Wednesday, December 8, 2010
Open System Consultants Ltd. and Arch Red Ltd. to enhance Radiator expert services via cooperation agreement
Arch Red brings 8 years experience with Radiator, building RADIUS implementations for eduroam(tm) in Finland, its commercial application, the Wireless Tampere community network as well as for traditional Internet and mobile service providers.
The new closer cooperation between Open System Consultants and Arch Red provides new opportunities for both expert services and product development, Arch Red managing Director, Karri Huhtanen says.
Mike McCauley, OSC's managing director welcomes the synergies this new cooperation offers. With Arch Red's application experience, we can together provide the highest quality access solutions and technical support to our mutual customers.
Wednesday, November 17, 2010
Cloud Computing Business Models
Feel free to comment or ask questions about the presentation and I will try to answer them in the comments.
Friday, September 17, 2010
Arch Red Guest Server v3.0 is coming
http://www.archred.com/products/arch-red-guest-server/arch-red-guest-server-demo
Tuesday, August 24, 2010
Arch Red Blog is now IPv6 enabled
It seems that while Google only enables IPv6 on its on services by request of the IPv6 service provider or IPv6 block owner, it is possible to enable IPv6 on those Google hosted services which are offered under your own domain name.
Since Arch Red blogs are under our own domain name service (archred.com and archred.fi), we can allow them to be accessed also with IPv6 with a simple change in DNS by changing CNAME for them to point to ghs46.google.com instead of IPv4-only ghs.google.com.
Heikki changed our DNS already yesterday and you should be now able to read even this blog entry over IPv6.
Thursday, June 3, 2010
ICT SHOK Future Internet Testbed Architecture v2.0 published
http://www.futureinternet.fi/publications/ict-shok-future-internet-testbed-architecture-v20-web-version.pdf
The central idea with our testbed is that instead of building yet another testbed, we will combine existing and new services into a concept, which is supposed to grow and evolve serving various research programs and cooperation both in Finland and abroad.
If you are interested to learn more about our concept, check the architecture specification or contact either me or CSC's Jari Miettinen or Pekka Savola.
Tuesday, June 1, 2010
Debugging eduroam at TNC2010
Other servers in Finland worked fine (I have been able to use eduroam the whole time with my TUT accounts) and only difference we first found was that Helsinki University certificate was bigger than the ones in some of the working organisations. This lead us to suspect RADIUS message fragmentation problems somewhere in between European Top Level RADIUS and Matti's device. We then remembered the one Radiator configuration directive, which we found was missing from Helsinki University RADIUS server configuration.
Adding EAPTLS_MaxFragmentSize 1024 solved this problem so if you are having similar problems with eduroam and your home organisation is running Radiator RADIUS, we suggest checking at least this setting found in Radiator manual:
EAPTLS_MaxFragmentSize
For TLS based EAP types such as TLS, TTLS and PEAP, this optional parameter specifies the maximum size in octets permitted for each TLS message fragment. Defaults to 2048, but many EAP clients, routers and wireless Access Points have limitations that require EAPTLS_MaxFragmentSize to be set as low as 1000 or less. Setting this number too small can result in excessive RADIUS request round trips during EAP TLS authentication, slowing down the authentication process. Setting this number too large can result in failure to complete TLS authentication for some types of clients and devices.
Monday, May 31, 2010
Beer and Food in Vilnius
Based on the background research done by Stig and Matti, I have managed to map already few places to enjoy good beer and food after heavy conference day. I will try to update this map during conference and all participants are welcome to contribute if they have clarifications or new places to be added.
Beer places in Vilnius, Lithuania
View Beer places in Vilnius, Lithuania in a larger map
Defining the Y Generation
The interesting thing was that at least I was able to pick up few Y generation characteristics from myself even if I guess I belong more to the previous generation based on my age. Or maybe it is just that I want to find some younger Y generation characteristics in me. :)
Blogging at Terena Networking Conference 2010
To make sure that my time was efficiently used, instead of just watching presentations, blogging and drinking beer :) I am also both invited speaker, paper and poster presenter here, which should keep me busy doing those slides and later by presenting them.
My first presentation is about RadSec/RADIUS based roaming paper and the second invited one is about the Internet bus from Tampere, Netti-Nysse. The poster is about ICT SHOK Future Internet Testbed and I just managed to bring it to conference lobby before coming to this Juniper presentation.
And speaking of presentations, I really have to now upload some placeholders for compatibility testing purposes to the presentation system, so more coverage and even some nice photos about Vilnius will have to wait to the next post. Luckily they have a nice working eduroam Wi-Fi network here complete with both public IPv4 and IPv6 addresses.
Sunday, April 11, 2010
What is eduroam and roaming?
For you, it is possible to get this technology to your home organisation or even a company by utilising Arch Red products and services to bring your network and users as a part of eduroam or other community networks such as Wireless Tampere (Langaton Tampere).
