authentication, authorization, accounting (aaa)jain/cse571-07/ftp/l_18aaa.pdf · isp net customer...

52
18-1 ©2007 Raj Jain CSE571S Washington University in St. Louis Authentication, Authentication, Authorization, Authorization, Accounting (AAA) Accounting (AAA) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-07/

Upload: trinhkhuong

Post on 27-Nov-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-1©2007 Raj JainCSE571SWashington University in St. Louis

Authentication, Authentication, Authorization, Authorization,

Accounting (AAA)Accounting (AAA)Raj Jain

Washington University in Saint LouisSaint Louis, MO 63130

[email protected]/Video recordings of this lecture are available at:

http://www.cse.wustl.edu/~jain/cse571-07/

Page 2: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-2©2007 Raj JainCSE571SWashington University in St. Louis

OverviewOverview

RADIUSAuthentication Protocols: PAP, CHAP, MS-CHAPExtensible Authentication Protocol (EAP)EAP Upper Layer Protocols802.1X

Page 3: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-3©2007 Raj JainCSE571SWashington University in St. Louis

RADIUSRADIUSRemote Authentication Dial-In User ServiceCentral point for Authorization, Accounting, and Auditing data ⇒ AAA serverNetwork Access servers get authentication info from RADIUS serversAllows RADIUS Proxy Servers ⇒ ISP roaming alliancesNormally runs on UDP ⇒ Can loose accounting packets FreeRADIUS and OpenRADIUS implementations available

ProxyRADIUSRADIUS

NetworkAccessServer

RemoteAccessServer

UserISP NetCustomer

Network

Page 4: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-4©2007 Raj JainCSE571SWashington University in St. Louis

RADIUS MessagesRADIUS Messages

Four Core Messages: Request, Challenge, Accept, Reject.Message Format: Code is the message type. Identifier is used to match request/response.

AuthenticationServer

NetworkAccess Server

Access-RequestAccess-Challenge

Access-RequestAccess-Accept

Access-ChallengeUsernameChallengeResponse

OK

Code Identifier Length Authenticator Attributes

Page 5: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-5©2007 Raj JainCSE571SWashington University in St. Louis

PAP and CHAPPAP and CHAP

Point-to-point protocol (PPP) allows two authentication methods:

Password authentication protocol (PAP)Challenge Handshake Authentication Protocol (CHAP) – RFC1994

Page 6: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-6©2007 Raj JainCSE571SWashington University in St. Louis

DIAMETERDIAMETER

Enhanced RADIUSLight weightCan use both UDP and TCPServers can send unsolicited messages to Clients ⇒ Increases the set of applicationsSupport for vendor specific Attribute-Value-Pairs (AVPs) and commandsAuthentication and privacy for policy messages

Page 7: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-7©2007 Raj JainCSE571SWashington University in St. Louis

Password Authentication Protocol (PAP)Password Authentication Protocol (PAP)

RFC 1334, Oct 1992Authenticator sends a authentication requestPeer responds with a username and password in plain textAuthenticator sends a success or failureCode: 1=Auth Request, 2=Auth Ack, 3=Auth Nak

Code ID Len Name Len Name Val Pswd Len Pswd Val1B 1B 2B 1B Var 1B Var

Code ID Len Success/Failure Message1B 1B 2B 1B

NAS

Page 8: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-8©2007 Raj JainCSE571SWashington University in St. Louis

CHAPCHAPChallenge Handshake Authentication Protocol RFC 1994, August 1996Uses a shared secret (password)Authenticator sends a challengePeer responds with a MD5 checksum hash of the challengeAuthenticator also calculates the hash and sends success or failureRequires both ends to know the password in plain textReplay attack prevention ⇒ Use a different challenge every timeLCP option 3 = 0x05 ⇒ CHAP

Page 9: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-9©2007 Raj JainCSE571SWashington University in St. Louis

CHAP (Cont)CHAP (Cont)

