Monday, December 3, 2012

The WhoIsIt PKI biometric authentication server


The WhoIsIt PKI biometric authentication server allows users to logon to the Network, to authenticate applications, digitally sign and encrypt documents, and mail correspondents using PKI technology.


The WhoIsIt PKI biometric server is a self contained server and biometric database. The WhoIsIt biometric database contains each enrolled user’s biometric templates, passwords, and PKI key store. Each user enrolled in the WhoIsIt biometric server database has their own PKI Key store where their Private keys and digital certificates are stored.
The WhoIsIt PKI Client/Server program performs all biometric template matching on the server. This enables users to perform complicated mathematical PKI operations such as sign, encrypt, authenticate, verify, using complex crypto keys and digital certificates from any location, be it home, on the road or in the office without the need for a USB token or Smart Card.
Security is tightened because biometric template matching and PKI asymmetric calculations are performed by the WhoIsIt biometric authentication server. Biometric templates and private key never leave the safety of the server.

The WhoIsIt PKI biometric server does not require the customer to deploy an expensive database system. The WhoIsIt PKI biometric server is designed for resilience and scalability. The WhoIsIt PKI biometric server can scale to 64 processors and  parallel process matching and encryption tasks to scale with user demand.

The WhoIsIt PKI biometric server can be reached from anywhere on the network or from the internet. Users can logon to Workstations and the network, authenticate to applications. Users can digitally sign documents, encrypt data and secure e-mail simply by placing their finger on a fingerprint sensor. No Smart Card required


The WhoIsIt PKI biometric server engine offers the customer the ability to use biometrics in place of passwords and PIN numbers to authenticate that the user is the person he or she claims to be.

Users will enroll their biometric templates and register secrets like passwords. WhoIsIt will generate, manage and store the users Private and Public keys in the WhoIsIt biometric authentication server’s database as part of the user’s database attributes.


The WhoIsIt PKI biometric authentication server will run on Windows 2000, 2003 and XP systems.

Identifying people through behaviour patterns

Identifying people through behaviour patterns
Munish Johar

ILLUSTRATION BY RAJIV KAULAs organisations search for more and more secure authentication methods for user access systems, electronic commerce, and other security applications, biometric technology is gaining increasing attention in today’s rapidly changing technology scenario. Once the stuff that you saw in James Bond movies, biometric technology (such as devices that read your fingerprints, cameras that recognise your face, software that knows your voice) is being used globally by companies and is readily available. However the question that comes to mind immediately is — What is Biometric?
Before giving a formal definition to the term biometric, it is important to provide some background information. The security field uses three different types of authentication methods:
  • Something you know (lowest level of security) — a password, PIN (Personal Identification Numbers), or piece of personal information (such as your mother's maiden name);

  • Something you have (second level of security) — a card key, smart card, or token;

  • Something you do or something you are (highest level of security) – this is a biometric, it comprises of both physiological and/or behavioural biometrics, including fingerprints, voiceprints, signatures, etc.

 

The above diagram depicts the process pictorially and the accompanying points provide a more complete explanation.
A. An end user attempts to access a protected network.
B. The application/Web server passes a request to the authentication server to verify the end user’s identity.
C. The authentication server checks the database for the end user’s identity profile (such as biometric templates).
D. Based on the security requested and constraints, an authentication policy is dynamically generated.
E. The authentication server prompts the end user for his/her credentials.
F. The credentials provided by the end user are matched against the database.
G. The authentication sever sends a yes or no validation response.

 Whilst individual biometric devices and systems have their own operating methodology, there are some generalisations one can make as to what typically happens within a biometric systems implementation. The most ‘popular’ biometrics seems to gravitate at present around the following methodologies:
Fingerprints: This biometric involves looking at the patterns found on a fingertip. A greater variety of fingerprint devices are available than for any other biometric. These systems have a high accuracy rating, are quick to use, take up little space and are relatively low cost, so they’re useful for providing security for large numbers of users.
Hand geometry: Hand geometry involves analysing and measuring the shape of the hand. This biometric offers a very good balance of performance characteristics and is quite easy to use.
Retina: A retina-based biometric involves analysing the layer of blood vessels found at the back of the eye. Retinal scanning can be quite accurate but does require the user to look into a receptacle and focus on a given point. This is not particularly convenient for people who wear glasses. For this reason, retinal scanning is not in widespread use, even though the technology itself can work well.
Iris: An iris-based biometric, on the other hand, involves analysing features found in the coloured ring of tissue that surrounds the pupil. Iris scanning, on the other hand is definitely less intrusive of the eye-related biometrics, it uses a fairly conventional camera element and requires no close contact between the user and the reader. Iris biometrics work with glasses in place and is one of the few devices that can work well in identification mode.
Face: Face recognition analyses the facial characteristics of a user. It requires the use of a digital camera to develop a facial image of the user for authentication. Because facial scanning needs an extra device not generally included with basic personal computers, it is targeted towards more niche areas such as network authentication.
Signature: Signature verification analyses the manner in which a user signs his or her name. Common signing features such as speed, pressure, and velocity are as important as the finished signature's static shape. This biometric enjoys a synergy with existing processes that other biometrics do not. Signature verification devices are reasonably accurate in operation and obviously lend themselves to applications where a signature is an accepted identifier.
Voice: Voice authentication is not based on voice recognition (as most of us would think) but on voice-to-print authentication, where complex technology transforms voice into text. Voice biometrics has the most potential for growth; because it requires no new hardware, most personal computers already contain a microphone. However, poor quality and ambient noise can affect the verification process.
No single biometric technology has dominated the market. Different technologies are being used for the same applications. To gain widespread acceptance in businesses, multiple individual biometrics methods must coexist in a single system solution. Initially, these techniques were employed primarily in specialist high security applications, however we are now seeing their use and proposed use in a much broader range of public facing situations. Future use of biometric technologies may include:
  • ATM machine use.
  • Workstation and network access
  • Travel and tourism
  • Internet transactions
  • Telephone transactions
  • Public identity cards
In the past few years, biometric technology has rapidly pushed through barriers that had slowed its adoption in mainstream environments, performance, accuracy and reliability have steadily increased amongst all types of biometrics methods and the prices of the capture devices used by this technology have plunged, making biometrics an attractive addition to security systems. For many companies, biometric systems are the perfect answer to the expensive and time-consuming problems of fraud, theft, and access control. Technical and financial considerations aside, biometrics can pose a significant cultural challenge and introducing fingerprint scanners to every desktop or a facial recognition based entry system has to be done sensitively and carefully. Once the exclusive preserve of sci-fi books and movies, biometrics now has to be considered as one of the many challenges of modern day management.

