Old way: remote access (network security)

Modern network access

PPP channels authentication
PPP is a protocol to encapsulate network packets (L3, e.g. IP), and to carry the ove a point-to-point link (physical, virtual l2, virtual l3).
PPP is activated by:
Authentication protocols for network access
EAP
This is the PPP Extensible Authentication Protocol (RFC-3748). It is a flexible L2 authentication framework. It is L2 because before getting access to internet (which is L3) you must authenticate.
Authentication mechanisms that are predefined: MD5-challenge (similar to CHAP), OTP, generic token card.
Other mechanisms can be added, examples:
In EAP the link is not assumed to be physically secure, EAP methods must provide security (on their own), some of these methods:
When authentication doesn’t work, it doesn’t mean that it failed, there could be a network problem. Network expert is needed to understand what is the problem.

EAP encapsulation
EAP has its encapsulation protocol because it needs to transport data to perform authentication at L2 (EAP authenticates before L3):
Authentication for network access
Authentication works like in image.
On the left communication links (modems, access points) which are terminated in a device hosted by ISP (that are controlled by the NAS).
NAS receives requests from all clients and need to check user authorization; it will use protocol on the backend IP network to ask the centralized authentication server.
NAS manufacturers claim they sec. needs three functions AAA: AuthN (check identity based on credentials), AuthZ (is entity authorized to access services?) and Accounting ( tracking resource usage, capacity analysis and billing).
Authentication server offers exactly these functionalities and communicates with NAS with 1/more protocols.
Network authentication protocols
Protocols that NAS (Network access server) and AS (Authentication server) use to communicate, main ones:
RADIUS

RADIUS PROXY
RADIUS server can act as a proxy to authenticate with various authentication servers.

This means that RADIUS will act as a proxy for the authentication part and will redirect the request to the Windows domain controller. Then the authorization/accounting could be managed local by the RADIUS server. RADIUS can also be associated to another domain (e.g. UNIX NIS server).
Security measures needed by RADIUS
RADIUS data protection
packet integrity and authentication via keyed-MD5:
password is transmitted “encrypted with MD5 (after padding with NULL bytes to a multiple of 128bit): password xor md5(key + authenticator)
RADIUS packet types
In each packet there is an authenticator, that has a double purpouse: in the server reply provides authentication and protection from replay, and masks the password.

NAI
Network Address Identifier: used to distinguish user requests made by local users or ones belonging to different security domains.
Syntax: user@realm
Rules say all devices must support NAI up to 72 bytes long.
All ASCII CHARACTERS < 128 ARE ALLOED.
username is the one used in PPP authentication phase, used when opening connection, not necessarily related to application username.
CHAP + RADIUS Example
The NAS is sending a CHAP packet containing a challenge request.
The client will sent the password through a challenge response, the the NAS will then create a RADIUS / ACCESS-REQUEST packet containing all necessary CHAP info.
RADIUS Server will answer with RADIUS / ACCESS-ACCEPT|REJECT, then the NAS will send the equivalent CHAP message.
NAS here is translating dialog between client and RADIUS server.
Then L3 will be enabled.
RADIUS ASSUMES WE ARE INSIDE A NETWORK ACCESS SYSTEM FOR A SINGLE PROVIDER.

DIAMETER
IEEE 802.1X
General standard architecture based on RADIUS and DIAMETER. (authentication framework that supports multiple authentication methods)
Port-based Network access control:
In picture: supplicant over wireless or lan, ask to connect to access points (authenticator, or etherNAS). When the authenticator receives EAP request, it will verify credenttials performing encapsulation/decapsulation of the packet into another protocol.

802.1X advantages
Exploits applicaiton level for the implementation of the security mechanisms, there is direct interaction between supplicant and Authentication Server, so the client are talking directly with the RADIUS/DIAMETER server.
The NAS and the network card on the other hand, now operate as a pass-through-device (encaps/decaps). This is important, because the security architecture doesn’t need to be changes with future evolution of authN techniques.
802.1X messages: example of connection
The switch acts like a pass-through element.

Eduroam example
Eduroam is a world-wide a RADIUS network, involves universities and research centers allover the world.
Since it will be using that Network Access Identifier (NAI) syntax, the supplicant will use his identifier (e.g. s123456@studenti.polito.it) and the local Radius Server will know that it has to go through the Eduroam hierarchy (national, international,…) until it reaches the Radius AS in which the supplicant has created his credentials (e.g. the PoliTO Radius Server), which is called Home AS.
Once it has been found, there will be a direct connection through an E2E (End-to-end) virtual secure channel (e.g. EAP-TTLS) between the supplicant and the Home AS to perform authN and then the latter will provide the answer to the access point, which will permit to the user to navigate.

Which is the best OSI level to implement security?
“Presentation” is the only one in which security measures are not useful.
Unfortunately, there is not a single optimal level.
The upper we go in the stack, the more specific can be our security function.
If the functions are placed at application level only, attacks at lower levels are possible (in particular, DoS attacks are available).
The lower we go in the stack, faster we can “expel” the intruders, but the fewer are the data for the decision.
DHCP security
DHCP (in)security:
Possible attacks:
Manufacturers have tried to provide sec. improvements:
Network Level Secuirty (L3)
Since it is the first layer to offer end-to-end connectivity, it allows end-to-end protection for L3-homogenous networks.
If end-to-end encryption is provided, then data are secured as soon as they exit from client/server, and it’s not important if routers are not properly managed, or if network is unsecure, because data are protected as soon as they exit the network interface.
For these reasons, L3 security allows to forget about all other attacks at network level, but DoS (attacket could still take out the network).
VPN
A way (HW or SW enabled) to create a private network… while using shared/untrusted channels and transmission devices. You as a company don’t have to lay cables for your private network.
Techniques: