SlideShare a Scribd company logo
ESnet RADIUS Authentication Fabric Michael Helm 19 January 2005
ESnet RADIUS Authentication Fabric Report on RADIUS-OTP feasibility study ESSC commissioned Apr 2004 ESnet and collaborators : May – Oct 2004 ESnet RAF Whitepaper – product of study Proposed service Section-by-section Note: “ESnet RAF Progress Report” Discuss project next steps: project proposal Pilot production service Additional R&D New opportunities: FWNA, wireless roaming
RADIUS – OTP Feasibility Study Summary April Project proposal: http://www.doegrids.org/CA/Research/GIRAF.doc Evaluated two OTP vendors: SecurID  Cryptocard 3 “Strong” Sites NERSC  ORNL  ESnet Applications: Apache, and  sshd RADIUS Appliance vendor : Infoblox Results were very favorable
RADIUS – OTP Next Steps – Project Proposal Advance to Pilot: Build the core; edge sites Put an application into “production” R&D needed : RADIUS has many issues Applications have some issues Kerberos and RADIUS: can they play together? New opportunities : 802.1x, EAP-TLS, and more Wireless / roaming initatives In order to support this, we must buy additional equipment and  add staff .
ESnet RAF Whitepaper Plan http://www.es.net/raf Background Architecture Applications and Services Outstanding Engineering Issues Federation Future Work / New Opportunities Team
Background DOE Lab Computing Facilities Hacked Panel discussion at Apr 2004 ESSC OTP and RADIUS efforts commissioned  Why OTP?  NOPS – NERSC founded grassroots effort RADIUS Authentication Fabric ESnet response to OTP initiatives
DOE Lab Computing Facilities Hacked  Widespread hacking incidents early 2004 Crossover between DOE labs, NSF labs, educational institutions, other collaborations Long lifetime, reusable passwords No amount of self-protection adequate Privilege escalation Attack “unpatchable” services Platform for further attacks Problems continued through 2004
Why One Time Passwords?  OTP tokens limit effectiveness of sniffing OTP breaks up domino effect noted in recent hacks Additional protection for unsecured, commercial environments (kiosks, shared / home computers &c) Tokens and commercial services Improve the user experience over S/KEY Reduce / limit some threats related to management of the one-time password list Tokens (and OTP in general) add some additional, DoS-type threats
NOPS NERSC + friends organized to respond to hacks; protect distributed collaborations How would a large-scale OTP deployment actually be accomplished?  What product or products would be used?  What would happen to the applications and services?  Requirements document The multiple token catastrophe
What is the Multiple Token Catastrophe? Assume a large physics collaboration.  A scientist at LBNL needs to move data from an experiment at FNAL, to an archiving service at ANL, and then run a distributed simulation from compute centers at NERSC and NCSA. How many  different  OTP hardware tokens does she need to use to get her work done? <insert picture of DOE Bandolier here> The answer should be: she needs only  ONE
RADIUS Authentication Fabric Solution to the OTP interoperability problem Solution to the Multiple token catastrophe But – does  not  exclude other solutions! App can require particular token Sites + vendors can use proprietary interoperability capabilities transparently What is the RAF? Deploy a hierarchy of RADIUS servers Edge (site) RADIUS servers support applications Edge RADIUS forwards to ESnet RADIUS core ESnet RADIUS core dispatches to site back end authentication service Let’s look at an architectural picture and work through an example….
How Does the RAF Work? All RAF Realms NERSC ANL r OTP Service ORNL r PNNL OTP Service OTP Service OTP Service R ESnet RAF Federation anl.gov nersc.gov pnnl.gov ornl.gov S r r RAF Realms RAF Realms RAF Realms RAF Realms r RADIUS
Architecture Fill in – explain protocols / jargon One-Time Password Technology  RADIUS RADIUS Naming Convention RAF Terminology RAF Core – RADIUS components @ ESnet RAF Edge – RADIUS @ sites or … Fabric – Core + Edge+RADIUS clients
One-Time Password Technology  (OTP) Account  is static Password  is dynamic  Tied to a non-reversible algorithm: see S/KEY RFC Eliminating reusable passwords eliminates classes of threats OTP can be retrofitted into legacy apps Looks like ordinary password dialogue App must be able to  outsource  Auth* This done through PAM – Pluggable Authentication Module
One-Time Password Technology  (Vendors) Three principal vendors in DOE labs RSA: SecurID – market leader – 4 sites Proprietary, time - sequence based algorithm Cryptocard – FNAL, others experimenting sequence based; open source (?) Safe Computing: Safeword – LBNL Sequence based Non – interoperable!
