SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
eduroam diagnostics in
 NTLR, IdPs and SPs
     Karri Huhtanen
      Arch Red Oy
      13.3.2013 v1.1
Warning

• This presentation contains detailed
  explanations and long sentences with rather
  small font.
• Because of this it is already available also at
  SlideShare
• http://www.slideshare.net/khuhtanen/
  eduroam-diagnostics-in-ntlr-idps-and-sps
Background
•   the amount of failed authentications in eduroam seems big
    when organisations are looking into NTLR statistics

•   CSC/Funet asked if Arch Red could list and explain 10 most
    common reasons while authentication failed for organisations

•   So we (Arch Red) wrote first few long emails, but decided then
    to publish our findings in two blog posts, first in Finnish:
    •   http://blog.archred.fi/2013/01/eduroamin-vianselvitys-osa-1.html

    •   http://blog.archred.fi/2013/01/eduroamin-vianselvitys-osa-2-yleisimmat.html

•   This presentation is about describing those findings in English
    and even developing those blog posts further
Background
•   Arch Red runs National Top Level RADIUS (NTLR) for CSC/
    Funet and has connected and even provided turn-key eduroam
    solutions for several Finnish universities

•   Via our cooperation agreement with Open System Consultants
    (Radiator RADIUS server), we have helped organisations around
    the world to join to eduroam

•   Arch Red also runs the Top Level RADIUS service and
    authentication services (IdP) for Wireless Tampere community
    network and several neighboring cities.

•   This has given us the experience of diagnosing eduroam from the
    perspective of Top Level RADIUS (TLR), Service Provider (SP)
    and Identity Provider (IdP)
Top Level RADIUS diagnostics
•   Do we accept RADIUS requests from source (IdP/SP)?

•   Do we know where to send them next? (routing) Is there a proper
    realm in requests?

•   Does the next hop (ETLR / IdP) accept the proxied RADIUS
    request, reject or drop them? Is it alive?

•   Do the RADIUS responses travel properly to opposite direction?

•   And that’s about it with EAP-packets. All the remaining
    information about connections is at the IdP.

•   TLR may not even register those eduroam authentications which
    hang or are not otherwise responded with accept or reject.
Service Provider Diagnostics
•   Do we accept RADIUS requests from source (NAS)?

•   Do we know where to send them next? (routing) Is there a
    proper realm in requests?

•   Does the next hop (TLR) accept the proxied RADIUS
    request, reject or drop them? Is it alive?

•   Do the RADIUS responses travel properly to opposite
    direction?

•   And that’s it with EAP messages. The service provider does
    not know anything else. It can however in some cases
    diagnose what is the roaming terminal’s connection quality,
    which is more than TLR knows.
Identity Provider Diagnostics
•   So now we know that Identity Provider has all the
    information to solve major part of its users connection
    problems.

•   Unfortunately Identity Provider such as University may
    not have the experience, knowledge and time needed to
    utilise that information.

•   Because of that we collected a short list of issues, which
    may lead to failed authentications and bad eduroam user
    experience.

•   The following problems are not in a particular order, but
    numbered to help referral.
1) configuration problems in terminals
•   user terminals are not configured correctly to work in home
    eduroam network, they are configured hastily/incompletely in
    foreign network or there may be typos in usernames/realms

•   the complex configuration is then not finished or removed but
    hoped magically to correct itself in some other network

•   this kind of partially configured client then bombards IdP server
    with failing authentication requests increasing failed authentication
    in statistics

•   even bigger problem are for example failing SSL/TLS tunneling,
    PEAP and this kind of interrupted or hanging sessions which may
    not be registered or seen without running IdP servers in debug
    mode
2) older devices and supplicant
            implementations

•   Old Nokia and Symbian based devices are good bad
    examples. WPA/WPA2 in them used by default EAP-SIM,
    EAP-AKA authentication and had to be manually changed
    to use PEAP/EAP-TTLS etc. If you do not know this
    problem, be happy that Symbian is dead.

•   This problem can be seen in SP, IdP and TLR logs with the
    usual 3gpp realm

•   Luckily this is going away with better defaults for
    supplicants, Android, Windows Phone and iPhone use by
    default username password authentication.
3) certificate checking problems
•   Proper certificate installation is hard to do correctly, iOS kinda
    works, Android is hell and does anyone know how to configure
    certificate check to Windows Phone?

•   EAP-TTLS/PEAP+MSCHAPv2 somewhat protects users and IdPs
    from man-in-the-middle attacks even if server certificate is not
    checked

•   Still some supplicants do not allow for example server name to be
    checked from certificate

•   In a better world this would be done via SSH style fingerprint
    checking and user alerted only if RADIUS server host key would be
    changed.

•   Incorrectly or half configured certificate checks cause devices to
    bombard once again IdP servers and may not even show in logs.
4) periodical password change
           requirements in IdPs
•   So IdP requires all its employees and students to change password
    every 6-9 months?

•   What happens to all those device configurations with old
    passwords? What will those devices do?

•   You see the point?

•   Our pursuit for single-sign-on has led us to problem where
    password needs to be so secure that it needs to be changed often.
    Changing it often then breaks eduroam configurations.

•   How about if we would just get back to multiple passwords or have
    a separate eduroam password? Maybe randomized password by
    device in a style of Google’s passwords per device? Or Certs in the
    year 2000 maybe? :)
5) IdPs incorrect/invalid
          configuration instructions

•   5.1) No realm in configuration instructions either in the
    inner or outer authentication

•   5.2) Weaseling out of certificate problems by instructing
    users not to check server certificate or server hostname

•   Just google eduroam instructions, you will find a lot of this
    kind of incorrect instructions

•   Solution for this might be to shame those organisations to
    correct instructions or offer only correct official instructions
    and require IdPs to configure their AAA accordingly.
6) Bugs in terminal UI or
           certificate management

•   Some devices do not allow e.g. configuring preinstalled CA
    certificates to be allowed to be used for RADIUS server
    certificate verification (Nokia N900 was one of these)

•   Some devices make it really hard to install CA certificates
    (Android)

•   And some just do not have UI settings for managing
    certificates, configuring server names checks etc.

•   Could we shame vendors to also do these properly? Pretty
    please?
7) eduroam WiFi network
           configuration differences
•   The actual WiFi radio network configuration differences can also
    cause problems.

•   Example: Organisation provides eduroam in WPA1/WPA2
    compatibility mode. Some devices assume then that eduroam
    always supports WPA1 and do not accept WPA2 network as
    eduroam. Then when user tries to configure new WPA2 eduroam
    network, it cannot be configured as it has the same SSID as the
    earlier WPA1 profile. (Microsoft Windows 7)

•   So let’s just decide that eduroam is only pure WPA2, no WPA1, no
    802.1X+WEP, no TKIP, no compatibility modes etc. The
    recommendation is already WPA2, can it be also obligation for pure
    WPA2?
Conclusions, solutions, suggestions
•   eduroam CAT solves a lot of these issues and in Stefan Winter’s
    presentation in this GN3 Workshop there were a lot of nice tests to
    ensure IdPs work properly

•   However installing an additional supplicant may interfere with
    terminal operating systems or other 3rd party clients.

•   A better approach might be to use operating system specific
    configuration and provisioning interfaces.

•   For some mobile devices a generic eduroam / other configuration
    provisioning app could be more generic solution. The app would
    then configure or correct the actual operating system settings based
    on the information received from the eduroam CAT provisioning
    service. App could also be used for eduroam quality and
    conformance monitoring as well as problem reporting.
More problems, solutions,
       questions?
Contact Information

•   Karri Huhtanen

•   Arch Red Oy: http://www.archred.com/

•   Twitter: @khuhtanen

•   Google+: https://plus.google.com/101610587919646203054/

Weitere ähnliche Inhalte

Was ist angesagt? (18)

IPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for MobilesIPv6 - A Real World Deployment for Mobiles
IPv6 - A Real World Deployment for Mobiles
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Wi fi and its application
Wi fi and its applicationWi fi and its application
Wi fi and its application
 
Acit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpns
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Next Generation Wireless Architecture for Multimedia-Grade Residence Halls
Next Generation Wireless Architecture for Multimedia-Grade Residence HallsNext Generation Wireless Architecture for Multimedia-Grade Residence Halls
Next Generation Wireless Architecture for Multimedia-Grade Residence Halls
 
Wi fi / Wireless Fidelity
Wi fi / Wireless FidelityWi fi / Wireless Fidelity
Wi fi / Wireless Fidelity
 
Wi-Fi Evolution
Wi-Fi EvolutionWi-Fi Evolution
Wi-Fi Evolution
 
Wi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank SaxenaWi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank Saxena
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
Air heads rio 2010 controlling the air
Air heads rio 2010   controlling the airAir heads rio 2010   controlling the air
Air heads rio 2010 controlling the air
 
