vlan ldap radiusd
Serge van Namen
svnamen at snow.nl
Fri Jul 15 14:04:53 CEST 2011
Op 15 jul 2011, om 11:26 heeft Alexander Clouter het volgende geschreven:
> Serge van Namen <svnamen at snow.nl> wrote:
>>
>> In our situation the user is bound to a VLAN, so on every workstation
>> in the building the user authenticates and the switchport becomes a
>> member of the correct VLAN.
>>
> I *strongly* recommend not mixing host and user authentication, it's
> just too much of a brain <explitive>. What happens on a computer you
> can SSH, terminal services into...user or host authentication?
Host authentication is already dealt with on a higher level.
Unknown hosts already cannot join the network, ever. :)
> Sure you
> can generalise, but you might as well just ignore the problem
> altogether. Another example, user A walks in and authenticates
> themselves to the network and goes into VLAN x, that user then goes to
> lunch and evil user B starts to use the machine...
Isn't that a problem of user awareness?
That is possible in every situation if the user doesn't lock their screen.
Or am I confused now?
>
> Obviously we all have our own policies and needs, but I recommend you
> push the 'user authentication' (authorisation too) into a higher level
> such as the application/server and not try to do it at the network
> layer.
That is already dealt with, this Proof of Concept is just a network security extension, not a whole new implementation.
>
> This does not mean you cannot use user authentication to bootstrap host
> authentication.
Exactly, the purpose is just for bootstrapping and to create 'flexible-workplaces'
> For example our mindset here at work is that the user
> is stating "I am responsible for this MAC address during this
> session"...they might also be authorised to register that workstation
> into a particular VLAN to
...
> create some workstation credentials.
Don't quit understand this part. :)
> 'un-registered' (user bootstrapped) workstations go into VLAN
> 'users-unmanaged' whilst our equipment goes into 'users-staff'.
> Hope that makes sense...? :)
Do you mean: unauthorized, user be put in default (jailed) vlan?
>
>> Correct me if I'm wrong but then we have to administer a separate
>> database for hosts ( and in our case users ) Now we have 2 auth-types
>> en autz-type's.
>>
>> 1 connects with cn=x,dc=example,dc=com (VLANid x)
>> 1 connects with cn=y,dc=example,dc=com (VLANid y)
>>
>> Depending on the realm the user indicates when logging in
>> (user at realm), autheticates and puts the "Tunnel-Private-Group-Id" in
>> the reply with the correct VLAN id.
>>
> Well, you could just have users members of network groups instead (do
> *not* repurpose an existing group). I would suggest, if you have the
> time, create an enrollment page. Unknown MAC addresses (even with a
> valid *user* 802.1X session) are redirected to a webpage to register the
> machine into a network (typically only one, maybe your helpdesk members
> would be permitted to register the equipment into a number of groups).
> This does not mean that you use MAC-auth for that machine, but the
> enrollment session could generate workstation credentials (EAP-TLS) to
> use or you could still enforce that user 802.1X credentials (not
> necessarily the original registraters one) need to be used to gain
> access.
We don't want to manage complex device lists, we just don't want unwanted hardware in our network.
MAC address / device management is not in the scope of the Proof of Concept. :)
Just:
User A: VLAN X
User B: VLAN Y
User C: VLAN X
etc.
>
> This means you can permit users to register up to five devices for
> example.
>
>> The problem: When using 'Login Window' based 802.1x.
>> So when user puts in it's user/pass at the login window, it does it's 802.1x magic.
>>
>> But with user at realm, LDAP doesnt understands this ofcourse, so the
>> @realm needs to be stripped when authenicating to LDAP.
>>
>> So:
>>
>> user at realm ---> radius reads the realm, strips the @realm so LDAP
>> understands, makes it's auth/autz-type.
>>
>> I hope you catch my drift. :)
>>
> This is covered in the FreeRADIUS documentation (and numerous 'eduroam'
> examples, it looks like you are aiming for this type of thing).
> 'suffix' is what you want in your authorize section, you then pass to
> the ldap module 'Stripped-User-Name'.
Thanks! One of the things I was looking for.
>
> Cheers
>
> --
> Alexander Clouter
> .sigmonster says: Massachusetts has the best politicians money can buy.
>
Yours,
Serge
> -
> List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
More information about the Freeradius-Users
mailing list