The strongswan IPsec Solution



Similar documents
Android BYOD Security using Trusted Network Connect Protocol Suite

TNC Endpoint Compliance and Network Access Control Profiles

VPN with Windows 7 and Linux strongswan using IKEv2

The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment

TNC: Open Standards for Network Security Automation. Copyright 2010 Trusted Computing Group

Network Access Control (NAC) and Network Security Standards

Network Access Security It's Broke, Now What? June 15, 2010

Trusted Network Connect (TNC)

Neue strongswan VPN Features

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

freeradius A High Performance, Open Source, Pluggable, Scalable (but somewhat complex) RADIUS Server Aurélien Geron, Wifirst, January 7th 2011

How To Create A Virtual Network With A Router And Network Operating System (Ip) For A Network (Ipv) (Ip V2) (Netv) And A Virtualization) (Network) (Wired) (Virtual) (Wire)

NETWORK ACCESS CONTROL

SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia 2006 Cisco Systems, Inc. All rights reserved.

UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU

Deploying iphone and ipad Virtual Private Networks

strongswan TNC Activities Update

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology

Pulse Secure Desktop Client

Trusted Network Connect (TNC)

IKEv2-based VPNs using strongswan

Extensible Authentication Protocol (EAP) Security Issues

Advanced Features of Linux strongswan the OpenSource VPN Solution

A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May New Features and Enhancements. Tip of the Day

Cisco Secure Access Control Server 4.2 for Windows

Microsoft Azure Configuration

Pulse Secure Desktop Client Supported Platforms Guide

To participate in the hands-on labs in this class, you need to bring a laptop computer with the following:

Junos Pulse Supported Platforms Guide

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues

PKI Uncovered. Cisco Press. Andre Karamanian Srinivas Tenneti Francois Dessart. 800 East 96th Street. Indianapolis, IN 46240

Using IKEv2 on Juniper Networks Junos Pulse Secure Access Appliance

Network Access Control and Cloud Security

Case Study for Layer 3 Authentication and Encryption

How To Make A Network Secure For A Business

Internet Protocol Security IPSec

VPN_2: Deploying Cisco ASA VPN Solutions

The OpenEapSmartcard platform. Pr Pascal Urien ENST Paris

How To Test An Eap Test On A Network With A Testnet (Networking) On A Pc Or Mac Or Ipnet (For A Network) On An Ipnet Or Ipro (For An Ipro) On Pc Or Ipo

Cisco Which VPN Solution is Right for You?

Oracle Desktop Virtualization

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

This section provides a summary of using network location profiles to identify network connection types. Details include:

RAD-Series RADIUS Server Version 7.3

An Experimental Study on Wireless Security Protocols over Mobile IP Networks

Security Services on IPv6 Networks: PKIv6 and IPv6-VPNs

Using BroadSAFE TM Technology 07/18/05

For Sales Kathy Hall

Workflow Guide. Establish Site-to-Site VPN Connection using RSA Keys. For Customers with Sophos Firewall Document Date: November 2015

RAD-Series RADIUS Server Version 7.1

Security Engineering Part III Network Security. Security Protocols (II): IPsec

Pulse Secure Desktop Client Supported Platforms Guide

iphone in Business Security Overview

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Cisco Certified Security Professional (CCSP)

VPN Tracker for Mac OS X

VLANs. Application Note

Lecture 17 - Network Security

Release Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved

ClickShare Network Integration

CCIE Security Written Exam ( ) version 4.0

Aradial Enforcer / AAA Features & capabilities

Google Compute Engine Configuration

Application Note: Onsight Device VPN Configuration V1.1

Nokia Mobile VPN Client

TABLE OF CONTENTS NETWORK SECURITY 2...1

Pulse Policy Secure. RADIUS Server Management Guide. Product Release 5.1. Document Revision 1.0. Published:

IP Office Technical Tip

Authentication, Authorization and Accounting (AAA) Protocols

Pulse Connect Secure. Supported Platforms Guide. Product Release 8.1. Document Revision 3.0 Published:

netld External Authentication Setup Guide

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

Security Guide. BlackBerry Enterprise Service 12. for BlackBerry. Version 12.0

Joe Davies Principal Writer Windows Server Documentation

PCISS-1. Job Description: Key Responsibilities: I. Perform troubleshooting& support:

Introduction to Security and PIX Firewall

TechNote. Configuring SonicOS for MS Windows Azure

This chapter describes how to set up and manage VPN service in Mac OS X Server.