Network Rightsizing Best Practices Guide
Network Rightsizing Best Practices GuideNetwork Rightsizing Best Practices Guide
Network Rightsizing Best Practices Guide
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Spectralink airheads 2013
Spectralink airheads 2013Spectralink airheads 2013
Spectralink airheads 2013
 
WIFI Technology
WIFI TechnologyWIFI Technology
WIFI Technology
 
All access Wi-Fi around CEAT
All access Wi-Fi around CEATAll access Wi-Fi around CEAT
All access Wi-Fi around CEAT
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
 

Andere mochten auch

Connecting the Dots: Integrating RADIUS to Network Measurement and Monitoring
Connecting the Dots: Integrating RADIUS to Network Measurement and MonitoringConnecting the Dots: Integrating RADIUS to Network Measurement and Monitoring
Connecting the Dots: Integrating RADIUS to Network Measurement and MonitoringKarri Huhtanen
 
Building Funet WLAN Roaming, eduroam Finland and Wireless Tampere
Building Funet WLAN Roaming, eduroam Finland and Wireless TampereBuilding Funet WLAN Roaming, eduroam Finland and Wireless Tampere
Building Funet WLAN Roaming, eduroam Finland and Wireless TampereKarri Huhtanen
 
Open WiFi or Broken WiFi?
Open WiFi or Broken WiFi?Open WiFi or Broken WiFi?
Open WiFi or Broken WiFi?Karri Huhtanen
 
Using NoSQL databases to store RADIUS and Syslog data
Using NoSQL databases to store RADIUS and Syslog dataUsing NoSQL databases to store RADIUS and Syslog data
Using NoSQL databases to store RADIUS and Syslog dataKarri Huhtanen
 
What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?Karri Huhtanen
 
Cloud Computing Business Models
Cloud Computing Business ModelsCloud Computing Business Models
Cloud Computing Business ModelsKarri Huhtanen
 

Andere mochten auch (6)

Connecting the Dots: Integrating RADIUS to Network Measurement and Monitoring
Connecting the Dots: Integrating RADIUS to Network Measurement and MonitoringConnecting the Dots: Integrating RADIUS to Network Measurement and Monitoring
Connecting the Dots: Integrating RADIUS to Network Measurement and Monitoring
 
Building Funet WLAN Roaming, eduroam Finland and Wireless Tampere
Building Funet WLAN Roaming, eduroam Finland and Wireless TampereBuilding Funet WLAN Roaming, eduroam Finland and Wireless Tampere
Building Funet WLAN Roaming, eduroam Finland and Wireless Tampere
 
Open WiFi or Broken WiFi?
Open WiFi or Broken WiFi?Open WiFi or Broken WiFi?
Open WiFi or Broken WiFi?
 
Using NoSQL databases to store RADIUS and Syslog data
Using NoSQL databases to store RADIUS and Syslog dataUsing NoSQL databases to store RADIUS and Syslog data
Using NoSQL databases to store RADIUS and Syslog data
 
What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?
 
Cloud Computing Business Models
Cloud Computing Business ModelsCloud Computing Business Models
Cloud Computing Business Models
 

Ähnlich wie eduroam diagnostics in NTLR, IdPs and SPs

Jax Devops 2017 Succeeding in the Cloud – the guidebook of Fail
Jax Devops 2017  Succeeding in the Cloud – the guidebook of FailJax Devops 2017  Succeeding in the Cloud – the guidebook of Fail
Jax Devops 2017 Succeeding in the Cloud – the guidebook of FailSteve Poole
 
Network Troubleshooting.pptx
Network Troubleshooting.pptxNetwork Troubleshooting.pptx
Network Troubleshooting.pptxMohamedSafeer14
 
Basic Network Support Certification
Basic Network Support CertificationBasic Network Support Certification
Basic Network Support CertificationVskills
 
Cyber Security - Boundary Defense Mechanisms
Cyber Security - Boundary Defense MechanismsCyber Security - Boundary Defense Mechanisms
Cyber Security - Boundary Defense MechanismsJim Kaplan CIA CFE
 
RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?APNIC
 
PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...
PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...
PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...RightScale
 