Codes: 1=Challenge, 2=Response, 3=Success, 4=Failure

Code ID Len Chal. Len Chal. Val Name Len Name Val1B 1B 2B 1B Var 1B Var

Code ID Len Resp. Len Resp. Val Name Len Name Val1B 1B 2B 1B Var 1B Var

Code ID Len Success/Failure Message1B 1B 2B 1B

Page 10: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-10©2007 Raj JainCSE571SWashington University in St. Louis

MSMS--CHAPCHAPMicrosoft version of CHAPMS-CHAP in RFC 2433, Oct 1998Does not require password in plain textUses hash of the passwordLCP option 3 = 0x80 ⇒ MS-CHAPv18B challenge ⇒ 24B LM compatible response, 24B NTLM compatible response and 1B use NTLM flagLM passwords are limited to 14 case-insensitive OEM charactersNT passwords are 0 to 256 case-sensitive Unicode charactersFlag ⇒ NT response is meaningful and should be usedAlso allows users to change password

Page 11: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-11©2007 Raj JainCSE571SWashington University in St. Louis

MSMS--CHAPv2CHAPv2

MS-CHAPv2 in RFC 2759, Jan 2000MS-CHAPv2 in Windows 2000 onwards.Vista does not support MS-CHAPv1LCP option 3 =0x81 ⇒ MS-CHAPv2V2 provides mutual authentication between peers by piggybacking a peer challenge on the response packet and an authenticator response on the success packet.Does not support change password

Page 12: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-12©2007 Raj JainCSE571SWashington University in St. Louis

Extensible Authentication Protocol (EAP)Extensible Authentication Protocol (EAP)

Each authentication protocols required a new protocol ⇒ Extensible Authentication ProtocolInitially developed for point-to-point protocol (PPP)Allows using many different authentication methodsSingle-Step Protocol ⇒ Only one packet in flight ⇒ Duplicate Elimination and retransmission

Ack/Nak ⇒ Can run over lossy linkNo fragmentation. Individual authentication methods can deal with fragmentation. One frag/round trip ⇒ Many round tripsAllows using a backend authentication server ⇒ Authenticator does not have to know all the authentication methodsCan run on any link layer (PPP, 802, ...). Does not require IP.Ref: RFC 3748, “EAP,” June 2004.

Page 13: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-13©2007 Raj JainCSE571SWashington University in St. Louis

EAP TerminologyEAP TerminologyPeer: Entity to be authenticated = SupplicantAuthenticator: Authenticating entity at network boundary Authentication Server: Has authentication databaseEAP server = Authenticator if there is no backend Authentication Server otherwise authentication serverMaster Session Key (MSK)= Keying material agreed by the peer and the EAP server. At least 64B. Generally given by the server to authenticator.

Peer Authenticator AuthenticationServer

Page 14: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-14©2007 Raj JainCSE571SWashington University in St. Louis

EAP ExchangeEAP ExchangeEAP Message Format:

Identifier is incremented for each message.Identifier in response is set equal to that in request.Type field in the request/response indicates the authentication.Assigned by Internet Assigned Number Authority (IANA)

Supplicant Authenticator

Request (01)Response (02)Success (03)Failure (04)

Only four types of messages:

Code Identifier Length Data8b 8b 16b

Code Identifier Length DataType

Page 15: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-15©2007 Raj JainCSE571SWashington University in St. Louis

EAP TypesEAP Types1 = Identity2 = Notification (messages to be displayed to user)3 = Nak4 = MD5 Challenge (CHAP)5 = One time password6 = Generic Token card (GTC) 254 = Expanded types (allows vendor specific options)255 = ExperimentalNotification requests are responded by notification responses.Nak type is valid only for responses. Expanded types include a 3B vendor ID and 4B vendor msg type.Expanded Nak is used in response to requests of type 254 and

may include alternative suggestions for methods.

