Android BYOD Security based on Trusted Network Connect » History » Version 18
Version 17 (Andreas Steffen, 08.04.2013 14:49) → Version 18/32 (Andreas Steffen, 08.04.2013 14:51)
h1. Android BYOD Security based on Trusted Network Connect
An experimental "BYOD version":http://www.strongswan.org/byod/strongswan-byod-1.2.0.apk of the popular "strongSwan Android VPN Client":https://play.google.com/store/apps/details?id=org.strongswan.android allows the collection of integrity measurements on Android 4.x devices. A special Android BYOD IMC written in Java communicates via the TNC IF-M 1.0 Measurement protocol with an Operating System IMV and a Port Scanner IMV. The strongSwan Android VPN Client transports the IF-M messages (RFC 5792 PA-TNC) in IF-TNCCS 2.0 Client/Server protocol batches (RFC 5793 PB-TNC) via the IF-T for Tunneled EAP Methods 1.1 Transport protocol protected by IKEv2 EAP-TTLS.
h2. VPN Client Configuration
!strongswan-config_small.png!:http://www.strongswan.org/byod/strongswan-config.png
The Android VPN client profile *BYOD* has specifies the VPN gateway *byod.strongswan.org* with the following properties:
* The hostname of the VPN gateway is *byod.strongswan.org*.
* The user authentication is based on *IKEv2 EAP-MD5*.
* Possible user names are *john* or *jane* and the user password is *byod-test*.
* The *byod.strongswan.org* server certificate is issued by the *strongSwan 2009* certification authority.
Therefore the "strongSwan 2009 CA certificate":http://www.strongswan.org/byod/strongswan-cert.crt must be imported into the Android certificate trust store before the first connection can be attempted.
h2. Unrestricted Access (TNC recommendation is allow)
!connected_small.png!:http://www.strongswan.org/byod/screenshot-01-connected.png
h2. Restricted Access (TNC recommendation is isolate)
* "Non-Market-Apps Security Setting":http://www.strongswan.org/byod/screenshot-09-non-market-apps-setting.png
* "Install Web Server App":http://www.strongswan.org/byod/screenshot-10-kws-webserver.png
!restricted_small.png!:http://www.strongswan.org/byod/screenshot-02-restricted.png !restricted-remediation_small.png!:http://www.strongswan.org/byod/screenshot-03-restricted-remediation.png !restricted-remediation-details_small.png!:http://www.strongswan.org/byod/screenshot-04-restricted-remediation-details.png
h2. Blocked Access (TNC recommendation is block)
* "Start Android Web Server":http://www.strongswan.org/byod/screenshot-08-webserver-active.png
!failed_small.png!:http://www.strongswan.org/byod/screenshot-05-failure.png !failed-remediation_small.png!:http://www.strongswan.org/byod/screenshot-06-failure-remediation.png !failed-remediation-details_small.png!:http://www.strongswan.org/byod/screenshot-07-failure-remediation-details.png
An experimental "BYOD version":http://www.strongswan.org/byod/strongswan-byod-1.2.0.apk of the popular "strongSwan Android VPN Client":https://play.google.com/store/apps/details?id=org.strongswan.android allows the collection of integrity measurements on Android 4.x devices. A special Android BYOD IMC written in Java communicates via the TNC IF-M 1.0 Measurement protocol with an Operating System IMV and a Port Scanner IMV. The strongSwan Android VPN Client transports the IF-M messages (RFC 5792 PA-TNC) in IF-TNCCS 2.0 Client/Server protocol batches (RFC 5793 PB-TNC) via the IF-T for Tunneled EAP Methods 1.1 Transport protocol protected by IKEv2 EAP-TTLS.
h2. VPN Client Configuration
!strongswan-config_small.png!:http://www.strongswan.org/byod/strongswan-config.png
The Android VPN client profile *BYOD* has specifies the VPN gateway *byod.strongswan.org* with the following properties:
* The hostname of the VPN gateway is *byod.strongswan.org*.
* The user authentication is based on *IKEv2 EAP-MD5*.
* Possible user names are *john* or *jane* and the user password is *byod-test*.
* The *byod.strongswan.org* server certificate is issued by the *strongSwan 2009* certification authority.
Therefore the "strongSwan 2009 CA certificate":http://www.strongswan.org/byod/strongswan-cert.crt must be imported into the Android certificate trust store before the first connection can be attempted.
h2. Unrestricted Access (TNC recommendation is allow)
!connected_small.png!:http://www.strongswan.org/byod/screenshot-01-connected.png
h2. Restricted Access (TNC recommendation is isolate)
* "Non-Market-Apps Security Setting":http://www.strongswan.org/byod/screenshot-09-non-market-apps-setting.png
* "Install Web Server App":http://www.strongswan.org/byod/screenshot-10-kws-webserver.png
!restricted_small.png!:http://www.strongswan.org/byod/screenshot-02-restricted.png !restricted-remediation_small.png!:http://www.strongswan.org/byod/screenshot-03-restricted-remediation.png !restricted-remediation-details_small.png!:http://www.strongswan.org/byod/screenshot-04-restricted-remediation-details.png
h2. Blocked Access (TNC recommendation is block)
* "Start Android Web Server":http://www.strongswan.org/byod/screenshot-08-webserver-active.png
!failed_small.png!:http://www.strongswan.org/byod/screenshot-05-failure.png !failed-remediation_small.png!:http://www.strongswan.org/byod/screenshot-06-failure-remediation.png !failed-remediation-details_small.png!:http://www.strongswan.org/byod/screenshot-07-failure-remediation-details.png