Novell's BorderManager Authentication Service: Arm Your Network for Remote Users

Novell's BorderManager Authentication Service: Arm Your Network for Remote Users


If you were the network administrator at a small bicycle-accessory manufacturer in Yuma, Arizona, how would you solve the following challenge? The company's president has recently hired an inventor and a research and development firm. Now it's your job to provide both the inventor, who works out of his home in White Plains, New York, and the research and development firm, whose facility is located in Dallas, Texas, with remote access to your company's network.
Because the information exchanged between Yuma, White Plains, and Dallas will be confidential, the remote-access system you create must be secure. In addition, you must be able to expand the remote-access system rapidly and to virtually any size. After all, you do not know how fast the company will grow or how big the company will become once it begins to market new products.
The growing number of companies that have employees who telecommute--whether they work at home, on the road, or at a branch office--has left many network administrators facing this challenge. How do you address the security problems inherent in providing network services to remote users, not to mention the difficulties of managing an extended network? Novell's BorderManager Authentication Service integrates Remote Authentication Dial-In User Service (RADIUS) with Novell Directory Services (NDS) to offer security and other capabilities you need to set up and manage remote access to your company's network.
This article explains how BorderManager Authentication Service integrates RADIUS with NDS to offer an easily managed RADIUS solution that provides authentication, authorization, and accounting services for remote users. This article also explains several additional features of BorderManager Authentication Service--features that make it easy for you to enable remote access for any number of remote users and to manage their user accounts.

WHAT IS RADIUS?

RADIUS is the authentication, authorization, and accounting protocol that Livingston Enterprises Inc. (now Lucent Technologies) developed in collaboration with the Internet Engineering Task Force (IETF). RADIUS supports dial-in user authentication through Point-to-Point Protocol (PPP), Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol (CHAP), UNIX login, and other authentication protocols that implement a username and password.
RADIUS transports authentication, authorization, and configuration information between a network access server and an authentication server, both of which must be RADIUS compliant. A network access server accepts dial-in access from telephone lines via modems or from Integrated Services Digital Network (ISDN) lines via ISDN terminal adapters. (For a list of vendors that supply RADIUS-compliant network access servers, visit the NetWare Connection World-Wide Web site at http://www.nwconnection.com.)
An authentication server, on the other hand, stores a database of usernames, passwords, authorization information, and configuration information. In addition, the authentication server can be the same server that is running the RADIUS protocol--the server that is known as the RADIUS server. (See Figure 1.)
Figure 1: Dial-access network using the RADIUS protocol
Click to enlarge
When a network access server sends a request to a RADIUS server, the RADIUS server first checks the IP address of the network access server making the request. If this IP address does not belong to one of the network access servers with which the RADIUS server has been configured to communicate, the RADIUS server does not respond to the request.
According to the IETF's Request for Comments (RFC) 2138, if a RADIUS server receives a request from a network access server that is not on the RADIUS server's list of configured network access servers, the RADIUS server should log the access attempt and then silently discard the request. When silently discarding a request, the RADIUS server simply does not respond to the requesting network access server. (To read RFC 2138, go to ftp://ftp.livingston.com/pub/radius/rfc2138.txt.)
Since RFC 2138 recommends, but does not require, RADIUS applications to log unauthorized attempts to access your company's network, not all RADIUS applications perform this function. However, BorderManager Authentication Service does, providing you with information that allows you to identify repeated attempts to gain unauthorized network access.

SECRET, SECRET, WHO'S GOT THE SECRET?

Network access servers and RADIUS servers use a shared secret to protect each user's password and, at the same time, to validate one another's identity. A shared secret is a well-chosen string of alphanumeric characters that becomes the encryption key these servers use to keep a user's password secure as it travels between the servers.
Like a well-chosen password, a well-chosen shared secret should be one that cannot be easily guessed and that is at least eight characters long, depending on the RADIUS server you are using. For example, if you were using a server running BorderManager Authentication Service as your company's RADIUS server, the shared secret you create should be a meaningless string of 20 to 30 alphanumeric characters.
When a user dials in to a network protected by RADIUS, he or she is prompted for a username and password. After obtaining this information (either directly from the user or through this user's dial-in software, depending on the type of connection being established), the network access server creates an access request packet that includes the username and password. Using an encryption method based on MD5, the Rivest-Shamir-Adleman (RSA) message digest algorithm, the network access server then uses the encryption key obtained from the shared secret to encrypt the user's password before sending the access request packet to the RADIUS server. (See Figure 1.)
When the RADIUS server receives the access request packet, this server uses the encryption key generated from the shared secret to decrypt the user's password. The RADIUS server then uses the database stored on the authentication server to authenticate this user. For example, if you were using a server running BorderManager Authentication Service as your company's RADIUS server, this server would compare the username and password against the usernames and passwords stored in your company's NDS database.
If the requesting network access server did not encrypt the user's password using the correct shared secret, the RADIUS server could not use the decrypted password to authenticate the user. In this case, the RADIUS server would prepare an access reject packet and send it to the network access server. In other words, if the requesting network access server did not have the shared secret, the RADIUS server would deny any requests it receives from that network access server. The RADIUS server would also prepare an access reject packet if any of the specified user requirements were not met--for example, if the user mistyped his or her username.
If the user were successfully authenticated, the RADIUS server would send an access accept packet to the network access server. This packet would contain all of the information necessary to deliver the network services the user is authorized to receive.
In addition to protecting your company's network via a shared secret and encrypted passwords, a RADIUS server can be configured to instruct the network access server to "hang up" on a user and call the user back at a specified telephone number. This callback feature is useful if you want to require remote users to access your company's network only from specific locations.

