Endpoint Compliance via PT-EAP Protocol » History » Version 3
Andreas Steffen, 07.10.2014 07:59
1 | 1 | Andreas Steffen | h1. Endpoint Compliance via PT-EAP Protocol |
---|---|---|---|
2 | 1 | Andreas Steffen | |
3 | 1 | Andreas Steffen | {{>toc}} |
4 | 1 | Andreas Steffen | |
5 | 1 | Andreas Steffen | h2. Starting the strongSwan Policy Decision Point (PDP) |
6 | 1 | Andreas Steffen | |
7 | 1 | Andreas Steffen | The strongSwan PDP starts and loads its server certificate and the client credentials |
8 | 1 | Andreas Steffen | <pre> |
9 | 1 | Andreas Steffen | 00[DMN] Starting IKE charon daemon (strongSwan 5.2.1dr1, Linux 3.16.1, x86_64) |
10 | 1 | Andreas Steffen | 00[LIB] openssl FIPS mode(0) - disabled |
11 | 1 | Andreas Steffen | 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts' |
12 | 1 | Andreas Steffen | 00[CFG] loaded ca certificate "C=CH, O=Linux strongSwan, CN=strongSwan Root CA" from '/etc/ipsec.d/cacerts/strongswanCert.pem' |
13 | 1 | Andreas Steffen | 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts' |
14 | 1 | Andreas Steffen | 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts' |
15 | 1 | Andreas Steffen | 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts' |
16 | 1 | Andreas Steffen | 00[CFG] loading crls from '/etc/ipsec.d/crls' |
17 | 1 | Andreas Steffen | 00[CFG] loading secrets from '/etc/ipsec.secrets' |
18 | 1 | Andreas Steffen | 00[CFG] loaded RSA private key from '/etc/ipsec.d/private/aaaKey.pem' |
19 | 1 | Andreas Steffen | 00[CFG] loaded EAP secret for carol |
20 | 1 | Andreas Steffen | 00[CFG] loaded EAP secret for dave |
21 | 1 | Andreas Steffen | </pre> |
22 | 1 | Andreas Steffen | |
23 | 1 | Andreas Steffen | Next the OS and SWID IMVs are loaded |
24 | 1 | Andreas Steffen | <pre> |
25 | 1 | Andreas Steffen | 00[TNC] TNC recommendation policy is 'default' |
26 | 1 | Andreas Steffen | 00[TNC] loading IMVs from '/etc/tnc_config' |
27 | 1 | Andreas Steffen | 00[TNC] added IETF attributes |
28 | 1 | Andreas Steffen | 00[TNC] added ITA-HSR attributes |
29 | 1 | Andreas Steffen | 00[TNC] added TCG attributes |
30 | 1 | Andreas Steffen | 00[LIB] libimcv initialized |
31 | 1 | Andreas Steffen | 00[IMV] IMV 1 "OS" initialized |
32 | 1 | Andreas Steffen | 00[TNC] IMV 1 supports 1 message type: 'IETF/Operating System' 0x000000/0x00000001 |
33 | 1 | Andreas Steffen | 00[TNC] IMV 1 "OS" loaded from '/usr/local/lib/ipsec/imcvs/imv-os.so' |
34 | 1 | Andreas Steffen | 00[IMV] IMV 2 "SWID" initialized |
35 | 1 | Andreas Steffen | 00[TNC] IMV 2 supports 1 message type: 'TCG/SWID' 0x005597/0x00000003 |
36 | 1 | Andreas Steffen | O00[TNC] IMV 2 "SWID" loaded from '/usr/local/lib/ipsec/imcvs/imv-swid.so' |
37 | 1 | Andreas Steffen | </pre> |
38 | 1 | Andreas Steffen | |
39 | 1 | Andreas Steffen | The PDP loads all plugins needed to communicate via its EAP-RADIUS and PT-TLS interfaces and spawns 16 worker threads |
40 | 1 | Andreas Steffen | <pre> |
41 | 1 | Andreas Steffen | 00[IKE] eap method EAP_TTLS selected |
42 | 1 | Andreas Steffen | 00[LIB] loaded plugins: charon aes des sha1 sha2 md5 pem pkcs1 gmp random nonce x509 curl revocation hmac socket-default kernel-netlink stroke eap-identity eap-ttls eap-md5 eap-tnc tnc-pdp tnc-imv tnc-tnccs tnccs-20 sqlite |
43 | 1 | Andreas Steffen | 00[JOB] spawning 16 worker threads |
44 | 1 | Andreas Steffen | 09[CFG] received stroke: add connection 'aaa' |
45 | 1 | Andreas Steffen | 09[CFG] left nor right host is our side, assuming left=local |
