Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

goal is to evaluate the service level, recognise excellence and identify possible weak spots all in order to maintain and improve the over overall quality of the service

2. Rules & Process

...

  • rewards and sanctions

audit tools:

  • self assesmentassessment
  • automatic via monitoring tools
  • manual assessment by the OT / audit team

...

  • initiated by the eduroam OT
  • NRO admins fill in the web form (monitor.eduroam.org/audit)
  • OT provides data via manual audit or monitoring tools
  • OT publishes final results (only final mark per NRO is publicly available


3a. Requirements and recommendations

...

(NRO, from eduroam policy)

#
Number
NameDescriptionStatusToolsReview commentswhohow
1policy (Ch 6)NRO has signed the appropriate version of the policyMUSTOT checks in official archive (OT manually)
otM
2policy (Ch 6)Establish the necessary infrastructure for eduroam (set-up FLRS and exchage traffic in expeced manner)MUSTCheck RADIUS server basic configuration (OT automatically)
otA
3policy (Ch 6)Ensure that eduroam servers and services are maintained according to the specified best practices for server build, configuration and security, with the purpose of maintaining a generally high level of security, and thereby trust in the eduroam Confederation.MUSTCheck RADIUS server version number (OT automatically/manually) OT interviews NRO (OT manually) or NRO self-assessment (NRO self)


4policy (Ch 6)Provide trustworthy and secure transport of all private authentication credentials (i.e.passwords) that are traversing the eduroam infrastructure. In other words, ensure that user credentials stay securely encrypted end-to-end between the user’s personal device and the identity provider when traversing the eduroam infrastructure. A rationale for this requirement can be found in Appendix A of the eduroam policy.MUSTCheck authentication flows to ensure that EAP is used (OT automatic)


5policy (Ch 6)
(before
Servers SHOULD be highly available, for example, by deploying multiple separate servers in a failover configuration in different IP subnets on different physical locations.
RECOMMENDED (MAY)Check number of servers (OT automatic), check location and configuration (NRO self)
otM
6policy (Ch 6)AAA server: RADIUS datagram processing to and from the ETLRS, as per RFC2865 or any other of the recommended transports (e.g. RADIUS/TLS). The server MUST be able to proxy RADIUS datagrams to other servers based on contents of the User-Name attribute.REQUIRED/MUSTCheck authentication flow through ETLRS (OT automatic), check server configuration (NRO self)
otA
7policy (Ch 6)AAA server: RFC3580 (EAP over RADIUS). The server MUST proxy EAP-Message attributes unmodified, in the same order as it received them, towards the appropriate destination.REQUIRED/MUSTCheck server configuration (NRO self)
otA
8policy (Ch 6)AAA server: The server MUST generate F-Ticks and send them to the monitoring infrastructure.REQUIRED/MUST Check received F-ticks (OT automatic) and/or server configuration (NRO self)
otA
9policy (Ch 6)If dynamic RADIUS routing (see eduroam policy Section 2.1.1.2) is used by the individual SPs, then it is the responsibility of the respective NRO to ensure that appropriate F-Ticks are sent to the monitoring infrastructure, either by enforcing that the SPs send them to the monitoring infrastructure themselves, or by collecting information of the authentication events and sending these on to the monitoring infrastructure on the SP’s behalf.REQUIRED/MUSTCheck issued certificates for dynamic routing and F-Ticks from corresponding SPs (OT automatic)
ot?
10policy (Ch 6)The server(s) MUST be setup to allow monitoring requests from the monitoring serviceMUSTCheck server configuration and monitoring results (OT automatic)
otA
11policy (Ch 6)The server(s) MUST respond to ICMP/ICMPv6 Echo Requests sent by the confederation infrastructure and confederation monitoring serviceMUSTCheck monitoring results (OT automatic)
otA
12policy
(not Ch 6)
NROs should appoint at least one representative to the eduroam SGSHOULD
OT checks meeting participation
(MUST)Check mailing list membership and meeting participation (OT automatic, manually if not possible)
OTM
13policy (Ch 6)Participate in the work of the SG (ask for reply from SG member's e-mail)MUST (SHOULD)Check mailing list membership and meeting participation (OT automatic, manually if not possible)
OTA
14policy (Ch 6)NRO MUST set up a web server in order to publish information about the eduroam service, including information with respect to the participating institutions, as well as practical information on how to use eduroam.MUSTCheck if website is present (OT manual)
OTM
15policy (Ch 6)The address of the web server with information about the eduroam service SHOULD be www.eduroam.<tld>. (combine with 14)
SHOULD

