Terena Networking Conference 2003 Applying Radius-based Public - - PowerPoint PPT Presentation

terena networking conference 2003
SMART_READER_LITE
LIVE PREVIEW

Terena Networking Conference 2003 Applying Radius-based Public - - PowerPoint PPT Presentation

Terena Networking Conference 2003 Applying Radius-based Public Access Roaming in the Finnish University Network (FUNET) Sami Keski-Kasari <samikk@cs.tut.fi> Karri Huhtanen <karrih@cs.tut.fi> 1 Contents 1. Background 1.1


slide-1
SLIDE 1

1

Terena Networking Conference 2003

Applying Radius-based Public Access Roaming in the Finnish University Network (FUNET) Sami Keski-Kasari <samikk@cs.tut.fi> Karri Huhtanen <karrih@cs.tut.fi>

slide-2
SLIDE 2

2

Contents

  • 1. Background

– 1.1 What is Public Access Roaming? – 1.2 Why Public Access Roaming?

  • 2. Architecture

– 2.1 Network Architecture – 2.2 Roaming Architecture

  • 3. Current State of Public Access Roaming
  • 4. Requirements for Organizations
  • 5. Security Issues
  • 6. Links and Contact Information
slide-3
SLIDE 3

3

1.1 What is Public Access Roaming?

  • Public Access is an authenticated

temporal access to the network via both wireless or wired medium.

  • Public Access Roaming is a way to

transfer authentication information between organizations so that an user from different organization may gain public access to organization’s network she’s visiting.

slide-4
SLIDE 4

4

1.2 Why Public Access Roaming?

  • The mobility of the students, faculty members, project

personnel, visiting lecturers etc. between organizations is constantly increasing.

  • The existing network access authentication schemes are

different between organizations and even inside one.

  • The authentication databases are separate and each
  • rganization is its own island without mutually agreed

way to transfer authentication information between

  • thers.
  • The usability of the public network access is poor:

– different authentication methods and network environments confuse the end user – every visiting user may require extra support from the system administration to be able to gain the network access

slide-5
SLIDE 5

5

2.1 Network Architecture

  • Org. core

network

  • Org. core

network

Location B ”intra” networks Location B ”intra” networks

Internet Internet

Location B public access networks Location B public access networks Location A public access networks Location A public access networks Location A ”intra” networks Location A ”intra” networks

  • public access networks (PAN) isolated

from other networks in the edge routers

  • access from PAN to Internet controlled by

access controllers

  • department ”intranets” may be protected

with access control lists / filters in the edge routers

  • VLANs are used to separate access

controllers to own access controller segment

  • public access network is considered a

hostile network like the Internet

access controller

AAA server Roaming Proxy

slide-6
SLIDE 6

6

2.2 Roaming Architecture

Roaming Proxy

TUT network TUT network

TUT Public Access Networks TUT Public Access Networks TUT AAA Server (RADIUS)

  • Org. X Public

Access Networks

  • Org. X Public

Access Networks

  • Org. X AAA

Server

NREN (Funet) core network NREN (Funet) core network

  • Org. X

network

  • Org. X

network

NREN Roaming Server

user@tut.fi roams

Roaming Proxy

1. 2. 3. 4.

slide-7
SLIDE 7

7

  • 3. Current State of Public Access Roaming
  • In Tampere region Tampere University and Tampere

University of Technology have both a network architecture capable of public access roaming.

  • In Vaasa region the local Funet organizations are

building public access network infrastructure that is interoperable with Tampere universities’ network infrastructure.

  • Regional roaming comes first defining policies and

practices and inter-region roaming follows.

  • After inter-region roaming comes inter-NREN-roaming

currently under work in Terena’s Mobility Taskforce

slide-8
SLIDE 8

8

  • 4. Requirements for Organizations
  • User account database (username, password),

preferably with Radius interface,but also LDAP/Diameter is/will be possible

  • Free or commercial public access controller(s), that can

do TLS/SSL-secured webpage-based authentication using Radius-servers (e.g. Oasis, NoCatAuth, Nokia, Nomadix, Vernier Networks)

  • Certificate Authority to generate the certificates needed

for access controllers

  • An UNIX/Linux/*BSD host for Public Access Roaming

Proxy functionality, if converting the existing AAA server is not viable

  • Open mind, desire to work together, the support of the

system administration staff

slide-9
SLIDE 9

9

  • 5. Security Issues 1/2
  • Server / Network element security

– Badly maintained Access Controllers, Roaming Proxies, AAA servers – Depending of host’s location in the network, compromising it may jeopardize all user accounts of the roaming organizations. – Allowing only IPSEC-secured traffic between network elements is not THE Solution as systems may be compromised locally via

  • ther network daemons like SSH and SNMP.
  • Certificates and distribution

– The handling of network element certificates becomes more important as we cannot expect the end user to install several self-signed CA certificates into her terminal => soon we have need for a common PKI infrastructure handling trust relationships between organizations and NRENs.

slide-10
SLIDE 10

10

  • 5. Security Issues 2/2
  • Security policies and legal issues

– Is it allowed to transfer username-password –pair between

  • rganizations and what are the conditions for that?

– What about the statistics gathered from the users (traffic amounts / profiles)? In what detail they can be stored, researched or followed?

  • Trust issues, roaming policies and practices

– For organizations to be able to trust each other and to roaming partners’ capability of securing and maintaining their systems, the roaming organizations must together define the roaming architecture and policies based on practical issues. – This may not be very far from roaming/peering agreements between cellular and Internet operators.

slide-11
SLIDE 11

11

  • 6. Links and Contact Information
  • Network Architecture:

– TUT Public Access Architecture: http://www.atm.tut.fi/tut-public-access/

  • Roaming Architecture:

– http://www.atm.tut.fi/public-access-roaming/

  • Contact Information:

– Sami Keski-Kasari <samikk@cs.tut.fi>, Public Access Roaming – Karri Huhtanen <karrih@cs.tut.fi>, TUT Public Access Architecture