IT'S BETTER WITH BORDERMANAGER AUTHENTICATION SERVICE

The IETF is in the process of establishing RADIUS as an official Internet standard. (See RFC 2138 and 2139. To read RFC 2139, go to ftp://ftp.livingston.com/pub/radius/rfc2139.txt.) However, vendors such as Novell have already made RADIUS the de facto industry standard. RADIUS performs even better when used in conjunction with BorderManager Authentication Service, which gives you flexibility to do the following:
  • Choose a platform
  • Choose dial-in software
  • Expand your company's remote-access system as the number of users grows
  • Update your company's remote-access system as technologies change
Platform of Choice: NetWare or Windows NT
You can install BorderManager Authentication Service on a server running NetWare 4.11 or above or on a server running Windows NT 4.0 or above. This cross-platform support means you can use NetWare or Windows NT servers running BorderManager Authentication Service together on the same network. You can also substitute a NetWare server for a Windows NT server, and vice versa.
Dial Me Up
BorderManager Authentication Service provides support for a variety of dial-in software. For example, BorderManager Authentication Service works with terminal emulation software, such as Hyper Terminal, and with software that supports PPP, such as the dial-in software included with Windows 95 and Windows NT 4.0. Since BorderManager Authentication Service doesn't require you to implement a particular type of dial-in software, the software you install on a user's workstation depends mainly on the type of RADIUS-compliant network access server that provides the user with remote access to your company's network.
For example, if BorderManager Authentication Service is running on a NetWare 4.11 server and remote users want to access NetWare services, both the network access server and the dial-in software you choose must support IPX. Also, like the network access server on your company's remote-access system, the dial-in software you choose must support authentication by username and password.
Room to Grow With NDS
In addition to allowing you to choose from a variety of dial-in software, BorderManager Authentication Service allows you to add a virtually unlimited number of users to your company's remote-access system. When you install BorderManager Authentication Service, the installation program copies RADIUS server files to one or more of your company's NetWare or Windows NT servers. These servers then become RADIUS servers. The installation program also extends the NDS schema to accommodate dial-in access to your company's network, thus enabling the RADIUS server (or servers) to authenticate remote users through the NDS database.
Since BorderManager Authentication Service is fully integrated with NDS and includes a snap-in module for Novell's NetWare Administrator (NWADMIN) utility, you can assign remote-access privileges--to individual users or to groups of users--through the same database you use to manage your company's network. You can also configure the NDS database to accommodate a virtually unlimited number of remote users.
After you have installed BorderManager Authentication Service, you must create at least one Dial Access System object in the NDS tree to provide dial-in access to your company's network. (You must also define a password for the Dial Access System object. To find out what this password does and how to keep it hidden from users who have access to the RADIUS server console, see "Where Did It Go?".) The Dial Access System object contains the configuration information that RADIUS servers on the network use to return connection information to requesting network access servers.
Whether you have one or more RADIUS servers, you can use the Dial Access System object to manage all of them. This capability allows you to add RADIUS servers to your company's remote-access system without significantly increasing the amount of time it takes to manage that system.
Keeping Up With Changing Technologies
BorderManager Authentication Service also allows you to incorporate new technologies as they become available. Along with the Dial Access System object, Novell recommends that you create a Dial Access Profile object, which allows you to configure a common set of attributes for all remote users, rather than configuring these attributes for each container object or for each User object. Attributes define specific authentication, authorization, and configuration options that are available to remote users.
For example, User-Password is an authentication attribute, Callback is an authorization attribute, and Framed Routing is a connection attribute. If you wanted users to receive PPP service, you would create a Dial Access Profile object and define the Framed value for the Service Type attribute and the PPP value for the Framed Protocol attribute. (For more information about defining attributes, see "Creating a Dial Access Profile Object")
BorderManager Authentication Service uses the attribute dictionary file to store information about a collection of attributes. The attribute dictionary file stores information about all of the generic and vendor-specific RADIUS attributes currently supported by BorderManager Authentication Service.
Generic RADIUS attributes consist of the attributes listed in RFC 2138, including User-Name, User-Password, CHAP-Password, Network Access Server (NAS) IP-Address, Framed Routing, and Framed-IPX-Network. Since many vendors have designed RADIUS-compliant network access servers to enable attributes outside the scope of RFC 2138, BorderManager Authentication Service's attribute dictionary file also stores information about many of these vendor-specific attributes.
BorderManager Authentication Service supports current technologies via the vendor-specific attributes in the attribute dictionary file. Novell plans to make emerging technologies available by extending the attribute dictionary file to include new attributes that vendors offer in future products, as well as attributes that the IETF might add as it extends the RADIUS standard. With BorderManager Authentication Service, you can incorporate emerging technologies by simply downloading the latest attribute dictionary file from Novell's web site and then adding the attributes you want to enable to the Dial Access Profile object. (For more information about how to add attributes to a Dial Access Profile object, see "Creating a Dial Access Profile Object".)

