RADIUS Protocol Sowjanya Talasila Shilpa Pamidimukkala.

Slides:



Advertisements
Similar presentations
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Advertisements

CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
CCNA – Network Fundamentals
Chapter 7 – Transport Layer Protocols
CMPE208 Presentation Terminal Access Controller Access Control System Plus (TACACS+) By MARVEL (Libing, Bhavana, Ramya, Maggie, Nitin)
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
Internet Control Message Protocol (ICMP). Introduction The Internet Protocol (IP) is used for host-to-host datagram service in a system of interconnected.
Semester 4 - Chapter 4 – PPP WAN connections are controlled by protocols In a LAN environment, in order to move data between any two nodes or routers two.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
PPP (Point to Point protocol).  On WAN connection, the protocol depends on the WAN technology and communicating equipment:  Examples:  HDLC –  The.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
Georgy Melamed Eran Stiller
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Radius Dave Grizzanti Steve Curti. What is RADIUS? Remote Authentication Dial-In User Service (RADIUS) is a protocol for remote user authentication and.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
RADIUS Server PAP & CHAP Protocols. Computer Security  In computer security, AAA protocol commonly stands for authentication, authorization and accounting.
Chapter 18 RADIUS. RADIUS  Remote Authentication Dial-In User Service  Protocol used for communication between NAS and AAA server  Supports authentication,
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 20 RADIUS and Internet Authentication Service.
S6C12 - AAA AAA Facts. AAA Defined Authentication, Authorization, and Accounting Central Management of AAA –Information in a single, centralized, secure.
Chapter 17 TACACS+.
Implementing RADIUS AAA Phil & Rick. Content Terms and Concepts Access Control What is AAA? Benefits of AAA What is RADIUS? Microsoft IAS Overview Installation.
Process-to-Process Delivery:
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
1 CMPT 471 Networking II ICMP © Janice Regan, 2012.
1 Transport Layer Computer Networks. 2 Where are we?
Mobile and Wireless Communication Security By Jason Gratto.
Doc.: IEEE /TBD Submission November 2001 Warren Barkley, Tim Moore, Bernard Aboba/Microsoft IEEE 802.1X and RADIUS Security Bernard Aboba Ashwin.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Lectu re 1 Recap: “Operational” view of Internet r Internet: “network of networks” m Requires sending, receiving of messages r protocols control sending,
Cody Brookshear Andy Borman
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Dynamic Host Configuration Protocol (DHCP)
AAA Services Authentication -Who ? -Management of the user’s identity Authorization -What can the user do? -Management of the granted services Accounting.
1 HRPD Roamer Authentication Zhibi Wang, Sarvar Patel, Simon Mizikovsky, Nancy Lee.
RADIUS What it is Remote Authentication Dial-In User Service
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
4343 X2 – The Transport Layer Tanenbaum Ch.6.
IP Protocol CSE TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol.
1 Kyung Hee University Chapter 11 User Datagram Protocol.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
RADIUS By: Nicole Cappella. Overview  Central Authentication Services  Definition of RADIUS  “AAA Transaction”  Roaming  Security Issues and How.
Introduction to Port-Based Network Access Control EAP, 802.1X, and RADIUS Anthony Critelli Introduction to Port-Based Network Access Control.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
Port Based Network Access Control
Dynamic Host Configuration Protocol
Chapter 11 User Datagram Protocol
The Transport Layer Implementation Services Functions Protocols
Chapter 9: Transport Layer
Instructor Materials Chapter 9: Transport Layer
5. End-to-end protocols (part 1)
EA C451 Vishal Gupta.
PPP PROTOCOL The First semester
Mobility And IP Addressing
TCP Transport layer Er. Vikram Dhiman LPU.
Net 431 D: ADVANCED COMPUTER NETWORKS
Internet Control Message Protocol (ICMP)
Process-to-Process Delivery:
Chapter 16 Host Configuration : BOOTP and DHCP
CS4470 Computer Networking Protocols
Process-to-Process Delivery: UDP, TCP
DHCP: Dynamic Host Configuration Protocol
Computer Networks Protocols
Transport Layer 9/22/2019.
Presentation transcript:

