Project

General

Profile

Trusted Network Connect (TNC) HOWTO » History » Version 25

Andreas Steffen, 16.06.2011 09:43
Fixed typo in URL

1 1 Andreas Steffen
h1. Trusted Network Connect (TNC) HOWTO
2 1 Andreas Steffen
3 3 Andreas Steffen
The "Trusted Computing Group":http://www.trustedcomputinggroup.org/ (TCG) has defined and released an open architecture and a growing set of standards for endpoint integrity called "Trusted Network Connect":http://www.trustedcomputinggroup.org/developers/trusted_network_connect.
4 1 Andreas Steffen
5 4 Andreas Steffen
!TNC_Architecture.png!
6 2 Andreas Steffen
7 1 Andreas Steffen
strongSwan supports both the older XML-based "IF-TNCCS 1.1":http://www.trustedcomputinggroup.org/files/resource_files/64697C86-1D09-3519-ADE44ADD6B39B71D/TNC_IF-TNCCS_v1_1_r15.pdf  "TNC Client-Server Interface" and the latest "IF-TNCCS-2.0":http://www.trustedcomputinggroup.org/files/resource_files/495CA3DD-1D09-3519-AD0043966E821ECB/IF-TNCCS_TLVBinding_v2_0_r16a.pdf "TLV Bindings" but currently not the "IF-TNCCS SoH 1.0":http://www.trustedcomputinggroup.org/files/resource_files/8D2DF7F3-1D09-3519-AD76CE4433FECE07/IF-TNCCS-SOH_v1.0_r8.pdf "State of Health Protocol Bindings" used by Microsoft's Network Access Protection (NAP) framework.
8 1 Andreas Steffen
9 12 Andreas Steffen
The TCG IF-TNCCS 2.0 protocol is equivalent to the IETF "Posture Broker (PB) Protocol Compatible with Trusted Network Connect" (PB-TNC) defined by "RFC 5793":http://tools.ietf.org/html/rfc5793 which is part of the IETF's "Network Endpoint Assessment" (NEA) framework defined by "RFC 5209":http://tools.ietf.org/html/rfc5209.
10 9 Andreas Steffen
11 1 Andreas Steffen
!NEA_Architecture_small.png!
12 6 Andreas Steffen
13 1 Andreas Steffen
As a transport protocol to exchange IF-TNCCS 1.1 or IF-TNCCS 2.0 messages between TNC Client and TNC Server, strongSwan uses the EAP-TNC method defined by "IF-T":http://www.trustedcomputinggroup.org/files/resource_files/8CC75909-1D09-3519-ADA6958AA29CF223/TNC_IFT_v1_1_r10.pdf "Protocol Bindings for Tunneled EAP Methods 1.1". EAP-TNC as an inner non-secure protocol is then encapsulated in an outer encrypted and authenticated IKEv2-EAP-TTLS tunnel.
14 9 Andreas Steffen
15 10 Andreas Steffen
By activating the appropriate plugins, a strongSwan VPN Client can act as a TNC Client and a strongSwan VPN Gateway can take on either the role of a "Policy Enforcement Point" (PEP) only which forwards all EAP-TTLS packets via EAP-RADIUS to an external AAA-Server or alternatively can additionally act as a TNC Server.
16 10 Andreas Steffen
17 9 Andreas Steffen
* [[TNCC|Configuration as a TNC Client]]
18 9 Andreas Steffen
19 9 Andreas Steffen
* [[TNCS|Configuration as a TNC Server]]
20 8 Andreas Steffen
21 10 Andreas Steffen
* [[PEP|Configuration as a PEP with EAP-RADIUS Interface]]
22 11 Andreas Steffen
23 20 Andreas Steffen
strongSwan can dynamically load any number of Integrity Measurement Collectors (IMCs) and Integrity Measurement Verifiers (IMVs) that adhere to the "IF-IMC 1.2":http://www.trustedcomputinggroup.org/files/resource_files/8CB977E1-1D09-3519-AD48484530EF6639/TNC_IFIMC_v1_2_r8.pdf and "IF-IMV 1.2":http://www.trustedcomputinggroup.org/files/static_page_files/646808C3-1D09-3519-AD2E60765779A42A/TNC_IFIMV_v1_2_r8.pdf interface specifications, respectively. These interfaces are implemented by the *tnc-imc* and *tnc-imv* plugins, respectively.
24 12 Andreas Steffen
25 1 Andreas Steffen
h2. Deployment
26 1 Andreas Steffen
27 23 Andreas Steffen
* *IF-TNCCS 1.1* support was first introduced in October 2010 with the strongSwan 4.5.0 release. The *tnccs-11* charon plugin originally used Mike McCauley's "libtnc":http://sourceforge.net/projects/libtnc/ library but the code was refactored with the strongSwan 4.5.1 release to use the *tnc-imc* and *tnc-imv* plugins and now implements the IF-TNCCS 1.1 protocol directly by including Mike McCauley's *libxml* statements.
28 22 Andreas Steffen
A strongSwan VPN Gateway configured as a PEP can connect to a FreeRADIUS server running the "TNC@FHH":http://trust.inform.fh-hannover.de/joomla/index.php/projects/tncfhh plugin.
29 1 Andreas Steffen
30 20 Andreas Steffen
 - "Example 1a":http://www.strongswan.org/uml/testresults/ikev2/rw-eap-tnc-11/: TNC Client - TNC Server with password-based EAP-MD5 client authentication
31 1 Andreas Steffen
 - "Example 1b":http://www.strongswan.org/uml/testresults/ikev2/rw-eap-tnc-11-radius/: TNC Client - PEP - FreeRADIUS 
32 19 Andreas Steffen
 
33 23 Andreas Steffen
* *IF-TNCCS 2.0* support was introduced in February 2011 with the strongSwan 4.5.1 release. The *tnccs-20* charon plugin was implemented by HSR master student Sansar Choinyambuu and does not make use of the libtnc library at all. Communication with IMCs and IMVs is handled by the *tnc-imc* or *tnc-imv* plugin, respectively. 
34 1 Andreas Steffen
35 20 Andreas Steffen
  - "Example 2a":http://www.strongswan.org/uml/testresults/ikev2/rw-eap-tnc-20/: TNC Client - TNC Server with password-based EAP-MD5 client authentication
36 20 Andreas Steffen
  - "Example 2b":http://www.strongswan.org/uml/testresults/ikev2/rw-eap-tnc-20-tls/: TNC Client - TNC Server with certificate-based EAP-TLS client authentication
37 19 Andreas Steffen
38 20 Andreas Steffen
* Using the *tnccs-dynamic* plugin, a strongSwan VPN gateway can act as a TNC Server handling both the *IF-TNCCS 1.1* and *IF-TNCCS 2.0* protocols by dynamically detecting the protocol version chosen by the TNC Client.
39 20 Andreas Steffen
40 20 Andreas Steffen
  - "Example 3":http://www.strongswan.org/uml/testresults/ikev2/rw-eap-tnc-dynamic/: TNC Client - TNC Server with dynamic IF-TNCCS 1.1/2.0 protocol detection.
41 24 Andreas Steffen
42 24 Andreas Steffen
h2. Presentations
43 24 Andreas Steffen
44 25 Andreas Steffen
* TCG Members Meeting June 2011 Munich: "The strongSwan IPsec Solution with TNC Support":http://www.strongswan.org/tcg/tcg_munich_2011.pdf.