TERENA TF-Mobility: Roaming for WLANs Tim Chown University of Southampton TF-Mobility WG & UKERNA Wireless Advisory Group.

Slides:



Advertisements
Similar presentations
Inter WISP WLAN roaming
Advertisements

Joining eduroam Wireless Roaming for Education and Research.
Encrypting Wireless Data with VPN Techniques
Options for integrating the JANET Roaming Service (JRS) and Shibboleth Tim Chown University of Southampton (UK) JISC Access Management.
Terena Mobility Taskforce update Klaas Wierenga SURFnet.
Licia Florio EUNIS05, Manchester 1 Eduroam EUNIS Conference, June Licia Florio.
5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
IPv6 Multihoming Support in the Mobile Internet Presented by Paul Swenson CMSC 681, Fall 2007 Article by M. Bagnulo et. al. and published in the October.
TF Mobility Group 22nd September A comparison of each national solution was made against Del C – “requirements”, the following solutions were assessed.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
10 October 2003 Internet2 members meeting 1 An update on the work of JANET Wireless Advisory Group & The Terena Mobility Taskforce James Sankar UKERNA.
Copyright JNT Association 2006 The JANET Roaming Service.
The Nomadic Network Providing Secure, Scalable and Manageable Roaming, Remote and Wireless Data Services Josh Howlett & Nick Skelton Information Services,
5/25/2015 AEB/Yleisesittely Roaming network access using Shibboleth in University of Helsinki Fall 2004 Internet2 Member Meeting 29th of September, 2004.
EduRoam ESA workshop 17 December 2004 Utrecht.
Eduroam – Roam In a Day Louis Twomey, HEAnet Limited HEAnet Conference th November, 2006.
Network Access and 802.1X Klaas Wierenga SURFnet
High-quality Internet for higher education and research Federated network access with Klaas Wierenga SURFnet Ljubljana, April.
WLAN Roaming for the European Scientific Community: Lessons Learned , June 9 th, 2004 Carsten Bormann Niels Pollem reporting on the work of TERENA.
Wbone: WLAN Roaming Based on Deep Security Zagreb, May 22 nd, 2003 Carsten Bormann Niels Pollem with a lot of help from TERENA TF Mobility.
EduRoam: movilidad por Europa... y España Toledo, 29 de octubre de 2004
WLAN Roaming for the European Scientific Community: Lessons Learned , June 9 th, 2004 Carsten Bormann Niels Pollem reporting on the work of TERENA.
Deliverable H: the interoperability testbed design Klaas Wierenga SURFnet.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Flexible Network Access Overview. Flexible Access an Integral part of Universal Access Policy Universal Access to Campus IT Resources Managed LAN portsFlexible.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
What about 802.1X? An overview of possibilities for safe access to fixed and wireless networks Amsterdam, October Erik Dobbelsteijn.
Windows 2003 and 802.1x Secure Wireless Deployments.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
UK WLAN Deployment Survey Tim Chown Electronics and Computer Science Department University of Southampton (UK) TERENA TF-Mobility Meeting,
Course 201 – Administration, Content Inspection and SSL VPN
EduRoam Australia Project Experience in location independent wireless networking with international collaboration with TERENA EduRoam Project 19 th APAN.
Windows Internet Connection Sharing Dave Eitelbach Program Manager Networking And Communications Microsoft Corporation.
AARNet Copyright 2010 Network Operations The eduroam project group
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Internet Addressing. When your computer is on the Internet, anything you do requires data to be transmitted and received. For example, when you visit.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Altai Certification Training Backend Network Planning
Education roaming Secure Wireless Service for Research and Education.
Wireless Network Authentication Regnauld / Büttrich, Edit: Sept 2011 Wireless Network Authentication Regnauld / Büttrich, Edit: Sept 2011.
70-411: Administering Windows Server 2012
Implementing Network Access Protection
High-quality Internet for higher education and research Paul Dekkers April 4th, Turkey.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
 An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network.
Large Space IPv4 Trial Usage Program for Future IPv6 Deployment ACTIVITIES UPDATE Vol.5 APNIC 16 Meeting / Policy SIG August 21st, 2003 at Seoul Kosuke.
Draft-chown-v6ops-campus-transition-00 Tim Chown v6ops WG, IETF 60, San Diego, August 2, 2004.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
802.1X in SURFnet 22 May 2003.
Configuring Network Access Protection
LIN and Shibboleth: Where do application and network access control systems meet? Tim Chown University of Southampton (UK) JISC Core.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Security for (Wireless) LANs 802.1X workshop 30 & 31 March 2004 Amsterdam.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Authentication and Authorisation in eduroam Klaas Wierenga, AA Workshop TNC Lyngby, 20th May 2007.
6 June 2004TF-Mobility meeting 6 June TF-Mobility meeting Agenda TF-Mobility Meeting, June Welcome and Update on TF-Mobility to date Discussion.
19 May 2003 © The JNT Association Terena Technical Advisory Council Terena Mobility Task Force
Activity 1 5 minutes to discuss and feedback on the following:
Federated Wireless Network Authentication Kevin Miller Duke University Internet2 Joint Techs Salt Lake City February, 2005.
Goals Introduce the Windows Server 2003 family of operating systems
Presentation transcript:

TERENA TF-Mobility: Roaming for WLANs Tim Chown University of Southampton TF-Mobility WG & UKERNA Wireless Advisory Group

TF-Mobility objectives Formation Original participants SURFnet, UKERNA, DFN, SWITCH, UNINETT, FUNET Taskforce started on January Key objectives Evaluate AAA techniques in mobile environments. Create an Inter-NREN WLAN roaming architecture and test bed and conduct tests. Evaluate mobile equipment and technology. Evaluate next generation mobile technology for handover and roaming (mobile IPv6).

TF-Mobility status Quickly homed in on the topic of WLAN roaming between university sites Catalogued WLAN access control technologies Web-redirection 802.1x Restricted VPN Roamnode Selecting “best” solution for roaming support Or at least proposing interoperability methods for the leading solutions Operating international test beds

Roaming requirements Any system that enables roaming should: Be scalable Have minimal administrative overhead Avoid the need for additional hardware/systems Have appropriate security for the infrastructure Have user access controlled by their home institution Allow users to use their own security (e.g. VPN/ssh) Have good usability for all needed/used platforms Provide accounting and logging Ensure AUPs and policy requirements are met

Access control mechanisms (Very) basic methods: Hidden SSID MAC-based authentication DHCP control of IP addresses Use of WEP More advanced methods: Web-redirect Restricted VPN 802.1x Roamnode (a homebrew system, more later…)

1: Web-redirection Commonly seen at commercial hotspots Used by BTOpenZone, Telia Homerun, … Popular in UK universities via BlueSocket product User runs web client Access controller detects web request Redirects browser to authentication screen User enters credentials If successful, controller opens access for user Users can be placed into “roles” Allows variable external access restrictions to be applied

Web-redirection Internet Public Access Network Access Control Device AAA Server WWW-browser

Web-redirect advantages May authenticate using different tokens: Username/password, scratch card, SMS Commercial and free systems available e.g. BlueSocket, Vernier, NoCatAuth, … Can interface to RADIUS lookup Important for potential scalable roaming support Can fine tune access policy on firewall Only requires a web browser on user’s device Can use cheaper (non-802.1x) access points Can run a VPN after authenticating

Web-redirect disadvantages Web challenge server could be spoofed Users tend not to check the web server certificate Some such systems do not offer SSL protection Some devices may not support use of SSL Though this is increasingly rare Can be some issues detecting detachment DHCP may be spoofed User traffic may be redirected/relayed/intercepted (Roamnode uses PPPoE for this reason)

2: Restricted VPN User gains local IP access via DHCP (May use RFC1918 addresses locally) Access network only allows VPN out To a restricted set of VPN servers Firewall blocks all other traffic out of network User connects to their home VPN server Requires VPN client Some examples in European networks SWITCHmobile in Swiss academic network There the “restricted set” is all Swiss universities

SWITCHmobile

VPN advantages Ensures data security via VPN connection Most (all?) universities now have a VPN service User appears to be at home university IP address allocated by home site IP-based access mechanisms work For example to access bibliographic resources (Though IP-based authentication is not great!) Most devices now have VPN client software Palm Tungsten C ships with WLAN and VPN

VPN disadvantages For the roaming solution: Need to manage large list of trusted VPN servers Needs to be automatically applied to firewall ACLs (Could “simplify” by using address ranges per NREN) VPN service scalability – need to provision for: High bandwidth/volume of remote users All user traffic routed via home VPN Has an impact on latency for traffic Roamers may be a source of viruses/worms VPNs often have no firewalling into home network

Wbone for VPNs A method deployed in Bremen Each access network at any site uses its own unique RFC1918 address space All sites are connected via permanent IP tunnels over the public academic network Users connect to home VPN gateway using the private address of that gateway Requires heavy coordination

Roamnode A homebrew solution from University of Bristol (UK) Uses PPPoE rather than DHCP Akin to access model for home users through their (broadband) ISP Private IP space used for the roaming node Once admitted, user (can only) run a VPN back to their home institution

