What is the process if X user (EduRoam) has a lot of malware and is
sharing it on your network. But home institution is 2000 miles away…
Black list MAC and call it a day? Notify eduroam? Home institution?
Geiger-Counter person and tell them?
My guest account requires active phone number for user to get on the
network.
*From:*The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:[email protected]] *On Behalf Of *Hunter Fuller
*Sent:* Tuesday, August 15, 2017 10:54 AM
*To:* [email protected]
*Subject:* Re: [WIRELESS-LAN] EAP-TLS
Our campus isn't comfortable with an open ESSID without verifying the
identity of the user, so that's the value of eduroam - identity.
On Tue, Aug 15, 2017 at 10:47 Jeffrey D. Sessler
<[email protected] <mailto:[email protected]>> wrote:
Couple of comments:
* eduroam – using your point of “…most users can access what
they want off-campus…”, what long-term value is there to
eduroam? IMHO – not at lot. Back in the day, this would
facilitate quick access for a visiting educator who may be
collaborating with someone locally and needing access to local
resources. Today, in age of cloud-based collaboration
platforms and access from anywhere, how important is eduroam
over an open wifi network? With few exceptions, all the
visitor needs is Internet access. eduroam doesn’t add value
here, but does add complexity to manage.
* Location data – Yeah, this can have some value, but at least
here, our emergency management moved to mobile-based
applications that allow the user to opt-in to being tracked
with the addition of panic-button-like services. I tend to shy
away from using location-based services within WiFi where
life-safety is involved. It can be a wonderful tool, until it
doesn’t work that one-time management believes it should. In
other words, finding a missing AV cart is different than a
missing person.
Jeff
On 8/14/17, 7:23 PM, "The EDUCAUSE Wireless Issues Constituent
Group Listserv on behalf of Jason Cook"
<[email protected]
<mailto:[email protected]> on behalf of
[email protected] <mailto:[email protected]>> wrote:
This is a good topic, we are slowly moving towards a preferred
EAP-TLS from PEAP-MChapv2 but not current date to force and
perhaps never. The points made about why do we bother at all
though are pretty relevant, most users can access what they want
off-campus from whatever network they want, and VPN for more
restricted access. So a properly segmented internal network
providing appropriate access would be fine. *PSK/ open networks
are theoretically ok.
At this point we are still confident that dot1x based auth is
still the best way to go for users accessing our wifi, though this
discussion has certainly opened my eyes a lot.
There's a couple of other reasons though why dot1x (which ever
method) does have advantages to us. This may not be relevant to
all, and there maybe better/other ways.
eduroam will break down via other methods, so you'll still
need to manage a dot1x service no matter what. Then you have still
have calls to SD because the service is now different when you
want to use it, requires special setup that's different to
on-campus.We've had Cloudpath a while, originally for PEAP config
and now TLS. We do roll with a main SSID so our onboarding will
configure our network UofA and eduroam and users will just work
wherever they go once done.
Occasionally for security reasons we use location data to
track missing people. This is possible without auth to network
data but it's better having that auth data. Same goes for
identifying users acting inappropriately online. User ID to IP
mapping is also fed into our firewall for web filtering exceptions
(including group and personal)
Originally we went with Cloudpath to help users get configured
easier which worked well (though this is less of requirement with
auto-configs now pretty good), as well as properly since
auto-config on OS's doesn't get the certificate right (so it
ensure proper config). Configuring eduroam at the same time for
windows was problematic however with PEAP (can't remember other
OS's). As it would only save 1 SSID User info properly, so the
second SSID it wouldn't save user ID and users would get prompted
and not add the @adelaide.edu.au <http://adelaide.edu.au> .. TLS
resolves that little windows issue.
So for us one additional positive the EAP-TLS over PEAP but
overall user-auth has its value.
--
Jason Cook
Technology Services
The University of Adelaide, AUSTRALIA 5005
Ph : +61 8 8313 4800
-----Original Message-----
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:[email protected]
<mailto:[email protected]>] On Behalf Of Lee H Badman
Sent: Tuesday, 15 August 2017 2:59 AM
To: [email protected]
<mailto:[email protected]>
Subject: Re: [WIRELESS-LAN] EAP-TLS
One interesting trade-off: if I have good AD credentials and
pop up a new Mac or Windows machine without any kind of onboarding
in play, I will get on the network quickly one way or the other
with PEAP/MS-CHAPv2. . Maybe I'm prompted to accept the server,
but I'll get on. This is good and bad. I got on, but not the way
that the Security and Network folks might have wanted me to get
on- because the cert stuff is optional with PEAP/MS-CHAPv2 on
non-AD machines that you don't control. That's arguably bad.