BUT THAT'S NOT ALL

In addition to the features already mentioned, BorderManager Authentication Service offers the following benefits:
  • The ability to outsource remote access
  • The ability to assign separate dial-in passwords
  • Group-based management
  • Dial access system caching
  • Accounting and audit logs
Your Place or Mine?
A RADIUS server can act as a proxy RADIUS server for other RADIUS servers. For example, a server running BorderManager Authentication service can act as a proxy RADIUS server or can communicate with other RADIUS servers that are acting as proxy RADIUS servers. As a result, you can outsource remote access by contracting with an Internet Service Provider (ISP) that provides RADIUS proxy services. (To view a list of some ISPs that provide RADIUS proxy services, visit the NetWare Connection web site at http://www.nwconnection.com.)
Outsourcing remote access through an ISP can save you time and money because you do not have to purchase, maintain, and manage costly hardware such as network access servers, modems, ISDN terminals, and routers. For example, suppose that you created a RADIUS server by installing BorderManager Authentication Service on a NetWare 5 server and that you contracted with an ISP to provide remote access to your company's network. In this case, remote users would dial in to a RADIUS-compliant network access server that would be owned and maintained by your ISP. (See Figure 2.)
Figure 2: Dial-access network that uses an ISP to provide RADIUS proxy services
Click to enlarge
The ISP's network access server would then route a user's request for access to a proxy RADIUS server, which would also be owned and maintained by your ISP. The ISP's proxy RADIUS server would use the encryption key derived from the shared secret to encrypt the user's password before sending the access request packet to your company's RADIUS server.
Upon receiving the access request packet, your company's RADIUS server would decrypt the user's password and authenticate the user through the NDS database. The RADIUS server would then send an access accept packet to the ISP's proxy RADIUS server, which would forward this packet to the ISP's network access server. The network access server, in turn, would establish the connections necessary to provide the user with any network services he or she was authorized to access.
In addition to running BorderManager Authentication Service, you could run other services on the NetWare 5 server, including NDS. In other words, the NetWare 5 server could do double-duty by acting as both a RADIUS server and an authentication server. (Alternately, BorderManager Authentication Service includes a two-user version of NetWare 4.11, so you could dedicate a server to RADIUS authentication without having to purchase additional software for that server.)
May I See a Second ID?
In addition to providing outsourcing capabilities, BorderManager Authentication Service allows you to assign remote users two passwords: one for accessing the network and the other--the NDS password--for accessing network resources. After a server running BorderManager Authentication Service sends an access accept packet to a network access server located on your company's network, the user is granted only the ability to connect to the network. If an ISP provides the network access server the user dials in to, the user can access only the ISP's network. In either case, the user must log in a second time to receive access to the network resources (such as NetWare file and print services) available to her or him through NDS.
When you create a Dial Access System object by using the snap-in module for the NWADMIN utility, you are prompted to choose one of the following password options:
  • Use Separate Dial-Access Passwords
  • Use Novell Directory Services Passwords
If you choose the Use Separate Dial-Access Passwords option, you can assign remote users separate, non-NDS passwords to access your company's network. Since all network access servers, RADIUS servers, and proxy RADIUS servers have access to users' clear text passwords, this option provides an extra level of security if an ISP owns the hardware that provides dial-in access to your company's network. In this case, the ISP's network access server and proxy RADIUS server would have clear text access only to non-NDS passwords. The NDS passwords that grant users access to network resources would not be available to these servers.
You should select the Separate Dial-in Passwords option if your company's network access server or your ISP's network access server sends access request packets via CHAP. CHAP servers require the RADIUS server to access the authenticating password in clear text, and NDS passwords are not available in clear text.
If you choose the Use Novell Directory Services Passwords option, remote users can use the same password (their NDS password) for both logins. This option is convenient for remote users because they have to remember only one password.
Join the Group
BorderManager Authentication Service's group-based management feature makes it easier for you to control remote users' access to network resources. With group-based management, you can control remote users' access to network resources such as network access servers, firewalls, and high-speed connections via Dial Access System objects and Group objects, rather than by controlling access on a user-by-user basis.
To use group-based management in BorderManager Authentication Service, you use the snap-in module for the NWADMIN utility to create a separate Dial Access System object for each resource to which you want to control access. You then configure separate RADIUS servers to access each Dial Access System object you created. (Each RADIUS server can access only one Dial Access System object. For more information, see "Where Did It Go?").
You also create a separate Group object for each Dial Access System object, and to each Group object, you assign rights to one of the Dial Access System objects. Finally, you add individual User objects to the Group objects.
For example, suppose you were the network administrator at the bicycle-accessory manufacturer mentioned earlier and you wanted to grant the inventor in White Plains and two of the researchers in Dallas access to a particular firewall. You would first use the NWADMIN utility to create a Dial Access System object (called, for example, FWALL1) for this firewall and to configure a RADIUS server to access that object.
Next, you would create a Group object (called, for example, FWALL1users) that granted access rights to the FWALL1 object. You would then add the inventor and the two researchers to the FWALL1users object.
Just as you can add any number of users to a Group object in general, you can add any number of remote users to a Group object that grants users rights to a Dial Access System object. Conversely, you can add an individual remote user to any number of Group objects that control users access to Dial Access System objects.
For example, suppose you wanted the entire staff of the research and development firm your company hired to have access to a particular set of network access servers on your company's network. You could create a Dial Access System object for that set of network access servers, configure a RADIUS server to access the Dial Access System object, and create a Group object (called, for example, RDSTAFF) with rights to the Dial Access System object. You could then add every member of the research and development staff to the RDSTAFF object, including the two researchers who were previously granted access to the firewall through the FWALL1users object. If the research and development staff grew, you could add the new employees to the RDSTAFF object as well.
Caching In on BorderManagerAuthentication Service
BorderManager Authentication Service's dial-access caching feature allows your company's RADIUS server to access authorization, authentication, and configuration information quickly and easily. The first time a user dials in to your company's network, BorderManager Authentication Service searches the Dial Access System object for the information necessary to authenticate the user and to provide the network services he or she is authorized to receive. BorderManager Authentication Service then stores this information in a dial-access cache.
With dial-access caching, users don't need to wait for BorderManager Authentication Service to search the Dial Access System object for authentication, authorization, and configuration information every time they request access to the network. Instead, BorderManager Authentication Service accesses and delivers this information from cache, which both speeds up remote access to and reduces traffic on your company's network.
In addition, BorderManager Authentication Service checks the Dial Access System object each minute. If this object has been modified, BorderManager Authentication Service updates the authentication, authorization, and configuration information stored in its dial-access cache to reflect the change. As a result, only currently authorized connections and access to network services are available to remote users.
Accounting and Auditing Made Easy
Dial-access caching may facilitate efficient dial-in connections to your company's network, but how do you get information about these connections? To provide you with the connection information you need, BorderManager Authentication Service generates accounting and auditing logs that record this information.
Upon installation, BorderManager Authentication Service automatically enables RADIUS accounting and auditing services. By default, these services are hosted on the same physical server as RADIUS authentication services.
BorderManager Authentication Service's accounting logs, like all RADIUS accounting logs, offer the following information:
  • Which users are using remote-access services
  • When users are using remote-access services
  • How long users are using remote-access services
You can use the information stored in BorderManager Authentication Service's accounting logs to help you troubleshoot problems, perform a statistical analysis, and provide your company's billing department with information about user accounts.
When a RADIUS session begins, the network access server sends an accounting request packet to the RADIUS server. (A session officially begins when the network access server first provides service to the user and officially ends when the service ends.) The accounting request packet contains information such as the user's username and password and the type of service the network access server is delivering to this user. The RADIUS server logs this information in an ASCII text file. The RADIUS server then returns a message to the network access server, acknowledging that the accounting request packet was received.
Similarly, when the session ends, the network access server sends another accounting request packet that contains the user's username and password, the type of service that was delivered to the user, and other information. The RADIUS server logs this information in an ASCII text file and once again sends the network access server a message, acknowledging receipt of the accounting request packet. (If you are running BorderManager Authentication Service on RADIUS proxy servers in your company's remote-access system, you should be aware that an accounting request packet is not forwarded but is recorded on the first RADIUS server that receives this packet.)
By default, RADIUS accounting log files are stored in the comma-delimited format. (To find out how you change the default parameters for RADIUS accounting and auditing services, see "Setting Accounting and Auditing Parameters".) The accounting log files are named YYYYMMDD.DAT.YYYY is the year,MM is the month, and DD is the day the accounting log rollover period begins.
For example, if you set the accounting log rollover period to Monthly, and tomorrow's date were January 1, 1999, the accounting log file that contained information about today's RADIUS sessions would be named 19981201.DAT. In this case, a new accounting log file named 19990101.DAT would be created at midnight, and information about the RADIUS sessions that occurred during the month of January would be recorded in this file. By default, accounting log files are set to roll over on a daily basis, but you can also set these files to roll over at the beginning of each week or at the beginning of each month. (See "Setting Accounting and Auditing Parameters".)
You can import the information stored in accounting log files into database and spreadsheet applications that support comma-delimited files, including Microsoft Excel. (By default, RADIUS accounting log files are located in the SYS:\ETC\RADIUS\ACCT directory if you are running BorderManager Authentication Service on a NetWare server. If you are running BorderManager Authentication Service on a Windows NT server, these files are located in the C:\Novell\BMAS\ACCT directory by default.)
RADIUS auditing log files provide a record of all login attempts, whether successful or unsuccessful. Although auditing log files are typically used for troubleshooting, these files are also a reliable means of identifying the attempts of unauthorized users to access your company's network. In addition, auditing log files provide information for use in accounting systems that are based on remote connection time.
RADIUS auditing log files are named YYYYMMDD.log.YYYY is the year,MM is the month, and DD is the day the auditing log rollover period begins. By default, these files are located in the SYS:\ETC\RADIUS\LOG directory on a NetWare server and in the C:\NOVELL\BMAS\LOG directory on a Windows NT server.
Unlike accounting log files, which you can set to begin at midnight on the first day of each week or each month, auditing log files always begin at midnight on each day. A RADIUS server stores these daily auditing log files for a specified interval and deletes auditing log files that exceed that interval. (Accounting log files are not deleted.)
For example, suppose today were December 17, 1998 and the auditing log interval were set to seven days (as it is by default). When the 19981217.LOG file was created at midnight this morning, the 19981210.LOG file would have been automatically deleted. You can set the rollover interval for RADIUS auditing log files to any number of days. (See "Setting Accounting and Auditing Parameters.")