Debugging Microservices - key challenges and techniques - Microservices Odesa...
Debugging Microservices - key challenges and techniques - Microservices Odesa...Debugging Microservices - key challenges and techniques - Microservices Odesa...
Debugging Microservices - key challenges and techniques - Microservices Odesa...Lohika_Odessa_TechTalks
 
Tech talk microservices debugging
Tech talk microservices debuggingTech talk microservices debugging
Tech talk microservices debuggingAndrey Kolodnitsky
 
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionHeartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionCASCouncil
 
EAP-TLS (extended version)
EAP-TLS (extended version)EAP-TLS (extended version)
EAP-TLS (extended version)Karri Huhtanen
 
Technical and Business Considerations for DNSSEC Deployment
Technical and Business Considerations for DNSSEC DeploymentTechnical and Business Considerations for DNSSEC Deployment
Technical and Business Considerations for DNSSEC DeploymentAPNIC
 
NATS Internals, Strengths and Challenges
NATS Internals, Strengths and ChallengesNATS Internals, Strengths and Challenges
NATS Internals, Strengths and Challengessouravagrawal35
 
Canarie CAF-eduroam Technical Workshop
Canarie CAF-eduroam Technical WorkshopCanarie CAF-eduroam Technical Workshop
Canarie CAF-eduroam Technical WorkshopChris Phillips
 
Federated access management
Federated access managementFederated access management
Federated access managementMark Cairney
 
cloud session uklug
cloud session uklugcloud session uklug
cloud session uklugdominion
 
CANARIE Eduroam and Shibboleth Lessons & Areas of interest
CANARIE Eduroam and Shibboleth Lessons & Areas of interestCANARIE Eduroam and Shibboleth Lessons & Areas of interest
CANARIE Eduroam and Shibboleth Lessons & Areas of interestChris Phillips
 
Introduction to Distributed Computing & Distributed Databases
Introduction to Distributed Computing & Distributed DatabasesIntroduction to Distributed Computing & Distributed Databases
Introduction to Distributed Computing & Distributed DatabasesShankar Iyer
 

Ähnlich wie eduroam diagnostics in NTLR, IdPs and SPs (20)

Jax Devops 2017 Succeeding in the Cloud – the guidebook of Fail
Jax Devops 2017  Succeeding in the Cloud – the guidebook of FailJax Devops 2017  Succeeding in the Cloud – the guidebook of Fail
Jax Devops 2017 Succeeding in the Cloud – the guidebook of Fail
 
Network Troubleshooting.pptx
Network Troubleshooting.pptxNetwork Troubleshooting.pptx
Network Troubleshooting.pptx
 
Basic Network Support Certification
Basic Network Support CertificationBasic Network Support Certification
Basic Network Support Certification
 
Cyber Security - Boundary Defense Mechanisms
Cyber Security - Boundary Defense MechanismsCyber Security - Boundary Defense Mechanisms
Cyber Security - Boundary Defense Mechanisms
 
RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?
 
PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...
PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...
PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...
 
Debugging Microservices - key challenges and techniques - Microservices Odesa...
Debugging Microservices - key challenges and techniques - Microservices Odesa...Debugging Microservices - key challenges and techniques - Microservices Odesa...
Debugging Microservices - key challenges and techniques - Microservices Odesa...
 
Tech talk microservices debugging
Tech talk microservices debuggingTech talk microservices debugging
Tech talk microservices debugging
 
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionHeartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
 
IT HealthCheck
IT HealthCheckIT HealthCheck
IT HealthCheck
 
EAP-TLS (extended version)
EAP-TLS (extended version)EAP-TLS (extended version)
EAP-TLS (extended version)
 
Technical and Business Considerations for DNSSEC Deployment
Technical and Business Considerations for DNSSEC DeploymentTechnical and Business Considerations for DNSSEC Deployment
Technical and Business Considerations for DNSSEC Deployment
 
NATS Internals, Strengths and Challenges
NATS Internals, Strengths and ChallengesNATS Internals, Strengths and Challenges
NATS Internals, Strengths and Challenges
 
Matrix
MatrixMatrix
Matrix
 
Canarie CAF-eduroam Technical Workshop
Canarie CAF-eduroam Technical WorkshopCanarie CAF-eduroam Technical Workshop
Canarie CAF-eduroam Technical Workshop
 