Saturday, April 3, 2010
Building a mobile eduroam access point with RadSec and OpenWRT
It has been in my plans to write this article for a while now, but now finally Easter holidays gave the opportunity to finalise the configuration and some free time to write these configuration instructions. This blog post describes how you can build a mobile eduroam access point by utilising RadSec and a popular open source access point firmware called OpenWRT. The network architecture is presented in the Figure 1 above and the rest of the instructions follow below.
The first thing to do is of course install OpenWRT on your access point. There are several different OpenWRT supported access point models and the installation instruction vary between models and manufacturers. In this case I assume that you have alredy OpenWRT based access point installed and continue from the actual eduroam and RadSec configuration.
The base OpenWRT distribution does not come with all the software we will require so we need a working Internet connection to install some additional packages. The most important of these are the tools for time synchronisation (for certificate validity verification) and radsecproxy for RadSec functionality.
From the OpenWRT command line you can install the needed packages by giving the following commands:
# opkg update # opkg upgrade # opkg install radsecproxy # opkg install ntpclient
I recommend rebooting the access point and verifying the correct time with date command. The default OpenWRT timezone is UTC so the time is likely to be hours off from your local time. You can change the timezone, hostname and remote logging address from /etc/config/system displayed below:
config system option hostname mobile-ap option timezone UTC # remote syslog server, we used the syslog configured to radsec server option log_ip 10.10.10.10
The wireless settings for eduroam are configured in /etc/config/wireless. The important thing to notice is that the RADIUS server (radsecproxy) will be run on the OpenWRT access point.
config wifi-device wl0 option type broadcom option channel 5 option country FI # REMOVE THIS LINE TO ENABLE WIFI: # option disabled 1 config wifi-iface option device wl0 option network lan option mode ap # in case you are already running eduroam in your organisation you might # want to consider different ssid to prevent causing denial of service for # your users option ssid eduroam option encryption mixed-wpa # as we use radsecproxy on localhost for converting RADIUS to RADSEC # the RADIUS server is the radsexproxy on localhost option server 127.0.0.1 option port 1812 option key RadiusSecretHere option nasid nas.id.here option wpa_group_key 600 option ieee80211d 1
Radsecproxy is an open source implementation of the RadSec protocol. The RadSec protocol is essentially TLS-secured RADIUS over TCP making it more reliable and more secure for setting up connections over unreliable or unsecure networks (such as most Internet connections).
There are however few pre-requirements for configuring RadSec and eduroam:
- Home organisation must be part of the national eduroam federation and international confederation to have an access to eduroam infrastructure
- a RadSec capable server (either radsecproxy (also on server side) or commercial RadSec capable server such as Radiator)
- existing Certificate Authority (CA) for signing certificates for RadSec server and clients
In our company we already had Radiator RADIUS server and own CA configured so making certificates and server configuration was not very difficult. The client side (OpenWRT) configuration was done in the /etc/radsecproxy.conf file.:
listenUDP 127.0.0.1:1812 ListenAccountingUDP 127.0.0.1:1813 # Optional log level. 3 is default, 1 is less, 4 is more LogLevel 3 #Optional LogDestinatinon, else stderr used for logging # Logging to file #LogDestination file:///tmp/rp.log # Or logging with Syslog. LOG_DAEMON used if facility not specified # The supported facilities are LOG_DAEMON, LOG_MAIL, LOG_USER and # LOG_LOCAL0, ..., LOG_LOCAL7 # Syslog is nice as you can direct it to external host via OpenWRT's # system configuration LogDestination x-syslog:///log_daemon tls mobile-ap-to-radsec-server { # In Arch Red we have multiple levels of CA servers with root CA and server CA # so the CACertificateFile is a bundle of root CA and server CA. The server CA # is the actual CA certifying both the server and mobile-ap certificates. CACertificateFile /etc/certs/ca-servers-bundle-cert.pem CertificateFile /etc/certs/mobile-ap-cert.pem CertificateKeyFile /etc/certs/mobile-ap-key.pem # Optionally enable CRL checking # CRLCheck on # Optionally specify how long CAs and CRLs are cached, default forever # CacheExpiry 3600 } # configuration for OpenWRT's local RADIUS client 127.0.0.1 { type udp # the secret between OpenWRT nas/hostapd and radsecproxy secret RadiusSecretHere } # in the real configuration the IP address of the RadSec server server 10.10.10.10 { type TLS # the RADIUS shared secret between mobile-ap and RadSec server secret SecretBetweenMobileAPandRadServer port 2083 tls mobile-ap-to-radsec-server certificateNameCheck off matchCertificateAttribute CN:/^radsecserver\.hostname\.here$/ retryCount 3 retryInterval 5 } # The realm below is equivalent to /.* realm * { # the IP addresses of the RadSec server server 10.10.10.10 accountingServer 10.10.10.10 }
I copied the necessary (CA and client) certificates manually to a directory /etc/certs I had created on the wireless access point file system. A larger deployment of RadSec access points would of course require either a scalable way to deploy and install client certificates or utilising only one client certificate for all mobile access points. Solving this issue can however be a topic for paper or some future blog post, when actual need arises. I did not yet configure the certificate revokation list (CRL) retrieval, but it is in my plans to document also this aspect.