CONCLUSION

Whether you are adding remote-access services to a multiplatform WAN or to a small LAN, such as the network belonging to our hypothetical bicycle-accessory manufacturer, BorderManager Authentication Service provides more than RADIUS security. Cross-platform capabilities, an extendable attribute dictionary file, group-based management, and dial-access system caching are only a few of the features that make BorderManager Authentication Service's RADIUS solution unique.
With BorderManager Authentication Service, you can manage your company's remote-access system just as you manage the rest of your company's network--through NDS and the NWADMIN utility. You can provide dial-in access to remote users via any network access server that is RADIUS compliant. And in many cases, these users can even access your company's network by using the dial-in software they are most comfortable with.
For more information about BorderManager Authentication Service, visit Novell's web site at http://www.novell.com/bordermanager/bmas. You can also participate in Novell's "Try Before You Buy" program. You can download a trial version of BorderManager Authentication Service from Novell's web site at http://www.novell.com/bordermanager/bmas/tbyb.html.
Cheryl Walton works for Niche Associates, an agency that specializes in writing and editing technical documents. Niche Associates is located in Sandy, Utah.
NetWare Connection, December 1998, pp. 21-30

Where Did It Go?

When you use the NetWare Administrator (NWADMIN) utility to create a Dial Access System object, you must give that object a password. BorderManager Authentication Service uses the password you create to protect the encryption keys that, in turn, protect both remote users' passwords and Remote Authentication Dial-In Service (RADIUS) shared secrets. In addition, RADIUS servers use the Dial Access System password to log in to the Dial Access System object, which allows RADIUS servers to access authentication and connection information through Novell Directory Services (NDS). Like the RADIUS shared secret, the Dial Access System password should be a random string of alphanumeric characters that is from 20 to 30 characters.
BorderManager Authentication Service's RADIUS service functions as a NetWare Loadable Module (NLM). As a result, RADIUS is on the NetWare server, but is not available and active until you load RADIUS. To load BorderManager Authentication Service's RADIUS services on a NetWare 4.11 or above server, type the following command at the server console:
LOAD RADIUS
After you enter this command, you will be prompted to enter the name and the password of the Dial Access System object that the RADIUS server will log in to.
When you install BorderManager Authentication Service, the installation program includes the LOAD RADIUS command in the AUTOEXEC.NCF file so that RADIUS will load automatically each time you reboot the server. Unless you edit the AUTOEXC.NCF file, however, you will be prompted to supply the Dial Access System object name and password each time RADIUS is loaded (as you are when you load the RADIUS services manually). You must add the following lines to the AUTOEXEC.NCF file:
"name=(Dial Access System object name)""
"password=(Dial Access System object password)"
You replace Dial Access System object name and Dial Access System object password with the actual name of your company's object and the actual password.
Although editing the AUTOEXEC.NCF file allows RADIUS to load unattended whenever the server is rebooted, this option also makes the Dial Access System object password available to anyone with access to your server's console. Fortunately, BorderManager Authentication Service allows you to hide the Dial Access System object password. You simply enter the following command at the server console after you load RADIUS the first time.
RADIUS Password SET
The RADIUS Password SET command stores the Dial Access System password in an encrypted form, preventing users who have access to the server console from accessing the Dial Access System password.
If you hide this password, only the name of the Dial Access System object must be specified if RADIUS is loaded. In other words, if the server went down while you were away, RADIUS could be loaded in your absence even if the person rebooting the server were not authorized to know the Dial Access System password.
If you change the Dial Access System password after hiding the previous Dial Access System password, you must either enter a SET command with the new password at the server console, or you must clear the previous password and enter the new password each time RADIUS is loaded. To clear a previously hidden password, type the following command at the server console:
RADIUS Password CLEAR
NetWare Connection, December 1998, p. 26