46 | 1 | Andreas Steffen | 09[CFG] loaded certificate "C=CH, O=Linux strongSwan, CN=aaa.strongswan.org" from 'aaaCert.pem' |
47 | 1 | Andreas Steffen | 09[CFG] added configuration 'aaa' |
48 | 1 | Andreas Steffen | </pre> |
49 | 1 | Andreas Steffen | |
50 | 2 | Andreas Steffen | h2. PT-EAP Connection by Access Requestor "dave" transported over EAP-RADIUS |
51 | 1 | Andreas Steffen | |
52 | 1 | Andreas Steffen | <pre> |
53 | 1 | Andreas Steffen | 04[CFG] received RADIUS Access-Request from client '10.1.0.1' |
54 | 1 | Andreas Steffen | 04[CFG] created RADIUS connection for user 'dave' NAS 'strongSwan' |
55 | 1 | Andreas Steffen | 04[CFG] sending RADIUS Access-Challenge to client '10.1.0.1' |
56 | 1 | Andreas Steffen | 11[CFG] received RADIUS Access-Request from client '10.1.0.1' |
57 | 2 | Andreas Steffen | 11[CFG] found RADIUS connection for user 'dave' NAS 'strongSwan' |
58 | 1 | Andreas Steffen | </pre> |
59 | 1 | Andreas Steffen | |
60 | 3 | Andreas Steffen | Set up an EAP-TTLS connection between AR and PDP |
61 | 1 | Andreas Steffen | <pre> |
62 | 1 | Andreas Steffen | 11[TLS] negotiated TLS 1.2 using suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA |
63 | 1 | Andreas Steffen | 11[TLS] sending TLS server certificate 'C=CH, O=Linux strongSwan, CN=aaa.strongswan.org' |
64 | 1 | Andreas Steffen | 11[TLS] sending TLS cert request for 'C=CH, O=Linux strongSwan, CN=strongSwan Root CA' |
65 | 2 | Andreas Steffen | |
66 | 2 | Andreas Steffen | <pre> |
67 | 2 | Andreas Steffen | 11[CFG] sending RADIUS Access-Challenge to client '10.1.0.1' |
68 | 2 | Andreas Steffen | 12[CFG] received RADIUS Access-Request from client '10.1.0.1' |
69 | 2 | Andreas Steffen | 12[CFG] found RADIUS connection for user 'dave' NAS 'strongSwan' |
70 | 2 | Andreas Steffen | 12[CFG] sending RADIUS Access-Challenge to client '10.1.0.1' |
71 | 2 | Andreas Steffen | 13[CFG] received RADIUS Access-Request from client '10.1.0.1' |
72 | 2 | Andreas Steffen | 13[CFG] found RADIUS connection for user 'dave' NAS 'strongSwan' |
73 | 2 | Andreas Steffen | 13[IKE] sending tunneled EAP-TTLS AVP [EAP/REQ/ID] |
74 | 2 | Andreas Steffen | 13[CFG] sending RADIUS Access-Challenge to client '10.1.0.1' |
75 | 2 | Andreas Steffen | 14[CFG] received RADIUS Access-Request from client '10.1.0.1' |
76 | 2 | Andreas Steffen | 14[CFG] found RADIUS connection for user 'dave' NAS 'strongSwan' |
77 | 1 | Andreas Steffen | </pre> |
78 | 2 | Andreas Steffen | |
79 | 3 | Andreas Steffen | Received EAP-Identity of AR dave |
80 | 2 | Andreas Steffen | <pre> |
81 | 2 | Andreas Steffen | 14[IKE] received tunneled EAP-TTLS AVP [EAP/RES/ID] |
82 | 2 | Andreas Steffen | 14[IKE] received EAP identity 'dave' |
83 | 2 | Andreas Steffen | 14[IKE] phase2 method EAP_MD5 selected |
84 | 2 | Andreas Steffen | 14[IKE] sending tunneled EAP-TTLS AVP [EAP/REQ/MD5] |
85 | 2 | Andreas Steffen | </pre> |
86 | 2 | Andreas Steffen | |
87 | 2 | Andreas Steffen | <pre> |
88 | 2 | Andreas Steffen | 14[CFG] sending RADIUS Access-Challenge to client '10.1.0.1' |
89 | 2 | Andreas Steffen | 03[CFG] received RADIUS Access-Request from client '10.1.0.1' |
90 | 2 | Andreas Steffen | 03[CFG] found RADIUS connection for user 'dave' NAS 'strongSwan' |
91 | 1 | Andreas Steffen | </pre> |
92 | 2 | Andreas Steffen | |
93 | 3 | Andreas Steffen | EAP-MD5 based authentication of AR dave |
94 | 2 | Andreas Steffen | <pre> |
95 | 2 | Andreas Steffen | 03[IKE] received tunneled EAP-TTLS AVP [EAP/RES/MD5] |
