribute Value Pairs) Error notification Extensibility, through addition of new commands and AVPs Basic services necessary for applications, such as handling of user sessions or accounting and session state maintenance Hop-by-hop security using IPSec (mandatory) and TLS (optional) authenticate each hop by shared secret key (distributed using automatic key distribution: e.g., IKE (Internet Key Exchange) HMAC-MD5-96 in [RFC2403] HMAC-SHA1-96 [RFC2404]) encrypt at each hop by shared secret (e.g., DES-CBC (Data Encryption Standard Cipher Block Chaining)) AAA protocols - Lecture 4b 17

Basic operation DIAMETER (key features) AVPs used by base Diameter protocol to support: Transporting user authentication information Transporting service specific authorization information Exchanging resource usage information may be used for accounting purposes, capacity planning, etc. Relaying and proxying of Diameter messages through server hierarchy. Transport: Diameter clients must support TCP or SCTP Diameter agents and servers must support TCP and SCTP Authentication/authorization session management may be independent of accounting session management: accounting information can be routed to different server than server used by authentication/authorization messages: Acct-Multi-Session-Id AVP in messages is used to correlate sessions AAA protocols - Lecture 4b 18

Basic operation DIAMETER (key features) DIAMETER base protocol provides minimum requirements needed: may be used by itself for accounting purposes only may be used with Diameter application, like NASREQ or MobileIPv4 may be extended for use in new applications with new commands or AVPs DIAMETER is peer-to-peer protocol any node can initiate a request DIAMETER client: node at edge of network performing access control generates Diameter messages for authentication, authorization and accounting of user DIAMETER agent: Relay, Proxy, Redirect, Translation agents does not authenticate and/or authorize messages locally DIAMETER server: node that performs authentication and/or authorization and accounting of user A node may act as agent for certain requests, while acting as server for others. AAA protocols - Lecture 4b 19

Basic operation DIAMETER (document architecture) base specification (IPv4 and IPv6) defining base protocol and accounting application (RFC 3588) Transport Profile document including failover mechanism and state machine (RFC 3539) NASREQ application for dial-in & terminal server applications (RFC 4005) EAP application for support of authentication methods (RFC4072) Credit Control application for real-time credit control (RFC 4006) SIP application provides AAA services to SIP entities (RFC 4740) MobileIPv4 application provides AAA support for Mobile IPv4 (RFC 4004) Accounting NASREQ (RFC4005) EAP (RFC4072) Credit Control (RFC4006) SIP (RFC4740) MobileIPv4 (RFC4004) DIAMETER Mobile IPv6 (RFC5447) DIAMETER Proxy Mobile IPv6 (RFC5779) Traffic classification QoS attributes (RFC5777) DIAMETER QoS (RFC5866) DIAMETER Base Protocol (RFC3588) Transport (TCP, SCTP) (RFC3539) AAA protocols - Lecture 4b 20

Basic operation DIAMETER (document architecture) MIPv6 bootstrapping using Diameter Network Access Server to home AAA server interface (RFC 5447) AAA interactions between proxy Mobile IPv6 entities and AAA server in proxy Mobile IPv6 domain (RFC 5779) DIAMETER AVPs for traffic classification and QoS support (RFC 5777) DIAMETER QoS application (RFC 5866) Accounting NASREQ (RFC4005) EAP (RFC4072) Credit Control (RFC4006) SIP (RFC4740) MobileIPv4 (RFC4004) DIAMETER Mobile IPv6 (RFC5447) DIAMETER Proxy Mobile IPv6 (RFC5779) Traffic classification QoS attributes (RFC5777) DIAMETER QoS (RFC5866) DIAMETER Base Protocol (RFC3588) Transport (TCP, SCTP) (RFC3539) AAA protocols - Lecture 4b 21