ZyWALL OTPv2 Support Notes

Table of Contents. Introduction

HP ProCurve Identity Driven Manager 3.0

KEYVPN CLIENT. Features & Benefits. Industry s Most Complete IPsec VPN Client for Android OEMs and Enterprises.

Network Security. Lecture 3

NCP Secure Enterprise Management Next Generation Network Access Technology

CenturyLink Cloud Configuration

Transcription:

The strongswan IPsec Solution with TNC Support TCG Members Meeting June 2011 Munich Prof. Dr. Andreas Steffen Institute for Internet Technologies andapplications HSR University of Applied Sciences Rapperswil andreas.steffen@hsr.ch

Where the heck is Rapperswil? Munich 15.06.2011, tcg_munich_2011.pptx 2

HSR - Hochschule für Technik Rapperswil University of Applied Sciences with about 1500 students Faculty of Information Technology (300-400 students) Bachelor Course (3 years), Master Course (+1.5 years) 15.06.2011, tcg_munich_2011.pptx 3

The strongswan IPsec Solution with TNC Support TCG Members Meeting June 2011 Munich IKEv2 Open Source Implementation

strongswan Usage Scenarios Remote Access VPN Client 10.3.0.2 10.1.0.5 10.2.0.3 Internet 55.66.x.x Head Quarters VPN Tunnel VPN Tunnel Subsidiary 10.1.0.0/16 10.2.0.0/16 VPN Gateway 11.22.33.44 VPN Gateway 55.66.77.88 strongswan is an Internet Key Exchange Daemon responsible for automatically setting up IPsec-based VPN connections. 15.06.2011, tcg_munich_2011.pptx 5

The FreeS/WAN Genealogy 1999 FreeS/WAN 1.x 2000 X.509 1.x Patch Super FreeS/WAN FreeS/WAN 2.x 2003 X.509 2.x Patch 2004 2005 2006 Openswan 1.x Openswan 2.x IKEv2 RFC 4306 strongswan 2.x IKEv1 & strongswan 4.x 2007 partial IKEv2 IKEv1 & IKEv2 2004 ITA IKEv2 Project New architecture, same config. 15.06.2011, tcg_munich_2011.pptx 6

IKEv2 Interoperability Workshops Spring 2007 in Orlando, Florida Spring 2008 in San Antonio, Texas strongswan successfully interoperated with IKEv2 products from Alcatel-Lucent, Certicom, CheckPoint, Cisco, Furukawa, IBM, Ixia, Juniper, Microsoft, Nokia, SafeNet, Secure Computing, SonicWall, and the IPv6 TAHI Project. 15.06.2011, tcg_munich_2011.pptx 7

strongswan Key Customers Alcatel-Lucent, Clavister, Ericsson, Nokia Siemens Networks, Ubiquisys Femtocells/Security Gateways for GSM/UMTS/LTE Mobile Networks Astaro Astaro Security Gateway Secunet SINA Box for High Security Applications (German Federal Government) U.S. Government Open Source IKEv2/IPsec Reference and Test System for Suite B Elliptic Curve Cryptography 15.06.2011, tcg_munich_2011.pptx 8

strongswan Business Model Paid development of customer-specific add-ons Features of general interest are released back into the main strongswan distribution under the GPLv2 open source license Commercial licensing of the HSR-owned IKEv2 source code Licensee is not obliged to disclose any proprietary modifications and add-ons to the IKEv2 strongswan source code. 15.06.2011, tcg_munich_2011.pptx 9

Supported Platforms Operating Systems Linux Android FreeBSD Mac OS X Hardware Platforms (32/64 bit) Intel, Via, AMD ARM, MIPS (e.g. Freescale, Marvell, 16-core Cavium Octeon) PowerPC Networking Stack IPv4 IPv6 (SuSE Linux Enterprise with strongswan certified by DoD in 2008) Mobile IPv4/IPv6 Portable Source Code 100% written in C but with an object-oriented modular approach Performance scalability through extensive use of multi-threading 15.06.2011, tcg_munich_2011.pptx 10