Federated access management
Federated access managementFederated access management
Federated access management
 
amir_(1) (1) (1)
amir_(1) (1) (1)amir_(1) (1) (1)
amir_(1) (1) (1)
 
cloud session uklug
cloud session uklugcloud session uklug
cloud session uklug
 
CANARIE Eduroam and Shibboleth Lessons & Areas of interest
CANARIE Eduroam and Shibboleth Lessons & Areas of interestCANARIE Eduroam and Shibboleth Lessons & Areas of interest
CANARIE Eduroam and Shibboleth Lessons & Areas of interest
 
Introduction to Distributed Computing & Distributed Databases
Introduction to Distributed Computing & Distributed DatabasesIntroduction to Distributed Computing & Distributed Databases
Introduction to Distributed Computing & Distributed Databases
 

Mehr von Karri Huhtanen

Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and PrivacyDisobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and PrivacyKarri Huhtanen
 
Wi-Fi Roaming Security and Privacy
Wi-Fi Roaming Security and PrivacyWi-Fi Roaming Security and Privacy
Wi-Fi Roaming Security and PrivacyKarri Huhtanen
 
OpenRoaming and CapPort
OpenRoaming and CapPortOpenRoaming and CapPort
OpenRoaming and CapPortKarri Huhtanen
 
Suomen eduroam-juuripalvelun uudistukset
Suomen eduroam-juuripalvelun uudistuksetSuomen eduroam-juuripalvelun uudistukset
Suomen eduroam-juuripalvelun uudistuksetKarri Huhtanen
 
Adding OpenRoaming to existing IdP and roaming federation service
Adding OpenRoaming to existing IdP and roaming federation serviceAdding OpenRoaming to existing IdP and roaming federation service
Adding OpenRoaming to existing IdP and roaming federation serviceKarri Huhtanen
 
OpenRoaming -- Wi-Fi Roaming for All
OpenRoaming -- Wi-Fi Roaming for AllOpenRoaming -- Wi-Fi Roaming for All
OpenRoaming -- Wi-Fi Roaming for AllKarri Huhtanen
 
Routing host certificates in eduroam/govroam
Routing host certificates in eduroam/govroamRouting host certificates in eduroam/govroam
Routing host certificates in eduroam/govroamKarri Huhtanen
 
Cooperative labs, testbeds and networks
Cooperative labs, testbeds and networksCooperative labs, testbeds and networks
Cooperative labs, testbeds and networksKarri Huhtanen
 
Privacy and traceability in Wi-Fi networks
Privacy and traceability in Wi-Fi networksPrivacy and traceability in Wi-Fi networks
Privacy and traceability in Wi-Fi networksKarri Huhtanen
 
Security issues in RADIUS based Wi-Fi AAA
Security issues in RADIUS based Wi-Fi AAASecurity issues in RADIUS based Wi-Fi AAA
Security issues in RADIUS based Wi-Fi AAAKarri Huhtanen
 
What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?Karri Huhtanen
 
eduroam ennen, nyt ja tulevaisuudessa
eduroam ennen, nyt ja tulevaisuudessaeduroam ennen, nyt ja tulevaisuudessa
eduroam ennen, nyt ja tulevaisuudessaKarri Huhtanen
 
Joukkoliikennedatan ongelmat ja ratkaisuja
Joukkoliikennedatan ongelmat ja ratkaisujaJoukkoliikennedatan ongelmat ja ratkaisuja
Joukkoliikennedatan ongelmat ja ratkaisujaKarri Huhtanen
 

Mehr von Karri Huhtanen (15)

Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and PrivacyDisobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
 
Wi-Fi Roaming Security and Privacy
Wi-Fi Roaming Security and PrivacyWi-Fi Roaming Security and Privacy
Wi-Fi Roaming Security and Privacy
 
OpenRoaming and CapPort
OpenRoaming and CapPortOpenRoaming and CapPort
OpenRoaming and CapPort
 
Suomen eduroam-juuripalvelun uudistukset
Suomen eduroam-juuripalvelun uudistuksetSuomen eduroam-juuripalvelun uudistukset
Suomen eduroam-juuripalvelun uudistukset
 
Adding OpenRoaming to existing IdP and roaming federation service
Adding OpenRoaming to existing IdP and roaming federation serviceAdding OpenRoaming to existing IdP and roaming federation service
Adding OpenRoaming to existing IdP and roaming federation service
 
OpenRoaming -- Wi-Fi Roaming for All
OpenRoaming -- Wi-Fi Roaming for AllOpenRoaming -- Wi-Fi Roaming for All
OpenRoaming -- Wi-Fi Roaming for All
 
