Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

3b. Secondary requirements and recommendations (NRO)

#NameDescriptionStatusTools
1Manage shared secretsRADIUS shared secrets MUST have sufficient entropy (16+ characters), and MUST NOT be reused (each RADIUS server must have a unique shared secret for each trust relationship it participates in)MUSTCheck server configuration (NRO self)
2Ensure you are contactableNRO has arranged 365 cover of all named contact points (mail and phone redirects for leave etc)SHOULDRandomly check quality of info in the eduroam database (OT automatic)Provide administrator trainingNRO SHOULD provide eduroam training to member organisations (either directly or through a third party)SHOULDCheck NRO course/training schedules (NRO self)Maximize eduroam coverageNROs SHOULD/MAY provide an eduroam proxy RADIUS server to enable interested SPs outside the community to offer eduroam in their network.SHOULD/MAYNRO verifies (NRO self) (Added by WBK)Enable collaborationNROs SHOULD/MAY enable collaboration between the eduroam-enabled institutions by the use of conferences, email lists and/or Slack channelsSHOULD/MAYNRO verifies (NRO self) Conference material are available at https://wiki.geant.org/x/5KbTC  (Added by WBK)

3c. Requirements and recommendations - IdP & SP



Suppress AccountingRADIUS accounting messages MUST NOT be forwarded to the eduroam international RADIUS Proxies. They may contain potentially sensitive information and therefore GDPR compliance duties. NB: conflicts with existing policy, which states it SHOULD be supported.MUST NOTCheck accounting messages towards the TLRs (OT automatic)

Set eduroam-SP-CountryAdvise NROs to set eduroam-SP-Country attribute in particular for RadSecSHOULDNRO verifies that this is the case (NRO self)(etlr also does it, but not for RadSec)

Deploy dedicated serversNRO-level RADIUS servers SHOULD be dedicated to the task, not supporting other local or national services, in order to reduce their attack surface.SHOULD (MUST?)NRO verifies that this is the case with the FTLRs (NRO self)

Ensure you are contactableNRO has arranged 365 cover of all named contact points (mail and phone redirects for leave etc)SHOULDRandomly check quality of info in the eduroam database (OT automatic)

Conduct external penetration testingNROs SHOULD regularly conduct vulnerability assessment of internet-facing eduroam infrastructure.SHOULDTo be carried out by the NRO in cooperation with the national CERT team (NRO self)

Conduct internal vulnerability testingNROs SHOULD regularly conduct vulnerability testing from within the internal network of eduroam infrastructure.SHOULDTo be carried out by the NRO in cooperation with the national CERT team (NRO self)

Incorporate redundancyNRO-level RADIUS servers SHOULD be deployed in a redundant, diverse configuration to maximise availability and meet SLAsSHOULDNRO verifies that this is the case (NRO self)

Provide administrator trainingNRO SHOULD provide eduroam training to member organisations (either directly or through a third party)SHOULDCheck NRO course/training schedules (NRO self)

Maximize eduroam coverageNROs SHOULD/MAY provide an eduroam proxy RADIUS server to enable interested SPs outside the community to offer eduroam in their network.SHOULD/MAYNRO verifies (NRO self) (Added by WBK)

Enable collaborationNROs SHOULD/MAY enable collaboration between the eduroam-enabled institutions by the use of conferences, email lists and/or Slack channelsSHOULD/MAYNRO verifies (NRO self) Conference material are available at https://wiki.geant.org/x/5KbTC  (Added by WBK)


3c. Requirements and recommendations - IdP & SP

Check CAT (OT automatic), NRO verifies that CAT has been strongly recommended
#NameDescriptionStatusTools
1Use the right SSID

NROs MUST ensure all members only deploy the service under the 'eduroam' SSID. Non-compliant networks MUST NOT be labelled 'eduroam' or anything similar to avoid confusion for visitors. The eduroam SSID MUST NOT be shared with other network services.

MUSTNRO verifies that this has been communicated
#NameDescriptionStatusTools
1Use the right SSID

NROs MUST ensure all members only deploy the service under the 'eduroam' SSID. Non-compliant networks MUST NOT be labelled 'eduroam' or anything similar to avoid confusion for visitors. The eduroam SSID MUST NOT be shared with other network services.

MUSTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
2Adopt AESeduroam wi-fi services MUST implement WPA2 Enterprise with the use of the CCMP (AES) algorithmMUSTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
3Disable WPA-TKIPThe WPA specification MUST NOT be supported and the TKIP algorithm MUST NOT be employed in eduroam servicesMUST NOTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
4Separate non-eduroam guestsNRO and its members may offer a public guest Wi-Fi service for those unable to access eudroam; such users SHOULD be provisioned onto a separate network from eduroam visitors, with its own authentication, monitoring, and anti-circumvention measures.SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
5Ensure clarityNRO members SHOULD act to minimise any possibility of confusion between eduroam and other guest services they may offer (e.g. to prevent credentials being inappropriately presented)SHOULDCheck info on web pages and other information sources (OT manual)
6Permit 802.11 onlyNROs MUST ensure members offer eduroam ONLY on 802.11-based wireless media (i.e. NOT over bluetooth etc).MUSTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
7Maintain an audit trailNROs MUST ensure that they and their members retain authentication and DHCP logs for <period defined in central policy?> to enable the cooperative resolution of identity in the event of abuse of eduroamMUSTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
8Standardise end-user accessNROs MUST ensure all members offer eduroam users access to the minimum standard ports and protocols, which are specified in the eduroam policy, such that the baseline services (web email and VPN) are consistently available.MUSTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
9Ensure physical securityNROs must advise their members that WiFi APs and cabling SHOULD be be secured as much as possible (e.g. to restrict opportunities to introduce network taps or other tampering). All servers MUST be hosted in a secure environment.MUSTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
10Provide physical signageNRO advises member organisations to deploy physical signage in areas where eduroam is available (e.g. to assist visitors with medical prosthetics) (What does this mean in practice?(WBK))SHOULDEvidence: copy of documentation/web page
11

Use the CAT

NRO SHOULD maintain a CAT adminstrator/config for its own staff and also recommend CAT usage to all members. Wherever possible, CAT SHOULD be used to assist with client deployments.SHOULD to eduroam IdPs/SPs (NRO self)
2Adopt AESeduroam wi-fi services MUST implement WPA2 Enterprise with the use of the CCMP (AES) algorithmMUST12Deprecate manual configurationWhere CAT-assisted end user device configuration is not possible, it SHOULD NOT be undertaken by the end user. Administration staff should undertake such configuration to ensure it is correctly completed. Manual configuration is not recommended.SHOULD NOTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
133Provide end-user educationNRO and members SHOULD implement training for end users on the expected legitimate behaviours of eduroam systems. Many attacks rely on incorrect user responses to inappropriate service behaviours such as password requests, certificate mismatch warnings etc.Disable WPA-TKIPThe WPA specification MUST NOT be supported and the TKIP algorithm MUST NOT be employed in eduroam servicesMUST NOTSHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs and that NRO has offered to help with training implementation (NRO self)
4Separate non-eduroam guestsNRO and its members may offer a public guest Wi-Fi service for those unable to access eudroam; such users SHOULD be provisioned onto a separate network from eduroam visitors, with its own authentication, monitoring, and anti-circumvention measures.SHOULD14Prevent credential sharingNROs MUST ensure that all their members enforce the policy that credentials SHOULD NOT be shared between users (or devices where device authentication is used). Automated monitoring of high numbers of simultaneous logins may help with this.MUSTNRO verifies that this has been communicated to communicated to eduroam IdPs/SPs (NRO self) Automated monitoring (OT automatic or NRO automatic)SPs (NRO self)
5Ensure clarityNRO members SHOULD act to minimise any possibility of confusion between eduroam and other guest services they may offer (e.g. to prevent credentials being inappropriately presented)SHOULDCheck info on web pages and other information sources (OT manual)
6Adopt encrypted commsNRO SHOULD recommend to members that they use a VPN to protect communications between Access Points and the RADIUS server. (Usually there is a controller here?!? Is VPN really needed?15Select an EAP TypeNRO should advise members that they SHOULD use at least one of TLS, TTLS, EAP-FAST or PEAP (see reference 9)SHOULDNRO verifies that this has been communicated to communicated to eduroam IdPs/SPs (NRO self)
7Permit 802.11 onlyNROs MUST ensure members offer eduroam ONLY on 802.11-based wireless media (i.e. NOT over bluetooth etc).MUST16Implement certificate revocationIf an EAP type which uses client side certificates is used (e.g. EAP-TLS), a robust revocation process SHOULD be in place to cover loss, theft or compromise of devices.SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs  SPs (NRO self). NRO checks authentication flows through the FLTRs, identifies the organisations utilizing client certs and shows evidence that a robust revocation process is in place
8Maintain an audit trailNROs MUST ensure that they and their members retain authentication and DHCP logs for <period defined in central policy?> to enable the cooperative resolution of identity in the event of abuse of eduroamMUSTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
9Standardise end-user accessNROs MUST ensure all members offer eduroam users access to the minimum standard ports and protocols, which are specified in the eduroam policy, such that the baseline services (web email and VPN) are consistently available.MUST17Use anonymous outer identitiesWhere supported by the EAP type and the supplicant, it is strongly recommended that anonymous outer identities SHOULD be used. (see reference 10)SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs and checks FTLR logs (NRO self)
10Ensure physical securityNROs must advise their members that WiFi APs and cabling SHOULD be be secured as much as possible (e.g. to restrict opportunities to introduce network taps or other tampering). All servers MUST be hosted in a secure environment.MUST18Select a certificate typeNRO and members SHOULD undertake a risk-based selection of private vs. public CAs for their RADIUS infrastructure. Private is usually preferrable.SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs and that NROs have offered help and advice SPs (NRO self)
19Set Operator-NameWhere possible, NRO and members SHOULD ensure all Access-Request packets proxied to the NRPS contain the Operator-Name attribute correctly set to the relevant realm.SHOULDNRO checks authentication flow through the FTLRs (NRO self)
20Enable CUIChargeable User Identity (CUI) SHOULD be implemented to enhance accountability of end user behaviour by pseudonymous means.SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs and checks FTLR logs (NRO self)