Creating a Dial Access Profile Object

To create a Dial Access Profile object for BorderManager Authentication Service, you use the NetWare Administrator (NWADMIN) utility to complete the following steps:
  1. Select or create the Organizational Unit (OU) object in which you want the Dial Access Profile object to reside.
  2. Select Create from the Object menu. The New Object dialog box appears.
  3. Select Dial Access Profile, and then click the OK button.
  4. Enter a name for the Dial Access Profile object, and then click the Create button.
  5. Double-click the Dial Access Profile object you just created. The Dial Access Profile dialog box appears.
  6. Select Attributes, and click the Add button.
  7. Double-click either the Generic option or one of the vendors listed below the Vendor Specific option. If you select the Generic option, a list of attributes required by Request For Comments (RFC) 2138 appears. These attributes include User-Name, User-Password, Challenge Handshake Authentication Protocol (CHAP) Password, Network Access Server (NAS) IP-Address, Framed Routing, and Framed-IPX-Network. Click the attributes you want to implement.
    To choose vendor-specific attributes, click the vendor that made your company's or your ISP's network access server. A list appears, containing the extended attributes that particular network access server supports. Click the attributes you want to implement. If your company uses more than one type of network access server, you can add other vendors' attributes as well. (You need to create only one Dial Access Profile object, even if your company has several network access servers.)
  8. Select the attributes you want to add from the list, and click the OK button.
  9. When you are finished adding attributes, uncheck the Add Another Attribute box, and click the OK button.
  10. Click the OK button again.
If the vendor of your RADIUS-compliant network access server has extended attributes and that vendor does not appear in the list of extended attributes supported by BorderManager Authentication Service, you can request that Novell make the vendor's attribute extensions available: Simply send an e-mail message to Novell at BMASComments@Novell.com.
You can also use this e-mail address to request that Novell add attributes to the attribute dictionary file. (Note: The RADIUS server does not recognize attributes that your network access server does not support.) Novell plans to update the attribute dictionary file and make these updates available on the Novell Support Connection World-Wide Web site at http://support.novell.com/products/bmas. If you are a BorderManager Authentication Service customer, you may want to check this site periodically.
NetWare Connection, December 1998, p. 28

Setting Accounting and Auditing Parameters

BorderManager Authentication Service allows you to configure its accounting and auditing services. The following is a list of accounting and auditing parameters for BorderManager Authentication Service and the default settings for these parameters:
  • serverType = [accounting/authentication] (The default setting is both accounting and authentication.)
  • acctPath = <RADIUS accounting directory> (The default setting is SYS:\ETC\RADIUS\ACCT for NetWare and C:\NOVELL\BMAS\ACCT for Windows NT.)
  • acctPort = <UDP port for RADIUS accounting> (The default setting is 1646.)
  • fileFormat = [standard/comma] (The default setting is comma, meaning comma delimited.)
  • rollOver = [daily/weekly/monthly] (The default setting is daily.)
  • RADIUS SystemLog [On\Off] (The default setting is On.)
  • RADIUS SystemLog <file_location> (The default setting is SYS:\ETC\RADIUS\LOG for NetWare and C:\NOVELL\BMAS\LOG for Windows NT.)
  • RADIUS SystemLogInterval <number_of_days> (The default setting is 7.)
To change these auditing and accounting parameters when BorderManager Authentication Service is running on a NetWare 4.11 or above server, you enter the following commands at the server console:
  • UNLOAD RADIUS
  • LOAD RADIUS parameter
For example, if you wanted to set the accounting log file to rollover on a monthly basis, you would unload RADIUS services and enter the following command at the server console:
  • LOAD RADIUS rollOver = monthly
To change RADIUS accounting parameters for BorderManager Authentication Service on a Windows NT server, you would complete the following steps:
  1. Select Settings from the Start menu on the Windows NT server console.
  2. Select Control Panel, and then double-click Services.
  3. Select BorderManager Authentication Service.
  4. Click Stop, and then click Startup.
  5. In the Log On As field, enter the username you use to authenticate to BorderManager Authentication Service.
  6. Enter your password.
  7. Select Automatic from the Startup Type list.
  8. Enter parameter options in the Startup Parameters field.
  9. After you enter the parameter options, click Start.
NetWare Connection, December 1998, p. 30
* Originally published in Novell Connection Magazine

Disclaimer
The origin of this information may be internal or external to Novell. While Novell makes all reasonable efforts to verify this information, Novell does not make explicit or implied claims to its validity.