Basic operation DIAMETER (command names) Command-Name Abbrev. Code (Authent/Authz-Request ) (Authent/Authz-Answer) Abort-Session-Request ASR 274 Abort-Session-Answer ASA 274 Accounting-Request ACR 271 Accounting-Answer ACA 271 Capabilities-Exchange- Request CER 257 Capabilities-Exchange- Answer CEA 257 Device-Watchdog-Request DWR 280 Device-Watchdog-Answer DWA 280 Disconnect-Peer-Request DPR 282 Disconnect-Peer-Answer DPA 282 Re-Auth-Request RAR 258 Re-Auth-Answer RAA 258 Session-Termination- Request STR 275 Session-Termination-Answer STA 275 AAA protocols - Lecture 4b 22

Basic operation DIAMETER (session establishment) Separate Authorization and Accounting sessions maintained, but using the same DIAMETER server Diameter client Diameter Server Authen/Authz session established * Accounting session established Authen/Authz Success Acc-Interim-Interval expires *Commands and number of rounds are application specific AAA protocols - Lecture 4b 23

Basic operation DIAMETER (session re-authorization) Separate Authorization and Accounting sessions maintained, but using same DIAMETER server Diameter client Diameter Server Authz-Lifetime expires Authen/Authz Success Re-Authorization successful Initiates Authen/Authz procedure Event: Re-authorization required Authen/Authz Success Re-Authorization successful AAA protocols - Lecture 4b 24

Basic operation DIAMETER (session termination) Separate Authorization and Accounting sessions maintained, but using same DIAMETER server Stops Authz session or initiates STR/STA exchange Authorization session is stopped Diameter client Diameter Server Event: Stop session Final accounting is triggered Accounting session is stopped AAA protocols - Lecture 4b 25

Outline Goal of this lecture What s AAA? Basic operation RADIUS Basic operation DIAMETER Main differences DIAMETER vs. RADIUS Summary & References AAA protocols - Lecture 4b 26

Main differences DIAMETER vs. RADIUS Better Transport Diameter runs over reliable transport, TCP or SCTP lost packets are retransmitted at each hop persistent connection with application-level heartbeat message (called a Watchdog message) supports timely failover TCP and SCTP adapt to network congestion Better Proxying Hop-by-hop transport failure detection allows failover to occur at the appropriate place proxies can locally failover to alternate next-hop peer proxy automatically does retransmission of pending request messages following failover. AAA protocols - Lecture 4b 27

Main differences DIAMETER vs. RADIUS Better Session Control Session management: independent of accounting accounting information can be routed to different server than authentication/authorization messages correlation between sessions needed => Acct-Multi-Session-Id AVP session termination may be conveyed by a specific Session- Termination message rather than Accounting Stop message (when session ID authorization and session ID accounting different). server may initiate message to request session termination server may initiate message to request re-authentication and/or reauthorization of user Better Security Hop-by-hop security is provided using IPsec or TLS Automatic secret key exchange End-to-end security is guaranteed AAA protocols - Lecture 4b 28

Outline Goal of this lecture What s AAA? Basic operation RADIUS Basic operation DIAMETER Main differences DIAMETER vs. RADIUS Summary & References AAA protocols - Lecture 4b 29

Summary, references & info homework assignments Understand: AAA concept Main characteristics of RADIUS protocol Main characteristics of DIAMETER protocol Main differences between RADIUS and DIAMETER References Many used RFCs can be located via http://www.ietf.org/rfc.html <then type RFC number> RFC1321, RFC2903, RFC2905, RFC2904, RFC1492, RFC2865, RFC3588, RFC2866, RFC2869, RFC3579, RFC3162, RFC4372, RFC3580, RFC4740, RFC5447, RFC5624, RFC5777, RFC5778 RFC5779, RFC5866 AAA protocols - Lecture 4b 30

Summary, references & info homework assignments Homework assignments can be found via Blackboard and via: http://wwwhome.cs.utwente.nl/~pras/netsec/ answers to homework exercises need to be sent by email to following email address before Monday 01 October, 23:55! Please Include "Lecture number (4B) and the number (4.B.1, 4.B.2, 4.B.3) of the exercise(s)" in the title/subject line of the email? Email address: network.security@ewi.utwente.nl AAA protocols - Lecture 4b 31