Right, so now we have the actual configuration pretty much set up and we can start testing. Before running radsecproxy as a service I did a prelimanry testing by running it on OpenWRT console with the following command:
# radsecproxy -c /etc/radsecproxy.conf -d 3 -f
I was now able to check if the radsecproxy was able to connect to the home organisation RADIUS server and thus verify the radsecproxy configuration. After this was verified I enabled the radsecproxy permanently with the following command:
# /etc/init.d/radsecproxy enable
Then I rebooted the access point and verified once again that time was correct, radsecproxy was running as a daemon and wireless settings were correct before proceeding to eduroam authentication tests using my own TUT user account.
Like you have probably guessed, the testing was successful and I was able to now have my own mobile eduroam access point to be deployed wherever I may roam. :) Of the difficulties I ran into while doing this, I think the most difficult was once again setupping and configuring the X.509 certificates properly. The radsecproxy default was to check if the certificate CN contained the IP address mentioned in the server block and I had to check from the documentation how this check could be replaced with hostname check without having to use DNS hostname in the configuration block. The result is documented above there in the radsecproxy configuration.
RadSec as a technology felt very solid and functional for connecting devices and services to eduroam and the radsecproxy open source implementation was so well implemented and documented that I think it could be used as an official open source implementation to join to the eduroam federation with RadSec and this way as a roaming proxy replacing for example FreeRADIUS. Even the current radsecproxy implementation has better functionality set (for example dead realm marking) for eduroam proxy usage than the current FreeRADIUS has.<commercial>Or then again, you can get a Radiator RADIUS+RADSEC server from us, Open System Consultants or some other reseller.</commercial>
Monday, March 15, 2010
Finding rogue IPv6 routers on Mac OS X
In one of the larger wireless campus networks there was a problem of an annoying host advertising 6to4 (2002) and fec0 prefixes to a network segment which already had an official IPv6 router. This is the same kind a situation as rogue DHCP server in IPv4 network. All traffic is sent to go through the advertising host and if that can either route or drop the traffic making IPv6 services slow or unusable. There exists few extensions for IPv6 to secure router advertisements and only accept proper ones, but those extensions are rarely implemented in the mobile devices.
So to find the owner of the misbehaving host, one option is to find the IPv4 address from the 6to4 prefix and inform NOC (Network Operations Center) about it. In 6to4 addresses the original IPv4 address is part of the IPv6 address so we can find out the corresponding IPv4 address this way (example IPv6 prefix 2002:c0a8:2a2a::/48):
% printf "%d\n" 0xc0 192 % printf "%d\n" 0xa8 168 % printf "%d\n" 0x2a 42
The IPv4 address corresponding to 2002:c0a8:2a3a::/48 prefix is thus 192.168.42.42. The IPv4 address is often enough to find the host and its owner, but in large wireless networks the IPv4 addresses may get reassigned so also the time of the problem must be recorded. Then the host and owner can be checked from the DHCP server logs or from the wireless network management system such as Airwave.
There exists also a way to identify the host faster and that is to find out its ethernet mac address. In IPv4 there is ARP, which is used to find out the mac addresses of the corresponding IPv4 addresses. In IPv6 the similar protocol is called Neighbor Discovery Protocol (NDP). The problem was where and how to find this information. In Linux it is possible to use ip utility for this (the addresses in these example are not related to the 6to4 culprit):
% ip -6 neighbor list fe80::224:36ff:fe9d:c1dc dev br0 lladdr 00:24:36:9d:c1:dc router REACHABLE
It took me for a while to find out what I could use on Mac OS X, but the manual pages hinted that Mac OS X's IPv6 stack conformed to the NetBSD implementation documentation found at:
The command needed for neighbor discovery protocol control on Mac OS X is called ndp. With this command it is possible to display and manipulate neighbor discovery protocol tables and find out the corresponding ethernet mac addressed for default router IPv6 addresses (listed with netstat -nr):
% netstat -nr Internet6: Destination Gateway Flags Netif Expire default fe80::212:3400:9c56:7890%en1 UGc en1 % ndp -a Neighbor Linklayer Address Netif Expire St Flgs Prbs fe80::212:3400:9c56:7890%en1 0:12:34:56:78:90 en1 23h59m9s S R
The more hardcore IPv6 specialists may read the ethernet mac address directly from the link level IPv6 address. The problem is that the link level address may not be always formed from the actual linklayer address so this method is preferable and also a bit more friendlier to user
Thursday, March 11, 2010
eduroam(tm) expands in Japan
These kind of cooperation announcements give additional validation to Arch Red's vision on utilising eduroam(tm) tried technology to increase community network coverage through roaming instead of building overlapping Wi-Fi networks or trying to form only one dominating one.