SURFnet and access pilots

Download Report

Transcript SURFnet and access pilots

I2 Workshop Shib-Eduroam
I2 Spring Member Meeting, 5 May 2005
[email protected]
Contents
• Requirements
• Implementation
– Requirements
– Technology
– Policy
• Future directions?
2
Requirements
• Identify users uniquely at the edge of the
network
– No session hijacking
• Enable guest usage
• Scalable
– Local user administration and authentication
– No exponential administrative load
• Easy to install and use
– At the most one-time installation by the user
• Open
– Support for all common operating systems
– Non-proprietary
• Secure
3
Possible solutions
European research networks:
• Web-gateway+RADIUS: scalable, unsafe?
• VPN-gateway: not scalable?, safe
• 802.1X+RADIUS: scalable, safe, the future,
but (at the time)…. New
4
EduRoam architecture
• Security based on 802.1X (or web-based redirect)
– Different authentication mechanisms possible
– Identity-based networking
– Mutual authentication possible (by using the right EAPtypes: PEAP, TTLS, TLS)
– Protection of credentials
– Integration with VLAN assignment
– Provides basis for new wireless security standards WPA
and 802.11i
• Roaming based on RADIUS proxying
– Remote Authentication Dial In User Service
– Transport-protocol for authentication information
• Trust fabric based on:
– Technical: RADIUS hierarchy
– Policy: Documents/contracts that define the
responsibilities of user, institution, NREN and the
EduRoam federation
5
EduRoam
Supplicant
Authenticator
(AP or switch)
RADIUS server
RADIUS server
User
DB
University A
Gast
University B
User
DB
SURFnet
piet@university_b.nl
Employee
VLAN
Commercial
VLAN
Student
VLAN
signalerling
data
Central RADIUS
Proxy server
•
Trust based on RADIUS plus policy
documents
•
802.1X
•
(VLAN assigment)
6
Tunneled authentication (PEAP/TTLS)
•
Uses TLS/SSL tunnel to protect data
– The TLS tunnel is set up using the server certificate, thus
authenticating the server and preventing man-in-the-middle
attacks
– The user sends his credentials through the secure tunnel to the
server, thus authenticating the user
User authentication
Protected by Tunnel
Server authentication
TLS tunnel
`
802.1X Client
•
EAP RADIUS Server
Can use dynamic session keys for ‘in the air’ encryption
© Alfa&Ariss
7
Bypassing the hierarchy overhead?
European Server
.nl
.ac.uk
…
uva.nl
Access Point
.dk
Uni-c.dk
Access Point
User database
[email protected]
• AA traffic goes through all intermediate entries
• All links are peer-to-peer agreements / static routes
• DIAMETER? DNSsec? Shib?
8
Authorisation?
European Server
.nl
.ac.uk
…
.de
Access Point
dfn.de
[email protected]
User database
• Is DFN a university? How do you know?
• Is Juergen over 17?
• In general: How to pass attributes back and forth (SAML?)
9
Universal single sign-on?
European Server
.nl
.ac.uk
uva.nl
Shibboleth
…
.es
uclm.es
A-Select
[email protected]
PAPI
Resource
• How do all these applications communicate? (SAML?)
• How can you protect credentials? Tunneled authentication?
• Should we want this?
10