Page 16: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-16©2007 Raj JainCSE571SWashington University in St. Louis

EAP Multiplexing ModelEAP Multiplexing Model

Code 1 (request), 3 (success), and 4 (failure) are delivered to the peer layerCode 2 (response) is delivered to the EAP authenticator layer.Both ends may need to implement peer layer and authenticator layer for mutual authenticationLower layer may be unreliable but it must provide error detection (CRC)Lower layer should provide MTU of 1020B or greater

EAP Method X

EAP Peer LayerEAP Layer

Lower Layer

Peer AuthenticatorEAP

Method XEAP

Method XEAP Auth. Layer

EAP LayerLower Layer

EAP Method X

Page 17: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-17©2007 Raj JainCSE571SWashington University in St. Louis

EAP Pass through AuthenticatorEAP Pass through Authenticator

EAP Method X

EAP LayerLower Layer

Peer Authentication Server

EAP PeerEAP Layer

Lower LayerEAP Layer

AAA/IP

EAP Method X

EAP LayerAAA/IP

Pass-thru Authenticator

EAP Auth

EAP Auth

EAP Peer

EAP Auth

Page 18: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-18©2007 Raj JainCSE571SWashington University in St. Louis

EAP Upper Layer ProtocolsEAP Upper Layer ProtocolsLightweight EAP (LEAP)EAP-TLSEAP-TTLSEAP-FASTProtected EAP (PEAP)PEAPv1 or EAP-GTCEAP-SIMEAP-AKAEAP-PSKEAP-IKEv2

Page 19: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-19©2007 Raj JainCSE571SWashington University in St. Louis

Lightweight EAP (LEAP)Lightweight EAP (LEAP)

Cisco proprietary EAPWas used in 802.11 networks prior to 802.11i extensionWidely adopted in networking industryNo native support in WindowsUses a modified version of MS-CHAP for authenticationAn exploit tool ASLEAP has been release to break LEAP ⇒ Not recommended now.

Page 20: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-20©2007 Raj JainCSE571SWashington University in St. Louis

EAPEAP--TLSTLSTLS over EAPRFC 2716, Oct 1999Considered most secure, Universally implemented including by Microsoft, Cisco, Apple, LinuxSupported in MAC X10+, Windows 2000, XP, Vista, Windows Mobile 2003, Windows Server 2003But Rarely deployedBoth sides need a certificateClient side private key is housed in a smart cardCertificate chains are big ⇒ Includes support for fragmentation and reassembly

Page 21: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-21©2007 Raj JainCSE571SWashington University in St. Louis

EAPEAP--TLS AuthenticationTLS Authentication

Peer AuthenticatorPPP LCP Request- EAP Auth

PPP LCP Ack-EAP AuthPPP EAP Request/Identity

PPP EAP Response/EAP-Type=EAP-TLS (TLS Client_hello)

PPP EAP Response/Identity (MyID)

PPP EAP Request/EAP-TYPE=EAP-TLS (TLS Start)

PPP EAP Request/EAP-Type=EAP-TLS (TLS server_hello, TLS certificate, TLS certificate Request, TLS server_hello_done)PPP EAP Response (TLS certificate, TLS Client_key_exchange,

TLS certificate verify, TLS Change Cipher Spec, TLS finished)

PPP EAP Request(TLS Change Cipher Spec, TLS finished)PPP EAP ResponsePPP EAP Success

Page 22: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-22©2007 Raj JainCSE571SWashington University in St. Louis

EAPEAP--TTLSTTLS

Tunneled TLS over EAPOnly server provides certificatesClient provides password based authentication using the secure tunnel setup using TLSDeveloped by Funk Software and CenticomWidely supported across platforms

Page 23: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-23©2007 Raj JainCSE571SWashington University in St. Louis

EAPEAP--FASTFASTFlexible Authentication via Secure TunnelingRFC 4851, May 2007Developed by Cisco as a replacement for LEAPUse of server certificates is optional.Uses a protected access tunnel (PAC) to verify credentialsOptional Phase 0 to provision PAC manually or dynamically.Done once for each client-RADIUS server pair.In Phase 1, RADIUS server and client use PAC to TLS tunnel.In Phase 2, Client credentials are exchanged inside encrypted tunnel.Dynamic establishment of PAC is vulnerable to attack ⇒ use manual provisioning.