RADIUS RFC 2865:  http://www.ietf.org/rfc/rfc2865.txt About 10 years’ development history Wide support in industry Built-in features support our needs: Proxying RADIUS-RADIUS and RADIUS-OTP back end Adequate extensibility and security and other features RADIUS Realm: “name” used to organize RADIUS features This is just a fancy way to describe how we divide up our hierarchy and decide where to forward auth queries Client-server model NAS =Network Access Server=Radius Client(=PAM) Naming convention
RADIUS - Infoblox Appliance – Infoblox Soon: FreeRADIUS based http://www.infoblox.com/products/radiusone_overview.cfm Dedicated Hardware Minimal Ports No User Accounts High Availability Geographical dispersion
RADIUS Naming Convention RADIUS RFC defines names RADIUS RFC mentions  realms , but does not define realms One widespread convention for this is  name@Radius-realm eg  [email_address]  or  [email_address] We will use our top-level domains: mike@es.net  or  joe.doakes@nersc.gov Caveat: RADIUS user names are  case-sensitive!
RAF Terminology RAF Core – RADIUS servers operated by ESnet Authentication routers – RADIUS proxy Back end database RAF Edge – RADIUS servers at sites or… RADIUS client – PAM Usually identical: most services of interest use a RADIUS client in PAM (… Except wireless)
Applications and Services Applications  – consumed a  lot  of our time The “ESnet RAF Progress Report” documents much of this work. From the RADIUS operation point of view, the OTP back end services are another application .   ESnet set up several RSA demo services in 2004 for its own use.  We did not have the resources to set up other vendors’ products, but relied on NERSC and ORNL to help us with additional instances and alternate vendor. Applications and PAM PAM widely used in modern UNIX Semi-standardized; capabilities vary Multi-layered API: many capabilities GIRAF (See picture next) We focused on these 2 widely used applications SSHD Apache
Grid Integrated RAF GIRAF OTP Grid  App MyProxy RADIUS Authentication Fabric On-Demand CA (SIPS) GridLogon ESnet Root CA 0 Sign Subordinate CA 1Token authentication; release proxy cert 3 RADIUS Auth query 4 OTP Back end authentication 2. “Prime” account
GIRAF Looks complicated, but it can be REAL simple: openssl req  + simple RADIUS client + signing key pair + name policy Or NCSA Grid Logon proposal (Fusion Grid, NERSC) Or Infoblox RADIUS server! Very important app – protect Grid investments
Outstanding Engineering Issues RAF Core  The set of RADIUS servers operated by ESnet Route authentication requests RADIUS Operations and Security Not ESnet-specific issues: but somebody needs to work on these: OTP Applications SETA:  Secure, Extensible, Token Authentication (NB: 15 Dec 2004) Grid Integrated RADIUS Authentication Fabric Web server client authentication Ssh Large scale file transfers Firewalls and VPNs Client security
Applications ESnet should pick ONE (but see later) Volunteers or broader project for others “Everything needs work” – mostly PAM GIRAF – NCSA/NMI support? SETA – NERSC proposal Batch jobs Kerberos support
RAF Core Reliability, reliability, reliability Multiple instances WAN high-availability Presentation:  round robin or individual We need to understand failure modes better Simpler is better Where does the “core” end? Doesn’t matter now: we need configuration solutions for “edge” or site RADIUS
RADIUS Operations and Security RADIUS security shortcomings OTP bypasses some of these Shared secret RADIUS-RADIUS-R Client Lack of confidentiality of transactions Need to secure admin interfaces Absolutely must protect against man-in-the-middle hijacking &c Deploy VPN or IPSec to support service Look at EAP/802.1x for person RADIUS Operations and Security
OTP Engineering Issues Cryptocard receives better reviews, but… Essential to support RSA SecurID ESnet needs access to both technologies Quality control issues: Error recovery Lost back end server Reporting synchronization errors Documents needed OTP Service “Best Practices” guides and other security analysis
Federation “ Layer 8” issues trump technical issues RAF Federation document in draft: http://www.es.net/raf /DOE%20OTP%20federation_v2.doc Federation governance: Based on GGF template RAF-specific issues: Types of authentication permitted VPN or IPSec management Token management – replacement, resynchronization, etc Radius shared secret management  RADIUS configurations RADIUS replication Realm naming practices DISCLOSURE by participants (sites) is essential How should this federation be governed/populated?