11Provide physical signageNRO advises member organisations to deploy physical signage in areas where eduroam is available (e.g. to assist visitors with medical prosthetics) (What does this mean in practice?(WBK))SHOULDEvidence: copy of documentation/web page
12

Use the CAT

NRO SHOULD maintain a CAT adminstrator/config for its own staff and also recommend CAT usage to all members. Wherever possible, CAT SHOULD be used to assist with client deployments.SHOULDCheck CAT (OT automatic), NRO verifies that CAT has been strongly recommended to eduroam IdPs/SPs (NRO self)
13Deprecate manual configurationWhere CAT-assisted end user device configuration is not possible, it SHOULD NOT be undertaken by the end user. Administration staff should undertake such configuration to ensure it is correctly completed. Manual configuration is not recommended.SHOULD NOT21Implement rogue AP detectionWhere available, NRO and members SHOULD monitor for rogue access points. IF possible, automated suppression of rogues SHOULD be implemented.SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
14Provide end-user education22Implement wireless IPSWhere available, NRO and members SHOULD implement Wi-Fi Intrusion Prevention Systems (IPS) to detect AP spoofing, malicious broadcasts etc.SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)23Operate to default denyNROs SHOULD advise all members to operate a default deny policy on all firewalls and access control lists, only granting specific traffic types that are required and have been risk assessed to passtraining for end users on the expected legitimate behaviours of eduroam systems. Many attacks rely on incorrect user responses to inappropriate service behaviours such as password requests, certificate mismatch warnings etc.SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
24Provide mapsWebsites MAY includes graphical maps of accessible locations, noting additional services such as charging pointsMAYCheck information on web site (OT manual)
25audit eduroam IdPs/SPsNROs SHOULD regularly audit eduroam IdPs/SPs on the criteria mentioned aboveSHOULDShow documentation of audit (OT manual) (Added by WBK)