Page 24: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-24©2007 Raj JainCSE571SWashington University in St. Louis

Protected EAP (PEAP)Protected EAP (PEAP)One-sided TLS over EAPServer provides certificate ⇒ Outer authenticationClient provides NT password hash (V0) ⇒ Inner AuthenticationJointly developed by Microsoft, Cisco, and RSAMicrosoft implements PEAPv0 with Inner = EAP-MS-CHAPv2Microsoft also implements PEAP with Client Certificates ⇒ PEAP-EAP-TLSCisco supports PEAPv0 with EAP-MS-CHAPv2, EAP-SIM

Page 25: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-25©2007 Raj JainCSE571SWashington University in St. Louis

PEAPv1 or EAPPEAPv1 or EAP--GTCGTC

Developed by Cisco to use Generic Token Cards (GTC)RFC 3748, June 2004Server generates a challenge, client generates a response using a security token device.

Page 26: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-26©2007 Raj JainCSE571SWashington University in St. Louis

Security TokenSecurity TokenSecurity Token = Small hardware device carried by users. May store cryptographic keys, biometric data (finger print), PIN entry pad.Based on USB, Bluetooth, Cell phones (SMS or Java)Use smart cardsTwo-factor authentication = What you have and what you know

[Wikipedia]

Page 27: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-27©2007 Raj JainCSE571SWashington University in St. Louis

OneOne--Time PasswordTime PasswordThree Types:1. Use a math algorithm to generate a new password based on

previous2. Uses time to generate password

⇒ Synchronized time between server and client 3. Use a math algorithm to generate a new password based on

a challenge from the server and a counter.Time synchronized approach allows users to generate password and not use it. The server may compare with the next n passwords to allow for time miss-synchronization.Non-time synchronized OTP do not need to be powered all the time ⇒ battery lasts long. Have been attacked by phishing.Time-based OTP need to be used right-away.

Page 28: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-28©2007 Raj JainCSE571SWashington University in St. Louis

OTP (Cont)OTP (Cont)

Most OTP devices use proprietary patented algorithms.HMAC-based OTP (HOTP) is proposed by Initiative for Open Authentication (OATH)RFC 2289, "OTP," Feb 1998.RFC 4226, "HOTP: An HMAC-based OTP Algorithm," Dec 2005.

Page 29: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-29©2007 Raj JainCSE571SWashington University in St. Louis

EAPEAP--SIMSIMEAP for Global System for Mobile Communications (GSM) Subscriber Identity Module (SIM). RFC 4186, Jan 2006Optional identity privacy, fast re-auth, result indicationUses a challenge response mechanism. Net not authenticatedHome auth server sends RAND: 128b Random challengeSIM uses shared key and generates 64b key seed Kc using a nonce. Kc used to generate encryption keySIM sends nonce and the response to the networkSeveral challenges are run to produce several Kc which are combined to generate stronger keys for data applications.Temporary identifiers are used to hide subscriber identityEAP-success + keying material sent by EAP server to the authenticator but not passed on to user who can itself derive it.

Page 30: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-30©2007 Raj JainCSE571SWashington University in St. Louis

EAPEAP--SIM Full AuthenticationSIM Full Authentication

Peer AuthenticatorEAP request/Identity

EAP-Response/IdentityEAP Request/SIM/Start (AT_Version_List)

EAP Response/SIM/Challenge (AT_MAC)

EAP Success

Peer runs GSM algorithmVerifies AT_MAC andDerives Session keys

Server Checks MAC

EAP Response/SIM/Start (AT_Nonce_MT, AT_Selected_Version)

EAP Request/SIM/Challenge(AT_RAND, AT_MAC)

Page 31: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-31©2007 Raj JainCSE571SWashington University in St. Louis

EAPEAP--AKAAKA

EAP for 3G UMTS and CDMA2000 Authentication and Key Agreement. RFC 4187, Jan 2006Based on symmetric keysRuns in subscriber identity module (SIM)Optional identity privacy, fast re-auth, result indicationSubstantially longer key lengths 128b than GSM-SIMNetwork is also authenticated

Page 32: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-32©2007 Raj JainCSE571SWashington University in St. Louis