Team – RAF/NOPS/Globus ESnet:  Tony Genovese, Michael Helm, Roberto Morelli, Dhivakaran Muruganantham, John Webster InfoBlox:  Edwin Menor, Andy Zindel LBNL : Olivier Chevassut NERSC:  Stephen Chan, Eli Dart ORNL:  Tom Barron, Sue Willoughby ANL:  Remy Evard, Gene Rakow, Craig Stacey; Frank Siebenlist  (Globus) PNNL:  Craig Gorenson NCSA:  Jim Basney, Von Welch
Future Work / New Opportunities KERBEROS – RADIUS interoperability NERSC’s SETA  FNAL  Use cases DIAMETER IETF (partial?) replacement for RADIUS Wireless – FWNA Wireless Roaming initiatives  September 2004 – GGF-12
KERBEROS-RADIUS Motivated by FNAL situation: Cryptocard tightly integrated with KDC Predates this effort How can we integrate them? Use case (hypothetical) FNAL scientist wants to use service at LBNL (no Kerberos) Get OK at LBNL from FNAL KDC LBNL scientist wants to use FNAL service (Kerberos) Get TGT at FNAL from LBNL RADIUS OK FNAL scientist wants to use NERSC service (K2K) Get forwarded TGT | Kerberos interrealm from FNAL OK? Don’t have any of  this – can EAP do this? Can we find EAP-GSS or something similar?
DIAMETER DIAMETER – IRTF/IETF replacement for RADIUS – RFC 3588 TCP instead of UDP Mandatory IPSec support In practice, TLS too;  ie  most security is in hands of security protocols, not DIAMETER Dynamic discovery Better proxy and roaming support Universal support is “some years away” However: Wireless initiatives may need DIAMETER in the core: more like a true “authentication router”
Federated Wireless Network Authentication First contact: Eduroam, Sep 2004 TERENA initiative to support roaming in European NREN community Eduroam contacts led us to I2 SALSA-Netauth  FWNA subgroup: milestone 0 of similar project We all have the same RADIUS architecture Eduroam is 6-12 mos ahead of ESnet technologically SALSA, Eduroam, and ESnet RAF all have some orthogonal components
FWNA http://wiki.netcom.duke.edu/twiki/bin/view/NetAuth/WebHome “ Analysis and proposal toward a pilot and eventual implementation to support network access to visiting scholars among federated institutions.” Subgroup of Internet 2 SALSA-Netauth
FWNA (Project outline)
Eduroam TERENA TF-Mobility  New site: http://www.eduroam.org Originally: 802.1x and web based redirection More elaborate requirements run-up Pilot began about Sep 2003
Project plan Build on feasibility study Pilot: 3 core, 3 edge sites (+ others) Engineering studies: Data replication Contingency: RSA/SecurID support Federation: build out Application: support selected apps One internal application
What Will It Take? 6 Infoblox HA pairs – 12 units / $12k ea ~ $150K 3 core pairs; 3 edge  pairs Support: Misc. servers: $20k Travel: training/conferences: $20k 3 FTE ($750K) Developer 1.25 FTE Engineering cases support Replication services Selected application development Deployment 1.25 FTE RADIUS Configuration management VPN / IPSec management Support Federation: 0.50 FTE National team coordination Outreach Contingency: Need access to SecurID for 1 year: cost unknown Ongoing: Expect about 0.5 FTE + Federation 0.5 FTE indefinitely
What Will It Take? (2) New initiatives – After 1 st  year Eduroam + I2/FWNA: 1.5 FTE 1.0 Deployment 0.5 Federation burden DIAMETER Initial deployment cost Reduce maintenance as IPSec and discovery simplify KERBEROS 0.25 FTE – Feasibility and implementation estimate
RAF Pilot Lab4 Lab2  r OTP Service Lab1 Lab3 OTP Service OTP Service OTP Service ESnet RAF Federation S r r RAF Realms RAF Realms RAF Realms RAF Realms All RAF Realms R1 R3 R2 R1 – Master R2,R3 – Slaves rE – Edge  rE rE rE FreeRADIUS External Hierarchy r RADIUS
RAF Pilot engineering Replication Presentation – is the core round robin, or distinct nodes? Default and filtering : new info from RADIATOR and Infoblox Error conditions and reporting VPN/IPSEC Lights out / Colocation configuration Edge site / customer configuration
