360 likes | 372 Views
This project aims to enable users to authenticate to wireless networks at other institutions using their home credentials, reducing the need for guest IDs and simplifying roaming. It explores the concept of federations to establish trust between entities and protect user privacy. The project plan includes two phases: RADIUS Hierarchy and RADIUS + Federation. Join the FWNA Group to stay updated.
E N D
SALSA-FWNAActivity Update Kevin Miller • Duke University kevin.miller@duke.edu Internet2 Member Meeting May 2005
Federated Wireless Auth Vision • Enable members of one institution to authenticate to the wireless network at another institution using their home credentials. • Reduce the need for guest IDs • Simplify authentication when roaming • The “roaming scholar” problem • Wired network roaming comes “free”
Federations • Goals of federations • Establish trust between entities • Make assertions about identities (authenticate) and release attributes • Protect user privacy through opaque user handles and controlled attribute release
Federations • All are relevant to FWNA • Need to create/reuse trust between sites • Could take many forms (hierarchical, central, 1-way, …) • Shibboleth is a candidate • Visited sites may want attributes about visiting users (e.g. type of user, mobile number) • Control release of user information
Potential Federations • Decentralized School • School Systems • State schools, local school districts, etc. • Regional consortia: GigaPoP / *REN • National consortia: Internet2 • International: EduRoam • Government: ESNet, NSF, NASA • Industry
Use Cases • “Simple” Roaming within Federation • Among Peer Institutions • Local Federation (Conference Guests) • Sensor Nets • Municipal Networks • VoIP • Inter-Federation Roaming • Shared Tenancy • Commercial Roaming
FWNA Project Plan • Work divided in two phases • Phase 1: RADIUS Hierarchy • Initial solution to the problem • Modeled after current Eduroam network • Develop knowledge of relevant technology • Learn capabilities and drawbacks of hierarchy • Relatively straightforward • Exchange RADIUS keys • Interface to existing authn systems using basic RADIUS mechanism
FWNA Phase 2 • Phase 2: RADIUS + Federation • Develop technically superior solution that enables attribute release • Identify and address other concerns regarding FWNA implementation • infrastructure • security • authorization • diagnostics • usability • Requires development • May not be solved by FWNA itself
Framing the Solution • 802.1x • Often used with WPA or WPA2 (802.11i) for edge encryption • Or middlebox access controller • EAP authentication • Exact EAP type selected by home institution, deployed on client machines • Establish client-to-home trust for purpose of transporting credentials
Beyond authentication… • In many cases today, once authenticated all users obtain same level of service • FWNA is about identity discovery • We must be able to separately provision services from authn and attributes: • Technical setup (IP address, QoS, ACL, etc..) • Access policy • Billing
Other Areas of Investigation • Real Time Diagnostics • Determining cause of authn failure • Requires additional inter-domain data exchange • Access Point Roaming • Will cause re-authentication back to home server (additional delay) • Mitigated by 802.11i pre-authentication
FWNA Project Milestones • Phase 1 • Core RADIUS Server: Established • Experimentation: Ongoing • Phase 2 • Technical plan: Ongoing • Experimentation: TBD
Join the FWNA Group • Project website:http://security.internet2.edu/fwna • Biweekly Conference Calls • Thursday 11am-12pm: May 19 • 866-411-0013, 0184827 • salsa-fwna @ internet2 list • “subscribe salsa-fwna” to sympa @ internet2
SALSA-NetAuthActivity Update Kevin Miller • Duke University kevin.miller@duke.edu Internet2 Member Meeting May 2005
SALSA-NetAuth Road Map • Version 0.9 published 25 April 05 • “Strategies” Document – Final Version Published • Taxonomy of some approaches for automating technical policy enforcement • “Futures” Documents • Architecture document: Draft 02 Published 25 April 05 • A proposed architecture for integrating network policy enforcement • Draft 03 Will Be Published Soon • “Prerequisites” Document – On Hold • A reference to systems and services necessary to deploy NetAuth systems • SALSA-FWNA Subgroup – Group Active • To investigate the visiting scholar problem
NetAuth Road Map • NetAuth still focused on document development • Engaging other players in the space (Cisco NAC, Microsoft NAP, TNC) • Encouraging and/or Developing for these efforts