96 | 2 | Andreas Steffen | 03[IKE] EAP_TTLS phase2 authentication of 'dave' with EAP_MD5 successful |
97 | 2 | Andreas Steffen | 03[IKE] phase2 method EAP_PT_EAP selected |
98 | 2 | Andreas Steffen | 03[IKE] sending tunneled EAP-TTLS AVP [EAP/REQ/PT] |
99 | 2 | Andreas Steffen | </pre> |
100 | 2 | Andreas Steffen | |
101 | 2 | Andreas Steffen | <pre> |
102 | 2 | Andreas Steffen | 03[CFG] sending RADIUS Access-Challenge to client '10.1.0.1' |
103 | 2 | Andreas Steffen | 15[CFG] received RADIUS Access-Request from client '10.1.0.1' |
104 | 1 | Andreas Steffen | 15[CFG] found RADIUS connection for user 'dave' NAS 'strongSwan' |
105 | 1 | Andreas Steffen | </pre> |
106 | 1 | Andreas Steffen | |
107 | 3 | Andreas Steffen | Upon reception of the first PB-TNC client batch open an IF-TNCCS 2.0 connection |
108 | 3 | Andreas Steffen | <pre> |
109 | 3 | Andreas Steffen | 15[IKE] received tunneled EAP-TTLS AVP [EAP/RES/PT] |
110 | 3 | Andreas Steffen | 15[IMV] IMV 1 "OS" created a state for IF-TNCCS 2.0 Connection ID 1: +long +excl -soh |
111 | 3 | Andreas Steffen | 15[IMV] over IF-T for Tunneled EAP 2.0 with maximum PA-TNC message size of 65490 bytes |
112 | 3 | Andreas Steffen | 15[IMV] user AR identity 'dave' authenticated by password |
113 | 3 | Andreas Steffen | 15[IMV] IMV 2 "SWID" created a state for IF-TNCCS 2.0 Connection ID 1: +long +excl -soh |
114 | 3 | Andreas Steffen | 15[IMV] over IF-T for Tunneled EAP 2.0 with maximum PA-TNC message size of 65490 bytes |
115 | 3 | Andreas Steffen | 15[IMV] user AR identity 'dave' authenticated by password |
116 | 3 | Andreas Steffen | 15[IMV] IMV 1 "OS" changed state of Connection ID 1 to 'Handshake' |
117 | 3 | Andreas Steffen | 15[IMV] IMV 2 "SWID" changed state of Connection ID 1 to 'Handshake' |
118 | 3 | Andreas Steffen | </pre> |
119 | 3 | Andreas Steffen | |
120 | 3 | Andreas Steffen | <pre> |
121 | 3 | Andreas Steffen | 15[TNC] received TNCCS batch (91 bytes) for Connection ID 1 |
122 | 3 | Andreas Steffen | 15[TNC] PB-TNC state transition from 'Init' to 'Server Working' |
123 | 3 | Andreas Steffen | 15[TNC] processing PB-TNC CDATA batch |
124 | 3 | Andreas Steffen | 15[TNC] processing IETF/PB-PA message (52 bytes) |
125 | 3 | Andreas Steffen | 15[TNC] setting language preference to 'en' |
126 | 3 | Andreas Steffen | </pre> |
127 | 3 | Andreas Steffen | |
128 | 3 | Andreas Steffen | Received an Attribute Size Request for the _TCG/SWID_ PA message subtype from the SWID IMC |
129 | 3 | Andreas Steffen | <pre> |
130 | 3 | Andreas Steffen | 15[TNC] handling PB-PA message type 'TCG/SWID' 0x005597/0x00000003 |
131 | 3 | Andreas Steffen | 15[IMV] IMV 2 "SWID" received message for Connection ID 1 from IMC 2 |
132 | 3 | Andreas Steffen | 15[IMV] => 28 bytes @ 0x7a5490 |
133 | 3 | Andreas Steffen | 15[IMV] 0: 01 00 00 00 26 4B C3 0A 00 00 55 97 00 00 00 21 ....&K....U....! |
134 | 3 | Andreas Steffen | 15[IMV] 16: 00 00 00 14 05 F5 E1 00 00 00 7F A6 ............ |
135 | 3 | Andreas Steffen | 15[TNC] processing PA-TNC message with ID 0x264bc30a |
136 | 3 | Andreas Steffen | 15[TNC] processing PA-TNC attribute type 'TCG/Max Attribute Size Request' 0x005597/0x00000021 |
137 | 3 | Andreas Steffen | 15[IMV] received a segmentation contract from IMC 2 for PA message type 'TCG/SWID' 0x005597/0x00000003 |
138 | 3 | Andreas Steffen | 15[IMV] maximum attribute size of 100'000'000 bytes with maximum segment size of 32678 bytes |
