PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005.

Slides:



Advertisements
Similar presentations
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Advertisements

Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Copyright Statement Copyright Robert J. Brentrup This work is the intellectual property of the author. Permission is granted for this material to.
CSD-Team 13 Oasis v.2. Introduction Oasis v.1 ISPs share access network Security Choice for end-users Compatible with legacy systems Problems with the.
1 Network Authentication with PKI EDUCAUSE/Dartmouth PKI Summit July 27, 2005 Jim Jokl University of Virginia.
Wireless and Switch Security NETS David Mitchell.
Eduroam – Roam In a Day Louis Twomey, HEAnet Limited HEAnet Conference th November, 2006.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
Network Access and 802.1X Klaas Wierenga SURFnet
Dartmouth PKI Deployment Robert Brentrup PKI Summit July 14, 2004.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Some Common Campus PKI Applications January 2004 CSG Meeting Jim Jokl.
Wireless Security without a VPN! Stirling Goetz, Microsoft Consulting Services.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
802.1x EAP Authentication Protocols
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Company LOGO WIRELESS DEPLOYMENT A successful solution to Campuswide role-based secure Wi-Fi deployment Andrea Di Fabio – Information Security Officer.
Wireless Security with 802.1X Copyright 2005 Michael Griego This work is the intellectual property of the author. Permission is granted for this material.
802.1X in Windows Tom Rixom Alfa & Ariss. Overview 802.1X/EAP 802.1X in Windows Tunneled Authentication Certificates in Windows WIFI Client in Windows.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Security and Accounting with 802.1X. Introduction Background Why 802.1X? What is 802.1X? Implementing 802.1X at UTD The future of 802.1X and.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
RADIUS Secured and Authenticated WiFi Robert Leahy Charles Bodman Brandon Ellis.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Windows 2003 and 802.1x Secure Wireless Deployments.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Course 201 – Administration, Content Inspection and SSL VPN
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 7 City College.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Chapter 20: Getting from the Office to the Road: VPNs BAI617.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
WIRELESS LAN SECURITY Using
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
The Windows NT ® 5.0 Public Key Infrastructure Charlie Chase Program Manager Windows NT Security Microsoft Corporation.
Implementing Network Access Protection
1 PKI & USHER/HEBCA Fall 2005 Internet2 Member Meeting Jim Jokl September 21, 2005.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
Securing your wireless LAN Paul DeBeasi VP Marketing
Module 8: Configuring Network Access Protection
What’s New in Fireware v11.9.5
1/28/2010 Network Plus Unit 4 WAP Configuration WAP Configuration In this section we will discuss basic Wireless Access configuration using a Linksys.
Module 9: Fundamentals of Securing Network Communication.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Dartmouth PKI Update Robert Brentrup Internet2 Member Meeting April 21, 2004.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
Configuring Network Access Protection
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
Fermilab CA Infrastructure EDG CA Managers Mtg June 13, 2003.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Copyright Statement Copyright Robert J. Brentrup This work is the intellectual property of the author. Permission is granted for this material to.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Implementing SSTP VPN and 802.1x with RADIUS on Windows 2012 Ing. Ondřej Ševeček | Product Manager Windows Server | GOPAS a.s. MCM: Directory | MVP: Security.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Implementing Network-Edge Security with 802.1x
Getting Connected to NGS while on the Road…
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Chapter 11: It’s a Network
Unit 27: Network Operating Systems
Goals Introduce the Windows Server 2003 family of operating systems
Getting Connected to NGS while on the Road…
Implementing Client Security on Windows 2000 and Windows XP Level 150
Presentation transcript:

PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005

Next Phase Applications Hardware Key Storage (USB Tokens) Application and OS Sign-on with Tokens Document Signatures –Acrobat, Office, XML (NIH) Secure Mail and List Server Wireless Network Authentication Grids

Network Auth Technologies Wireless and Wired 802.1x/EAP TLS and TTLS or LEAP, PEAP, MS-CHAP etc. WEP, WPA x VPN –IPSEC standard, using Cisco proprietary Cisco password authentication is vulnerable, use client certificates to be secure

VPN Objectives Secure network connections for distant office and travellers –some from home use too, local IP address Secure some legacy applications with closed subnets –server firewall rejects connections not from Private subnet addresses –Use PKI “High Assurance” certificate (token if possible) to authenticate –Assign IP address from protected space after Radius Authentication/Authorization

VPN Implementation Cisco 3000 VPN concentrators (3000 can only look at OU in DN, so added OU=PrivateGroupVPN to certs) ACL check implemented by Radius server Members of ACL maintained with “AuthAdmin” application Configure protected subnets on concentrator Two redundant Radius servers for reliability – running FreeRadius 0.9.2

AuthAdmin Each private VPN subnet intended for members of a specific group Existing examples –Human Resources –Dean of Students Office –International Students Office –Student Health Services Individual in the group authorized to maintain group membership, add and delete Group membership stored in LDAP directory –Web interface for group admin

AuthAdmin UI (screen shot)

Network Authentication Objectives Implement additional protection for campus network services Limit outside use of network Protect campus users from malicious behavior of others Eliminate possible eavesdropping

Network Authentication Implementation Deploy 802.1x/EAP-TLS on APs and switches Traffic is encrypted between user and AP/switch Clients are authenticated with PKI certificates –in our case locally issued No Passwords are exchanged (no credentials to steal)

EAP-TLS Implementation Configure Radius –AP clients, users, EAP-TLS module –Certificate for Radius server –Provide Root certificates of trusted CAs to EAP-TLS module Dartmouth self-signed certificates automatically accepted Tested APs from Cisco and Aruba

Client Software Supplicants built into Win 2000 SP4, XP SP1-2, MacOS –other supplicants available for these platforms Supplicants available for Linux, Win98 and MacOS 9 (some from vendors)

Issues Windows: –no password on Keys –no luck with tokens yet –set advanced options for server certificate validation –Certificates with UID in DN fail Win XP SP1 had some issues with SSID and cert selection, improved in SP2 Mac KeyChain: early versions confused by more than one key with same "name"

Greenpass Objectives System developed to support Guest Authorization in an 802.1x EAP-TLS environment –Also useful for insiders that forgot their token User only needs 802.1x capable machine and web browser, no additional software Guest Introduces Public Key to Greenpass Authorization System Host signs authorization for Guest Access using SPKI certificate delegation features Guest then has access to controlled internal network until time limit expires

Greenpass Implementation Use Router, AP and switch capable of VLANs to create limited use network Recently implemented automatic VLAN switching by Radius Modifications to FreeRadius needed Greenpass servers run on Linux Delegation tool is written in Java Available as Open Source –

Guest Unauthorized

Guest Introduction

Guest Fingerprint

Authorized Delegator

Select Guest

Guest Lookup

Delegation Tool

Delegation Complete

Guest Authorized

Authorized User