Check if web site exists (OT automatic)

Note from MOL: have encountered many organisations that are prevented by policy from registering a TLD-level domain, but they can always do tld/eduroam...


OTM
16policy (Ch 6)The national eduroam website should be available in EnglishSHOULDCheck if website is present (OT manual - there is no specified URL to the English version, e.g. www.eduroam.tld/en/)
OTM
17policy (Ch 6)An NRO’s web server MUST provide data in XML format, based on the specification defined by the SG, and available at http://monitor.eduroam.org/databaseMUST (soon outdated xml → json) web page → https://monitor.eduroam.org/fact_eduroam_db.php (question)Check eduroam database (OT automatic)
OTA
18policy ( Ch 5.7)

The NRO must provide the estimated coverage inside themember federation to the eduroam OT.

MUSTCheck when the eduroam database data for the NRO has been updated (OT automatic)


19

policy (not Ch 6)

The use of RADIUS/TLS is recommendedRECOMMENDED (SHOULD)Check server configuration and issued certificates (OT automatic)
OTA
20policy (Ch 6)Provide a RADIUS/TLS endpoint open for connections from all other eduroam participants to enable the receiving end of RADIUS/TLS dynamic discovery.RECOMMENDEDCheck issued certificates and server configuration (OT automatic?)


21policy (Ch 6)Provide a DNS-based discovery module for outgoing RADIUS/TLS dynamic discovery.RECOMMENDEDCheck issued certificates and server configuration (OT automatic?)


22policy (not
policy (before
Ch 6)

Scheduled maintenance work performed by the NRO within the respective federation should be announced two (2) days in advance through the SG mailing list. For unscheduled maintenance the announcement should preferably be made 24 hours in advance. Policy says 24 working hours  but 24 working hours is more than 2 days !?! A ticket on TTS should be opened by the respective NRO representative, and closed with a short comment on the performed action. 

SHOULDOT lists outages from the monitoring systems (OT automatic), then checks SG mailing list archive and TTS
as well as outages in the FTLR connections from the monitoring systems
(OT manually). No unscheduled maintenance should have taken place since last audit (or during the last 12 months).


23policy (not
policy (before
Ch 6)NROs should regularly report to the OT about the number and type of security incidentsSHOULDOT cross-checks its archives with other security incident archives (help needed from the CERT teams?) since last audit or from the last 12 months (OT manually)This sounds like we expect them.NS
24policy (
before
not Ch 6)Malfunction in a member federation should be announced to the eduroam OT and optionally through the SG mailing list. A ticket on the TTS should be opened by the respective NRO representative and closed with a short comment on the performed actionSHOULDOT lists outages from the monitoring systems (OT automatic) and checks
mailing list archives and possible other sources (including social media) regarding malfunction reports.
from TTS and the SG mailing list archive if malfunction has been reported (OT manually).  Time period: Since last audit or the last 12 months.So if there are never issues, people don't score?NS
25policy (not
policy (before
Ch 6)Participating federations are encouraged to check
send
sent VLAN attributes (Tunnel-Type, Tunnel-Medium-Type, Tunnel-Private-Group-ID) , and to investigate whether the sender is sending these attributes inadvertently or not, and then take appropriate action.SHOULD (encouraged)
OT checks
Check sent VLAN attributes
and contact
(OT automatic)  Contact institutions directy to check if
the NRO has been in contact regarding this.
sending is intentional (OT semi-automatic - contact info in eduroam database). Check also at federation TLRs (NRO self)An NRO may also decice to drop everything, right, if agreed by members.OTA
26policy (Ch 6)Violation of the Policy declaration MUST be reported to the OT, and MUST be presented to the SG and escalated to the NREN PC in serious cases.MUST
Check forums and social media etc and cross-check with OT and SG mailing list archives & meeting minutes.