3c. Technical requirements and recommendations (MOL)

and that NRO has offered to help with training implementation (NRO self)
15Prevent credential sharingNROs MUST ensure that all their members enforce the policy that credentials SHOULD NOT be shared between users (or devices where device authentication is used). Automated monitoring of high numbers of simultaneous logins may help with this.MUSTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) Automated monitoring (OT automatic or NRO automatic)
16Select a certificate typeNRO and members SHOULD undertake a risk-based selection of private vs. public CAs for their RADIUS infrastructure. Private is usually preferrable.SHOULDNRO
#NameDescriptionStatusToolsReview Comments1Deploy a FirewallA layer 4 firewall MUST separate all internet-facing RADIUS servers and the internal network. Access must be controlled and monitored.MUSTNRO checks that this is the case with the FTLRs & NRO
verifies that this has been communicated to eduroam IdPs/SPs and that NROs have offered help and advice (NRO self)
2Limit admin access

17Deploy secure CA serversCA servers MUST be hosted on a dedicated, locked-down server in a secure location,  configured for minimum user access. Such servers SHOULD have a fully qualified domain name, although this MAY not be published through DNS
System administration (RADIUS and associated systems) MUST be preformed over a private internal network ONLY
.MUSTNRO
checks that this is the case with the FTLRs & NRO
verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
3Assess connectivity risksAll protocols permitted access to the servers MUST be risk-assessed (e.g. SMB and RDP may present security risks)MUSTCarry out assessment (OT manually)4Regulate external port accessA deny-all policy MUST be applied, permitting only the minimum ports necessary for authentication (e.g. UDP 1812, Status-Server 18121, TCP 2083 if RadSec is used). UDP 1645 MUST NOT be used.MUST

18Select an EAP TypeNRO should advise members that they SHOULD use at least one of TLS, TTLS, EAP-FAST or PEAP (see reference 9)SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
19Implement certificate revocationIf an EAP type which uses client side certificates is used (e.g. EAP-TLS), a robust revocation process SHOULD be in place to cover loss, theft or compromise of devices.SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs  (NRO self). NRO checks authentication flows through the FLTRs, identifies the organisations utilizing client certs and shows evidence that a robust revocation process is in place (NRO self)
20Disable PAPPassword Authentication Protocol MUST NOT be used between access points and RADIUS serversMUST NOTNRO
NRO checks that this is the case with the FTLRs & NRO 6Regulate Internal port accessA deny-all policy MUST be applied, permitting only the minimum ports necessary for administration functions (e.g. TCP 3389 for RDP or TCP 22 for SSH)MUSTNRO checks that this is the case with the FTLRs &
verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
Why do we care about not running 1645. (Or even random other ports, like the hosted SP may do.)5UDP fragmentationMake sure UDP fragmentation worksMUSTTest this once a year with eduroam managed IdP - one account per organisation, verify results (OT automatic) Can be checked by peers.

21DIsable SPAPShiva Password Authentication Protocol MUST NOT be used, as their encryption is reversible (see reference 7)MUST NOTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
22Disable MS-CHAPv1Challenge Handshake Authentication Protocol is considered weak and MUST NOT be used.MUST NOTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
23Use anonymous outer identitiesWhere supported by the EAP type and the supplicant, it is strongly recommended that anonymous outer identities SHOULD be used. (see reference 10)SHOULD
NRO verifies that this has been communicated to eduroam IdPs/SPs and checks FTLR logs (NRO self)
7Undertake patch managementAll server operating systems and applications MUST be kept fully patched and up to date (SysAdmins must apply risk assessment criteria to deciding whether to deploy early patches against zero-day exploits or to follow stable releases)MUST

24Set Operator-NameWhere possible, NRO and members SHOULD ensure all Access-Request packets proxied to the NRPS contain the Operator-Name attribute correctly set to the relevant realm.SHOULDNRO checks authentication flow through the FTLRs
NRO checks that this is the case with the FTLRs & NRO verifies that this has been communicated to eduroam IdPs/SPs
(NRO self)
8Make back-upsAll servers and configuration files MUST be regularly backed up (as a minimum after every configuration change)MUSTNRO checks that this is the case with the FTLRs &

