IP/Network |
||
Security - RADIUS
RADIUS stands for Remote Authentication Dial-In User Service. It is a kind of Triple A (AAA, Authentication, Authorization, and Accounting ) adopted at various networks like modems, DSL, access points, VPNs, network ports, web servers. Usually it is used as a client-server model based on UDP, but it is often used as 802.1X authentication as well.
Following is overal RADIUS procedure that is used as 802.1X authentication.
(1) Beacon
This belongs to 802.11 protocol. Details of this step is out of the scope of this page. If you want to know the details of this step, refer to step (1) in WLAN Protocol page.
(2) SSID Selection
Once UE (WiFi device) decode Beacon, it will show all the SSID it detected. Then you can select a specific SSID manually or the device automatically select the SSID in a certain order you have configured.
(3) 802.11
This belongs to 802.11 protocol. Details of this step is out of the scope of this page. If you want to know the details of this step, refer to step (2)~(7) in WLAN Protocol page.
(5.a) RADIUS-Access-Request
Radius Protocol Code: Access-Request (1) Packet identifier: 0x24 (36) Length: 237 Authenticator: bdecb10e7c41855a9ded31a368a9fb21 [The response to this request is in frame 34] Attribute Value Pairs AVP: l=53 t=User-Name(1): 0001010123456789@wlan.mnc001.mcc001.3gppnetwork.org User-Name: 0001010123456789@wlan.mnc001.mcc001.3gppnetwork.org AVP: l=6 t=Framed-MTU(12): 1400 Framed-MTU: 1400 AVP: l=30 t=Called-Station-Id(30): AA-BB-CC-DD-EE-FF:WLAN_SSID_TEST Called-Station-Id: AA-BB-CC-DD-EE-FF:WLAN_SSID_TEST AVP: l=19 t=Calling-Station-Id(31): FF-EE-DD-CC-BB-AA Calling-Station-Id: FF-EE-DD-CC-BB-AA AVP: l=6 t=Service-Type(6): Login(1) Service-Type: Login (1) AVP: l=18 t=Message-Authenticator(80): a87015020fd7285494ccc90ab264a8b6 Message-Authenticator: a87015020fd7285494ccc90ab264a8b6 AVP: l=58 t=EAP-Message(79) Last Segment[1] EAP fragment Extensible Authentication Protocol Code: Response (2) Id: 1 Length: 56 Type: Identity (1) Identity: 0001010123456789@wlan.mnc001.mcc001.3gppnetwork.org AVP: l=6 t=NAS-Port-Type(61): Wireless-802.11(19) NAS-Port-Type: Wireless-802.11 (19) AVP: l=6 t=NAS-Port(5): 298 NAS-Port: 298 AVP: l=5 t=NAS-Port-Id(87): 298 NAS-Port-Id: 298 AVP: l=6 t=NAS-IP-Address(4): 192.168.0.100 NAS-IP-Address: 192.168.0.100 (192.168.0.100) AVP: l=4 t=NAS-Identifier(32): ap NAS-Identifier: ap
(5.b) RADIUS-Access-Challenge
Radius Protocol Code: Access-Challenge (11) Packet identifier: 0x24 (36) Length: 126 Authenticator: 900430bc6361e3f7e457d1895753ca95 [This is a response to a request in frame 31] [Time from request: 0.005006000 seconds] Attribute Value Pairs AVP: l=18 t=State(24): 0123456789abcdeffedcba9876543210 State: 0123456789abcdeffedcba9876543210 AVP: l=70 t=EAP-Message(79) Last Segment[1] EAP fragment Extensible Authentication Protocol Code: Request (1) Id: 2 Length: 68 Type: UMTS Authentication and Key Agreement EAP (EAP-AKA) (23) EAP-AKA Subtype: AKA-Challenge (1) EAP-AKA Reserved: 0x0000 EAP-AKA Attribute: AT_RAND (1) EAP-AKA Type: AT_RAND (1) EAP-AKA Length: 5 EAP-AKA Value: 000094d89d270744eb83324d05e7d4653000 EAP-AKA Attribute: AT_AUTN (2) EAP-AKA Type: AT_AUTN (2) EAP-AKA Length: 5 EAP-AKA Value: 00001443118df4ba000094c9bf1443118df4 EAP-AKA Attribute: AT_MAC (11) EAP-AKA Type: AT_MAC (11) EAP-AKA Length: 5 EAP-AKA Value: 00005bb41b500656ad412eba489db5defdf0 AVP: l=18 t=Message-Authenticator(80): 1473c48d5490b3f0dbed210c7ff28f68 Message-Authenticator: 1473c48d5490b3f0dbed210c7ff28f68