Roamnode advantages PPPoE is more secure than DHCP Less potential for spoofing Visited institution does not provide an IP address Arguably makes deployment easier Offers RADIUS support Potential for plug-in to a national RADIUS scheme Clients use VPNs Thus shares the pros and cons of VPN usage

Roamnode disadvantages PPPoE client availability Not yet available for Pocket PC PDA platform And because the client uses a VPN: The usual drawbacks of VPN approach

802.1x Port-based (layer 2) access control Run 802.1x client on user device Communicates with authenticator (in access point) User supplies credential (e.g. Carried over EAP, e.g. EAP-TLS or EAP-TTLS Access point relays request to RADIUS server RADIUS response processed by access point May add user to a given VLAN Runs at Layer 2 (Ethernet admission)

802.1x with RADIUS referral Authentication Server (RADIUS server) Institution A Authentication Server (RADIUS server) Institution A Internet Central RADIUS Proxy server Central RADIUS Proxy server Authenticator (access point) Supplicant (client) DB Authentication Server (RADIUS server) Institution B Authentication Server (RADIUS server) Institution B

802.1x advantages Growing client (“supplicant”) support MacOS/X built-in, WinXP support good EAP-TTLS needs only RADIUS server certificate WEP keys refreshed regularly Supported by many access points Can interface to RADIUS Thus has potential for a scalable roaming method Can be used on wired docking points too User can run a VPN after being admitted

802.1x disadvantages Requires special client (“supplicant”) software Not universally available But growing in stature and popularity Participating RADIUS server(s) must support EAP type Any relaying servers must be able to forward EAP Radiator RADIUS server was tested heavily in the pilot 802.1x-capable access points expensive But prices are falling fast Living a little on the bleeding edge

Interoperability Interoperability will be very important E.g. in the transition to deploy new technology, like 802.1x May require special AP functions Ability to offer multiple SSIDs or VLANs Run different methods on different SSIDs/VLANs 802.1x on “trusted” VLAN and SSID Perhaps run a more basic method on another VLAN and SSID as a fallback mechanism during transition 802.1x + multi-SSID + multi-VLAN access points Still quite rare, but available

A roaming infrastructure Explore synergies between the methods Common use of RADIUS back-end Used by Web-redirect, 802.1x, Roamnode Suggests concept of RADIUS referrals Unknown credentials passed up hierarchy Relayed by proxy to home institution Response relayed back to querying site Differential access based on local/remote user In parallel explore scalability of VPN method

RADIUS relationships RADIUS carries authentication requests Needs shared secret configuration between sites To scale, do not want n-squared setup So each site “peers” with national RADIUS server Each national server “peers” with EU server Enables “web of trust” between sites Sites use own auth backend, eg. Active Directory Open question: What are the security requirements on the peerings? Should certain access control methods be dissuaded?

Organisational RADIUS Server Top-level RADIUS Proxy Server Top-level RADIUS Proxy Server Organisational RADIUS Server National RADIUS Proxy Server National RADIUS Proxy Server National RADIUS Proxy Server National RADIUS Proxy Server University of Southampton Currently hosted at SURFnet Currently linked to FCCN, Portugal Currently linked to CARNET, Croatia Backup Top-level RADIUS Proxy Server Backup Top-level RADIUS Proxy Server etlr1.radius.terena.nl ( ) etlr2.radius.terena.nl ( ) Organisational RADIUS Server National RADIUS Proxy Server National RADIUS Proxy Server Organisational RADIUS Server Currently linked to SURFnet, Netherlands National RADIUS Proxy Server National RADIUS Proxy Server Organisational RADIUS Server Currently linked to FUNET, Finland RADIUS proxy hierarchy testbed (network topology view) National RADIUS Proxy Server National RADIUS Proxy Server Organisational RADIUS Server FOKUS (Berlin) National RADIUS Proxy Server National RADIUS Proxy Server

Future work Trials & refinement of the RADIUS hierarchy Location Independent Networking (LIN) architecture Consider RADIUS credential formats and semantics Understand interoperability of methods Study methods to scale VPN roaming Define policy issues Security analysis of all aspects of the LIN model Wider trials of Bristol’s Roamnode Consider and deploy (Mobile) IPv6 implications

Internet 2 interest? US universities have significant WLANs Often much bigger than European deployments Is there a desire for a roaming infrastructure? Are mobility requirements different in the US? What is Internet 2 doing in this area now? Perhaps join the TF-Mobility trial? If any university is interested Shibboleth integration/interoperability Many issues to consider, but should be feasible

More info TERENA TF-Mobility (Deliverable G in particular) UKERNA WAG Including LIN proposal UK Networkshop event presentations