25Enable CUIChargeable User Identity (CUI) SHOULD be implemented to enhance accountability of end user behaviour by pseudonymous means.SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs and checks FTLR logs (NRO self)
9Conduct monitoringServers MUST be configured to detect and log rogue behaviour such as password brute forcing. Where automated defence is possible, it SHOULD be deployed (e.g. increasing authentication back-off times)MUSTNRO checks that this is the case with the FTLRs & NRO checks that this is the case with the FTLRs (show test results) &

26Implement rogue AP detectionWhere available, NRO and members SHOULD monitor for rogue access points. IF possible, automated suppression of rogues SHOULD be implemented.SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
10Enable AlertsServers MUST be configured to send alerts (with copies of logs) to SysAdmins so that incidents can be detected and responded to in real time. Alert systems should be regularly tested for effectiveness.MUST

27Implement wireless IPSWhere available, NRO and members SHOULD implement Wi-Fi Intrusion Prevention Systems (IPS) to detect AP spoofing, malicious broadcasts etc.SHOULD
NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
11Deploy secure CA serversCA servers MUST be hosted on a dedicated, locked-down server in a secure location,  configured for minimum user access. Such servers SHOULD have a fully qualified domain name, although this MAY not be published through DNS.

28Operate to default denyNROs SHOULD advise all members to operate a default deny policy on all firewalls and access control lists, only granting specific traffic types that are required and have been risk assessed to pass.SHOULD
MUST13Don't intercept trafficNROs and members MUST NOT deploy interception technology or otherwise monitor the content of visitor or roaming traffic (e.g. do not use TLS or SSL interception proxies)MUST NOTNRO checks that this is the case with the FTLRs &
NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
12Enable Message-AuthenticatorWhere supported, the Message-Authenticator attribute MUST be enabled to prevent IP spoofed fake message injection. (see reference 8)MUSTEAP requests always carry it

29Provide mapsWebsites MAY includes graphical maps of accessible locations, noting additional services such as charging pointsMAYCheck information on web site (OT manual)
30UDP fragmentationMake sure UDP fragmentation worksMUSTTest this once a year with eduroam managed IdP - one account per organisation, verify results (OT automatic) Can be checked by peers.
31Adopt network segmentationNetwork segmentation SHOULD be considered, placing roaming users into a separate segment to local organisation users.SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
32Deploy VLAN spoofing countermeasuresthe visitor network design SHOULD prevent devices from mailiciously placing themselves into unauthorised VLANsSHOULD
NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
14Disable PAPPassword Authentication Protocol MUST NOT be used between access points and RADIUS serversMUST NOT

33audit eduroam IdPs/SPsNROs SHOULD regularly audit
NRO verifies that this has been communicated to
eduroam IdPs/SPs on the criteria mentioned aboveSHOULDShow documentation of audit (OT manual) (Added by WBK)

3c. Technical requirements and recommendations NRO, IdP and SP (MOL)

NRO self)NRO NRO verifies NRO 23 external penetration testingTo be carried out by the NRO in cooperation with the national CERT team
#NameDescriptionStatusToolsReview Comments
1Deploy a FirewallA layer 4 firewall MUST separate all internet-facing RADIUS servers and the internal network. Access must be controlled and monitored.MUSTNRO checks that this is the case with the FTLRs & NRO 15DIsable SPAPShiva Password Authentication Protocol MUST NOT be used, as their encryption is reversible (see reference 7)MUST NOT verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
2Limit admin accessSystem administration (RADIUS and associated systems) MUST be preformed over a private internal network ONLY.MUSTNRO checks that this is the case with the FTLRs & 16Disable MS-CHAPv1Challenge Handshake Authentication Protocol is considered weak and MUST NOT be used.MUST NOT NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)17Suppress AccountingRADIUS accounting messages MUST NOT be forwarded to the eduroam international RADIUS Proxies. They may contain potentially sensitive information and therefore GDPR compliance duties. NB: conflicts with existing policy, which states it SHOULD be supported.MUST NOTCheck accounting messages towards the TLRs (OT automatic)18Secure RadSec server identitiesIf RadSec is used, X.509 certificates must be used to identify RADIUS serversMUST (optional)Check FTLR server configuration (NRO self), check TLR configuration (OT automatic)
19Set eduroam-SP-CountryAdvise NROs to set eduroam-SP-Country attribute in particular for RadSecSHOULDNRO verifies that this is the case (NRO self)(etlr also does it, but not for RadSec)

