Training Michal Procházka, Jan Oppolzer CESNET

Slides:



Advertisements
Similar presentations
RSDB Installation & Configuration
Advertisements

RadSec – A better RADIUS protocol
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
CONFIDENTIAL © Copyright Aruba Networks, Inc. All rights reserved AOS & CPPM INTEGRATION CONFIGURATION & TESTING EAP TLS & EAP PEAP by Abilash Soundararajan.
1 Dynamic DNS. 2 Module - Dynamic DNS ♦ Overview The domain names and IP addresses of hosts and the devices may change for many reasons. This module focuses.
Eduroam – Roam In a Day Louis Twomey, HEAnet Limited HEAnet Conference th November, 2006.
Connect communicate collaborate RADIUS and WLAN Infrastructure Monitoring Jovana Palibrk, AMRES NA3 T2, Sofia,
Configuring Linux Radius Server
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Chapter Apache Installation in Linux- Mandrake. Acknowledgment The following information has been obtained directly from
Hands-On Microsoft Windows Server 2003 Networking Chapter 6 Domain Name System.
Deploying eduroam Deyan Stoykov, BREN E-infrastructure Autumn Workshops 8 September, 2014.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
802.1x Port Authentication via RADIUS By Oswaldo Perdomo cs580 Network Security.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
RADIUS Secured and Authenticated WiFi Robert Leahy Charles Bodman Brandon Ellis.
PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Understanding Active Directory
Setting up a Subversion repository By: Matt Krass Last Updated: 4/11/07.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Windows 2003 and 802.1x Secure Wireless Deployments.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
VoIP Study and Implementation Security Version 1.0 – Author : Marc PYBOURDIN / Julien BERTON Dernière Mise à Jour : 19/02/2012.
Virtual Company Group 8 Presentation Date: June /04/2017
GRID Centralized management of the Globus grid-mapfile Carlo Rocca INFN, Catania.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 7: Domain Name System.
IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.
70-411: Administering Windows Server 2012
Implementing Network Access Protection
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Michal Procházka, Jan Oppolzer CESNET.
1 Build a SIP of Environment Speaker: Yi-Ji Jheng Date:
TWSd - Security Workshop Part I of III T302 Tuesday, 4/20/2010 TWS Distributed & Mainframe User Education April 18-21, 2010  Carefree Resort  Carefree,
Phone: Mega AS Consulting Ltd © 2007  CAT – the problem & the solution  Using the CAT - Administrator  Mega.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Configuring Linux Radius Server Objectives –This chapter will show you how to install and use Radius Contents –An Overview Of How Radius Works –Configruation.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Internet Authentication Service.
HotEx Radius Manager Installation. hotEx RADIUS Manager Network Diagram.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
1 Network Information System (NIS). 2 Module – Network Information System (NIS) ♦ Overview This module focuses on configuring and managing Network Information.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Workshop roaming services: eduroam / govroam
RADIUS What it is Remote Authentication Dial-In User Service
IETF 78 Maastricht 27 July 2010 Josh Howlett, JANET(UK)
RadSec Proxy Stig Venaas RadSec Proxy Generic proxy, any number of UDP and/or TLS clients and/or servers Can run on same host as a.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
EGI-InSPIRE RI Pakiti Michal Prochazka, (Daniel Kouril)
1 E-Site - FTP Services Setup / install guide. 2 About FTP services can run on any desired port(s) Runs as a windows service Works for all sites installed.
VMware ESX and ESXi Module 3.
JRA3-T4 eduroam development - plan Stefan Winter Task Leader JRA3-T4
Working at a Small-to-Medium Business or ISP – Chapter 8
CCNA Routing and Switching Routing and Switching Essentials v6.0
Module Overview Installing and Configuring a Network Policy Server
Chapter 5 : Designing Windows Server-Level Security Processes
Implementing Network Access Protection
Configuring and Troubleshooting Routing and Remote Access
Chapter 10: Device Discovery, Management, and Maintenance
CCNA Routing and Switching Routing and Switching Essentials v6.0
SSSD and OpenSSH Integration
Welcome To : Group 1 VC Presentation
DHCP, DNS, Client Connection, Assignment 1 1.3
Chapter 10: Device Discovery, Management, and Maintenance
Configuration Of A Pull Network.
Presentation transcript:

training Michal Procházka, Jan Oppolzer CESNET

Agenda FLRS Requirements Preparation of the host Installation of radsecproxy IdP Requirements Preparation of the host Installation of freeRADIUS

