EAP-TTLS/EAP-TLS with freeRADIUS
Mr Dash Four
mr.dash.four at googlemail.com
Sun Nov 27 17:29:54 CET 2011
> Why don't you try reading about EAP and 802.1X too?
>
I did.
>> Interesting, noted. It would be nice if this works in a similar way as the SSL handshake works - this is very secure, tested and already established in the real world.
>>
>
> Of course it does, it's using TLS...
Thank you.
> You think the RADSEC guys are going to mess with it just because it's used for transporting RADIUS packets?
>
Where did I said or implied that? Touche!
>> OK, my understanding of EAP-TTLS/EAP-TLS is that the authentication happens in two distinct stages: the first stage (EAP-TTLS) is the outer authentication where the server presents its credentials/certificate to the client and then the secure channel is established. Phase two (EAP-TLS in my case) is where the client - via its client certificate - is actually authenticated to the RADIUS server. Now, I was hoping that the AP does this in a similar sort of way when authenticating itself to the RADIUS server, but it seems that is not the case and this is indeed a weak point.
>>
>
> No the NAS (It can be a WAP, VPN concentrator, Switch, Router, Terminal Server) - Does not use EAP-TTLS or any EAP based authentication method to communicate with the RADIUS server directly.
>
> As previously mentioned RADSEC does what you're asking. There's also plans for a DTLS transport layer (http://tools.ietf.org/html/draft-dekok-radext-dtls-03).
>
> But neither have been implemented by NAS vendors yet. If you want to have a secure channel of communication between the RADIUS server run the UDP packets through a VPN, or implemented a local proxy on the NAS to translate between UDP and RADSEC.
>
Tunnelling is something I might consider as an alternative, thanks again
for the explanation.
> Additionally, if you're using EAP-TTLS-TLS, why do you need the RADIUS communications to be secure? The sensitive data is already encrypted. In fact why are you using EAP-TTLS-TLS unless you're transporting something extra in the TTLS tunnel? Seems sort of pointless to me...
>
Well, my understanding is that the communication between AP and RADIUS
is not encrypted, isn't that so?
>> My question still remains though - since this is a two-phase authentication, two distinct sets of (ca, server, client) certificates can be used. How do I specify these in RADIUS?
>>
>
> raddb/modules/eap.conf - You can specify the signing CA for peer certificates for EAP-TLS.
>
> You can use two instances of the module, one for outer and one for inner if it helps you understand the concept any better.
>
Yep, that seems like a good plan - Phil Mayers was kind enough to
explain it to me. I'll probably do a bit of digging before delving in
with RADIUS myself.
More information about the Freeradius-Users
mailing list