139 | 3 | Andreas Steffen | </pre> |
140 | 3 | Andreas Steffen | |
141 | 3 | Andreas Steffen | Sending an Attribute Size Response for the _TCG/SWID_ subtype back to the SWID IMC |
142 | 3 | Andreas Steffen | <pre> |
143 | 3 | Andreas Steffen | 15[TNC] creating PA-TNC message with ID 0x45425ec5 |
144 | 3 | Andreas Steffen | 15[TNC] creating PA-TNC attribute type 'TCG/Max Attribute Size Response' 0x005597/0x00000022 |
145 | 3 | Andreas Steffen | 15[IMV] created PA-TNC message: => 28 bytes @ 0x7a5b00 |
146 | 3 | Andreas Steffen | 15[IMV] 0: 01 00 00 00 45 42 5E C5 00 00 55 97 00 00 00 22 ....EB^...U...." |
147 | 3 | Andreas Steffen | 15[IMV] 16: 00 00 00 14 05 F5 E1 00 00 00 7F A6 ............ |
148 | 3 | Andreas Steffen | 15[TNC] creating PB-PA message type 'TCG/SWID' 0x005597/0x00000003 |
149 | 3 | Andreas Steffen | </pre> |
150 | 3 | Andreas Steffen | |
151 | 3 | Andreas Steffen | Sending an Attribute Size Request to any IMC subscribing to the IETF/Oper |
152 | 3 | Andreas Steffen | 15[IMV] IMV 1 requests a segmentation contract for PA message type 'IETF/Operating System' 0x000000/0x00000001 |
153 | 3 | Andreas Steffen | 15[IMV] maximum attribute size of 100000000 bytes with maximum segment size of 65446 bytes |
154 | 3 | Andreas Steffen | Oct 6 20:49:27 alice charon: 15[TNC] creating PA-TNC message with ID 0x2ae6641f |
155 | 3 | Andreas Steffen | Oct 6 20:49:27 alice charon: 15[TNC] creating PA-TNC attribute type 'TCG/Max Attribute Size Request' 0x005597/0x00000021 |
156 | 3 | Andreas Steffen | Oct 6 20:49:27 alice charon: 15[TNC] creating PA-TNC attribute type 'IETF/Attribute Request' 0x000000/0x00000001 |
157 | 3 | Andreas Steffen | Oct 6 20:49:27 alice charon: 15[IMV] created PA-TNC message: => 96 bytes @ 0x7a7ff0 |
158 | 3 | Andreas Steffen | Oct 6 20:49:27 alice charon: 15[IMV] 0: 01 00 00 00 2A E6 64 1F 00 00 55 97 00 00 00 21 ....*.d...U....! |
159 | 3 | Andreas Steffen | Oct 6 20:49:27 alice charon: 15[IMV] 16: 00 00 00 14 05 F5 E1 00 00 00 FF A6 00 00 00 00 ................ |
160 | 3 | Andreas Steffen | Oct 6 20:49:27 alice charon: 15[IMV] 32: 00 00 00 01 00 00 00 44 00 00 00 00 00 00 00 02 .......D........ |
161 | 3 | Andreas Steffen | Oct 6 20:49:27 alice charon: 15[IMV] 48: 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 03 ................ |
162 | 3 | Andreas Steffen | Oct 6 20:49:27 alice charon: 15[IMV] 64: 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 0B ................ |
163 | 3 | Andreas Steffen | Oct 6 20:49:27 alice charon: 15[IMV] 80: 00 00 00 00 00 00 00 0C 00 00 90 2A 00 00 00 08 ...........*.... |
164 | 3 | Andreas Steffen | Oct 6 20:49:27 alice charon: 15[TNC] creating PB-PA message type 'IETF/Operating System' 0x000000/0x00000001 |
165 | 3 | Andreas Steffen | Oct 6 20:49:27 alice charon: 15[TNC] PB-TNC state transition from 'Server Working' to 'Client Working' |
166 | 3 | Andreas Steffen | Oct 6 20:49:27 alice charon: 15[TNC] creating PB-TNC SDATA batch |
167 | 3 | Andreas Steffen | Oct 6 20:49:27 alice charon: 15[TNC] adding TCG/PB-PDP-Referral message |
168 | 3 | Andreas Steffen | Oct 6 20:49:27 alice charon: 15[TNC] adding IETF/PB-PA message |
169 | 3 | Andreas Steffen | Oct 6 20:49:27 alice charon: 15[TNC] adding IETF/PB-PA message |
170 | 3 | Andreas Steffen | Oct 6 20:49:27 alice charon: 15[TNC] sending PB-TNC SDATA batch (222 bytes) for Connection ID 1 |
171 | 3 | Andreas Steffen | Oct 6 20:49:27 alice charon: 15[IKE] sending tunneled EAP-TTLS AVP [EAP/REQ/PT] |