Wednesday, October 3, 2012

DHCP server feature ใน Cisco router

DHCP server feature ใน Cisco router
ใน Cisco IOS version ตั้งแต่ 12.0 เป็นต้นมา Cisco ได้เพิ่ม feature หลายๆอย่างเพื่อรองรับรูปแบบ office ที่เป็นขนาดเล็ก ที่ Cisco เรียกว่า SOHO (Small Office Home Office) สำหรับตอนนี้ผมจะเขียนถึง feature นึงที่ค่อนข้อางเป็นหัวใจของการสื่อสานในระบบ network นั่นก็คือ DHCP (Dynamic Host Control Protocol) ซึ่งโดยปกติ features นี้จะพบได้ในรูปแบบที่เป็น server แต่หลายคนอาจจะยังไม่ทราบว่าเราสามารถ configure ให้ router ทำงานเพื่อทดแทน DHCP server ได้
ผมคงเว้นเรื่องรายละเอียดของ DHCP เพราะหลายๆคนน่าจะทราบดีแล้ว หรือถ้าต้องการทราบก็สามารถหาอ่านได้โดยง่ายจาก Internet เรามาเริ่มดูกันที่ configuration เลยดีกว่า
การ Configuring DHCP
Cisco ได้เริ่มเพิ่ม feature เรื่องของ DHCP server อย่างเป็นทางการใน IOS 12.0(1) T และได้เพิ่ม feature ต่างๆเพื่อเพิ่มความสามารถเรื่อยมาในส่วนนี้
เรามาดูหน้าตาของ configuration เพื่อให้ router ทำตัวเป็น DHCP server แบบง่ายๆ กันก่อนนะครับ
!
ip dhcp pool net01
network 10.20.1.0 255.255.255.0
default-router 10.20.1.1
dns-server 10.20.1.2
lease 0 0 3
!
( ผมอนุมานเอาเองนะครับว่า ท่านผู้อ่านคุ้นเคยกับการอ่าน configuration ในรุปแบบของ Cisco ดีแล้ว)
แค่นี้เองครับ router ก็จะทำตัวเสมือนกับ DHCP server คือสามาถรับ request จาก PC หรือ DHCP client อื่นๆ และแจก IP address กลับไปได้
มาพิจารณาสิ่งที่ต้องทำอย่างแรก คือการกำหนด pool ของ ip address โดยจากตัวอย่างเราสร้าง pool ขึ้นมาใช้ชื่อว่า net01 และคำสั่งที่ใช้คือ ip dhcp pool หลังจากนั้น ก็ใช้คำสั่งตามตัวอย่างเพื่อกำหนดค่าอื่นๆ โดยในตัวอย่างนี้ เรากำหนดให้ router สามารถจ่าย IP address ตั้งแต่ 10.20.1.1 จนถึง 10.20.1.254 (ด้วยคำสั่ง network 10.20.1.0 255.255.255.0 ) และกำหนดให้ใช้ 10.20.1.1 เป็น ip address ของ default gateway ( default-router 10.20.1.1 ) และ 10.20.1.2 เป็น ip address ของ DNS server
นอกจากนี้เรายังใช้คำสั่ง lease เพื่อกำหนดระยะเวลา lease time ของ IP address โดย parameters ที่ใช้ จะเป็น วัน ชั่วโมง นาที เพราะฉะนั้นคำสั่งที่เราใช้ lease 0 0 3 คือกำหนดให้ IP address มีอายุแค่ 3 นาที
ในกรณีที่เราต้องการยกเว้น ip address บางตัวเพราะจะไปซ้ำกับ IP address ที่มีอยู่แล้วใน network เช่น IP address ของ server และ แน่นอน IP address ของ Ethernet interface บน router เราจะใช้คำสั่ง ip dhcp excluded-address
!
ip dhcp excluded-address 10.20.1.1
!
มาดู config เต็มๆนะครับ
!
ip dhcp excluded-address 10.20.1.1
!
ip dhcp pool net01
network 10.20.1.0 255.255.255.0
default-router 10.20.1.1
dns-server 10.20.1.2
lease 0 0 3
!
interface fa0/0
ip address 10.20.1.1 255.255.255.0
!
ทบทวนนะครับ ในตัวอย่างนี้เรายกเว้น 10.20.1.1 ออกจาก range ของ ip address ที่เราจะกำหนด ต่อมาเราให้ชื่อของ range ของ ip address ว่าชื่อ net01 โดยกำหนด range ของ ip address ที่จะให้ router ทำการแจกคือตั้งแต่ 10.20.1.1 จนถึง 10.20.1.254 และมีข้อมูลของ default gateway และ DNS server รวมไปด้วยโดย IP address ที่แจกให้จะอายุ 3 นาที
เพิ่มเติมนิดนึงนะครับ Cisco router จะพิจารณา DHCP request ที่ได้รับว่าเข้ามาทาง interface ไหน (หรือที่เรียกว่า inbound interface) แล้วก็จะดูว่า inbound interface นั้นมี subnet อะไรเพื่อที่จะเลือกใช้ pool ของ IP ได้ถูกต้อง เช่น ถ้ามี Ethernet interface จำนวน 2 interfaces และเราต้องการ config ให้แจก IP address ทั้ง 2 interfaces สิ่งที่เราต้อง config ก็คือการ config pool ขึ้นมา 2 pools เท่านั้นเองครับ ดูตัวอย่าง
!
ip dhcp excluded-address 10.20.1.1
ip dhcp excluded-address 10.20.1.2
ip dhcp excluded-address 20.20.2.1
!
ip dhcp pool net10
network 10.20.1.0 255.255.255.0
default-router 10.20.1.1
dns-server 10.20.1.2
lease 0 0 3
!
ip dhcp pool net20
network 20.20.2.0 255.255.255.0
default-router 20.20.2.1
dns-server 9.1.1.1
!
interface fa0/0
ip address 10.20.1.1 255.255.255.0
!
interface fa0/1
ip address 20.20.2.1 255.255.255.0
!
เอาละครับคงพอสำหรับ DHCP คราวหน้าผมจะเขียนถึงอีก feature นึงที่เรียกว่า DNS Spoofing ใน Cisco router ซึ่งเป็น feature ที่ config ไม่ยากและน่าสนใจทีเดียว