EAPEAP--AKA Full AuthenticationAKA Full Authentication

Peer AuthenticatorEAP request/Identity

EAP-Response/Identity

EAP Request/AKA challengeAT_RAND, AT_AUTN, AT_MAC

EAP Response/AKA challengeAT_Res, AT_MAC

EAP Success

Server runs AKA algorithmGenerates RAND and AUTN

Peer runs AKA algorithmVerifies AUTN and MACDerives Res and Session key

Server Checks RES and MAC

Page 33: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-33©2007 Raj JainCSE571SWashington University in St. Louis

EAPEAP--PSKPSK

EAP using pre-shared keyRFC 4764, Jan 2007Designed for IEEE 802.11Does not require any infrastructureUses AES-128Does not use Diffie-HellmanDoes not have perfect forward secrecy, identity hiding

Page 34: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-34©2007 Raj JainCSE571SWashington University in St. Louis

EAPEAP--PSK KeysPSK KeysPre-Shared Key (PSK): 16B Authentication Key (AK): 16B Derived from PSK that peer and server use for mutual authenticationKey Derivation Key (KDK): 16B Derived from PSK to generate TEK, MSK, EMSKAK and KDK are derived once from PSK. Used for long time Master Session Key (MSK): Derived by peer and server. Sent by server to authenticator.Extended Master Session Key (EMSK): Reserved for future.Transient EAP Key (TEK): 128b Session key for AES-128 encryption used during authentication. Data encryption can use any other method Nonce N is a monotonically increasing sequence number starting from 0. Zero’s pre-pended to 16B.

Page 35: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-35©2007 Raj JainCSE571SWashington University in St. Louis

Key Derivation in EAPKey Derivation in EAP--PSKPSK“0” Input Block 16B

AES-128(PSK,.)

C1=“1” 16B XOR C2=“2” 16BXOR

AES-128(PSK,.) AES-128(PSK,.)

Authentication Key 16B Key Derivation Key 16B

AES-128(KDK,.)

C=“9” 16B XORC=“2” 16BXORC=“1” 16B XOR

AES-128(KDK,.) AES-128(KDK,.) AES-128(KDK,.)

TEK 16b MSK 1/4 16b EMSK 4/4 16b

Rand P 16B

Page 36: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-36©2007 Raj JainCSE571SWashington University in St. Louis

EAPEAP--IKEv2IKEv2

IKEv2 over EAPMutual authenticationAllows certificates, passwords, shared secretsRef: draft-tschofenig-eap-ikev2-15.txt

Page 37: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-37©2007 Raj JainCSE571SWashington University in St. Louis

EAP Upper Layer Protocols: SummaryEAP Upper Layer Protocols: SummaryLightweight EAP (LEAP): Uses MS-CHAP. Not secure.EAP-TLS: Both sides need certificatesEAP-TTLS: Only server certificates. Secure tunnel for peer.EAP-FAST: Certificates optional. Protected tunnels.Protected EAP (PEAP): Server Certificates. Client password.PEAPv1 or EAP-GTC: Client uses secure tokens.EAP-SIM: Used in GSM. 64b keys.EAP-AKA: Used in 3G. 128b keys.EAP-PSK: Pre-shared key+AES-128 to generate keysEAP-IKEv2: Mutual authentication. Certificate, Password, or Shared secret

Page 38: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-38©2007 Raj JainCSE571SWashington University in St. Louis

EAP over LAN (EAPOL)EAP over LAN (EAPOL)EAP was designed for Point-to-point lineIEEE extended it for LANs ⇒ Defines EAPOLAdded a few more messages and fieldsFive types of EAPOL messages:

EAPOL Start: Sent to a multicast addressEAPOL Key: Contains encryption and other keys sent by the authenticator to supplicantEAPOL packet: Contains EAP messageEAPOL Logoff: DisconnectEAPOL Encapsulated-ASF-Alert: Management alert

Message Format: Version=1, Type=start,key,…,

Ethernet Header Version Type Packet Body Len Packet Body

Page 39: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-39©2007 Raj JainCSE571SWashington University in St. Louis

802.1X802.1XAuthentication framework for IEEE802 networksSupplicant (Client), Authenticator (Access point), Authentication server

No per packet overhead ⇒ Can run at any speedNeed to upgrade only driver on NIC and firmware on switchesUser is not allowed to send any data until authenticated

Authenticator

ExternalDevice

Authenticator

ConnectedDevice

Page 40: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-40©2007 Raj JainCSE571SWashington University in St. Louis

802.1X Authentication802.1X Authentication

AssociateEAP Identity Request

EAP-Success

StationAccess PointAccess Point Authentication

Server

EAP Auth Response EAP Auth Response

EAP Auth Request EAP Auth Request

EAP Identity ResponseEAP Identity Response

EAP-Success

Can I connect please? What’s your user name?