Routing host certificates in eduroam/govroam
Routing host certificates in eduroam/govroamRouting host certificates in eduroam/govroam
Routing host certificates in eduroam/govroam
 
Cooperative labs, testbeds and networks
Cooperative labs, testbeds and networksCooperative labs, testbeds and networks
Cooperative labs, testbeds and networks
 
Privacy and traceability in Wi-Fi networks
Privacy and traceability in Wi-Fi networksPrivacy and traceability in Wi-Fi networks
Privacy and traceability in Wi-Fi networks
 
EAP-TLS
EAP-TLSEAP-TLS
EAP-TLS
 
Security issues in RADIUS based Wi-Fi AAA
Security issues in RADIUS based Wi-Fi AAASecurity issues in RADIUS based Wi-Fi AAA
Security issues in RADIUS based Wi-Fi AAA
 
TLS and Certificates
TLS and CertificatesTLS and Certificates
TLS and Certificates
 
What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?
 
eduroam ennen, nyt ja tulevaisuudessa
eduroam ennen, nyt ja tulevaisuudessaeduroam ennen, nyt ja tulevaisuudessa
eduroam ennen, nyt ja tulevaisuudessa
 
Joukkoliikennedatan ongelmat ja ratkaisuja
Joukkoliikennedatan ongelmat ja ratkaisujaJoukkoliikennedatan ongelmat ja ratkaisuja
Joukkoliikennedatan ongelmat ja ratkaisuja
 

Kürzlich hochgeladen

Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfROWELL MARQUINA
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneUiPathCommunity
 

Kürzlich hochgeladen (20)

Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdf
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyone
 

