You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 6 Next »

radsecproxy

Goals and Prerequisites

This section describes how to set up radsecproxy to act as a federation-level RADIUS+RadSec server. It can then completely replace other RADIUS server products on the federation level.

More precisely, it will enable a server to:

  • Accept requests from connected service providers via RADIUS and RadSec.
  • Forward requests to connected identity providers via RADIUS and RadSec.
  • Forward requests from international visitors to the European eduroam confederation root servers via RadSec.
  • Accept requests from the root servers via RadSec for the own federation's users when they are roaming in another federation.

The prerequisites for this deployment are:

  • radsecproxy version 1.2 or higher
  • A server certificate and a private key for that certificate to establish the RadSec connection which
    designates the server as a federation proxy:

          urn:geant:eduroam:component:proxy:Europe:<FedName>:<id>

Sample configuration

Most of the radsecproxy configuration file is static. Therefore, a template configuration file is provided at http://www.eduroam.org/downloads/docs/eduroam-cookbook-scripts.zip. A detailed explanation of this configuration file follows. However, the comments included in the file should make its action almost self- explanatory. This means you can start and experiment with it right after installation.

Installation

On UNIX-like systems, the installation is very simple:

  1. Download the code from http://software.uninett.no/radsecproxy/.
  2. Unpack the code.
  3. Navigate into the unpacked directory (the base directory) and type:   
    make

           The code is ISO C and should compile cleanly. It usually does not require a ./configure.

      4.  After compiling, the executable:radsecproxy is in the base directory.
           Either run this executable here or copy it to a convenient location (e.g. /usr/local/bin) and run it there.
           Execution does not require root rights. It expects its configuration file to be in:

           /etc/radsecproxy.conf

      5.  Create the directory /etc/radsecproxy.d/certs/ca/. The template configuration file requires this directory
           to contain the accredited CA root certificates and the corresponding Certificate Revocation Lists (CAs)
           in their OpenSSL hash form.
      6.  Currently, two CAs are accredited for eduroam. These two certificates and their CRLs need to be copied
           into this directory. For your convenience, we have prepared a script at
           http://www.eduroam.org/downloads/docs/eduroam-cookbook-scripts.zip, which you can execute in the
           directory. It will download and hash the appropriate files. In this case you can skip steps 7 and 8.
      7.  If you want to download the files manually, download them from these URLs:

      8.  After downloading, execute the following command in the /etc/radsecproxy.d/certs/ca/ directory:
           _c_rehash_ .
           (including the dot) to generate OpenSSL hashes of the downloaded files.
      9.  Make sure that the CRL files are regularly re-downloaded. This can for example be done by executing the
           download script regularly with cron. CRLs have a limited validity time themselves – not regularly refreshing
           the CRLs will eventually cause certificate validation to fail!
     10. Copy the template configuration file into /etc/radsecproxy.conf.
     11. Fill the lines marked with _STUFF_.
     12. Start radsecproxy and enjoy (for first-time use, starting it with the --f option is recommended, it will start
           radsecproxy in the foreground and show some verbose startup messages).

Detailed explanation of configuration

This walk-through goes through the template radsecproxy.conf line by line and explains the meaning of each
stanza.

ListenUDP                 *:1812ListenTCP                 *:2083

radsecproxy will receive requests from all connected Service Providers via both RADIUS and RadSec. Therefore it has to listen on the appropriate ports on its network interfaces (the * meaning: all interfaces). If you want radsecproxy to listen only on specific interfaces, enter the interface names here. Beware: in this case you may also have to set the more exotic options SourceUDP and/or SourceTCP (see the man page of radsecproxy for details).

LogLevel                   3
_LogDestination          file:///var/log/radsecproxy.log_

A logging level of 3 is the default and recommended log level. Radsecproxy will then log successful and failed authentications on one line each. The log destination is a typical POSIX-compliant log location.

LoopPrevention         On

This enables a semi-automatic prevention of routing loops for RADIUS connections. If you connect a client {...] and a server

Unknown macro: {...}

and give them the same descriptive name, the proxy will prevent proxying.

tls default {
    CACertificatePath                       /etc/radsecproxy/certs/ca/
    CertificateFile                              /etc/radsecproxy/certs/CERT_PEM__
    CertificateKeyFile                        /etc/radsecproxy/certs/CERT_KEY__
    CertificateKeyPassword              __CERT_PASS__
    CRLCheck                                  On
}

This section defines which TLS certificates should be used by default. This installation of radsecproxy always uses the same certificates, so this is the only TLS section. CACertificatePath contains the eduroam-accredited CA certificates with filenames in the OpenSSL hash form. The parameters below need to be adapted to point to your server certificate in PEM format, the private key for this certificate and the password for this private key if needed, respectively. If no password is needed for the private key, you can comment this line (precede it with a # sign). The option CRLCheck validates certificates against the Certificate Revocation List (CRL) of the CAs. It requires a valid CRL in place, or else the certificate validation will fail. Therefore, it is important to regularly update the CRLs by re-downloading them as described above.

rewrite defaultclient {
     removeAttribute                       64
     removeAttribute                       65
     removeAttribute                       81
}

This section deletes attributes from RADIUS requests that convey VLAN assignment information. If VLAN information is sent inadvertently, it can cause a degraded or non-existent service for the end user because he might be put into the wrong VLAN. Connected service providers should filter this attribute on their own. Connected Identity Providers should not send this attribute at all. Checking for the existence of these attributes on the federation server is just an optional additional safety layer. If you do have a roaming use for cross- institution VLAN assignment, you may want to delete this stanza.

client 127.0.0.1 {
               type                               udp
               secret                            testing123
}

client ::1 {
               type                                udp
               secret                             testing123
}