This is not really possible to check. But if eduroam OT learns of this kind of violation of the policy, NRO should loose many audit points, in order to courage NROs to report this to eduroam OT.

Tools are rather passive again. If people never report anything, they score? Or they fail?NS
27
policy (Ch 6)Establish the necessary infrastructure for eduroam, and ensure that it is maintained according to the eduroam service requirements and best practicesMUSTCheck RADIUS server configuration and version number
policy (Ch 6)Establish user-support service for its end users, as explained in Section 5.1 in the eduroam policy, “User Support Processes”MUST
Check reported cased to identify the flowpolicy (Ch 6)Participate in the work of the SGMUSTCheck if presence on mailing lists.policy (Ch 6)Provide the information for the eduroam databaseMUSTCheck eduroam databasepolicy (Ch 6)Establish and maintain a website, including information with respect to the participating institution, as well as practical information on how to use eduroam.MUSTCheck if website is presentpolicy (Ch 6)The national eduroam website should be available in EnglishSHOULDCheck if website is presentpolicy (Ch 6)Provide trustworthy and secure transport of all private authentication credentials (i.e.passwords) that are traversing the eduroam infrastructure.MUSTCheck server configurationpolicy (Ch 6)Ensure that user credentials stay securely encrypted end-to-end between the user’s personal device and the identity provider when traversing the eduroam infrastructure. A rationale for this requirement can be found in Appendix A of the eduroam policy.MUSTCheck server configurationpolicy (Ch 6)Ensure that eduroam servers and services are maintained according to the specified best practices for server build, configuration and security, with the purpose of maintaining a generally high level of security, and thereby trust in the eduroam Confederation.MUSTCheck server configuration and practices used.

3b. Secondary Requirements and recommendations (MOL)

NRO checks that this is the case with the FTLRs & NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
NS
28policy (Ch 6)

AAA server: RFC2866 (RADIUS Accounting). The server SHOULD be able to receive RADIUS Accounting packets if a service provider opts to send that data.

SHOULDSkip this

Note from MOL: accounting packets may include GDPR-sensitive data. On govroam we have elected to NOT accept accounting packets...
I don't agree: well, we for instance accept the requests right away and discard.

29policy (Ch 6)AAA server: RFC2866 (RADIUS Accounting). If RADIUS Accounting is supported, RADIUS Accounting packets with a destination outside the federation MUST NOT be forwarded outside the federation, and MUST be acknowledged by the FLRS.MUSTCheck server configuration (NRO self)
OTA
30policy (Ch 6)All relevant logs MUST be created with synchronisation to a reliable time source (GPS or in its absence NTP/SNTP)MUSTCheck server configuration (NRO self)
NS
31policy (Ch 6)

Logs of all authentication requests and responses MUST be kept. The minimum log retention time is six months, unless national regulations require otherwise. These logs may constitute personal data and MUST be managed in a GDPR-compliant way. The information in the requests and responses MUST as a minimum include:

The time the authentication request was exchanged.

The value of the User-Name attribute in the request ('outerEAP-identity').

The value of the Calling-Station-Id attribute in authentication requests.

The result of the authentication.

The value of Chargeable-User-Identity (if present in Access-Accept message).

