Project

General

Profile

Endpoint Compliance via PT-EAP Protocol » History » Version 2

Andreas Steffen, 07.10.2014 07:42

1 1 Andreas Steffen
h1. Endpoint Compliance via PT-EAP Protocol
2 1 Andreas Steffen
3 1 Andreas Steffen
{{>toc}}
4 1 Andreas Steffen
5 1 Andreas Steffen
h2. Starting the strongSwan Policy Decision Point (PDP)
6 1 Andreas Steffen
7 1 Andreas Steffen
The strongSwan PDP starts and loads its server certificate and the client credentials
8 1 Andreas Steffen
<pre>
9 1 Andreas Steffen
00[DMN] Starting IKE charon daemon (strongSwan 5.2.1dr1, Linux 3.16.1, x86_64)
10 1 Andreas Steffen
00[LIB] openssl FIPS mode(0) - disabled 
11 1 Andreas Steffen
00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
12 1 Andreas Steffen
00[CFG]   loaded ca certificate "C=CH, O=Linux strongSwan, CN=strongSwan Root CA" from '/etc/ipsec.d/cacerts/strongswanCert.pem'
13 1 Andreas Steffen
00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
14 1 Andreas Steffen
00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
15 1 Andreas Steffen
00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
16 1 Andreas Steffen
00[CFG] loading crls from '/etc/ipsec.d/crls'
17 1 Andreas Steffen
00[CFG] loading secrets from '/etc/ipsec.secrets'
18 1 Andreas Steffen
00[CFG]   loaded RSA private key from '/etc/ipsec.d/private/aaaKey.pem'
19 1 Andreas Steffen
00[CFG]   loaded EAP secret for carol
20 1 Andreas Steffen
00[CFG]   loaded EAP secret for dave 
21 1 Andreas Steffen
</pre>
22 1 Andreas Steffen
23 1 Andreas Steffen
Next the OS and SWID IMVs are loaded
24 1 Andreas Steffen
<pre>
25 1 Andreas Steffen
00[TNC] TNC recommendation policy is 'default'
26 1 Andreas Steffen
00[TNC] loading IMVs from '/etc/tnc_config'
27 1 Andreas Steffen
00[TNC] added IETF attributes
28 1 Andreas Steffen
00[TNC] added ITA-HSR attributes
29 1 Andreas Steffen
00[TNC] added TCG attributes
30 1 Andreas Steffen
00[LIB] libimcv initialized
31 1 Andreas Steffen
00[IMV] IMV 1 "OS" initialized
32 1 Andreas Steffen
00[TNC] IMV 1 supports 1 message type: 'IETF/Operating System' 0x000000/0x00000001
33 1 Andreas Steffen
00[TNC] IMV 1 "OS" loaded from '/usr/local/lib/ipsec/imcvs/imv-os.so'
34 1 Andreas Steffen
00[IMV] IMV 2 "SWID" initialized
35 1 Andreas Steffen
00[TNC] IMV 2 supports 1 message type: 'TCG/SWID' 0x005597/0x00000003
36 1 Andreas Steffen
O00[TNC] IMV 2 "SWID" loaded from '/usr/local/lib/ipsec/imcvs/imv-swid.so'
37 1 Andreas Steffen
</pre>
38 1 Andreas Steffen
39 1 Andreas Steffen
The PDP loads all plugins needed to communicate via its EAP-RADIUS and PT-TLS interfaces and spawns 16 worker threads
40 1 Andreas Steffen
<pre>
41 1 Andreas Steffen
00[IKE] eap method EAP_TTLS selected
42 1 Andreas Steffen
00[LIB] loaded plugins: charon aes des sha1 sha2 md5 pem pkcs1 gmp random nonce x509 curl revocation hmac socket-default kernel-netlink stroke eap-identity eap-ttls eap-md5 eap-tnc tnc-pdp tnc-imv tnc-tnccs tnccs-20 sqlite
43 1 Andreas Steffen
00[JOB] spawning 16 worker threads
44 1 Andreas Steffen
09[CFG] received stroke: add connection 'aaa'
45 1 Andreas Steffen
09[CFG] left nor right host is our side, assuming left=local
46 1 Andreas Steffen
09[CFG]   loaded certificate "C=CH, O=Linux strongSwan, CN=aaa.strongswan.org" from 'aaaCert.pem'
47 1 Andreas Steffen
09[CFG] added configuration 'aaa'
48 1 Andreas Steffen
</pre>
49 1 Andreas Steffen
50 2 Andreas Steffen
h2. PT-EAP Connection by Access Requestor "dave" transported over EAP-RADIUS