RADIUS Protocol Sowjanya Talasila Shilpa Pamidimukkala

Outline Introduction Features of RADIUS Protocol Overview Proxy Server Operations of RADIUS Packet format Vulnerabilities Conclusion References

Introduction Remote Authentication Dial In User Service AAA protocol (Authentication, Authorization and Accounting) Supports applications such as Network access IP mobility Used in embedded network devices such as modems servers, routers, switches Works in both local and roaming situations

Network Topology

Features of RADIUS Client-server Model Network Security Flexible Authentication Mechanisms Extensible Protocol

Protocol Overview RADIUS client sends a message to a RADIUS server RADIUS server authenticates and authorizes requests and sends back a response message Client and server use a pre-shared secret key Accounting messages sent from clients to severs, and acknowledged by servers

Logical System View PPPIP Remote Server Information Provider WorkstationModem Customer NAS / RAS ROUTER RADIUS AAA SERVER USER DB ISP POP PSTN Internet

RADIUS Details RADIUS uses UDP instead of TCP as a transport protocol The following are some of the reasons for using UDP: 1. User can wait for only few seconds. It can’t wait for several minutes 2. No special handling for rebooting or offline clients and servers

RADIUS Details Contd.. Reasons for using UDP: 3. Stateless protocol 4. Easy to implement multi-threaded server to service multiple client requests

Advantages Facilitates Centralized user administration Provides certain level of protection against sniffing and active attackers Omni present support Current standard for remote authentication Current versions of RADIUS protocol: RFC 2865 (RADIUS) RFC 2866 (RADIUS Accounting)

Access and Accounting Details Access to a network includes both authentication and authorization RFC 2865 protocol helps for carrying access Port 1812 Accounting RFC 2866 protocol used The assigned port number for RADIUS accounting is 1813

Access Messages Access-Request : authentication and authorization for a connection attempt by a RADIUS client Possible responses from the server to the client: Access-Accept : connection attempt is authenticated and authorized provides specific configuration information necessary to begin the delivery of service to the user

Access messages Contd.. Responses from the server Access-Reject : issued by the server when unacceptable attributes are received Access-Challenge : demands challenge response and causes access deny for subscribers

Accounting messages Accounting-Request : sent by the RADIUS client to specify accounting information for the connection accepted Accounting-Response : acknowledges the successful receipt and processing of Accounting- Request message

Client-server Transaction

RADIUS Clients Theorem (for Java) Livingstone (for c, unix) Radiusclient (for c, unix) Vopcom (for VC++)

RADIUS Server Cistron freeRADIUS ICRADIUS YARD RADIUS GNU-radius

RADIUS Proxying The proxy feature forwards authentication (and accounting) to another server Used for Carriers Roaming users Applications where different organizations use shared resources

Proxy Setup

RADIUS Proxy Servers Client sends access request to forwarding server Gets forwarded to remote server Remote server sends access-accept Forwarding server sends the access accept to the client

RADIUS Operations

Operations Authentication Accounting

Subscriber PSTN Data Store User Information Access Accept Access Request The Authentication Process Access Request Access Accept User Information RADIUS Server the Internet

When a client is configured to use RADIUS, any user of the client presents authentication information to the client. Once the client has obtained such information, it may choose to authenticate using RADIUS. To do so, the client creates an "Access- Request“ containing such Attributes as the user's name, the user's password, the ID of the client and the Port ID which the user is accessing. The Access-Request is submitted to the RADIUS server via the network. Once the RADIUS server receives the request, it validates the sending client. A request from a client for which the RADIUS server does not have a shared secret MUST be silently discarded.

Authentication Flow

If any condition is not met, the RADIUS server sends an "Access- Reject" response indicating that this user request is invalid. If all conditions are met and the RADIUS server wishes to issue a challenge to which the user must respond, the RADIUS server sends an "Access-Challenge" response. If the client receives an Access-Challenge and supports challenge/response it MAY display the text message, if any, to the user, and then prompt the user for a response. The client then re- submits its original Access-Request with a new request ID. If all conditions are met, the list of configuration values for the user are placed into an "Access-Accept" response.