Applications What is the most useful application? sshd ESnet application – roaming support? Complication: trust domains GIRAF – NERSC, Fusion Grid
Federation Build out Rules / policies Role of ESSC in oversite / reporting
Conclusion Discuss: Level of Commitment  Direction Project plan / management http://www.es.net/raf

More Related Content

PPTX
Janet access solutions
PPTX
Tech 2 tech low latency networking on Janet presentation
PDF
Smart bin internet of thing (IoT) project using LoRaWAN
PPTX
Tech 2 Tech welcome
PDF
Tech 2 Tech: Network performance
PPTX
Software defined networking(sdn) vahid sadri
PDF
Non-Fluff Software Defined Networking, Network Function Virtualization and IoT
ODP
Why sdn
Janet access solutions
Tech 2 tech low latency networking on Janet presentation
Smart bin internet of thing (IoT) project using LoRaWAN
Tech 2 Tech welcome
Tech 2 Tech: Network performance
Software defined networking(sdn) vahid sadri
Non-Fluff Software Defined Networking, Network Function Virtualization and IoT
Why sdn

What's hot (19)

PPT
Network Critical @ Sharkfest 2008
PDF
SDN & NFV Introduction - Open Source Data Center Networking
PDF
Introduction to Software Defined Networking (SDN)
PPTX
Software Defined Networks
PDF
Telco Cloud 03 - Introduction to SDN
PPTX
Software Defined Network - SDN
PPTX
Is SDN Necessary?
PPTX
An overview of SDN & Openflow
PPTX
DEVNET-1114 Automated Management Using SDN/NFV
PPTX
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
PDF
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las Vegas
PPTX
Software Defined networking (SDN)
PPTX
Introduction to SDN: Software Defined Networking
PPTX
SDN_and_NFV_technologies_in_IoT_Networks
PDF
Software Defined Networking (SDN) Technology Brief
PPTX
SDN: an introduction
PDF
Software-Defined Networking: Evolution or Revolution?
PPTX
Software defined network-- SDN
DOC
guna_2015.DOC
Network Critical @ Sharkfest 2008
SDN & NFV Introduction - Open Source Data Center Networking
Introduction to Software Defined Networking (SDN)
Software Defined Networks
Telco Cloud 03 - Introduction to SDN
Software Defined Network - SDN
Is SDN Necessary?
An overview of SDN & Openflow
DEVNET-1114 Automated Management Using SDN/NFV
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las Vegas
Software Defined networking (SDN)
Introduction to SDN: Software Defined Networking
SDN_and_NFV_technologies_in_IoT_Networks
Software Defined Networking (SDN) Technology Brief
SDN: an introduction
Software-Defined Networking: Evolution or Revolution?
Software defined network-- SDN
guna_2015.DOC
Ad

Viewers also liked (11)

PPT
Textiles
DOC
Membrete
PPT
Hairong Qi V Swaminathan
PPT
Saea06 Poster Doris
ODP
Autoretrato Mmargarida Aptaboado
PPT
Thai Textile Stat.(Jan. Jun.04)
PPT
Retail
PPT
Lutz Walter
PPT
Proxy server
PPT
Proxy Servers
PPT
Proxy Server
Textiles
Membrete
Hairong Qi V Swaminathan
Saea06 Poster Doris
Autoretrato Mmargarida Aptaboado
Thai Textile Stat.(Jan. Jun.04)
Retail
Lutz Walter
Proxy server
Proxy Servers
Proxy Server
Ad

Similar to E Snet Raf Essc Jan2005 (20)

PPT
Web Services and Devices Profile for Web Services (DPWS)
PPT
E Snet Authentication Fabric Pilot
PPTX
Introduction To Cloud Computing
PPT
wireless lan security for their all details
PDF
EAP-TLS (extended version)
PPTX
A10 presentation for LB GLB for ADC solutions
PPT
wireless lan security.ppt
PPTX
CloudStack DC Meetup - Apache CloudStack Overview and 4.1/4.2 Preview
PPT
Securing Servers in Public and Hybrid Clouds
PDF
SDN and Security: A Marriage Made in Heaven. Or Not.
PPTX
Innovation in SDN Tools and Platforms
PPTX
Netflix Cloud Architecture and Open Source
PDF
Radisys/Wind River: The Telcom Cloud - Deployment Strategies: SDN/NFV and Vir...
