pki network authentication dartmouth applications robert brentrup educause/dartmouth pki summit july...

24
PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27 , 2005

Upload: clementine-howard

Post on 23-Dec-2015

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005

PKI Network AuthenticationDartmouth Applications

Robert Brentrup

Educause/Dartmouth PKI Summit

July 27 , 2005

Page 2: PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005

Next Phase Applications

• Hardware Key Storage (USB Tokens)

• Application and OS Sign-on with Tokens

• Document Signatures– Acrobat, Office, XML (NIH)

• Secure Mail and List Server

• Wireless Network Authentication

• Grids

Page 3: PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005

Network Auth Technologies

• Wireless and Wired• 802.1x/EAP

• TLS and TTLS• or LEAP, PEAP, MS-CHAP etc.

• WEP, WPA - 802.1x• VPN

– IPSEC standard, using Cisco proprietary• Cisco password authentication is vulnerable,• use client certificates to be secure

Page 4: PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005

VPN Objectives

• Secure network connections for distant office and travellers– some from home use too, local IP address

• Secure some legacy applications with closed subnets– server firewall rejects connections not from Private

subnet addresses– Use PKI “High Assurance” certificate (token if

possible) to authenticate– Assign IP address from protected space after Radius

Authentication/Authorization

Page 5: PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005

VPN Implementation

• Cisco 3000 VPN concentrators• (3000 can only look at OU in DN, so added

OU=PrivateGroupVPN to certs)

• ACL check implemented by Radius server• Members of ACL maintained with

“AuthAdmin” application• Configure protected subnets on concentrator• Two redundant Radius servers for reliability

– running FreeRadius 0.9.2

Page 6: PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005

AuthAdmin

• Each private VPN subnet intended for members of a specific group

• Existing examples– Human Resources– Dean of Students Office– International Students Office– Student Health Services

• Individual in the group authorized to maintain group membership, add and delete

• Group membership stored in LDAP directory– Web interface for group admin

Page 7: PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005

AuthAdmin UI

• (screen shot)

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 8: PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005

Network Authentication Objectives

• Implement additional protection for campus network services

• Limit outside use of network

• Protect campus users from malicious behavior of others

• Eliminate possible eavesdropping

Page 9: PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005

Network Authentication Implementation

• Deploy 802.1x/EAP-TLS on APs and switches• Traffic is encrypted between user and AP/switch• Clients are authenticated with PKI certificates

– in our case locally issued

• No Passwords are exchanged (no credentials to steal)

Page 10: PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005

EAP-TLS Implementation

• Configure Radius– AP clients, users, EAP-TLS module– Certificate for Radius server– Provide Root certificates of trusted CAs to

EAP-TLS module

• Dartmouth self-signed certificates automatically accepted

• Tested APs from Cisco and Aruba

Page 11: PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005

Client Software

• Supplicants built into Win 2000 SP4, XP SP1-2, MacOS 10.3+– other supplicants available for these platforms

• Supplicants available for Linux, Win98 and MacOS 9 (some from vendors)

Page 12: PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005

Issues

• Windows:– no password on Keys

– no luck with tokens yet

– set advanced options for server certificate validation

– Certificates with UID in DN fail

• Win XP SP1 had some issues with SSID and cert selection, improved in SP2

• Mac KeyChain: early versions confused by more than one key with same "name"

Page 13: PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005

Greenpass Objectives

• System developed to support Guest Authorization in an 802.1x EAP-TLS environment– Also useful for insiders that forgot their token

• User only needs 802.1x capable machine and web browser, no additional software

• Guest Introduces Public Key to Greenpass Authorization System

• Host signs authorization for Guest Access using SPKI certificate delegation features

• Guest then has access to controlled internal network until time limit expires

Page 14: PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005

Greenpass Implementation

• Use Router, AP and switch capable of VLANs to create limited use network

• Recently implemented automatic VLAN switching by Radius

• Modifications to FreeRadius needed• Greenpass servers run on Linux• Delegation tool is written in Java• Available as Open Source

– www.dartmouth.edu/~pkilab/greenpass

Page 15: PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005

Guest Unauthorized

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 16: PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005

Guest Introduction

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 17: PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005

Guest Fingerprint

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 18: PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005

Authorized Delegator

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 19: PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005

Select Guest

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 20: PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005

Guest Lookup

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 21: PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005

Delegation Tool

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 22: PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005

Delegation Complete

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 23: PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005

Guest Authorized

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 24: PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005

Authorized User

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.