51 1 Andreas Steffen
52 1 Andreas Steffen
<pre>
53 1 Andreas Steffen
04[CFG] received RADIUS Access-Request from client '10.1.0.1'
54 1 Andreas Steffen
04[CFG] created RADIUS connection for user 'dave' NAS 'strongSwan'
55 1 Andreas Steffen
04[CFG] sending RADIUS Access-Challenge to client '10.1.0.1'
56 1 Andreas Steffen
11[CFG] received RADIUS Access-Request from client '10.1.0.1'
57 2 Andreas Steffen
11[CFG] found RADIUS connection for user 'dave' NAS 'strongSwan'
58 1 Andreas Steffen
</pre>
59 1 Andreas Steffen
60 2 Andreas Steffen
h3. Set up an EAP-TTLS connection between Access Requestor and PDP
61 2 Andreas Steffen
62 1 Andreas Steffen
<pre>
63 1 Andreas Steffen
11[TLS] negotiated TLS 1.2 using suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA
64 1 Andreas Steffen
11[TLS] sending TLS server certificate 'C=CH, O=Linux strongSwan, CN=aaa.strongswan.org'
65 1 Andreas Steffen
11[TLS] sending TLS cert request for 'C=CH, O=Linux strongSwan, CN=strongSwan Root CA'
66 2 Andreas Steffen
67 2 Andreas Steffen
<pre>
68 2 Andreas Steffen
11[CFG] sending RADIUS Access-Challenge to client '10.1.0.1'
69 2 Andreas Steffen
12[CFG] received RADIUS Access-Request from client '10.1.0.1'
70 2 Andreas Steffen
12[CFG] found RADIUS connection for user 'dave' NAS 'strongSwan'
71 2 Andreas Steffen
12[CFG] sending RADIUS Access-Challenge to client '10.1.0.1'
72 2 Andreas Steffen
13[CFG] received RADIUS Access-Request from client '10.1.0.1'
73 2 Andreas Steffen
13[CFG] found RADIUS connection for user 'dave' NAS 'strongSwan'
74 2 Andreas Steffen
13[IKE] sending tunneled EAP-TTLS AVP [EAP/REQ/ID]
75 2 Andreas Steffen
13[CFG] sending RADIUS Access-Challenge to client '10.1.0.1'
76 2 Andreas Steffen
14[CFG] received RADIUS Access-Request from client '10.1.0.1'
77 2 Andreas Steffen
14[CFG] found RADIUS connection for user 'dave' NAS 'strongSwan'
78 2 Andreas Steffen
</pre>
79 2 Andreas Steffen
80 2 Andreas Steffen
<pre>
81 2 Andreas Steffen
14[IKE] received tunneled EAP-TTLS AVP [EAP/RES/ID]
82 2 Andreas Steffen
14[IKE] received EAP identity 'dave'
83 2 Andreas Steffen
14[IKE] phase2 method EAP_MD5 selected
84 2 Andreas Steffen
14[IKE] sending tunneled EAP-TTLS AVP [EAP/REQ/MD5]
85 2 Andreas Steffen
</pre>
86 2 Andreas Steffen
87 2 Andreas Steffen
<pre>
88 2 Andreas Steffen
14[CFG] sending RADIUS Access-Challenge to client '10.1.0.1'
89 2 Andreas Steffen
03[CFG] received RADIUS Access-Request from client '10.1.0.1'
90 2 Andreas Steffen
03[CFG] found RADIUS connection for user 'dave' NAS 'strongSwan'
91 2 Andreas Steffen
</pre>
92 2 Andreas Steffen
93 2 Andreas Steffen
<pre>
94 2 Andreas Steffen
03[IKE] received tunneled EAP-TTLS AVP [EAP/RES/MD5]
95 2 Andreas Steffen
03[IKE] EAP_TTLS phase2 authentication of 'dave' with EAP_MD5 successful
96 2 Andreas Steffen
03[IKE] phase2 method EAP_PT_EAP selected
97 2 Andreas Steffen
03[IKE] sending tunneled EAP-TTLS AVP [EAP/REQ/PT]
98 2 Andreas Steffen
</pre>
99 2 Andreas Steffen
100 2 Andreas Steffen
<pre>
101 2 Andreas Steffen
03[CFG] sending RADIUS Access-Challenge to client '10.1.0.1'
102 2 Andreas Steffen
15[CFG] received RADIUS Access-Request from client '10.1.0.1'
103 2 Andreas Steffen
15[CFG] found RADIUS connection for user 'dave' NAS 'strongSwan'
104 2 Andreas Steffen
</pre>
105 2 Andreas Steffen
106 2 Andreas Steffen
Oct  6 20:49:27 alice charon: 15[IKE] received tunneled EAP-TTLS AVP [EAP/RES/PT]