cybercafe - acsa) - c · cybercafe issues - dhcp if all users authenticated into the same group,...

18
ACSAC - 12 Dec 1999 - Phoenix 1 Jeff Hayes, Product Manager Jeff Hayes, Product Manager jeff jeff . . hayes hayes @ @ ind ind . . alcatel alcatel .com .com The Cybercafe User Authentication at Layer 2

Upload: others

Post on 12-May-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cybercafe - ACSA) - c · CyberCafe Issues - DHCP If all users authenticated into the same group, not a problem If user get authenticated into different groups/subnets, there’s an

ACSAC - 12 Dec 1999 - Phoenix 1

Jeff Hayes, Product ManagerJeff Hayes, Product Managerjeffjeff..hayeshayes@@indind..alcatelalcatel.com.com

The CybercafeUser Authentication at Layer

2

Page 2: Cybercafe - ACSA) - c · CyberCafe Issues - DHCP If all users authenticated into the same group, not a problem If user get authenticated into different groups/subnets, there’s an

ACSAC - 12 Dec 1999 - Phoenix 2

Agenda

▼ User authentication

▼ Campus issues

▼ Cybercafe

▼ Access control

▼ Issues

▼ Cases studies

Page 3: Cybercafe - ACSA) - c · CyberCafe Issues - DHCP If all users authenticated into the same group, not a problem If user get authenticated into different groups/subnets, there’s an

ACSAC - 12 Dec 1999 - Phoenix 3

$SSOLFDWLRQVHUYHUV

,QWHUQHW3276

126

)LUHZDOO

5$6

%DFNERQH

User Authentication

▼ Remote Access– support for dial users

▼ Firewall authentication– user access from unknown

IP sources

▼ Network Operating Systemauthentication

– NOS sign-on

▼ Application authentication– host and mainframe

access

Page 4: Cybercafe - ACSA) - c · CyberCafe Issues - DHCP If all users authenticated into the same group, not a problem If user get authenticated into different groups/subnets, there’s an

ACSAC - 12 Dec 1999 - Phoenix 4

%DFNERQH

,QWHUQHW

3ULYDWH�*URXS

3ULYDWH�*URXS

3ULYDWH�*URXS

2SHQ�*URXS

8VHU'DWDEDVH

Campus requirements

▼ provide open, internalcommunication

▼ provide Internet access

▼ provide access fromanywhere on campus

▼ verify each user isauthorized

▼ leverage common userdatabase / directory

Page 5: Cybercafe - ACSA) - c · CyberCafe Issues - DHCP If all users authenticated into the same group, not a problem If user get authenticated into different groups/subnets, there’s an

ACSAC - 12 Dec 1999 - Phoenix 5

%DFNERQH

,QWHUQHW

3ULYDWH�*URXS

3ULYDWH�*URXS

3ULYDWH�*URXS

&\EHU&DIH�*URXS

'LUHFWRU\0DLO

The CyberCafe

▼ Perimeter security– Public access in a private

environment

– Access control at the edge

▼ Not all users created equal– trust all; really trust only a

few

▼ Not all networks createdequal

– some require extra accesscontrol measures

Page 6: Cybercafe - ACSA) - c · CyberCafe Issues - DHCP If all users authenticated into the same group, not a problem If user get authenticated into different groups/subnets, there’s an

ACSAC - 12 Dec 1999 - Phoenix 6

1R�3ULYLOHJHV3ULRU�WR

$XWKHQWLFDWLRQ

3ULYLOHJHV$FFRUGLQJ�WR3ROLF\�$IWHU$XWKHQWLFDWLRQ

CyberCafe - user perspective

▼ Sit down

▼ Plug into an Ethernet port

▼ Power on PC

▼ Obtain an IP address

▼ Activate browser

▼ Point at pre-configuredauthentication URL/address inswitch

▼ Submit user name/password inJava applet

▼ Obtain authorization based onuser profile

▼ Elapsed time = 30 seconds

Page 7: Cybercafe - ACSA) - c · CyberCafe Issues - DHCP If all users authenticated into the same group, not a problem If user get authenticated into different groups/subnets, there’s an

ACSAC - 12 Dec 1999 - Phoenix 7

'HIDXOW9/$1

$XWKHQWLFDWLRQ6HUYHU '+&3

$XWKRUL]HG9/$1

CyberCafe - the details

▼ Switch ports configured asauthenticated ports

▼ These ports offer no initialprivileges - default VLAN

▼ If dynamic address, requestforwarded to DHCP server

▼ User login forwarded by switch toauthentication server

▼ Auth server informs switch aboutuser privileges

▼ User’s MAC address virtuallymoved to authorized VLAN

Page 8: Cybercafe - ACSA) - c · CyberCafe Issues - DHCP If all users authenticated into the same group, not a problem If user get authenticated into different groups/subnets, there’s an

ACSAC - 12 Dec 1999 - Phoenix 8&DPSXV�1HWZRUN

6ZLWFK&OLHQW

$XWKHQWLFDWLRQ6HUYHU

Authentication mechanisms

Client-to-Switch

▼ PC shim/executable

▼ TELNET– native

– Browser/Java

▼ Secure Socket Layer (SSL)

▼ EAP over Ethernet

Switch-to-Server

▼ RADIUS

▼ LDAP

▼ X.509 CA

▼ Kerberos v5

Page 9: Cybercafe - ACSA) - c · CyberCafe Issues - DHCP If all users authenticated into the same group, not a problem If user get authenticated into different groups/subnets, there’s an

