Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 16 Next »

Introduction

Things to mention:

802.1X is a standard that is part of 802.1, it consists in access control to a network by allowing/blocking all packets at the client's point of access into the network, including all broadcast packets, etc.  ... It is possible on Wi-Fi, ethernet and other mediums.

Upon connecting a device to an ethernet port on a switch or associating to a wireless SSID, the network switch or wifi router concerned will initially not allow any data to be transmitted/received by the device. It will request the connected device to identify itself and, upon approval of the supplied credentials by an authentication server, start accepting packets from/to the newly connected device, or continue dis-allowing, in the case the authentication server did not approve the credentials.

 

Architecture

802.1X defines how EAP messages are transmitted over an IEEE 802 network (e.g. ethernet, wifi).

RADIUS is a protocol to exchange information between an authenticator (also known as NAS (Network Access Server)) (see above picture) and an Authentication server. Each packet has a packet type, and contains multiple ValueName-Value attributes with relevant information as may be the case. A well known RADIUS server software is called FreeRADIUS.

In the above example, a wifi router is providing access to the 192.168.254.0/24 network. When a device (called a supplicant) attempts to connect to the wifi network, the wireless router starts an EAP conversation with the supplicant over 802.1X, requesting it to supply credentials. The router then connects to the authentication server (which, in the example above is also part of the 192.168.254.0/24 network) and sends the EAP response it received from the supplicant over the RADIUS protocol. The authentication server may wish to request the client for more information, it may thus answer the wifi router with a RADIUS packet of type Access-Challenge containing an EAP message to be forwarded to the supplicant. The wifi router facilitates this conversation between authentication server and supplicant until the authentication server sends a packet to the wifi router which is of either type Access-Accept or Access-Reject. In the case of an Access-Accept, the wifi router now allows the supplicant to join the network, or, in the case of Access-Reject, will not. Due to this role played by the wifi router, it is called an authenticator or sometimes NAS. Once the NAS has granted access, for 802.1X/RADIUS/authentication server, the job is done, and the supplicant becomes part of the 192.168.254.0/24 network's broadcast domain. It can now initiate a DHCP request for an IP address or any other action as may be appropriate. The authentication server is able to log that the user connected 

Things to mention:

What RADIUS/802.1X is able to provide and not and in which situations.

Varying implementation of features

Re-auth, accounting, request from server, features supported by TP-Link NASes

Terminology: NAS, RADIUS, FreeRADIUS, Authenticator, Supplicant, Authentication server

Diameter

Protocols used: EAP, MSCHAP, PEAP, TTLS, TLS

What EAP is

Difference between auth systems: PEAP, TTLS, TLS

Difference between 802.1X and RADIUS and FreeRADIUS

RADIUS is the protocol, it can be used for many purposes and many authentication methods can be used.

Certificates

Outer and inner identity and MAC/Windows support

Inner tunnel and outer tunnel sites

authorize, authenticate, post-auth, etc. sections

clients.conf

sites-available

mods-available

Wifi keying, session timeout, etc. protections against MAC-spoofing, etc.

Sources

Support / Knowledge places

FreeRADIUS wiki:

https://wiki.freeradius.org/

FreeRADIUS mailing list:

https://wiki.freeradius.org/guide/Users-Mailing-List

http://lists.freeradius.org/mailman/listinfo/freeradius-users

  • No labels