Project

General

Profile

Trusted Network Connect (TNC) HOWTO » History » Version 76

Version 75 (Andreas Steffen, 25.07.2015 22:34) → Version 76/92 (Andreas Steffen, 15.08.2015 15:07)

{{>toc}}

h1. Trusted Network Connect (TNC) HOWTO

The "Trusted Computing Group":http://www.trustedcomputinggroup.org/ (TCG) has defined and released an open architecture and a growing set of standards for endpoint integrity called "Trusted Network Connect":http://www.trustedcomputinggroup.org/developers/trusted_network_connect.

h2. Architecture

!TCG_TNC_Architecture.png!

strongSwan supports both the older XML-based "IF-TNCCS 1.1":http://www.trustedcomputinggroup.org/files/resource_files/64697C86-1D09-3519-ADE44ADD6B39B71D/TNC_IF-TNCCS_v1_1_r15.pdf "TNC Client-Server Interface" and the latest "IF-TNCCS 2.0":http://www.trustedcomputinggroup.org/files/resource_files/495CA3DD-1D09-3519-AD0043966E821ECB/IF-TNCCS_TLVBinding_v2_0_r16a.pdf "TLV Binding" but currently not the "IF-TNCCS SoH 1.0":http://www.trustedcomputinggroup.org/files/resource_files/8D2DF7F3-1D09-3519-AD76CE4433FECE07/IF-TNCCS-SOH_v1.0_r8.pdf "State of Health Protocol Bindings" used by Microsoft's Network Access Protection (NAP) framework. The new strongSwan "Test" and "Scanner" IMC/IMV pairs support the "IF-M 1.0":http://www.trustedcomputinggroup.org/files/resource_files/495862FF-1D09-3519-AD8977DC98C1167C/TNC_IFM_TLVBinding_v1_0_r37a.pdf "TLV Binding" standard.

The TCG IF-M 1.0 protocol is equivalent to the IETF "Posture Attribute (PA) Protocol Compatible with Trusted Network Connect" (PA-TNC) defined by "RFC 5792":http://tools.ietf.org/html/rfc5792 and the TCG IF-TNCCS 2.0 protocol is equivalent to the IETF "Posture Broker (PB) Protocol Compatible with Trusted Network Connect" (PB-TNC) defined by "RFC 5793":http://tools.ietf.org/html/rfc5793. Both RFCs are part of the IETF's "Network Endpoint Assessment" (NEA) framework defined by "RFC 5209":http://tools.ietf.org/html/rfc5209.

!NEA_Architecture_small.png!

As a transport protocol to exchange IF-TNCCS 1.1 or IF-TNCCS 2.0 messages between TNC Client and TNC Server, strongSwan uses the EAP-TNC method defined by "IF-T":http://www.trustedcomputinggroup.org/files/resource_files/8CC75909-1D09-3519-ADA6958AA29CF223/TNC_IFT_v1_1_r10.pdf "Protocol Bindings for Tunneled EAP Methods 1.1". EAP-TNC as an inner non-secure protocol is then encapsulated in an outer encrypted and authenticated IKEv2-EAP-TTLS tunnel.

h2. TNC Configuration

By activating the appropriate plugins, a strongSwan VPN Client can act as a TNC Client and a strongSwan VPN Gateway can take on either the role of a "Policy Enforcement Point" (PEP) only which forwards all EAP-TTLS packets via EAP-RADIUS to an external AAA-Server or alternatively can additionally act as a TNC Server.

* [[TNCC|Configuration as a TNC Client]]

* [[TNCS|Configuration as a TNC Server]]

* [[PEP|Configuration as a PEP with EAP-RADIUS Interface]]

* [[OptimumTMC|Optimum PB-TNC Batch and PA-TNC Message Sizes]]

h2. TNC Integrity Measurement Collectors and Verifiers

strongSwan can dynamically load any number of Integrity Measurement Collectors (IMCs) and Integrity Measurement Verifiers (IMVs) that already comply with the draft *IF-IMC 1.3* and *IF-IMV 1.3* interface specifications, respectively. These interfaces are implemented by the *tnc-imc* and *tnc-imv* plugins, respectively.