Terms ETRLS – eduroam top level RADIUS server FLRS – federation level RADIUS server OT – eduroam operational team

National level RADIUS (FLRS) Proxy requests among IdPs or proxy request to the ETLRS Monitored by the eduroam monitoring infrastructure

Requirements Linux host for national-level RADIUS hosting X.509 certificate + private key (eduroam accredited) certificates/ NTP radsecproxy

Preparation of the host Assign DNS name Generate X.509 certificate for the host Install these components: NTP radsecproxy (>1.6)

radsecproxy to+deploy+eduroam+at+national+level#Howtod eployeduroamatnationallevel-radsecproxy

Install radsecproxy On Debian systems apt-get install radsecproxy Manually get sources from

/etc/radsecproxy.conf # Server listen ports ListenUDP *:1812 ListenTLS *:2083

/etc/radsecproxy.conf # Logging LogLevel 3 LogDestination x-syslog:///LOG_LOCAL0 LoopPrevention On

/etc/radsecproxy.conf # FTIKS FTicksReporting Full FTicksMAC VendorKeyHashed FTicksKey arandomsalt

/etc/rsyslog.d/50-radsecproxy.conf # radsecproxy if ($programname == 'radsecproxy') and ($msg contains 'F-TICKS') \ & stop # Contact OT for syslog IP address

/etc/radsecproxy.conf # TLS configuration tls defaultClient { CACertificatePath /root/ CertificateFile /root/cert.pem CertificateKeyFile /root/key.pem # CertificateKeyPassword __CERT_PASS__ policyOID # CRLCheck On } tls defaultServer { CACertificatePath /root/ CertificateFile /root/cert.pem CertificateKeyFile /root/key.pem # CertificateKeyPassword __CERT_PASS__ policyOID # CRLCheck On }

/etc/radsecproxy.conf # Attribute filtering (remove VLAN definitions) rewrite defaultClient { removeAttribute 64 removeAttribute 65 removeAttribute 81 }

/etc/radsecproxy.conf # For debugging purposes only client { type udp secret testing123 }

/etc/radsecproxy.conf # eduroam monitoring, negotiate with OT client SA3-monitoring-incoming { host a.b.c.d type UDP secret __MONITORING_SECRET__ } server SA3-monitoring-outgoing { host a.b.c.d type UDP secret __MONITORING_SECRET__ }

/etc/radsecproxy.conf # catch-all for RADIUS/TLS client incoming { host /0 type TLS tls defaultClient secret radsec }

/etc/radsecproxy.conf # Request forwarding – RADIUS/TLS server radius.asren.org { type TLS tls defaultServer secret radsec statusserver on }

/etc/radsecproxy.conf # Uplink to eduroam infrastructure server etlr1.eduroam.org { type TLS tls defaultServer secret radsec statusserver on } server etlr2.eduroam.org { type TLS tls defaultServer secret radsec statusserver on }

/etc/radsecproxy.conf # Filter bad realms, should be catched by the SP realm /myabc\.com$ { replymessage "Misconfigured client: default realm of Intel PRO/Wireless supplicant! Rejected by." accountingresponse on } realm /^$/ { replymessage "Misconfigured client: empty realm! Rejected by." accountingresponse on }

/etc/radsecproxy.conf # Filter wrong realms from your TLD (e.g..edu.jo) realm /\.YOUR_TLD$ { replymessage "Misconfigured supplicant or downstream server: uses known- bad realm in federation!" }

/etc/radsecproxy.conf # Realms forwarding logins realm /asren\.org$ { server radius.asren.org server radius2.asren.org }

/etc/radsecproxy.conf # Definition for eduroam monitoring realm /eduroam\.YOUR_TLD { server SA3-monitoring-outgoing }

/etc/radsecproxy.conf # Finally forward other realms upwards realm * { server etlr1.eduroam.org server etlr2.eduroam.org }

Testing and Debugging Run radsecproxy in debug mode: radsecproxy –d5 –f

Get the Testing Certificate Register your RA Request server certificate and-demos/