MUST (in policy as SHOULD)NRO checks that this is the case with the FTLRs & NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
NS
32policy (Ch 6)Communicate to all IdPs and SPs the obligations put on them in policy Chapters 6.3.2. and 6.3.3. (included in 3c & 3d)MUST

NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)


NS
33policy (Ch 6)Audit IdPs and SPs according to the obligations put on them in policy Chapters 6.3.2. and 6.3.3. (included in 3c & 3d)SHOULDShow documentation of audit (OT manual)
NS

3b. Secondary requirements and recommendations (NRO)

#NameDescriptionStatusTools
1Manage shared secretsRADIUS shared secrets MUST have sufficient entropy (16+ characters), and MUST NOT be reused (each RADIUS server must have a unique shared secret for each trust relationship it participates in)MUSTCheck server configuration (NRO self)
2Suppress AccountingRADIUS accounting messages MUST NOT be forwarded to the eduroam international RADIUS Proxies. They may contain potentially sensitive information and therefore GDPR compliance duties. NB: conflicts with existing policy, which states it SHOULD be supported.MUST NOTCheck accounting messages towards the TLRs (OT automatic)
3Set eduroam-SP-CountryAdvise NROs to set eduroam-SP-Country attribute in particular for RADIUS/TLS (RadSec)SHOULDNRO verifies that this is the case (NRO self)(etlr also does it, but not for RadSec)
4Deploy dedicated serversNRO-level RADIUS servers SHOULD be dedicated to the task, not supporting other local or national services, in order to reduce their attack surface.SHOULD (MUST?)NRO verifies that this is the case with the FTLRs (NRO self)
5Ensure you are contactableNRO has arranged 365 cover of all named contact points (mail and phone redirects for leave etc)SHOULDRandomly check quality of info in the eduroam database (OT automatic)
6Conduct external penetration testingNROs SHOULD regularly conduct vulnerability assessment of internet-facing eduroam infrastructure.SHOULDTo be carried out by the NRO in cooperation with the national CERT team (NRO self)
7Conduct internal vulnerability testingNROs SHOULD regularly conduct vulnerability testing from within the internal network of eduroam infrastructure.SHOULDTo be carried out by the NRO in cooperation with the national CERT team (NRO self)
8Provide administrator trainingNRO SHOULD provide eduroam training to member organisations (either directly or through a third party)SHOULDCheck NRO course/training schedules (NRO self)
9Maximize eduroam coverageNROs SHOULD/MAY provide an eduroam proxy RADIUS server to enable interested SPs outside the community to offer eduroam in their network.SHOULD/MAYNRO verifies (NRO self) (Added by WBK)
10Enable collaborationNROs SHOULD/MAY enable collaboration between the eduroam-enabled institutions by the use of conferences, email lists and/or Slack channelsSHOULD/MAYNRO verifies (NRO self) Conference material available at https://wiki.geant.org/x/5KbTC  (Added by WBK)


3c. Requirements and recommendations - IdP & SP (both policy and non-policy)

Website (3)
#NameDescriptionStatusTools
1Verify IdP functionality (policy)Verify that the authentication is performed according to the policy by checking authentication flow through the FTLRs or by checking authentication of an issued test account.MUST (IdP only)NRO verifies by checking the FTLRs or by checking authentication of a test account (NRO self)
2

Verify SP functionality
(policy)

Verify that the authentication is performed according to the policy by checking authentication flow through the FTLRs or by checking authentication of a known account eligible for eduroam. Check presence of Calling-Station-Id.MUST (SP only)NRO verifies by checking the FTLRs or by checking authentication of a test account (NRO self)
3Use the right SSID (policy)

NROs MUST ensure all members only deploy the service under the 'eduroam' SSID unless there is more than one eduroam SP at the same physical location and the signal overlap would create operational problems,in which case an SSID starting with "eduroam-" MAY be used. Non-compliant networks MUST NOT be labelled 'eduroam' or anything similar to avoid confusion for visitors. The eduroam SSID MUST NOT be shared with other network services.

MUSTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
4Adopt AES (policy)eduroam wi-fi services MUST implement WPA2 Enterprise with the use of the CCMP (AES) algorithmMUSTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
5Disable WPA-TKIP (policy)The WPA specification MUST NOT be supported and the TKIP algorithm MUST NOT be employed in eduroam servicesMUST NOTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
6Separate non-eduroam guestsNRO and its members may offer a public guest Wi-Fi service for those unable to access eduroam; such users SHOULD be provisioned onto a separate network from eduroam visitors, with its own authentication, monitoring, and anti-circumvention measures.SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
7Ensure clarityNRO members SHOULD act to minimise any possibility of confusion between eduroam and other guest services they may offer (e.g. to prevent credentials being inappropriately presented)SHOULDCheck info on web pages and other information sources (OT manual)
8Adopt encrypted commsNRO SHOULD recommend to members that they use a VPN to protect communications between Access Points and the RADIUS server. (Usually there is a controller here?!? Is VPN really needed?)SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
9Permit 802.11 onlyNROs MUST ensure members offer eduroam ONLY on 802.11-based wireless media (i.e. NOT over bluetooth etc).MUSTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
10Well-managed identity system (policy)Ensure a well-managed identity management backend system.MUST (IdP only)NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
11Maintain an audit trail (policy)NROs MUST ensure that they and their members retain authentication and DHCP logs for six months, unless national regulations require otherwise, to enable the cooperative resolution of identity in the event of abuse of eduroam. All relevant logs MUST be created with synchronisation to a reliable time source (GPS or in its absence NTP/SNTP)MUSTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
12Logs (policy)

Logs of all authentication requests and responses MUST be kept. The minimum log retention time is six months, unless national regulations require otherwise. These logs may constitute personal data and MUST be managed in a GDPR-compliant way. The information in the requests and responses MUST as a minimum include:

The time the authentication request was exchanged.

The value of the User-Name attribute in the request ('outerEAP-identity').

The value of the Calling-Station-Id attribute in authentication requests.

The result of the authentication.

The value of Chargeable-User-Identity (if present in Access-Accept message).

MUSTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
13Standardise end-user access (policy)NROs MUST ensure all members offer eduroam users access to the minimum standard ports and protocols, which are specified in the eduroam policy, such that the baseline services (web email and VPN) are consistently available.MUSTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)N / S
14Filtered protocols (policy)Network access to roaming visitors SHOULD not be port-restricted at all (i.e. in additionto the minimum list of open ports from above, allow all outgoing communication). Where this is not possible, the number of filtered protocols SHOULD be kept as low as possible.SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
15NAT (policy)The use of NAT SHOULD be avoidedSHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
16IPV6 (policy)IPv6 connectivity SHOULD be supplied.SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
17Application & interception proxies (policy)Service providers SHOULD NOT deploy application or interception proxies. Service providers deploying application or interception proxiesMUST NOT use the proxy to require users to submit personal information before gainingaccess to the Internet,and MUST publish information aboutthese proxies on their eduroam website. If an application proxy is nottransparent, the service provider MUST also provide documentation on theconfiguration of applications to use the proxy.SHOULD NOT / MUST (NOT)NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
18Ensure physical securityNROs must advise their members that WiFi APs and cabling SHOULD be be secured as much as possible (e.g. to restrict opportunities to introduce network taps or other tampering). All servers MUST be hosted in a secure environment.MUSTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
19Implement rogue AP detectionWhere available, NRO and members SHOULD monitor for rogue access points. IF possible, automated suppression of rogues SHOULD be implemented.SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
20Implement wireless IPSWhere available, NRO and members SHOULD implement Wi-Fi Intrusion Prevention Systems (IPS) to detect AP spoofing, malicious broadcasts etc.SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
21Provide physical NameDescriptionStatusTools1Physical signageNRO advises member organisations to deploy physical signage in areas where eduroam is available (e.g. to assist visitors with medical prosthetics) (What does this mean in practice?(WBK))SHOULDShouldEvidence: copy of documentation/web page2Published locationsNRO ensures all member venue location data is added to the eduroam database (for use in maps etc.)Should
3Web presencePublishes a site at (tld)/eduroam documenting eduroam activities and locations in their NRENShouldEvidence: URL/screenshots