Strategies Document • Draft 3 became final version • Published 20 April 2005 • Edited by Eric Gauthier (Boston University) and Phil Rodrigues (New York University) • May return to draft stage after wider analysis and vetting
Strategies Document • Taxonomy of mechanisms for automating network policy enforcement • For example: NetReg, Perfigo, etc. • Provides a starting point for discussions on improving the process • References free and commercial systems
Lifecycle of Network Access • Registration is the initial state • Detection • Isolation • Notification • Remediation
NetAuth Prerequisites • Currently on hold • The Strategies document assumes certain underlying components (systems, software) • The Prerequisites would be a reference to sites interested in establishing network policy enforcement • May evolve as a reference to EDUCAUSE Effective Practices, RESNET presentations, and some additional material as necessary • Will be covered in Futures documents
Futures Documents • Originally targeted as a single document • Too complex • Current goal is to outline each in a separate document: • Architecture • Components • Deployment
Futures Documents • How would we design a NetAuth system if we could do it again? • Focused on interoperability and modularization • Leveraging the taxonomy from the Strategies document to define a unified architecture • Building text and images to understand the space
Futures Documents • Example implementations from the architecture will demonstrate better ways of achieving policy enforcement • Cognizant of vendor/commercial activity in this space • Trusted Computing Group TNC • Cisco NAC • Microsoft NAP
Future Architecture Document • Draft 02 published 25 April 2005 • Draft 03 will be published soon • Edited by Kevin Amorin (Harvard), Eric Gauthier (Boston University)
Future Architecture Document • Two major themes • Workflow • Conceptual model • How a ‘network’ may determine and enforce policy compliance • State Diagram • Mapping of states and transitions • Summation of above workflow
Future Architecture Workflow • Transitions through states can be triggered by various events • Connections • Disruptions • Change in endpoint network stack • Active scanning • Passive detection • Event detection causes a policy decision • Possible enforcement action • Transition to next state
Policy Evaluation • Can be applied in any state • Host can move from “final” state to policy state due to external action
Future Architecture Workflow • Process oriented • A drill down of state transitions in future NetAuth systems • Iterative policy decisions • Policy compliance/non-compliance determined by summation of policy decisions • Based on local criteria
Future Architecture States • The network cycles through various well-defined states while determining policy compliance • Transitions between states are defined by the workflow above • Provides a taxonomy of these states • Represents the lifecycle of an endpoint during policy determination
State Transitions • Any Policy Determination State can move to “Final” State • External events cause transition back to Determination State
Future Components Document • Pre-draft stage • What are the components the comprise a NetAuth system? • How do these components: • Communicate • Interoperate • Modularize • Application to use-cases
Why Develop Futures Documents? • NetAuth systems are complex • There are a mix of commercial and open-souce offerings • Complexity is obscuring our understanding of how they work • As ‘Strategies’ provided a baseline for the current deployments, this effort will help us analyze future systems
FWNA Interactions • We (will) deploy NetAuth systems to federated environments (like FWNA) • To ensure endpoint policy compliance • What if the home institution policies vary from the visited institution? • How do we notify the user if they are a guest? • Identifiers may be opaque
FWNA Interactions • Understanding NetAuth in a federated environment is a challenge • Deployment constraints • Policy enforcement consequences • We can’t understand how NetAuth works in a federated environment until we have a consistent taxonomy to discuss them
Join the NetAuth Group • All documents available fromhttp://security.internet2.edu/netauth • Biweekly Conference Calls • Thursday 12pm-1pm (EDT): May 12, May 26 • 866-411-0013, 0122644 • salsa-netauth @ internet2 list • “subscribe salsa-netauth” to sympa @ internet2