FLRS server Implements F-ticks monitoring Host properly monitored (e.g. Nagios) Synchronized time with GPS/NTP Must answer ICMP Ping requests

Summary Installed FLRS Configured to be connected to the ETLRS FLRS ready to be monitored

Homework Failover configuration Maintenance support Monitoring of the FLRS Backup (logs for 6 months)

Organization level RADIUS Provides authentication of the users Connected to the organizational IdM Usually works as a SP

Requirements Linux/Windows host for IdP RADIUS X.509 certificate NTP freeRADIUS

Preparation of the host Assign DNS name Generate X.509 certificate for the host Install these components: NTP freeRADIUS (>3)

Installation of freeRADIUS Complete instructions on: -Debian-packages

Installation of freeRADIUS on Debian 8 cd /usr/src/ wget ftp://ftp.freeradius.org/pub/freeradius/freeradius-server tar.gzftp://ftp.freeradius.org/pub/freeradius/freeradius-server tar.gz tar xvzf freeradius-server tar.gz apt-get install dpkg-dev fakeroot build-essential debhelper quilt autotools-dev libpam0g-dev libmysqlclient-dev libgdbm-dev libldap2-dev libsasl2-dev libiodbc2- dev libkrb5-dev libperl-dev libpcap-dev python-dev libreadline-dev libsnmp-dev libpq-dev libssl-dev libtalloc-dev libyubikey-dev libsqlite3-dev libcurl4-openssl-dev libcap-dev libjson-c-dev libwbclient-dev ssl-cert cd freeradius-server fakeroot dpkg-buildpackage -b -uc cd /opt/src/ dpkg -i freeradius_3.0.9+git_amd64.deb freeradius-common_3.0.9+git_all.deb freeradius-utils_3.0.9+git_amd64.deb libfreeradius3_3.0.9+git_amd64.deb freeradius-ldap_3.0.9+git_amd64.deb freeradius-config_3.0.9+git_amd64.deb

/etc/freeradius/proxy.conf # Setup proper proxying of the requests … realm LOCAL { … } realm asren.org { } …

Certificates Store/use X.509 certificates in /etc/freeradius/certs/ Setup proper owner chown freerad:freerad server.key chmod 0640 server.key

/etc/freeradius/mods-available/eap # Setup TLS eap { … tls-config tls-common { # Private key private_key_file = ${certdir}/radius.key … # Certificate certificate_file = ${certdir}/radius.crt … }

/etc/freeradius/clients.conf # Client definitions client ap_network { secret = shortname = aps ipaddr = /24 }

Enable radsec ln -s /etc/freeradius/sites-available/tls /etc/freeradius/sites-enables/tls

/etc/freeradius/sites-available/tls # For listen and home_server section private_key_file = radius.key certificate_file = radius.pem

/etc/freeradius/sites-available/tls # Connection to the FLRS clients radsec { client radius1.asren.org { ipaddr = a.b.c.d proto = tls secret = radsec } … } home_server tls { ipaddr = radius1.asren.org secret = radsec … } … realm DEFAULT { auth_pool = tls nostrip }

Additional steps Disable dhcp module rm /etc/freeradius/mods-enable/dhcp

Testing and debugging freeradius -fxx -l stdout eapol_test test/eduroam-test.cgi

Create local test account Edit /etc/freeradius/users Cleartext-Password := „abc123“ Fall-Through = Yes

Integration with LDAP Users login/password will be checked against LDAP Passwords must be stored in clear-text form in the LDAP

sites-enabled/inner-tunnel # Enable LDAP authentication authorize { … ldap … } … authenticate { … Auth-Type LDAP { ldap } … }

mods-available/ldap server = ‘ldaps://ldaphost.org’ # user with rights to read the passwords identity = ‘uid=,ou=Special Users,dc=asren,dc=org“ password = # Base DN, where to search the user base_dn = „ou=People,dc=asren,dc=org“ update { # LDAP atribute containing the password control:Cleartext-Password := 'radiusPassword’ } … tls { … ca_file = require_cert = ‘demand’ }

Activate LDAP module cd /etc/freeradius/mods-enabled ln -s../mods-available/ldap

Integration with AD Active-Directory-Integration-HOWTO

Sources Automatic installer from CAF Slides and configuration files from the workshop