DOC
Resume_Appaji
PPT
WLAN and IP security
PDF
Hybridní cloud s F5 v prostředí kontejnerů
PPTX
How APIs are Transforming Cisco Solutions and Catalyzing an Innovation Ecosystem
PPT
From MSS to TelScale - Mobicents Summit 2011
PPTX
Serhiy Kalinets "Embracing architectural challenges in the modern .NET world"
PPT
Cisco Product & Solutions Overview
Web Services and Devices Profile for Web Services (DPWS)
E Snet Authentication Fabric Pilot
Introduction To Cloud Computing
wireless lan security for their all details
EAP-TLS (extended version)
A10 presentation for LB GLB for ADC solutions
wireless lan security.ppt
CloudStack DC Meetup - Apache CloudStack Overview and 4.1/4.2 Preview
Securing Servers in Public and Hybrid Clouds
SDN and Security: A Marriage Made in Heaven. Or Not.
Innovation in SDN Tools and Platforms
Netflix Cloud Architecture and Open Source
Radisys/Wind River: The Telcom Cloud - Deployment Strategies: SDN/NFV and Vir...
Resume_Appaji
WLAN and IP security
Hybridní cloud s F5 v prostředí kontejnerů
How APIs are Transforming Cisco Solutions and Catalyzing an Innovation Ecosystem
From MSS to TelScale - Mobicents Summit 2011
Serhiy Kalinets "Embracing architectural challenges in the modern .NET world"
Cisco Product & Solutions Overview

More from FNian (20)

PPT
Wipro Media Q1 0809
PPT
Watts Brief
PPT
The Role Of Business In Society Presentation At
PPT
Unit C Eco Toolbox
PPT
Singapore Jakarta Conf
PPT
Syndication Pp
PPT
Integration of internal database system
PPT
Analyse sourcing and manufacturing strategies
PPT
Scitc 2006 India 2005 And Future
PPT
Miller China Trade
PPT
Developing a market plan
PPT
Gianelle Tattara
PPT
Gp Industry
PPT
House
PPT
How To Biuld Internal Rating System For Basel Ii
PPT
Gujarat
PPT
Ietp Session 2 June 28
PPT
India An Overview
PPT
Intra Industry
PPT
Innovation Class 6
Wipro Media Q1 0809
Watts Brief
The Role Of Business In Society Presentation At
Unit C Eco Toolbox
Singapore Jakarta Conf
Syndication Pp
Integration of internal database system
Analyse sourcing and manufacturing strategies
Scitc 2006 India 2005 And Future
Miller China Trade
Developing a market plan
Gianelle Tattara
Gp Industry
House
How To Biuld Internal Rating System For Basel Ii
Gujarat
Ietp Session 2 June 28
India An Overview
Intra Industry
Innovation Class 6

Recently uploaded (20)

PDF
Deliverable file - Regulatory guideline analysis.pdf
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PDF
Reconciliation AND MEMORANDUM RECONCILATION
PDF
WRN_Investor_Presentation_August 2025.pdf
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PDF
Types of control:Qualitative vs Quantitative
PPT
Chapter four Project-Preparation material
PDF
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
PDF
Nidhal Samdaie CV - International Business Consultant
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PDF
IFRS Notes in your pocket for study all the time
PDF
Business model innovation report 2022.pdf
PPTX
HR Introduction Slide (1).pptx on hr intro
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PDF
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
DOCX
Business Management - unit 1 and 2
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
Deliverable file - Regulatory guideline analysis.pdf
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
unit 1 COST ACCOUNTING AND COST SHEET
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
Reconciliation AND MEMORANDUM RECONCILATION
WRN_Investor_Presentation_August 2025.pdf
Roadmap Map-digital Banking feature MB,IB,AB
Types of control:Qualitative vs Quantitative
Chapter four Project-Preparation material
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
Nidhal Samdaie CV - International Business Consultant
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
IFRS Notes in your pocket for study all the time
Business model innovation report 2022.pdf
HR Introduction Slide (1).pptx on hr intro
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
Business Management - unit 1 and 2
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement

E Snet Raf Essc Jan2005

  • 1. ESnet RADIUS Authentication Fabric Michael Helm 19 January 2005
  • 2. ESnet RADIUS Authentication Fabric Report on RADIUS-OTP feasibility study ESSC commissioned Apr 2004 ESnet and collaborators : May – Oct 2004 ESnet RAF Whitepaper – product of study Proposed service Section-by-section Note: “ESnet RAF Progress Report” Discuss project next steps: project proposal Pilot production service Additional R&D New opportunities: FWNA, wireless roaming
  • 3. RADIUS – OTP Feasibility Study Summary April Project proposal: http://www.doegrids.org/CA/Research/GIRAF.doc Evaluated two OTP vendors: SecurID Cryptocard 3 “Strong” Sites NERSC ORNL ESnet Applications: Apache, and sshd RADIUS Appliance vendor : Infoblox Results were very favorable
  • 4. RADIUS – OTP Next Steps – Project Proposal Advance to Pilot: Build the core; edge sites Put an application into “production” R&D needed : RADIUS has many issues Applications have some issues Kerberos and RADIUS: can they play together? New opportunities : 802.1x, EAP-TLS, and more Wireless / roaming initatives In order to support this, we must buy additional equipment and add staff .