But... I got on. And I got authentication and encryption,
without IT intervention. From the user perspective, this is good.
I didn't have to onboard, I didn't need IT help. I wasn't stranded
if I didn't understand what the onboarding SSID is all about, etc.
With TLS- you get properly onboarded, or you're sucking wind
until you do. But once you do, TLS' advantages kick in as
described in this thread. But that "easy on" thing is gone... no
matter how simple you make TLS onboarding, it still requires end
users to comprehend it. So, to me, part of going to TLS is with
the understanding that occasionally someone will be stranded by
their own lack of understanding the process, that somebody may be
someone important and/or vocal, the stranding will occur at the
worst time of day and in the worst circumstance in accordance with
Murphey's Law, and there will be some increase in related trouble
calls.
None of this negates TLS' value, but at the same time you have
to go into it with your eyes open to the perspective of the BYOD
crowd on campus versus what they are currently accustomed to.
One man's o-pinion.
-Lee
Lee Badman | Network Architect
Certified Wireless Network Expert (#200) Information
Technology Services
206 Machinery Hall
120 Smith Drive
Syracuse, New York 13244
t 315.443.3003 f 315.443.4325 e [email protected]
<mailto:[email protected]> w its.syr.edu <http://its.syr.edu>
SYRACUSE UNIVERSITY syr.edu <http://syr.edu>
-----Original Message-----
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:[email protected]
<mailto:[email protected]>] On Behalf Of Curtis
K. Larsen
Sent: Monday, August 14, 2017 1:11 PM
To: [email protected]
<mailto:[email protected]>
Subject: Re: [WIRELESS-LAN] EAP-TLS
Excellent Point. We did some testing with LDAP group lookups,
etc. vs. checking for an attribute in a user certificate for
authorization and found the performance to be significantly better
for the same number of authentications when *not* having to wait
for LDAP. Another benefit is not having to worry about users that
have trouble typing passwords/getting their account locked out for
failed attempts.
--
Curtis K. Larsen
Senior Network Engineer
University of Utah IT/CIS
________________________________________
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
<[email protected]
<mailto:[email protected]>> on behalf of Curtis,
Bruce <[email protected] <mailto:[email protected]>>
Sent: Monday, August 14, 2017 10:56 AM
To: [email protected]
<mailto:[email protected]>
Subject: Re: [WIRELESS-LAN] EAP-TLS
> On Aug 11, 2017, at 7:45 AM, Bucklaew, Jerry
<[email protected] <mailto:[email protected]>> wrote:
>
> To ALL:
>
>
>
>
>
> I am going to amend my initial request to "does anyone have
any other reasons to switch to eap-tls besides the ones I list
below"? I am trying to build a case for switching and want to
gather all the benefits.
One other benefit that I haven't seen mentioned in the
thread yet is that EAP-TLS removes dependency on Active Directory
or other identity box.
So an outage or slowdown of Active Directory (or other
external box) does not affect RADIUS and wireless logins.
> From: The EDUCAUSE Wireless Issues Constituent Group Listserv
> [mailto:[email protected]
<mailto:[email protected]>] On Behalf Of Bucklaew,
> Jerry
> Sent: Thursday, August 10, 2017 3:36 PM
> To: [email protected]
<mailto:[email protected]>
> Subject: Re: [WIRELESS-LAN] EAP-TLS
>
>
>
> Lee,
>
>
>
> I want to state first that I am not, by any means, an expert
on all of the authentication standards and protocols. I was
hoping someone would have a document that would help better
articulate the goals and benefits.
>
>
>
> We have been a eap-peap shop for years and I have always
been told that eap-tls (cert based authentication) is more secure
and you should do that. I never had the time to deal with it and
putting up a cert based infrastructure just seemed daunting. I
finally have some time and have started to play with it. We are
an Aruba shop and the clearpass Onboard system seems pretty simple
to implement and get EAP-TLS working.
>
>
>
> Now to the why. It seems that the ability to separate
username/password from network authentication has some benefits.
