Aarnet Australia's Academic and Research Network Glen Turner 2008-05-29 Eduroam workshop University of Sydney, Australia Using FreeRADIUS with Eduroam.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
Configuring Linux Radius Server
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Remote User Authentication. Module Objectives By the end of this module participants will be able to: Describe the methods available for authenticating.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
1 Linux Networking and Security Chapter 3. 2 Configuring Client Services Configure DNS name resolution Configure dial-up network access using PPP Understand.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Mobile and Wireless Communication Security By Jason Gratto.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe.
Chapter 9: Novell NetWare
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Michal Procházka, Jan Oppolzer CESNET.
1 Week 6 – NPS and RADIUS Install and Configure a Network Policy Server Configure RADIUS Clients and Servers NPS Authentication Methods Monitor and Troubleshoot.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
A Practical Guide for Joining EduRoam EuroCAMP Torino A Practical Guide for Joining EduRoam 4 March 2005 Version 1.6.
Module 11: Remote Access Fundamentals
Single Sign-on with Kerberos 1 Chris Eberle Ryan Thomas RC Johnson Kim-Lan Tran CS-591 Fall 2008.
Configuring Linux Radius Server Objectives –This chapter will show you how to install and use Radius Contents –An Overview Of How Radius Works –Configruation.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Module 7: Implementing Security Using Group Policy.
Wireless and Mobile Security
Workshop roaming services: eduroam / govroam
1 Active Directory Administration Tasks And Tools Active Directory Administration Tasks Active Directory Administrative Tools Using Microsoft Management.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
1 Directory Services  What is a Directory Service?  Directory Services model  Directory Services naming model  X.500 and LDAP  Implementations of.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Securing Cisco Wireless Enterprise Networks (WISECURE)
Web and Proxy Server.
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Module 9: Configuring Network Access
Application layer tcp/ip
Module 3: Enabling Access to Internet Resources
Microsoft Windows NT 4.0 Authentication Protocols
Enabling Secure Internet Access with TMG
COP 4343 Unix System Administration
Module 8: Networking Services
Module Overview Installing and Configuring a Network Policy Server
Implementing Network Access Protection
Securing the Network Perimeter with ISA 2004
Configuring and Troubleshooting Routing and Remote Access
Presented by Liang-Chang Yu
Radius, LDAP, Radius used in Authenticating Users
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
Understand Networking Services
Security of a Local Area Network
Welcome To : Group 1 VC Presentation
What’s New in Fireware v12.1.1
Cisco Real Exam Dumps IT-Dumps
On and Off Premise Secure Access
Unit 27: Network Operating Systems
DHCP, DNS, Client Connection, Assignment 1 1.3
Wireless LAN Security 4.3 Wireless LAN Security.
Server-to-Client Remote Access and DirectAccess
Single Sign-on with Kerberos
Windows Active Directory Environment
Chapter 7 Network Applications
Firewall Installation
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

aarnet Australia's Academic and Research Network Glen Turner Eduroam workshop University of Sydney, Australia Using FreeRADIUS with Eduroam

aarnet Australia's Academic and Research Network Eduroam fundamentals

Chain of authentication example.edu.au Access point example.edu.au LDAP server example.edu.au RADIUS server eduroam-au-*.aarnet.net.au RADIUS proxy eg.edu.au RADIUS server eg.edu.au LDAP server eg.edu.au Roaming laptop

Visitor ● User uses 802.1X to communicate with access point – Gives a user name of ● This is converted from 802.1X to RADIUS and sent to example.edu.au's RADIUS server ● The RADIUS for server does not have an authentication clause the default is to proxy to eduroam-au-* ● eduroam-au-* proxies to eg.edu.au ● eg.edu.au's RADIUS server gateways to LDAP ● which checks the password

Local user ● Two choices – Prevent local users from using eduroam ● example.edu.au's RADIUS server can deny access for – Map Eduroam users to a different VLAN, within the firewall, applying example.edu.au local user policies ● example.edu.au's RADIUS server allows access for and sets VLAN ● Second is the more interesting choice – Only need “eduroam” SSID – Client machines are already set up and tested for roaming