  • 5. ESnet RAF Whitepaper Plan http://www.es.net/raf Background Architecture Applications and Services Outstanding Engineering Issues Federation Future Work / New Opportunities Team
  • 6. Background DOE Lab Computing Facilities Hacked Panel discussion at Apr 2004 ESSC OTP and RADIUS efforts commissioned Why OTP? NOPS – NERSC founded grassroots effort RADIUS Authentication Fabric ESnet response to OTP initiatives
  • 7. DOE Lab Computing Facilities Hacked Widespread hacking incidents early 2004 Crossover between DOE labs, NSF labs, educational institutions, other collaborations Long lifetime, reusable passwords No amount of self-protection adequate Privilege escalation Attack “unpatchable” services Platform for further attacks Problems continued through 2004
  • 8. Why One Time Passwords? OTP tokens limit effectiveness of sniffing OTP breaks up domino effect noted in recent hacks Additional protection for unsecured, commercial environments (kiosks, shared / home computers &c) Tokens and commercial services Improve the user experience over S/KEY Reduce / limit some threats related to management of the one-time password list Tokens (and OTP in general) add some additional, DoS-type threats
  • 9. NOPS NERSC + friends organized to respond to hacks; protect distributed collaborations How would a large-scale OTP deployment actually be accomplished? What product or products would be used? What would happen to the applications and services? Requirements document The multiple token catastrophe
  • 10. What is the Multiple Token Catastrophe? Assume a large physics collaboration. A scientist at LBNL needs to move data from an experiment at FNAL, to an archiving service at ANL, and then run a distributed simulation from compute centers at NERSC and NCSA. How many different OTP hardware tokens does she need to use to get her work done? <insert picture of DOE Bandolier here> The answer should be: she needs only ONE
  • 11. RADIUS Authentication Fabric Solution to the OTP interoperability problem Solution to the Multiple token catastrophe But – does not exclude other solutions! App can require particular token Sites + vendors can use proprietary interoperability capabilities transparently What is the RAF? Deploy a hierarchy of RADIUS servers Edge (site) RADIUS servers support applications Edge RADIUS forwards to ESnet RADIUS core ESnet RADIUS core dispatches to site back end authentication service Let’s look at an architectural picture and work through an example….
  • 12. How Does the RAF Work? All RAF Realms NERSC ANL r OTP Service ORNL r PNNL OTP Service OTP Service OTP Service R ESnet RAF Federation anl.gov nersc.gov pnnl.gov ornl.gov S r r RAF Realms RAF Realms RAF Realms RAF Realms r RADIUS
  • 13. Architecture Fill in – explain protocols / jargon One-Time Password Technology RADIUS RADIUS Naming Convention RAF Terminology RAF Core – RADIUS components @ ESnet RAF Edge – RADIUS @ sites or … Fabric – Core + Edge+RADIUS clients
  • 14. One-Time Password Technology (OTP) Account is static Password is dynamic Tied to a non-reversible algorithm: see S/KEY RFC Eliminating reusable passwords eliminates classes of threats OTP can be retrofitted into legacy apps Looks like ordinary password dialogue App must be able to outsource Auth* This done through PAM – Pluggable Authentication Module
  • 15. One-Time Password Technology (Vendors) Three principal vendors in DOE labs RSA: SecurID – market leader – 4 sites Proprietary, time - sequence based algorithm Cryptocard – FNAL, others experimenting sequence based; open source (?) Safe Computing: Safeword – LBNL Sequence based Non – interoperable!