If a user changes his username/password it no longer affects his
network connectivity. If we want to blacklist a device it will be
easy as each device will have its own cert. So we can blacklist
one device and let the rest still on. We could do those things
today but it is just a little harder to do with eap-peap. We can
also get users out of storing their usernames and passwords,
because everyone does it with eap-peap. The thought process went,
if you are going to run an on-board process anyway, why not
onboard with eap-tls. On the wireless side that is really all I
have. I have always been told it is more secure so have always
thought I should try and get there.
>
>
>
> Now, we are also moving to wired authentication on every
port. We are supporting both mac auth and 802.1x (eap-peap). We
did this to get the project moving and get all ports to some type
of authentication. Now 802.1x on the wired side is just plain
difficult. Nothing except macs are setup for it out of the box.
You need admin rights on the machine to set it up (which many
people on the wired side don't have) and you almost have to run
through some type of onboard process to do it in mass. You have
to deal with stuff like network logons and mounting drives before
authentication. We also don't want the users storing usernames and
password and everyone will because no one wants to type it in
every time. I am back to the if you are going to run through an
onboard process anyway, will certs make it a little easier. It
gives you the username/password separation. The ability to
revoke per device, and once onboarded, never have to be bothered
again (until the cert expires).
>
>
>
> I am not really concerned about peap being deprecated, it
will be around forever. I am not really concerned about
usernames and passwords being stolen because of eap-peap, there
are so many easier ways to do that. It guess it is really the
username/password separation and the "thought" that it is the most
secure method.
>
>
>
> From: The EDUCAUSE Wireless Issues Constituent Group Listserv
> [mailto:[email protected]
<mailto:[email protected]>] On Behalf Of Lee H Badman
> Sent: Thursday, August 10, 2017 3:00 PM
> To: [email protected]
<mailto:[email protected]>
> Subject: Re: [WIRELESS-LAN] EAP-TLS
>
>
>
> Jerry,
>
> Am curious your reasons for TLS, like if anything beyond
"it's better". Concern for PEAP being deprecated, etc?
>
> Lee
>
> -----Original Message-----
> From: Bucklaew, Jerry [[email protected] <mailto:[email protected]>]
> Received: Thursday, 10 Aug 2017, 14:42
> To: [email protected]
<mailto:[email protected]>
> [[email protected]
<mailto:[email protected]>]
> Subject: Re: [WIRELESS-LAN] EAP-TLS
>
> To ALL:
>
>
>
>
>
> We currently do mac auth and EAP-PEAP authentication on our
wireless network. I am trying to put together a proposal to move
to cert based authentication and I was wondering if anyone has a
proposal or justification already written as to why you should
move to cert based auth? Just trying to save myself some typing.
>
> ********** Participation and subscription information for
this EDUCAUSE Constituent Group discussion list can be found at
http://www.educause.edu/discuss.
>
> ********** Participation and subscription information for
this EDUCAUSE Constituent Group discussion list can be found at
http://www.educause.edu/discuss.
>
> ********** Participation and subscription information for
this EDUCAUSE Constituent Group discussion list can be found at
http://www.educause.edu/discuss.
>
> ********** Participation and subscription information for
this EDUCAUSE Constituent Group discussion list can be found at
http://www.educause.edu/discuss.
>
> ********** Participation and subscription information for
this EDUCAUSE Constituent Group discussion list can be found at
http://www.educause.edu/discuss.
>
---
Bruce Curtis [email protected] <mailto:[email protected]>
Certified NetAnalyst II 701-231-8527
North Dakota State University
**********
Participation and subscription information for this EDUCAUSE
Constituent Group discussion list can be found at
http://www.educause.edu/discuss.
**********
Participation and subscription information for this EDUCAUSE
Constituent Group discussion list can be found at
http://www.educause.edu/discuss.
**********
Participation and subscription information for this EDUCAUSE
Constituent Group discussion list can be found at
http://www.educause.edu/discuss.
**********
Participation and subscription information for this EDUCAUSE
Constituent Group discussion list can be found at
http://www.educause.edu/discuss.
********** Participation and subscription information for this
EDUCAUSE Constituent Group discussion list can be found at
http://www.educause.edu/discuss.
--
--
Hunter Fuller
Network Engineer
VBH Annex B-5
+1 256 824 5331
Office of Information Technology
The University of Alabama in Huntsville
Systems and Infrastructure
********** Participation and subscription information for this
EDUCAUSE Constituent Group discussion list can be found at
http://www.educause.edu/discuss.
********** Participation and subscription information for this
EDUCAUSE Constituent Group discussion list can be found at
http://www.educause.edu/discuss.