802.1X modes ● EAP/PEAP/TTLS/etc

aarnet Australia's Academic and Research Network Beginning

Installation ● ● Use the package manager – Red Hat, Fedora, CentOS # yum install freeradius ● Doesn't start by default # chkconfig radiusd on # /etc/init.d/radiusd start – Debian, Ubuntu # apt-get install freeradius freeradius-ldap ● Starts immediately, to stop # update-rc.d -f freeradius remove # /etc/init.d/freeradius stop

Configuration files ● Usual Unix-style configuration file – Red Hat /etc/raddb – Debian /etc/freeradius ● Each file collects together related configuration – radiusd.conf — Server configuration – clients.conf — RADIUS clients – proxy.conf — Upstream RADIUS servers – snmp.conf — Connection with Net-SNMP and so on

Log files ● Red Hat /var/log/radius/radius.log ● Debian /var/log/freeradius/radius.log ● Contains: – configuration errors – running errors – authentication success or failure ● Typical debugging phrase is # tail -f /var/log/*radius/radius.log &

SELinux ● Type enforcement of programs and their data – a simple way to stop zero-day attacks ● Look for audit messages in /var/log/messages ● Ask for an explanation – sealert -i … ● Look at SELinux configuration options – getsebool -a ● Modify policy – audit2allow -M local local.te semodule -i local.pp

Exercise 1 ● Boot CentOS Linux virtual machine ● Record its IP address from DHCP server log ● Install FreeRADIUS ● Start FreeRADIUS ● Examine the log file

aarnet Australia's Academic and Research Network Connect access point

Configure access point — SSID ● Service-set Identifer is “eduroam” – ESSID used to retrieve stored configurations – If there are multiple networks operating which provide eduroam then use a riff on the name ● eduroam-aarnet ● eduroam-UofA, eduroam-adelaide may have been better ● 32 bytes

Configure access point — 802.1X ● Transports Extensible Authentication Protocol from supplicant to access point ● Encrypts session – Most supported: WPA Enterprise with TKIP – Most secure: WPA2 Enterprise with AES

Configure access point — RADIUS ● The most common way to transport EAP from the access point across the IP network to the authenticator is RADIUS ● Configure RADIUS – Server IP address and ports ● Well known port: 1812, 1813; used to be 1645, 1646 – Secret (“shared key”)

Configure RADIUS server ● clients.conf contains access points ● Configuration phrase is client { shortname = cbr-c-12 secret = testing } ● The shortname appears in the log file, it has no other significance – Some riff on the AP's name seems right

Exercise 2 ● Configure your access point to use – DHCP to obtain an IP address – Channel 1 – A unique SSID – NAT routing ● Record its IP address from DHCP server log ● Configure 802.1X and RADIUS on access point ● Configure RADIUS server to connect to access point ● Test

aarnet Australia's Academic and Research Network Federate RADIUS server: visitors

Sending requests to federation example.edu.au Access point example.edu.au LDAP server example.edu.au RADIUS server eduroam-au-*.aarnet.net.au RADIUS proxy eg.edu.au RADIUS server eg.edu.au LDAP server eg.edu.au Roaming laptop

Sending requests to federation ● Requests which are not handled locally are proxied to the Eduroam federation ● proxy.conf ● realm DEFAULT { type = radius authhost = eduroam-au-1.anycast.aarnet.net.au:1812 accthost = eduroam-au-1.anycast.aarnet.net.au:1813 secret = testing nostrip } realm DEFAULT { type = radius authhost = eduroam-au-2.anycast.aarnet.net.au:1812 accthost = eduroam-au-2.anycast.aarnet.net.au:1813 secret = testing nostrip }