22Configuration instructions (policy)An IdP MUST provide sufficient configuration instructions for their end users so that a unique identification of the IdP is possible for the end user at all times.MUSTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
23

Use the CAT

NRO SHOULD maintain a CAT adminstrator/config for its own staff and also recommend CAT usage to all members. Wherever possible, CAT SHOULD be used to assist with client deployments.SHOULDCheck CAT (OT automatic), NRO verifies that CAT has been strongly recommended to eduroam IdPs/SPs (NRO self)OT/A
24Deprecate manual configurationWhere CAT-assisted end user device configuration is not possible, it SHOULD NOT be undertaken by the end user. Administration staff should undertake such configuration to ensure it is correctly completed. Manual configuration is not recommended.SHOULD NOTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
25Provide end-user educationNRO and members SHOULD implement training for end users on the expected legitimate behaviours of eduroam systems. Many attacks rely on incorrect user responses to inappropriate service behaviours such as password requests, certificate mismatch warnings etc.SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs and that NRO has offered to help with training implementation (NRO self)
26Prevent credential sharingNROs MUST ensure that all their members enforce the policy that credentials SHOULD NOT be shared between users (or devices where device authentication is used). Automated monitoring of high numbers of simultaneous logins may help with this.MUSTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) Automated monitoring (OT automatic or NRO automatic)
27Select a certificate typeNRO and members SHOULD undertake a risk-based selection of private vs. public CAs for their RADIUS infrastructure. Private is usually preferrable.SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs and that NROs have offered help and advice (NRO self)
28Deploy secure CA serversCA servers MUST be hosted on a dedicated, locked-down server in a secure location,  configured for minimum user access. Such servers SHOULD have a fully qualified domain name, although this MAY not be published through DNS.MUSTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
29Select an EAP TypeNRO should advise members that they SHOULD use at least one of TLS, TTLS, EAP-FAST or PEAP (see reference 9)SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
30Implement certificate revocationIf an EAP type which uses client side certificates is used (e.g. EAP-TLS), a robust revocation process SHOULD be in place to cover loss, theft or compromise of devices.SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs  (NRO self). NRO checks authentication flows through the FLTRs, identifies the organisations utilizing client certs and shows evidence that a robust revocation process is in place (NRO self)
31Disable PAPPassword Authentication Protocol MUST NOT be used between access points and RADIUS serversMUST NOTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
32DIsable SPAPShiva Password Authentication Protocol MUST NOT be used, as their encryption is reversible (see reference 7)MUST NOTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
33Disable MS-CHAPv1Challenge Handshake Authentication Protocol is considered weak and MUST NOT be used.MUST NOTNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
34Use anonymous outer identitiesWhere supported by the EAP type and the supplicant, it is strongly recommended that anonymous outer identities SHOULD be used. (see reference 10)SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs and checks FTLR logs (NRO self)
35Set Operator-Name (policy)Where possible, NRO and members SHOULD ensure all Access-Request packets proxied to the NRPS (FTLRs) contain the Operator-Name attribute correctly set to the relevant realm.SHOULDNRO checks authentication flow through the FTLRs (NRO self)
36Operator-Name functionality (policy)The appearance of the Operator-Name attribute (RFC5580) in Access-Requests MUST NOT cause these requests to be treated as invalidMUST NOTNRO verifies that this has been communicated to eduroam IdPs/SPs and checks FTLR logs (if possible) (NRO self)
37Enable CUI (policy)Chargeable User Identity (CUI) SHOULD be implemented to enhance accountability of end user behaviour by pseudonymous means.SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs and checks FTLR logs (NRO self)
38UDP fragmentationMake sure UDP fragmentation worksMUSTTest this once a year with eduroam managed IdP - one account per organisation, verify results (OT automatic) Can be checked by peers.
39Operate to default denyNROs SHOULD advise all members to operate a default deny policy on all firewalls and access control lists, only granting specific traffic types that are required and have been risk assessed to pass.SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
40Adopt network segmentationNetwork segmentation SHOULD be considered, placing roaming users into a separate segment to local organisation users.SHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
41Deploy VLAN spoofing countermeasuresthe visitor network design SHOULD prevent devices from mailiciously placing themselves into unauthorised VLANsSHOULDNRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
42Provide mapsWebsites MAY 4Maps includes graphical maps of accessible locations, noting additional services such as charging pointsMay5Contact dataNRO has arranged 365 cover of all named contact points (mail and phone redirects for leave etc)Should6