ACSAC - 12 Dec 1999 - Phoenix 9

Authentication servers

▼ RADIUS– understood, deployed & affordable

– standard-based implementation that supports vendor-specific attributes

▼ LDAP Directory– standardized & gaining momentum

– one directory, multiple functions

– major vendors supporting - Novell, AOL, MicroSoft

▼ Kerberos v5– closest thing to SSO

– proven, in use in many environments

▼ Certificate Authority– basis for e-commerce

– key deployments - Entrust, VeriSign, Baltimore

Page 10: Cybercafe - ACSA) - c · CyberCafe Issues - DHCP If all users authenticated into the same group, not a problem If user get authenticated into different groups/subnets, there’s an

ACSAC - 12 Dec 1999 - Phoenix 10

$XWKHQWLFDWLRQ6HUYHU '+&3

�����������[

'HIDXOW�9/$1

�����������[CyberCafe Issues - DHCP

▼ If all users authenticated into thesame group, not a problem

▼ If user get authenticated intodifferent groups/subnets, there’san issue

– Windows 95, 98 or NT do notrelinquish a temp address after itexpires

– requires manual release and renewif one changes from one IP group toanother

▼ Switch can force a release/renewwhen user’s device moves fromone group to another

Page 11: Cybercafe - ACSA) - c · CyberCafe Issues - DHCP If all users authenticated into the same group, not a problem If user get authenticated into different groups/subnets, there’s an

ACSAC - 12 Dec 1999 - Phoenix 11

$GPLQ

CyberCafe - the administration

▼ Configure the switch– load correct authentication image

– create required groups (defaultclient and authenticated)

– configure server related info(address, etc.)

▼ Configure the server– configure users with authentication

group info (groups they can access)

– configure switch related info(address, shared secret, skey, etc.)

– activate accounting

Page 12: Cybercafe - ACSA) - c · CyberCafe Issues - DHCP If all users authenticated into the same group, not a problem If user get authenticated into different groups/subnets, there’s an

ACSAC - 12 Dec 1999 - Phoenix 12

,QWHUQHW

6RIWZDUH)LUHZDOO���*DWHZD\

$6,&)LUHZDOO��$SSOLDQFH

Controlling access

▼ Once authenticated, mustisolate users

– VLANs

– Subnets

▼ Firewalls– software based

– WAN oriented

– moderate performance

– very secure

▼ Access Lists– ASIC based

– LAN oriented

– wire-speed

– moderate security

Page 13: Cybercafe - ACSA) - c · CyberCafe Issues - DHCP If all users authenticated into the same group, not a problem If user get authenticated into different groups/subnets, there’s an

ACSAC - 12 Dec 1999 - Phoenix 13

2SHQ�QHWZRUN´F\EHUFDIHµ

,QWHUQHW6DWHOOLWH&DPSXV

Goal - open, securecomputing

Case Study - University

▼ Facilities– large campus with satellites

& dorms

▼ Users– students - dorms,

classrooms & library

– faculty - offices & classes

– admin - offices

▼ Policy– DHCP & static addresses

– authenticate users

– filter between subnets

Page 14: Cybercafe - ACSA) - c · CyberCafe Issues - DHCP If all users authenticated into the same group, not a problem If user get authenticated into different groups/subnets, there’s an

ACSAC - 12 Dec 1999 - Phoenix 14

3DWLHQW�5HFRUGV��$FFRXQWLQJ

5HVHDUFK

Goal - patient & researchconfidentiality

Case Study - Medical

▼ Facilities– 2500 bed hospital

– large research labs

▼ Users– patient, research, MD,

nurse, admin

▼ Policy– authenticate into key

subnets

– filter/firewall internal traffic

Page 15: Cybercafe - ACSA) - c · CyberCafe Issues - DHCP If all users authenticated into the same group, not a problem If user get authenticated into different groups/subnets, there’s an

ACSAC - 12 Dec 1999 - Phoenix 15

Case Study - Carrier

▼ Connect remote sites viahigh-speed LAN drop

▼ User informs NSP its targetISP– switch forwards

accordingly

– keeps usage info

▼ Each ISP handles its ownauthentication and billing

,63�� ,63�� ,63��

163

'6/�RU�&DEOH

Goal - secure, multi-layer access

Page 16: Cybercafe - ACSA) - c · CyberCafe Issues - DHCP If all users authenticated into the same group, not a problem If user get authenticated into different groups/subnets, there’s an

ACSAC - 12 Dec 1999 - Phoenix 16

Standards

▼ IEEE 802.1x– Port-based Network Access Control

– supplement to 802.1D

– draft 1published 20 September 1999

– ftp://p8021:[email protected]/8021/x-drafts/d1/802-1x-d1.pdf

– will use EAP over Ethernet between client and switch

– authentication server can be RADIUS, LDAP, TACACS+,Kerberos, etc. -- not specified by spec

▼ Issues– port based only

– easy for switch vendors to implement

– no authorizations like a layer 2 solution provides

Page 17: Cybercafe - ACSA) - c · CyberCafe Issues - DHCP If all users authenticated into the same group, not a problem If user get authenticated into different groups/subnets, there’s an

ACSAC - 12 Dec 1999 - Phoenix 17

CyberCafe - Summary

▼ Most authentication occurs above L2– users’ are already on the network

▼ Campus’ needs distributed security– same privileges regardless of location

▼ Controlled, wire-speed performance– once authenticated at Layer 2, user operates at native wire

speeds

– firewalls control internal forwarding

▼ Leverages existing user databases– RADIUS, LDAP, CA, Kerberos

– can be part of a single sign-on solution

Page 18: Cybercafe - ACSA) - c · CyberCafe Issues - DHCP If all users authenticated into the same group, not a problem If user get authenticated into different groups/subnets, there’s an

ACSAC - 12 Dec 1999 - Phoenix 18

Thank You!

Questions?