Exercise 3 ● Federate your server with the Australian eduroam server ● Use a test account to check to if your RADIUS server and access point with authenticate a foreign user

aarnet Australia's Academic and Research Network Local users

Defining a local user ● users fred User-Password == “testing” ● radiusd.conf authorize { preprocess mschap suffix eap files } authenticate { Auth-Type MS-CHAP { mschap } eap }

MSCHAP ● radiusd.conf mschap { authtype = MS-CHAP use_mppe = yes require_encryption = yes require_strong = yes }

EAP ● eap.conf ● eap { default_eap_type = … timer_expire = 60 ignore_unknown_eap_types = no cisco_accounting_username_bug = no ● Now configure TLS, PEAP, TTLS

TLS ● Transport layer security requires certificates ● eap.conf eap{ tls { private_key_password = abcdefg private_key_file = ${raddbdir}/certs/cert-srv.pem certificate_file = ${raddbdir}/certs/cert-srv.pem CA_file = ${raddbdir}/certs/demoCA/cacert.pem dh_file = ${raddbdir}/certs/dh random_file = ${raddbdir}/certs/random fragment_size = 1024 include_length = yes copy_request_to_tunnel = no use_tunneled_reply = no } }

PEAP with MSCHAPv2 ● eap.conf eap { tls { … } default_eap_type = peap peap { default_eap_type = mschapv2 } mschapv2 { } }

TTLS ● eap.conf eap { default_eap_type = tls tls { … } ttls { copy_request_to_tunnel = no use_tunneled_reply = no } }

Exercise 4 ● Create a local user ● Configure your wireless supplicant to authenticate against that local user using PEAP+MSCHAPv2 and TTLS – You may need to download the Secure W2 client if using Windows ●

aarnet Australia's Academic and Research Network Federate RADIUS server: travellers

The federation makes queries ● Just like access points do ● clients.conf client eduroam-au-1.aarnet.net.au { shortname = eduroam-au-1 secret = testing } client eduroam-au-2.aarnet.net.au { shortname = eduroam-au-2 secret = testing }

aarnet Australia's Academic and Research Network Integration with organisational directory

Connect server with authentication ● FreeRADIUS can locally authenticate user IDs and passwords ● FreeRADIUS can proxy the authentication to a database, LDAP, Kerberos and ActiveDirectory ● Authentication servers often provide an LDAP gateway themselves, making LDAP a common ground – Oracle Internet Directory – Novell eDirectory

LDAP recipe ● Modern LDAP server schema – Very different from what ISO intended – Easy interoperation with Internet ● recipe.htm ● dn: uid=a12323,ou=people,dc=example,dc=edu,dc=au uid: a12323 cn: Fred Bloggs givenName: Fred sn: Bloggs eduPersonNickname: Fred mail: mailhost: smtp.srv.example.edu.au eduPersonAffliliation: staff eduPersonPrimaryAffiliation: staff eduPersonPrincipalName:

LDAP and FreeRADIUS ● modules { ldap { server = ldap.srv.example.edu.au basedn = “ou=people,dc=example,dc=edu,dc=au” filter = “(eduPersonPrincipalName=%{User-Name})” dictionary_mapping = ${raddbdir}/ldap.attrmap ldap_connections_number = 5 timeout = 4 timelimit = 3 net_timeout = 1 } } authorize { … ldap … } authenticate { Auth-Type LDAP { ldap } … }

● If your LDAP Schema doesn't follow the eduPerson recipe then you can use other attributes, such as addresses, and add an explicit attribute or LDAP group for use of Eduroam

OpenLDAP ● apt-get install slapd ● yum install openldap openldap-clients openldap-servers ● gq is a nice graphical administration tool

Other directories ● The FreeRADIUS Wiki has configs for Microsoft Active Directory

aarnet Australia's Academic and Research Network Limiting financial exposure

Strategies ● Blocking ● Rate-limiting ● Blocking with multiple routers ● Rate-limiting with multiple routing tables

aarnet Australia's Academic and Research Network Glen Turner Using FreeRADIUS with Eduroam