(5.c) RADIUS-Access-Request
Radius Protocol Code: Access-Request (1) Packet identifier: 0x25 (37) Length: 251 Authenticator: 0142218b21804f05e70010072fa6bde0 [The response to this request is in frame 40] Attribute Value Pairs AVP: l=53 t=User-Name(1): 0001010123456789@wlan.mnc001.mcc001.3gppnetwork.org User-Name: 0001010123456789@wlan.mnc001.mcc001.3gppnetwork.org AVP: l=6 t=Framed-MTU(12): 1400 Framed-MTU: 1400 AVP: l=30 t=Called-Station-Id(30): AA-BB-CC-DD-EE-FF:WLAN_SSID_TEST Called-Station-Id: AA-BB-CC-DD-EE-FF:WLAN_SSID_TEST AVP: l=19 t=Calling-Station-Id(31): FF-EE-DD-CC-BB-AA Calling-Station-Id: FF-EE-DD-CC-BB-AA AVP: l=6 t=Service-Type(6): Login(1) Service-Type: Login (1) AVP: l=18 t=Message-Authenticator(80): 156a8ee61ae68696e68802b869d8d82f Message-Authenticator: 156a8ee61ae68696e68802b869d8d82f AVP: l=54 t=EAP-Message(79) Last Segment[1] EAP fragment Extensible Authentication Protocol Code: Response (2) Id: 2 Length: 52 Type: UMTS Authentication and Key Agreement EAP (EAP-AKA) (23) EAP-AKA Subtype: AKA-Challenge (1) EAP-AKA Reserved: 0x0000 EAP-AKA Attribute: AT_RES (3) EAP-AKA Type: AT_RES (3) EAP-AKA Length: 5 EAP-AKA Value: 008094c9bf1443118df4bad4af5c18b8deff EAP-AKA Attribute: AT_CHECKCODE (134) EAP-AKA Type: AT_CHECKCODE (134) EAP-AKA Length: 1 EAP-AKA Value: 0000 EAP-AKA Attribute: AT_MAC (11) EAP-AKA Type: AT_MAC (11) EAP-AKA Length: 5 EAP-AKA Value: 0000a77ceba33d9fa47b193fe520939357be AVP: l=6 t=NAS-Port-Type(61): Wireless-802.11(19) NAS-Port-Type: Wireless-802.11 (19) AVP: l=6 t=NAS-Port(5): 298 NAS-Port: 298 AVP: l=5 t=NAS-Port-Id(87): 298 NAS-Port-Id: 298 AVP: l=18 t=State(24): 0123456789abcdeffedcba9876543210 State: 0123456789abcdeffedcba9876543210 AVP: l=6 t=NAS-IP-Address(4): 192.168.0.100 NAS-IP-Address: 192.168.0.100 (192.168.0.100) AVP: l=4 t=NAS-Identifier(32): ap NAS-Identifier: ap
(5.d) RADIUS-Access-Accept
Radius Protocol Code: Access-Accept (2) Packet identifier: 0x25 (37) Length: 172 Authenticator: 91b6be9b253920873621b38558f4a263 [This is a response to a request in frame 39] [Time from request: 0.005842000 seconds] Attribute Value Pairs AVP: l=58 t=Vendor-Specific(26) v=Microsoft(311) VSA: l=52 t=MS-MPPE-Recv-Key(17): 9eacf45ef6473fde1c98b31c9eea1cd746afff158dc2350c... MS-MPPE-Recv-Key: 9eacf45ef6473fde1c98b31c9eea1cd746afff158dc2350c... AVP: l=58 t=Vendor-Specific(26) v=Microsoft(311) VSA: l=52 t=MS-MPPE-Send-Key(16): a3bf190301febc71c4f132442df2b5c74df5d2d0ed5ceb0b... MS-MPPE-Send-Key: a3bf190301febc71c4f132442df2b5c74df5d2d0ed5ceb0b... AVP: l=6 t=EAP-Message(79) Last Segment[1] EAP fragment Extensible Authentication Protocol Code: Success (3) Id: 2 Length: 4 AVP: l=18 t=Message-Authenticator(80): 07e1b2faa24d8a98b6aff9e2ed0c8616 Message-Authenticator: 07e1b2faa24d8a98b6aff9e2ed0c8616 AVP: l=6 t=Idle-Timeout(28): 600 Idle-Timeout: 600 AVP: l=6 t=Session-Timeout(27): 86400 Session-Timeout: 86400
(6) After the completion of RADIUS, UE need to get an IP address to exchange IP packets. If UE already assigned any static IP (Manual setting), it would not need this step and jump to step (7). However, if UE has no IP assigned before, it would initiate a dynamic IP assignement procedure. What kind of dynamic IP allocation procedure it would trigger is up to UE implementation. It may use DHCP (for IPv4) or DHCPv6 (for IPv6) or IPv6 NDP to get the IP dynamically.
|
||