What about Windows? 15.06.2011, tcg_munich_2011.pptx 11

Windows 7 VPN with Machine Certificates Microsoft tested IKEv2 interoperability using strongswan right up to the final Windows 7 release. 15.06.2011, tcg_munich_2011.pptx 12

Windows 7 VPN with EAP Authentication Using IKEv2 EAP-MSCHAPv2 or EAP-TLS with smartcards 15.06.2011, tcg_munich_2011.pptx 13

strongswan Applet for the Linux Desktop D-Bus based communication. 15.06.2011, tcg_munich_2011.pptx 14

strongswan in a Mixed VPN Environment Windows Active Directory Server Corporate Network Linux FreeRadius Server High-Availability strongswan VPN Gateway Internet Windows 7 Agile VPN Client strongswan Linux Client 15.06.2011, tcg_munich_2011.pptx 15

IKEv2 Authentication Methods Based on Public Keys X.509 certificates with RSA or ECDSA keys PKCS#11 smartcard interface CRLs via HTTP/LDAP, OCSP Based on Pre-Shared Keys (PSK) Arbitrary PSK length, beware of weak secrets! Based on the Extended Authentication Protocol (EAP) EAP-MD5, EAP-MSCHAPv2, EAP-GTC EAP-SIM, EAP-AKA (GSM/UMTS/CDMA2000) EAP-TLS, EAP-TTLS, EAP-PEAPv0 Interface to AAA Server EAP-RADIUS EAP and TNC Methods implemented as Plugins strongswan IKEv2 daemon loads plugins at run-time 15.06.2011, tcg_munich_2011.pptx 16

The strongswan IPsec Solution with TNC Support TCG Members Meeting June 2011 Munich Trusted Network Connect Capabilities

strongswan as a TNC client and PEP 1.1 EAP-TNC in EAP-TTLS 15.06.2011, tcg_munich_2011.pptx 18

IF-TNCCS-1.1 Protocol on the TNC Client Side 13[TNC] sending TNCCS Batch (633 bytes) for Connection ID 1 13[TNC] <?xml version="1.0"?> 13[TNC] <TNCCS-Batch BatchId="1" Recipient="TNCS"...> 13[TNC] <TNCC-TNCS-Message> 13[TNC] <Type>00000003</Type> 13[TNC] <XML> 13[TNC] <TNCCS-PreferredLanguage>en</TNCCS-PreferredLanguage> 13[TNC] </XML> 13[TNC] </TNCC-TNCS-Message> 13[TNC] <IMC-IMV-Message> 13[TNC] <Type>0080ab31</Type> 13[TNC] <Base64>RHVtbXlJTUMgbWVzc2FnZSAwLCBhY3Rpb24gPSBhbGxvdw==</Base64> 13[TNC] </IMC-IMV-Message> 13[TNC] </TNCCS-Batch> 13[IKE] sending tunneled EAP-TTLS AVP [EAP/RES/TNC] 13[ENC] generating IKE_AUTH request 7 [ EAP/RES/TTLS ] 13[NET] sending packet: from 192.168.0.100[4500] to 192.168.0.1[4500] 15[NET] received packet: from 192.168.0.1[4500] to 192.168.0.100[4500] 15[ENC] parsed IKE_AUTH response 7 [ EAP/REQ/TTLS ] 15[IKE] received tunneled EAP-TTLS AVP [EAP/REQ/TNC] 15[TNC] received TNCCS Batch (473 bytes) for Connection ID 1 15[TNC] <?xml version="1.0"?> 15[TNC] <TNCCS-Batch BatchId="2" Recipient="TNCC...> 15[TNC] <IMC-IMV-Message> 15[TNC] <Type>0080ab31</Type> 15[TNC] <Base64>RHVtbXlJTVYgdG8gRHVtbXlJTUMgbWVzc2FnZSAx</Base64> 15[TNC] </IMC-IMV-Message> 15[TNC] </TNCCS-Batch> 15.06.2011, tcg_munich_2011.pptx 19

TNC Policy Enforcement allow Policy Enforcement Point TNC Server Corporate Network block Host with TNC Client Remediation Server Isolation Network isolate Policy Manager 10.1.0.0/16 10.2.0.0/16 Source: Jörg Vieweg, FH Hannover 15.06.2011, tcg_munich_2011.pptx 20

strongswan Configuration on the PEP side conn rw-allow rightgroups=allow leftsubnet=10.1.0.0/16 also=rw-eap auto=add conn rw-isolate rightgroups=isolate leftsubnet=10.2.0.0/16 also=rw-eap auto=add conn rw-eap left=192.168.0.1 leftcert=mooncert.pem leftid=@moon.strongswan.org leftauth=eap-ttls leftfirewall=yes rightauth=eap-radius rightid=*@strongswan.org rightsendcert=never right=%any 15.06.2011, tcg_munich_2011.pptx 21

IF-PEP Protocol on the strongswan PEP 05[CFG] received RADIUS Access-Accept from server '10.1.0.10' 05[IKE] received RADIUS attribute Tunnel-Type: tag = 0, value = 9 05[IKE] received RADIUS attribute Filter-Id: 'allow' 05[IKE] RADIUS authentication of 'carol@strongswan.org' successful 05[IKE] EAP method EAP_TTLS succeeded, MSK established 05[ENC] generating IKE_AUTH response 11 [ EAP/SUCC ] 05[NET] sending packet: from 192.168.0.1[4500] to 192.168.0.100[4500] 04[NET] received packet: from 192.168.0.100[4500] to 192.168.0.1[4500] 04[ENC] parsed IKE_AUTH request 12 [ AUTH ] 04[IKE] authentication of 'carol@strongswan.org' with EAP successful 04[IKE] authentication of 'moon.strongswan.org' (myself) with EAP 04[IKE] IKE_SA rw-allow[1] established between 192.168.0.1[moon.strongswan.org]...192.168.0.100[carol@strongswan.org] 02[CFG] received RADIUS Access-Accept from server '10.1.0.10' 02[IKE] received RADIUS attribute Tunnel-Type: tag = 0, value = 9 02[IKE] received RADIUS attribute Filter-Id: 'isolate' 02[IKE] RADIUS authentication of 'dave@strongswan.org' successful 02[IKE] EAP method EAP_TTLS succeeded, MSK established 02[ENC] generating IKE_AUTH response 11 [ EAP/SUCC ] 02[NET] sending packet: from 192.168.0.1[4500] to 192.168.0.200[4500] 01[NET] received packet: from 192.168.0.200[4500] to 192.168.0.1[4500] 01[ENC] parsed IKE_AUTH request 12 [ AUTH ] 01[IKE] authentication of 'dave@strongswan.org' with EAP successful 01[CFG] constraint check failed: group membership required 01[CFG] selected peer config 'rw-allow' inacceptable 01[CFG] switching to peer config 'rw-isolate 01[IKE] authentication of 'moon.strongswan.org' (myself) with EAP 01[IKE] IKE_SA rw-isolate[2] established between 192.168.0.1[moon.strongswan.org]...192.168.0.200[dave@strongswan.org] 15.06.2011, tcg_munich_2011.pptx 22

Network Endpoint Assessment (RFC 5209) Posture Posture Posture Collectors (1 (1... N) N) (1.. N) Posture Broker Client Posture Posture Posture Transport Clients Clients Clients (1 (1... K) K) (1.. K) NEA Client PA RFC 5792 PA-TNC PB RFC 5793 PB-TNC PT Internet Drafts Posture Posture Posture Validators Collectors (1 (1... N) N) (1.. N) Posture Broker Server Posture Posture Posture Transport Clients Servers Clients (1 (1... K) K) (1.. K) NEA Server 15.06.2011, tcg_munich_2011.pptx 23

strongswan as a TNC client and TNC server 2.0 EAP-TNC in EAP-TTLS 15.06.2011, tcg_munich_2011.pptx 24