There is no other RADIUS server running on localhost, which makes these client definitions almost superfluous. They may be of some use however to initiate debugging requests and tests from the server itself, so it is considered good practice to list localhost as a client. If your system is not IPv6-enabled, simply delete the stanza about client ::1.

client __SP_IP_ADDR_ {_               type                                UDP               secret                             __SP_SECRET__}

Stanzas like this one are used for each connected service provider that is connected via RADIUS. You need to know the IP address of every SP's RADIUS server and negotiate a shared secret with the SP.

client incoming {
               host *
               type                              TLS
               secret                           mysecret
               matchcertificateattribute
_SubjectAltName:URI:/^https://registry.edugain.org/resolver?urn=urn:geant:eduroam:_
component:(sp|proxy|confederation-root).*$/
}

All incoming RadSec connections can be handled with this stanza. It does not need to be modified. The eduroam trust model requires that a SP that tries to connect has:

  • A X.509 certificate from an eduroam-accredited CA (configured above in block tls default).
  • A URN proving its eligibility (this is achieved with the matchcertificateattribute option).

The traditional RADIUS shared secret has no meaning in RadSec and can be statically set without security implications. In current eduroam deployments, it is set to mysecret. This may change in the future.

Please note that the client and server stanza for the Service Activity 5 (SA5) monitoring have the same host address, but different stanza names. This is important: it disables the LoopDetection for this host, and the SA5 monitoring deliberate uses loops to do its tests.

client SA5-monitoring-incoming {
                host                          161.53.2.204
                type                          UDP
                secret                       __MONITORING_SECRET__
}

This is the eduroam Service Activity's monitoring client. Negotiate a shared secret for monitoring with the operators in SA5 and enter it here.

server __DESCRIPTIVE_NAME_ {_                host                         __IP_ADDR__                type                        UDP                secret                     __SERVER_SECRET__}

To deliver requests to your connected IdPs, their servers need to be configured. This stanza is for IdP servers using RADIUS.

server __RADSEC_PEER_DNS_NAME_ {_                type                       TLS                secret                    mysecret                statusserver          on               matchcertificateattribute_SubjectAltName:URI:/^https://registry.edugain.org/resolver?urn=urn:geant:eduroam:_component:(idp|proxy|confederation-root):.*$/i}

This is the equivalent stanza for IdP servers using RadSec.

server etlr1.eduroam.org {
                type                       TLS
                secret                    mysecret
                statusserver          on
_                matchcertificateattribute _
_SubjectAltName:URI:/^https://registry.edugain.org/resolver?urn=urn:geant:eduroam:component:confederation-root:Europe:ETLR:.*$/i_
}

server etlr2.eduroam.org {
                 type                      TLS
                 secret                   mysecret 
                 statusserver         on
_                 matchcertificateattribute _
_SubjectAltName:URI:/^https://registry.edugain.org/resolver?urn=urn:geant:eduroam:component:confederation-root:Europe:ETLR:.*$/i_
}

These are the European eduroam Confederation root servers. This entry can be kept as it stands and doesn't need any further configuration.
server SA5-monitoring-outgoing {
                   host                   161.53.2.204
                   type                   UDP
                   secret                __MONITORING_SECRET__
}

server TODO:add SRCE RadSec server here {
                  type                    TLS
                  secret                 mysecret
                  statusserver       on
_                 matchcertificateattribute _
SubjectAltName:URI:/^urn:geant:eduroam:component:confederation-root:Europe:Monitoring:.*/i
}

SA5 monitoring works both ways. The client entry near the beginning of the configuration file was needed for incoming requests from the monitoring servers. The two entries here specify the outgoing connections to the monitoring servers. Outgoing connections can use either RADIUS (first entry) or RadSec (second entry) at your discretion. You can configure both, and select the preferred way later in the special monitoring realm eduroam.TLD.

Finally, the IdP realms need to be defined. This is done in the remainder of the configuration file:

realm /myabc\.com$ {
                   replymessage "Misconfigured client: default realm of Intel PRO/Wireless supplicant! Rejected by <TLD>."
}

_realm /[radsecproxy-flr@]*$

Unknown macro: { replymessage "Misconfigured client}

_

There are some known client-side misconfigurations. If they were not already caught by the SP local RADIUS server, it does not make sense for the proxy to send these requests up to the eduroam infrastructure. These requests are immediately rejected.

Note: if you need to blacklist an existing realm for some reason, you can follow the myabc.com example, copying and replacing it with the realm to be blacklisted.

realm /IDP_REALM$ {
                               server         __FROM_SERVER_STANZAS_ABOVE__
                               server         __BACKUP_NAME__
}

Requests that are coming in from upstream and are supposed to be handled by an identity provider are listed in stanzas like this. _IDP_REALM_ contains the realm of the connected IdP. Create one such stanza for each IdP realm. If an IdP has multiple servers for a failover configuration, you can list all servers in a row, as in the example above.

realm /eduroam\.YOUR_TLD_ {_                               server         SA5-monitoring-outgoing                               server         TODO:SRCE RadSec server}

The configuration stanza above is for outgoing SA5 monitoring connections. You can select your preference for RADIUS or RadSec for the outgoing connections by changing the order of the server stanzas.

realm /\.YOUR_TLD$ {
                                replymessage "Misconfigured supplicant or downstream server: uses known- bad realm in <TLD> federation!"
}

All the valid realms were listed earlier in the configuration file, and this server is authoritative for the own TLD. If a supplicant or downstream servers sends a realm with the own TLD, but also with a realm name that is not registered, this request is unauthorised and bound to fail. It will be rejected immediately to prevent routing loops.

realm    * {
                              server           etlr1.eduroam.org
                              server           etlr2.eduroam.org
}

Finally, all realms that do not belong to the own federation are forwarded to the European eduroam Confederation root servers.

  • No labels