  • 16. RADIUS RFC 2865: http://www.ietf.org/rfc/rfc2865.txt About 10 years’ development history Wide support in industry Built-in features support our needs: Proxying RADIUS-RADIUS and RADIUS-OTP back end Adequate extensibility and security and other features RADIUS Realm: “name” used to organize RADIUS features This is just a fancy way to describe how we divide up our hierarchy and decide where to forward auth queries Client-server model NAS =Network Access Server=Radius Client(=PAM) Naming convention
  • 17. RADIUS - Infoblox Appliance – Infoblox Soon: FreeRADIUS based http://www.infoblox.com/products/radiusone_overview.cfm Dedicated Hardware Minimal Ports No User Accounts High Availability Geographical dispersion
  • 18. RADIUS Naming Convention RADIUS RFC defines names RADIUS RFC mentions realms , but does not define realms One widespread convention for this is name@Radius-realm eg [email_address] or [email_address] We will use our top-level domains: mike@es.net or joe.doakes@nersc.gov Caveat: RADIUS user names are case-sensitive!
  • 19. RAF Terminology RAF Core – RADIUS servers operated by ESnet Authentication routers – RADIUS proxy Back end database RAF Edge – RADIUS servers at sites or… RADIUS client – PAM Usually identical: most services of interest use a RADIUS client in PAM (… Except wireless)
  • 20. Applications and Services Applications – consumed a lot of our time The “ESnet RAF Progress Report” documents much of this work. From the RADIUS operation point of view, the OTP back end services are another application . ESnet set up several RSA demo services in 2004 for its own use. We did not have the resources to set up other vendors’ products, but relied on NERSC and ORNL to help us with additional instances and alternate vendor. Applications and PAM PAM widely used in modern UNIX Semi-standardized; capabilities vary Multi-layered API: many capabilities GIRAF (See picture next) We focused on these 2 widely used applications SSHD Apache
  • 21. Grid Integrated RAF GIRAF OTP Grid App MyProxy RADIUS Authentication Fabric On-Demand CA (SIPS) GridLogon ESnet Root CA 0 Sign Subordinate CA 1Token authentication; release proxy cert 3 RADIUS Auth query 4 OTP Back end authentication 2. “Prime” account
  • 22. GIRAF Looks complicated, but it can be REAL simple: openssl req + simple RADIUS client + signing key pair + name policy Or NCSA Grid Logon proposal (Fusion Grid, NERSC) Or Infoblox RADIUS server! Very important app – protect Grid investments
  • 23. Outstanding Engineering Issues RAF Core The set of RADIUS servers operated by ESnet Route authentication requests RADIUS Operations and Security Not ESnet-specific issues: but somebody needs to work on these: OTP Applications SETA: Secure, Extensible, Token Authentication (NB: 15 Dec 2004) Grid Integrated RADIUS Authentication Fabric Web server client authentication Ssh Large scale file transfers Firewalls and VPNs Client security
  • 24. Applications ESnet should pick ONE (but see later) Volunteers or broader project for others “Everything needs work” – mostly PAM GIRAF – NCSA/NMI support? SETA – NERSC proposal Batch jobs Kerberos support
  • 25. RAF Core Reliability, reliability, reliability Multiple instances WAN high-availability Presentation: round robin or individual We need to understand failure modes better Simpler is better Where does the “core” end? Doesn’t matter now: we need configuration solutions for “edge” or site RADIUS
  • 26. RADIUS Operations and Security RADIUS security shortcomings OTP bypasses some of these Shared secret RADIUS-RADIUS-R Client Lack of confidentiality of transactions Need to secure admin interfaces Absolutely must protect against man-in-the-middle hijacking &c Deploy VPN or IPSec to support service Look at EAP/802.1x for person RADIUS Operations and Security
  • 27. OTP Engineering Issues Cryptocard receives better reviews, but… Essential to support RSA SecurID ESnet needs access to both technologies Quality control issues: Error recovery Lost back end server Reporting synchronization errors Documents needed OTP Service “Best Practices” guides and other security analysis
  • 28. Federation “ Layer 8” issues trump technical issues RAF Federation document in draft: http://www.es.net/raf /DOE%20OTP%20federation_v2.doc Federation governance: Based on GGF template RAF-specific issues: Types of authentication permitted VPN or IPSec management Token management – replacement, resynchronization, etc Radius shared secret management RADIUS configurations RADIUS replication Realm naming practices DISCLOSURE by participants (sites) is essential How should this federation be governed/populated?