My user name is john

What’s your password?

My password is mary? You can connect!

Authentication method can be changed without upgrading switches and access pointsOnly the client and authentication server need to implement the authentication method

Page 41: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-41©2007 Raj JainCSE571SWashington University in St. Louis

SummarySummary

RADIUS allows centralized authentication server and allows roamingEAP allows many different authentication methods to use a common framework => Authenticators do not need to know about authentication methodsMany variations of EAP authentication methods depending upon certificates, shared secrets, passwords802.1X adds authentication to LAN and uses EAPOL

Page 42: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-42©2007 Raj JainCSE571SWashington University in St. Louis

Homework 18Homework 18

How would you implement Kerberos v4 over EAP in a LAN environment. Show the sequence of EAP messages that will be sent for authentication and key generation. Show also EAPOL headers on the messages.

Page 43: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-43©2007 Raj JainCSE571SWashington University in St. Louis

ReferencesReferencesJ. Edney and W.A. Arbaugh, “Real 802.11 Security: Wi-Fi Protected Access and 802.11i,” Addison-Wesley, 2004, 451 pp., ISBN:0321136209http://en.wikipedia.org/wiki/RADIUShttp://en.wikipedia.org/wiki/DIAMETERhttp://en.wikipedia.org/wiki/Password_Authentication_Protocolhttp://en.wikipedia.org/wiki/Challenge-handshake_authentication_protocolhttp://en.wikipedia.org/wiki/MS-CHAPhttp://en.wikipedia.org/wiki/Extensible_Authentication_Protocol#_note-0http://en.wikipedia.org/wiki/EAP-FAST

Page 44: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-44©2007 Raj JainCSE571SWashington University in St. Louis

References (Cont)References (Cont)

http://en.wikipedia.org/wiki/Protected_Extensible_Authentication_Protocolhttp://en.wikipedia.org/wiki/Security_tokenhttp://en.wikipedia.org/wiki/One-time_passwordhttp://en.wikipedia.org/wiki/EAP-SIMhttp://en.wikipedia.org/wiki/EAP-AKAhttp://en.wikipedia.org/wiki/EAP-TTLS#EAP-FAST

Page 45: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-45©2007 Raj JainCSE571SWashington University in St. Louis

EAP RFCsEAP RFCsRFC 2716 "PPP EAP TLS Authentication Protocol," October 1999.RFC 3579 "RADIUS Support For EAP," September 2003.RFC 3748 "EAP," June 2004.RFC 4017 "EAP Method Requirements for Wireless LANs," March 2005.RFC 4072 "Diameter EAP Application," August 2005.RFC 4137 "State Machines for EAP Peer and Authenticator," August 2005.RFC 4186 "EAP Method for GSM SIMs (EAP-SIM)," January 2006.RFC 4187 "EAP Method for 3G Authentication and Key Agreement (EAP-AKA)," January 2006.

Page 46: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-46©2007 Raj JainCSE571SWashington University in St. Louis

EAP RFCs (Cont)EAP RFCs (Cont)RFC 4284 "Identity Selection Hints for the EEAP," January 2006.RFC 4746 "EAP Password Authenticated Exchange," November 2006.RFC 4763 "EAP Method for Shared-secret Authentication and Key Establishment (EAP-SAKE)," November 2006.RFC 4764 "The EAP-PSK Protocol: A Pre-Shared Key EAP Method," January 2007.RFC 4851 "The Flexible Authentication via Secure Tunneling EAP Method (EAP-FAST)," May 2007.