TNCCS-2.0 Protocol on the TNC Client Side 13[TNC] creating PB-PA message type 'ITA-HSR' 0x00902a/0x01 13[TNC] adding PB-PA message 13[TNC] PB-TNC state transition from 'Init' to 'Server Working' 13[TNC] sending PB-TNC CDATA batch (88 bytes) for Connection ID 1 13[TNC] => 88 bytes @ 0x8081044 13[TNC] 0: 02 00 00 01 00 00 00 58 00 00 00 00 00 00 00 06...X... 13[TNC] 16: 00 00 00 1F 41 63 63 65 70 74 2D 4C 61 6E 67 75...Accept-Langu 13[TNC] 32: 61 67 65 3A 20 65 6E 80 00 00 00 00 00 00 01 00 age: en... 13[TNC] 48: 00 00 31 00 00 90 2A 00 00 00 01 00 01 FF FF 01..1...*... J 13[TNC] 64: 00 00 00 C1 2E D6 2F 80 00 90 2A 00 00 00 01 00.../...*... 13[TNC] 80: 00 00 11 61 6C 6C 6F 77...allow 13[IKE] sending tunneled EAP-TTLS AVP [EAP/RES/TNC] 13[ENC] generating IKE_AUTH request 7 [ EAP/RES/TTLS ] 13[NET] sending packet: from 192.168.0.100[4500] to 192.168.0.1[4500] 14[NET] received packet: from 192.168.0.1[4500] to 192.168.0.100[4500] 14[ENC] parsed IKE_AUTH response 7 [ EAP/REQ/TTLS ] 14[IKE] received tunneled EAP-TTLS AVP [EAP/REQ/TNC] 14[TNC] received TNCCS batch (58 bytes) for Connection ID 1 14[TNC] => 58 bytes @ 0x8080fee 14[TNC] 0: 02 80 00 02 00 00 00 3A 80 00 00 00 00 00 00 01...:... 14[TNC] 16: 00 00 00 32 00 00 90 2A 00 00 00 01 FF FF 00 01...2...*... J 14[TNC] 32: 01 00 00 00 2C 40 A0 6C 00 00 90 2A 00 00 00 01...,@.l...*... 14[TNC] 48: 00 00 00 12 72 65 70 65 61 74...repeat 14[TNC] PB-TNC state transition from 'Server Working' to 'Client Working' 14[TNC] processing PB-TNC SDATA batch 14[TNC] processing PB-PA message (50 bytes) 14[TNC] handling PB-PA message type 'ITA-HSR' 0x00902a/0x01 15.06.2011, tcg_munich_2011.pptx 25

Current Work TCG Certification of IF-IMC, IF-IMV, and IF-PEP Interfaces Participation at the TNC 2011 Spring PlugFest in Chantilly, VA Passed IF-IMC and IF-IMV compliance test suites IF-PEP layer 2 VLAN test suite must first be adapted for layer 3 VPN IMC/IMV Test Pair with IF-M (RFC 5792 PA-TNC) Interface Available now as strongswan developers release Stable strongswan 4.5.3 release expected in July 2011. 13[TNC] creating PA-TNC message with ID 0xc12ed62f 13[TNC] creating PA-TNC attribute type 'ITA-HSR' 0x00902a/0x00000001 13[TNC] => 5 bytes @ 0x808123c 13[TNC] 0: 61 6C 6C 6F 77 allow 13[TNC] creating PB-PA message type 'ITA-HSR' 0x00902a/0x01 14[TNC] handling PB-PA message type 'ITA-HSR' 0x00902a/0x01 14[TNC] processing PA-TNC message with ID 0x2c40a06c 14[TNC] processing PA-TNC attribute type 'ITA-HSR' 0x00902a/0x00000001 14[TNC] => 6 bytes @ 0x8080568 14[TNC] 0: 72 65 70 65 61 74 repeat 15.06.2011, tcg_munich_2011.pptx 26

Future Work Implementation of PTS protocol binding to IF-M HSR student Sansar Choinyambuu, implementor of the strongswan IF-TNCCS 2.0 interface who is now working on TPM-based remote attestation is going to tackle the Platform Trust Service (PTS) protocol binding to IF-M as part of her Master Thesis. Ultimate Goal: Full support of PTS attestation Stable strongswan release with PTS attestation support expected in Q1 2012. 15.06.2011, tcg_munich_2011.pptx 27

Thank you for your attention! Questions? www.strongswan.org/tnc/ 15.06.2011, tcg_munich_2011.pptx 28