การconfig DNS (Spoofing)ใน Cisco router

การconfig DNS (Spoofing)ใน Cisco router
อะไรคือ DNS
DNS ถ้าอธิบายแบบง่ายๆ ก็คือวิธีการ (หรือบริการ) ที่ช่วยให้เราไม่ต้องจำ ip address ในการติดต่อสื่อสารบน TCP/IP โดยให้เราใช้วิธีจำชื่อหรือที่อยู่ที่เป็นภาษามนุษย์มากขึ้น เช่น ถ้าเราต้องการไปที่ website ของ Cisco เราก็เพียงพิมพ์ www.cisco.com บน web browser ของเรา แล้วเจ้า DNS ก็จะทำการเปลี่ยนจากชื่อ www.cisco.com ที่จำได้ง่ายให้เป็น 198.133.219.25 ซึ่งเป็น ip address ของ Cisco website ทั้งหมดนี้ทาง technical term เราเรียกว่าการทำ name lookup
เหมือนเดิมนะครับ ผมคงต้องขอไม่พูดถึง DNS ในรายละเอียดเพราะคิดว่าท่านผู้อ่านสามารถหาข้อมูลเพิ่มเติมได้ง่ายมาก ทั้งบน Internet และในหนังสือหลายๆเล่ม
แล้วอะไรคือ DNS Spoofing?
DNS Spoofing คือการทำให้ router ทำตัวเป็น DNS server หรือเรียกให้ถูกๆก็คือ proxy DNS server ในกรณีที่ router ไม่สามารถติดต่อกับ DNS server ได้เช่น link ที่เชื่อมไปยัง headoffice หรือ ISP ที่มี DNS server อยู่เกิดdown เราก็สามารถ config router ที่เรามีอยู่ให้ทำงานแทนที่ DNS server ชั่วคราว เสมือนว่าเรามี local DNS server อยู่ ดังนั้นDNS spoofing เหมาะสำหรับ office ที่เป็นลักษณะ remote office หรือoffice ที่มีขนาดเล็กที่อาศัย WAN link ในการติดต่อกับ DNS server.
ถ้าใครคุ้นเคยกับ Windows ดี ประโยชน์ของDNS Spoofing จะคล้ายๆกับ local host file ที่ Windows ใช้ในเรื่องของการทำ name lookup ระหว่าง ip address กับ NetBios name
Configuring DNS Spoofing
จากข้อมูลในCisco.com feature ที่รองรับการทำ DNS Spoofing เริ่มมีใน IOS 12.2(2) T , 12.2(4) T, และเหมือนว่า12.3(2)T จะเป็น official release สำหรับ DNS Spoofing
ในการที่จะให้ DNS spoofing ทำงานอย่างถูกต้อง เราต้อง config คำสั่งด้านล่างก่อน (คำสั่งใดคำสั่งหนึ่ง) ซึ่งได้แก่
  • มีคำสั่ง no ip domain-lookup หรือ
  • ไม่มีการ config โดยใช้คำสั่ง ip name-server x.x.x.x
หรือ
  • ในกรณีที่router ไม่สามารถ connect ไปถึง DNS server เช่น Interface down หรือ ไม่มี routing path ใน routing table
ที่นี้เรามาดูคำสั่งบังคับที่ต้องมีเพื่อ activate การทำงานของ DNS service process บน router ก็จะมี
no ip domain-lookup
ip dns server
ip dns spoofing
no ip domain-lookup
คำสั่งนี้คงคุ้นเคยกันดีนะครับ เป็นคำสั่งที่บอก router ว่าไม่ต้องพยายามติดต่อกับ DNS server (คิดว่าหลายๆท่านคงรำคาญเหมือนผมเวลาไม่มีคำสั่งนี้ เพราะถ้าเราพิมพ์คำสั่งผิดไป routerจะพยายามติดต่อกับ DNS server เพื่อดูว่าที่เราพิมพ์ไปนั้นอาจจะเป็นชื่อ host ตัวใดตัวหนึ่งรึเปล่าซึ่งน่ารำคาญทีเดียวนะครับเพราะจะต้องเสียเวลารอ)
ip dns server
คำสั่งนี้เป็นการบอก router ให้ทำตัวเป็น DNS server ด้วย(นอกเหนือจากการ routing และอีกหลายอย่างที่เรา config ไป) โดยการactivate DNS server process ใน router
ip dns spoofing [spoofing ip address]
คำสั่งนี้เป็นการบอกให้ router ทำการ spoof หรือ สวมรอยโดยถ้าเห็น DNS queries เข้ามา router จะทำการตอบกลับด้วยข้อมูล record (ชื่อและ ip address) ที่เราconfigให้ router ซึ่งจะอธิบายเพิ่มเติมด้านล่าง
เรามี option ให้เลือกว่าจะใส่ ip address หลังคำสั่ง ip dns spoofing โดยถ้าเราใส่ ip address ตามหลังคำสั่ง ก็จะเป็นการกำหนด ip address ที่routerใช้ในการตอบ DNS queries เช่นถ้าเรา config ด้วยคำสั่ง
ip dns spoofing 1.1.1.1
client ที่ทำการทำ DNS queries จะคิดว่า DNS server ที่ตอบกลับคือ server ที่มี address 1.1.1.1 แต่ถ้าเราไม่ใส่ routerจะใช้ ip address ของ inbound interface ที่ได้รับ DNS queriesในการตอบกลับซึ่งเป็น default configuration ของ router (งงไม๊ครับ คือสรุปว่าrouter หลอกให้อุปกรณ์อื่นเข้าใจว่าได้รับคำตอบจาก ip address 1.1.1.1)
หลังจาก DNS service ทำงานแล้ว เราก็ต้องใส่ข้อมูลของชื่อและ ip address หรือที่เราเรียกว่า resource record ใน DNS ให้ router สามารถค้นหา (name lookup) ซึ่งคำสั่งที่ใช้ก็คือคำสั่ง ip host และ ip domain name
ตอนนี้เรามาดู configuration แบบเต็มๆเพื่อความเข้าใจนะครับ
!
no ip domain-lookup
ip dns server
ip dns spoofing 1.1.1.1
!
ip domain name tnet.com
ip host test.tnet.com 1.2.3.4
!
ทีนี้ดูผลของ query ด้วยคำสั่ง nslookup จาก Windows
C:\>nslookup
> test
Server: [1.1.1.1]
Address: 1.1.1.1
Non-authoritative answer:
Name: test
Address: 1.2.3.4
> test.tnet.com
Server: [1.1.1.1]
Address: 1.1.1.1
Non-authoritative answer:
Name: test.tnet.com
Address: 1.2.3.4
> 1.2.3.4
Server: [1.1.1.1]
Address: 1.1.1.1
Name: test.tnet.com
Address: 1.2.3.4
สำหรับผู้ที่เข้าใจ DNSดีอยู่แล้ว โปรดสังเกตนะครับว่าเราไม่ต้องยุ่งกับ PTR record (สำหรับ reverse lookup) นะครับ DNS process ใน cisco router ฉลาดพอที่จะทำ reverse lookup ให้เอง
ก็คงพอแค่นี้นะครับสำหรับ DNS spoofing ที่จริงมีคำสั่งที่เกี่ยวกับการ config DNS ใน Cisco router ค่อนข้างเยอะทีเดียว สำหรับผู้ที่ต้องการรู้เพิ่มเติม เข้าไปดูที่http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122newft/122t/122t2/ftddns.htm นะครับ