Page 47: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-47©2007 Raj JainCSE571SWashington University in St. Louis

AAA RFCsAAA RFCsRFC2903, "Generic AAA Architecture," Aug 2000.RFC2904, "AAA Authorization Framework," Aug 2000.RFC2905, "AAA Authorization application examples," Aug 2000.RFC2906, "AAA Authorization requirements," Aug 2000.RFC2989, "Criteria for Evaluating AAA Protocols for Network Access," Nov 2000.RFC3141, "CDMA2000 Wireless Data Requirements for AAA," Jun 2001.RFC3539, "AAA Transport Profile," Jun 2003.RFC3957, "AAA Registration keys for Mobile IPv4," Mar 2005.RFC4962, "Guidance for AAA Key Management," Jul 2007

Page 48: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-48©2007 Raj JainCSE571SWashington University in St. Louis

RADIUS RFCsRADIUS RFCsRFC2548 Microsoft Vendor-specific RADIUS Attributes, March 1999.RFC2809 Implementation of L2TP Compulsory Tunneling via RADIUS. April 2000.RFC2865 RADIUS. June 2000.RFC2866 RADIUS Accounting. June 2000.RFC2867 RADIUS Accounting Modifications for Tunnel Protocol Support. June 2000.RFC2868 RADIUS Attributes for Tunnel Protocol Support. June 2000.RFC2869 RADIUS Extensions. June 2000.RFC2882 Network Access Servers Requirements: Extended RADIUS Practices. July 2000.

Page 49: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-49©2007 Raj JainCSE571SWashington University in St. Louis

RADIUS RFCs (Cont)RADIUS RFCs (Cont)RFC3162 RADIUS and IPv6. August 2001.RFC3575 IANA Considerations for RADIUS. July 2003.RFC3576 Dynamic Authorization Extensions to RADIUS. July 2003.RFC3579 RADIUS Support For Extensible Authentication Protocol (EAP). September 2003.RFC3580 IEEE 802.1X RADIUS Usage Guidelines. September 2003.RFC4014 RADIUS Attributes Suboption for the DHCP Relay Agent Information Option. February 2005.RFC4590 RADIUS Extension for Digest Authentication. July 2006.RFC4668 RADIUS Authentication Client MIB for IPv6. August 2006.

Page 50: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-50©2007 Raj JainCSE571SWashington University in St. Louis

RADIUS RFCs (Cont)RADIUS RFCs (Cont)RFC4669 RADIUS Authentication Server MIB for IPv6. August 2006.RFC4670 RADIUS Accounting Client MIB for IPv6. August 2006.RFC4671 RADIUS Accounting Server MIB for IPv6. August 2006.RFC4672 RADIUS Dynamic Authorization Client MIB. September 2006.RFC4673 RADIUS Dynamic Authorization Server MIB. September 2006.RFC4675 RADIUS Attributes for Virtual LAN and Priority Support. September 2006.RFC4679 DSL Forum Vendor-Specific RADIUS Attributes. September 2006.

Page 51: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-51©2007 Raj JainCSE571SWashington University in St. Louis

RADIUS RFCs (Cont)RADIUS RFCs (Cont)RFC4818 RADIUS Delegated-IPv6-Prefix Attribute. April 2007.RFC4849 RADIUS Filter Rule Attribute. April 2007.RFC5030 Mobile IPv4 RADIUS Requirements. October 2007.

Page 52: Authentication, Authorization, Accounting (AAA)jain/cse571-07/ftp/l_18aaa.pdf · ISP Net Customer Network. 18-4 ... No fragmentation. Individual authentication methods can deal

18-52©2007 Raj JainCSE571SWashington University in St. Louis

Diameter RFCsDiameter RFCsRFC3588 Diameter Base Protocol. September 2003.RFC3589 Diameter Command Codes for 3GPP Release 5. September 2003.RFC4004 Diameter Mobile IPv4 Application. August 2005.RFC4005 Diameter Network Access Server Application. August 2005.RFC4006 Diameter Credit-Control Application. August 2005.RFC4072 Diameter EAP Application. August 2005.RFC4740 Diameter SIP Application. November 2006.