CAT enabled

NRO maintains a CAT adminstrator/config for its own staff and recommends CAT usage to all membersShould7TrainingNRO provides eduroam training to member organisations (either directly or through a third party)Should891011

4. References

MAYCheck information on web site (OT manual)

3d. Technical requirements and recommendations NRO, IdP and SP (non-policy) (MOL)

#NameDescriptionStatusToolsReview Comments
1Deploy a FirewallA layer 4 firewall MUST separate all internet-facing RADIUS servers and the internal network. Access must be controlled and monitored.MUSTNRO checks that this is the case with the FTLRs & NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
2Limit admin accessSystem administration (RADIUS and associated systems) MUST be preformed over a private internal network ONLY.MUSTNRO checks that this is the case with the FTLRs & NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
3Assess connectivity risksAll protocols permitted access to the servers MUST be risk-assessed (e.g. SMB and RDP may present security risks)MUSTCarry out assessment (NRO self)
4Regulate external port accessA deny-all policy MUST be applied, permitting only the minimum ports necessary for authentication (e.g. UDP 1812, Status-Server 18121, TCP 2083 if RadSec is used). UDP 1645 MUST NOT be used.MUSTNRO checks that this is the case with the FTLRs & NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)Why do we care about not running 1645. (Or even random other ports, like the hosted SP may do.)
5Regulate Internal port accessA deny-all policy MUST be applied, permitting only the minimum ports necessary for administration functions (e.g. TCP 3389 for RDP or TCP 22 for SSH)MUSTNRO checks that this is the case with the FTLRs & NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
6Undertake patch managementAll server operating systems and applications MUST be kept fully patched and up to date (SysAdmins must apply risk assessment criteria to deciding whether to deploy early patches against zero-day exploits or to follow stable releases)MUSTNRO checks that this is the case with the FTLRs & NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
7Make back-upsAll servers and configuration files MUST be regularly backed up (as a minimum after every configuration change)MUSTNRO checks that this is the case with the FTLRs & NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
8Conduct monitoringServers MUST be configured to detect and log rogue behaviour such as password brute forcing. Where automated defence is possible, it SHOULD be deployed (e.g. increasing authentication back-off times)MUSTNRO checks that this is the case with the FTLRs & NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
9Enable AlertsServers MUST be configured to send alerts (with copies of logs) to SysAdmins so that incidents can be detected and responded to in real time. Alert systems should be regularly tested for effectiveness.MUSTNRO checks that this is the case with the FTLRs (show test results) & NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
10Enable Message-AuthenticatorWhere supported, the Message-Authenticator attribute MUST be enabled to prevent IP spoofed fake message injection. (see reference 8)MUST
EAP requests always carry it
11Don't intercept trafficNROs and members MUST NOT deploy interception technology or otherwise monitor the content of visitor or roaming traffic (e.g. do not use TLS or SSL interception proxies)MUST NOT (policy says SHOULD NOT, check Application & interception proxies)NRO checks that this is the case with the FTLRs & NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self)
12Secure RADIUS/TLS (RadSec) server identitiesIf RADIUS/TLS (RadSec) is used, X.509 certificates must be used to identify RADIUS serversMUST (optional)Check FTLR server configuration (NRO self), check TLR configuration (OT automatic)

4. References

...

#ReferenceURL
1eduroam Compliance Statement