3Assess connectivity risksAll protocols permitted access to the servers MUST be risk-assessed (e.g. SMB and RDP may present security risks)MUSTCarry out assessment (OT manually)
4Regulate external port accessA deny-all policy MUST be applied, permitting only the minimum ports necessary for authentication (e.g. UDP 1812, Status-Server 18121, TCP 2083 if RadSec is used). UDP 1645 MUST NOT be used.MUSTNRO checks that this is the case with the FTLRs & NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)Why do we care about not running 1645. (Or even random other ports, like the hosted SP may do.)
5Regulate Internal port accessA deny-all policy MUST be applied, permitting only the minimum ports necessary for administration functions (e.g. TCP 3389 for RDP or TCP 22 for SSH)MUSTNRO checks 20Deploy dedicated serversNRO-level RADIUS servers SHOULD be dedicated to the task, not supporting other local or national services, in order to reduce their attack surface.SHOULD (MUST?) that this is the case with the FTLRs & NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)21Adopt network segmentationNetwork segmentation SHOULD be considered, placing roaming users into a separate segment to local organisation users.
6Undertake patch managementAll server operating systems and applications MUST be kept fully patched and up to date (SysAdmins must apply risk assessment criteria to deciding whether to deploy early patches against zero-day exploits or to follow stable releases)MUSTNRO checks that this is the case with the FTLRs & NRO SHOULD verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
7Make back-upsAll servers and configuration files MUST be regularly backed up (as a minimum after every configuration change)MUSTNRO checks that this is the case with the FTLRs & 22Deploy VLAN spoofing countermeasuresthe visitor network design SHOULD prevent devices from mailiciously placing themselves into unauthorised VLANsSHOULD NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
8Conduct monitoringServers MUST be configured to detect and log rogue behaviour such as password brute forcing. Where automated defence is possible, it SHOULD be deployed (e.g. increasing authentication back-off times)MUSTNRO checks that this is the case with the FTLRs & NRO verifies that this has been communicated to eduroam IdPs/SPs NROs SHOULD regularly conduct vulnerability assessment of internet-facing eduroam infrastructure.SHOULD (NRO self)24Conduct internal vulnerability testingNROs SHOULD regularly conduct vulnerability testing from within the internal network of eduroam infrastructure.SHOULD
9Enable AlertsServers MUST be configured to send alerts (with copies of logs) to SysAdmins so that incidents can be detected and responded to in real time. Alert systems should be regularly tested for effectiveness.MUSTNRO checks that this is the case with the FTLRs (show test results) & NRO verifies that this has been communicated to eduroam IdPs/SPs To be carried out by the NRO in cooperation with the national CERT team (NRO self)25Incorporate redundancyNRO-level RADIUS servers SHOULD be deployed in a redundant, diverse configuration to maximise availability and meet SLAsSHOULDNRO verifies that this is the case (NRO self)
10Enable Message-AuthenticatorWhere supported, the Message-Authenticator attribute MUST be enabled to prevent IP spoofed fake message injection. (see reference 8)MUST
EAP requests always carry it
11Don't intercept trafficNROs and members MUST NOT deploy interception technology or otherwise monitor the content of visitor or roaming traffic (e.g. do not use TLS or SSL interception proxies)MUST NOTNRO checks that this is the case with the FTLRs & NRO verifies that this has been communicated to 26Adopt encrypted commsNRO SHOULD recommend to members that they use a VPN to protect communications between Access Points and the RADIUS server. (Usually there is a controller here?!? Is VPN really needed?)SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
12Secure RadSec server identitiesIf RadSec is used, X.509 certificates must be used to identify RADIUS serversMUST (optional)Check FTLR server configuration (NRO self), check TLR configuration (OT automatic)
1327audit eduroam IdPs/SPsNROs SHOULD regularly audit eduroam IdPs/SPs on the criteria mentioned aboveSHOULDShow documentation of audit (OT manual) (Added by WBK)

...