RADIUS: Basics Authentication Data Flow ISP User Database ISP Modem Pool User dials modem pool and establishes connection UserID: bob Password: ge55gep UserID: bob Password: ge55gep NAS-ID: Select UserID=bob Bob password=ge55gep Timeout=3600 [other attributes] Access-Accept User-Name=bob [other attributes] Framed-Address= The Internet ISP RADIUS Server Internet PPP connection established

Accounting Process At the start of service delivery it will generate an Accounting Start packet describing the type of service being delivered and the user it is being delivered to, and will send that to the RADIUS Accounting server, which will send back an acknowledgement that the packet has been received. The Accounting-Request (whether for Start or Stop) is submitted to the RADIUS accounting server via the network. It is recommended that the client continue attempting to send the Accounting-Request packet until it receives an acknowledgement, using some form of backoff.

RADIUS: Basics Accounting Data Flow ISP Accounting Database ISP Modem Pool Acct-Status-Type=Start User-Name=bob Framed-Address= …... Sun May 10 20:47: Acct-Status-Type=Start User-Name=bob Framed-Address= …... The Internet ISP RADIUS Server Internet PPP connection established Acknowledgement The Accounting “Start” Record

RADIUS: Basics Accounting Data Flow ISP Accounting Database ISP Modem Pool The Internet ISP RADIUS Server Internet PPP connection established Acct-Status-Type=Stop User-Name=bob Acct-Session-Time=1432 …... Sun May 10 20:50: Acct-Status-Type=Stop User-Name=bob Acct-Session-Time=1432 …... Acknowledgement The Accounting “Stop” Record User Disconnects

RADIUS Packet Format

RADIUS Packet

Packet Details Code (8 bits) indicates the type of RADIUS packet The table shows the codes assigned to packet types 255 is reserved for future use Packet with invalid code is discarded

Packet Details Identifier (8 bits) helps in matching requests and response Server can use identifier to detect duplicate requests from the same client IP address Identifiers must be reused frequently

Packet Details Length (16 bits) indicates the entire length of the RADIUS packet If packet received was shorter than Length, then it is dropped The extra bits are ignored, if packet is longer than Length Minimum length is 20 bits and maximum is 4096 bits

Packet Details Authenticator (16 bytes) used to authenticate the reply from the RADIUS server Different for both access and accounting requests and responses Request Authenticator: The value should be unique and unpredictable random number over the entire lifetime of the secret key

Packet Details Request Authenticator: Secret key followed by Request Authenticator is put through MD5 hash, then XORed with user password Result is placed in the password attribute Response Authenticator: The values of authentication fields in all access responses indicate Response Authenticator

Packet Details Response Authenticator: MD5 hash over concatenated fields Code + ID + Length + Request Authenticator + Attributes + Secret key Accounting Authenticator: Request Authenticator: MD5 hash over concatenated fields Code + ID + Length +Request Authenticator + Response attributes + shared secret

Packet Details Accounting Authentication: Response Authenticator: MD5 hash over Response code + ID + Length + Request Authenticator +Response attributes +shared secret Attributes ( variable length) contains the list of attributes that are required for the type of service

Vulnerability RADIUS hiding method ( MD5 hash and stream cipher) may not be adequate. Client Access-Request message is not authenticated. Request Authenticators may be poorly implemented. Administrators may choose the RADIUS shared secrets poorly. Multiple clients sharing the same secret make the key easier to discover.

Conclusion RADIUS is Commonly used in embedded systems (routers, switches, etc), which cannot handle large numbers of users with distinct authentication information. Facilitates centralized user administration (useful for ISPs) Other alternatives have less security. Widely implemented by hardware vendors.

Questions What are the possible responses to an Access- Request packet? Access-Accept, Access-Reject, Access-Challenge Explain the unique timing requirements of RADIUS (i.e. why is UPD used rather than TCP).  User can wait a few seconds to be authenticated, no ack overhead and aggressive packet retransmission required.  Users don’t want to wait several minutes, so a reliable delivery 2 minutes later is unacceptable. Send request to alternate server instead.

Questions What are the 2 primary concerns or best practices for a RADIUS installation?  High “information entropy” (randomness) in the shared secret.  Unpredictable and unique random numbers are generated for Request Authentication.

References auth.html auth.html /ch01s01.html#d0e /ch01s01.html#d0e382 Richard Perlman For CEENet #9 Budapest, Hungary Richard Perlman For CEENet #9 Budapest, Hungary