  • 29. Team – RAF/NOPS/Globus ESnet: Tony Genovese, Michael Helm, Roberto Morelli, Dhivakaran Muruganantham, John Webster InfoBlox: Edwin Menor, Andy Zindel LBNL : Olivier Chevassut NERSC: Stephen Chan, Eli Dart ORNL: Tom Barron, Sue Willoughby ANL: Remy Evard, Gene Rakow, Craig Stacey; Frank Siebenlist (Globus) PNNL: Craig Gorenson NCSA: Jim Basney, Von Welch
  • 30. Future Work / New Opportunities KERBEROS – RADIUS interoperability NERSC’s SETA FNAL Use cases DIAMETER IETF (partial?) replacement for RADIUS Wireless – FWNA Wireless Roaming initiatives September 2004 – GGF-12
  • 31. KERBEROS-RADIUS Motivated by FNAL situation: Cryptocard tightly integrated with KDC Predates this effort How can we integrate them? Use case (hypothetical) FNAL scientist wants to use service at LBNL (no Kerberos) Get OK at LBNL from FNAL KDC LBNL scientist wants to use FNAL service (Kerberos) Get TGT at FNAL from LBNL RADIUS OK FNAL scientist wants to use NERSC service (K2K) Get forwarded TGT | Kerberos interrealm from FNAL OK? Don’t have any of this – can EAP do this? Can we find EAP-GSS or something similar?
  • 32. DIAMETER DIAMETER – IRTF/IETF replacement for RADIUS – RFC 3588 TCP instead of UDP Mandatory IPSec support In practice, TLS too; ie most security is in hands of security protocols, not DIAMETER Dynamic discovery Better proxy and roaming support Universal support is “some years away” However: Wireless initiatives may need DIAMETER in the core: more like a true “authentication router”
  • 33. Federated Wireless Network Authentication First contact: Eduroam, Sep 2004 TERENA initiative to support roaming in European NREN community Eduroam contacts led us to I2 SALSA-Netauth FWNA subgroup: milestone 0 of similar project We all have the same RADIUS architecture Eduroam is 6-12 mos ahead of ESnet technologically SALSA, Eduroam, and ESnet RAF all have some orthogonal components
  • 34. FWNA http://wiki.netcom.duke.edu/twiki/bin/view/NetAuth/WebHome “ Analysis and proposal toward a pilot and eventual implementation to support network access to visiting scholars among federated institutions.” Subgroup of Internet 2 SALSA-Netauth
  • 36. Eduroam TERENA TF-Mobility New site: http://www.eduroam.org Originally: 802.1x and web based redirection More elaborate requirements run-up Pilot began about Sep 2003
  • 37. Project plan Build on feasibility study Pilot: 3 core, 3 edge sites (+ others) Engineering studies: Data replication Contingency: RSA/SecurID support Federation: build out Application: support selected apps One internal application
  • 38. What Will It Take? 6 Infoblox HA pairs – 12 units / $12k ea ~ $150K 3 core pairs; 3 edge pairs Support: Misc. servers: $20k Travel: training/conferences: $20k 3 FTE ($750K) Developer 1.25 FTE Engineering cases support Replication services Selected application development Deployment 1.25 FTE RADIUS Configuration management VPN / IPSec management Support Federation: 0.50 FTE National team coordination Outreach Contingency: Need access to SecurID for 1 year: cost unknown Ongoing: Expect about 0.5 FTE + Federation 0.5 FTE indefinitely
  • 39. What Will It Take? (2) New initiatives – After 1 st year Eduroam + I2/FWNA: 1.5 FTE 1.0 Deployment 0.5 Federation burden DIAMETER Initial deployment cost Reduce maintenance as IPSec and discovery simplify KERBEROS 0.25 FTE – Feasibility and implementation estimate
  • 40. RAF Pilot Lab4 Lab2 r OTP Service Lab1 Lab3 OTP Service OTP Service OTP Service ESnet RAF Federation S r r RAF Realms RAF Realms RAF Realms RAF Realms All RAF Realms R1 R3 R2 R1 – Master R2,R3 – Slaves rE – Edge rE rE rE FreeRADIUS External Hierarchy r RADIUS
  • 41. RAF Pilot engineering Replication Presentation – is the core round robin, or distinct nodes? Default and filtering : new info from RADIATOR and Infoblox Error conditions and reporting VPN/IPSEC Lights out / Colocation configuration Edge site / customer configuration
  • 42. Applications What is the most useful application? sshd ESnet application – roaming support? Complication: trust domains GIRAF – NERSC, Fusion Grid
  • 43. Federation Build out Rules / policies Role of ESSC in oversite / reporting
  • 44. Conclusion Discuss: Level of Commitment Direction Project plan / management http://www.es.net/raf