eduroam diagnostics in NTLR, IdPs and SPs

  • 1. eduroam diagnostics in NTLR, IdPs and SPs Karri Huhtanen Arch Red Oy 13.3.2013 v1.1
  • 2. Warning • This presentation contains detailed explanations and long sentences with rather small font. • Because of this it is already available also at SlideShare • http://www.slideshare.net/khuhtanen/ eduroam-diagnostics-in-ntlr-idps-and-sps
  • 3. Background • the amount of failed authentications in eduroam seems big when organisations are looking into NTLR statistics • CSC/Funet asked if Arch Red could list and explain 10 most common reasons while authentication failed for organisations • So we (Arch Red) wrote first few long emails, but decided then to publish our findings in two blog posts, first in Finnish: • http://blog.archred.fi/2013/01/eduroamin-vianselvitys-osa-1.html • http://blog.archred.fi/2013/01/eduroamin-vianselvitys-osa-2-yleisimmat.html • This presentation is about describing those findings in English and even developing those blog posts further
  • 4. Background • Arch Red runs National Top Level RADIUS (NTLR) for CSC/ Funet and has connected and even provided turn-key eduroam solutions for several Finnish universities • Via our cooperation agreement with Open System Consultants (Radiator RADIUS server), we have helped organisations around the world to join to eduroam • Arch Red also runs the Top Level RADIUS service and authentication services (IdP) for Wireless Tampere community network and several neighboring cities. • This has given us the experience of diagnosing eduroam from the perspective of Top Level RADIUS (TLR), Service Provider (SP) and Identity Provider (IdP)
  • 5. Top Level RADIUS diagnostics • Do we accept RADIUS requests from source (IdP/SP)? • Do we know where to send them next? (routing) Is there a proper realm in requests? • Does the next hop (ETLR / IdP) accept the proxied RADIUS request, reject or drop them? Is it alive? • Do the RADIUS responses travel properly to opposite direction? • And that’s about it with EAP-packets. All the remaining information about connections is at the IdP. • TLR may not even register those eduroam authentications which hang or are not otherwise responded with accept or reject.
  • 6. Service Provider Diagnostics • Do we accept RADIUS requests from source (NAS)? • Do we know where to send them next? (routing) Is there a proper realm in requests? • Does the next hop (TLR) accept the proxied RADIUS request, reject or drop them? Is it alive? • Do the RADIUS responses travel properly to opposite direction? • And that’s it with EAP messages. The service provider does not know anything else. It can however in some cases diagnose what is the roaming terminal’s connection quality, which is more than TLR knows.
  • 7. Identity Provider Diagnostics • So now we know that Identity Provider has all the information to solve major part of its users connection problems. • Unfortunately Identity Provider such as University may not have the experience, knowledge and time needed to utilise that information. • Because of that we collected a short list of issues, which may lead to failed authentications and bad eduroam user experience. • The following problems are not in a particular order, but numbered to help referral.
  • 8. 1) configuration problems in terminals • user terminals are not configured correctly to work in home eduroam network, they are configured hastily/incompletely in foreign network or there may be typos in usernames/realms • the complex configuration is then not finished or removed but hoped magically to correct itself in some other network • this kind of partially configured client then bombards IdP server with failing authentication requests increasing failed authentication in statistics • even bigger problem are for example failing SSL/TLS tunneling, PEAP and this kind of interrupted or hanging sessions which may not be registered or seen without running IdP servers in debug mode
  • 9. 2) older devices and supplicant implementations • Old Nokia and Symbian based devices are good bad examples. WPA/WPA2 in them used by default EAP-SIM, EAP-AKA authentication and had to be manually changed to use PEAP/EAP-TTLS etc. If you do not know this problem, be happy that Symbian is dead. • This problem can be seen in SP, IdP and TLR logs with the usual 3gpp realm • Luckily this is going away with better defaults for supplicants, Android, Windows Phone and iPhone use by default username password authentication.
  • 10. 3) certificate checking problems • Proper certificate installation is hard to do correctly, iOS kinda works, Android is hell and does anyone know how to configure certificate check to Windows Phone? • EAP-TTLS/PEAP+MSCHAPv2 somewhat protects users and IdPs from man-in-the-middle attacks even if server certificate is not checked • Still some supplicants do not allow for example server name to be checked from certificate • In a better world this would be done via SSH style fingerprint checking and user alerted only if RADIUS server host key would be changed. • Incorrectly or half configured certificate checks cause devices to bombard once again IdP servers and may not even show in logs.
  • 11. 4) periodical password change requirements in IdPs • So IdP requires all its employees and students to change password every 6-9 months? • What happens to all those device configurations with old passwords? What will those devices do? • You see the point? • Our pursuit for single-sign-on has led us to problem where password needs to be so secure that it needs to be changed often. Changing it often then breaks eduroam configurations. • How about if we would just get back to multiple passwords or have a separate eduroam password? Maybe randomized password by device in a style of Google’s passwords per device? Or Certs in the year 2000 maybe? :)
  • 12. 5) IdPs incorrect/invalid configuration instructions • 5.1) No realm in configuration instructions either in the inner or outer authentication • 5.2) Weaseling out of certificate problems by instructing users not to check server certificate or server hostname • Just google eduroam instructions, you will find a lot of this kind of incorrect instructions • Solution for this might be to shame those organisations to correct instructions or offer only correct official instructions and require IdPs to configure their AAA accordingly.
  • 13. 6) Bugs in terminal UI or certificate management • Some devices do not allow e.g. configuring preinstalled CA certificates to be allowed to be used for RADIUS server certificate verification (Nokia N900 was one of these) • Some devices make it really hard to install CA certificates (Android) • And some just do not have UI settings for managing certificates, configuring server names checks etc. • Could we shame vendors to also do these properly? Pretty please?
  • 14. 7) eduroam WiFi network configuration differences • The actual WiFi radio network configuration differences can also cause problems. • Example: Organisation provides eduroam in WPA1/WPA2 compatibility mode. Some devices assume then that eduroam always supports WPA1 and do not accept WPA2 network as eduroam. Then when user tries to configure new WPA2 eduroam network, it cannot be configured as it has the same SSID as the earlier WPA1 profile. (Microsoft Windows 7) • So let’s just decide that eduroam is only pure WPA2, no WPA1, no 802.1X+WEP, no TKIP, no compatibility modes etc. The recommendation is already WPA2, can it be also obligation for pure WPA2?
  • 15. Conclusions, solutions, suggestions • eduroam CAT solves a lot of these issues and in Stefan Winter’s presentation in this GN3 Workshop there were a lot of nice tests to ensure IdPs work properly • However installing an additional supplicant may interfere with terminal operating systems or other 3rd party clients. • A better approach might be to use operating system specific configuration and provisioning interfaces. • For some mobile devices a generic eduroam / other configuration provisioning app could be more generic solution. The app would then configure or correct the actual operating system settings based on the information received from the eduroam CAT provisioning service. App could also be used for eduroam quality and conformance monitoring as well as problem reporting.
  • 17. Contact Information • Karri Huhtanen • Arch Red Oy: http://www.archred.com/ • Twitter: @khuhtanen • Google+: https://plus.google.com/101610587919646203054/