* Attestation [[PTS-IMC]] / [[PTS-IMV]] : TPM-based Remote Attestation

* Scanner IMC / IMV : Does a remote port scan and reports the results

* Test IMC / IMV : Tests the IF-TNCCS / IF-M protocols

The strongSwan IMC/IMV dynamic libraries can be used by any third party TNC Client/Server implementation possessing a standard IF-IMC/IMV interface and running under a Linux, Android, FreeBSD or Mac OS X operating system. The following [[Build-IMC-IMV-Only|HOWTO]] shows how to build the IMC/IMV libraries only, without the strongSwan IKE daemon.

h2. TNC Deployment

* *IF-TNCCS 1.1* support was first introduced in October 2010 with the strongSwan 4.5.0 release. The *tnccs-11* charon plugin originally used Mike McCauley's "libtnc":http://sourceforge.net/projects/libtnc/ library but the code was refactored with the strongSwan 4.5.1 release to use the *tnc-imc* and *tnc-imv* plugins and now implements the IF-TNCCS 1.1 protocol directly by including Mike McCauley's *libxml* statements.
A strongSwan VPN Gateway configured as a PEP can connect to a FreeRADIUS server running the "TNC@FHH":http://trust.inform.fh-hannover.de/joomla/index.php/projects/tncfhh plugin.

- "Example 1a":http://www.strongswan.org/uml/testresults/tnc/tnccs-11/: TNC Client - TNC Server with password-based EAP-MD5 client authentication
- "Example 1b":http://www.strongswan.org/uml/testresults/tnc/tnccs-11-radius/: TNC Client - PEP - FreeRADIUS

* *IF-TNCCS 2.0* support was introduced in February 2011 with the strongSwan 4.5.1 release. The *tnccs-20* charon plugin was implemented by HSR master student Sansar Choinyambuu and does not make use of the libtnc library at all. Communication with IMCs and IMVs is handled by the *tnc-imc* or *tnc-imv* plugin, respectively.

- "Example 2a":http://www.strongswan.org/uml/testresults/tnc/tnccs-20/: TNC Client - TNC Server with password-based EAP-MD5 client authentication
- "Example 2b":http://www.strongswan.org/uml/testresults/tnc/tnccs-20-tls/: TNC Client - TNC Server with certificate-based EAP-TLS client authentication

* Using the *tnccs-dynamic* plugin, a strongSwan VPN gateway can act as a TNC Server handling both the *IF-TNCCS 1.1* and *IF-TNCCS 2.0* protocols by dynamically detecting the protocol version chosen by the TNC Client.

- "Example 3":http://www.strongswan.org/uml/testresults/tnc/tnccs-dynamic/: TNC Client - TNC Server with dynamic IF-TNCCS 1.1/2.0 protocol detection.

* *IF-M 1.0* support was introduced in August 2011 with the strongSwan 4.5.3 release. The strongSwan "Test" and "Scanner" IMC/IMV pairs which communicate with each other via the IF-M TLV-based protocol can be used either in conjunction with a strongSwan TNC Client or TNC Server, respectively, or as stand-alone dynamic libraries *imc-test.so*, *imc-scanner.so*, *imc-attestation.so*, *imv-test.so*, *imv-scanner.so*, and *imv-attestation.so* with any third party TNC Client or TNC Server product having an *IF-IMC* or *IF-IMV* interface, respectively.

* *IF-MAP 2.0* prototype support was introduced in November 2011 with the strongSwan 4.6.0 release. Using the *tnc-ifmap* plugin strongSwan acts as a MAP Client sending IPsec authentication metadata to a MAP Server via an Apache Axis2/C SOAP interface. For details see our [[IfMap|TNC IF-MAP HOWTO]].

* Support of the "TCG Attestation PTS Protocol: Binding to IF-M":http://www.trustedcomputinggroup.com was introduced in February 2012 with the strongSwan 4.6.2 release and was developed by HSR master student Sansar Choinyambuu. Using the [[PTS-IMC|Attestation PTS-IMC]] / [[PTS-IMV|Attestation PTS-IMV]] pair, file and TPM-based functional component measurements can be executed remotely.

- "Example 4":http://www.strongswan.org/uml/pts/: TNC Client with PTS-IMC - TNC Server with PTS-IMV.

h2. Certification

The *IF-IMC* interface of the strongSwan 4.5.2 TNC Client (*TNCC*) and the *IF-IMV* interface of the strongSwan 4.5.2 TNC Server (*TNCS*) were successfully "certified":http://www.trustedcomputinggroup.org/certification/tnc_certified_products_list by the Trusted Computing Group (TCG). We also participated in the May 2011 Plugfest in Chantilly, Virginia, USA, where we tested *IF-PEP* interoperability.

h2. Android BYOD Security based on the TNC framework

The following [[BYOD|link]] gives an overview of the BYOD security features of our Android VPN client.

h2. Endpoint Compliance Profile

* The following [[PT-TLS-SWID|scenario]] shows SWID tag requests via the PT-TLS transport protocol.

* An alternative [[PT-EAP-SWID|scenario]] shows SWID tag requests via the PT-EAP transport protocol.

* The strongSwan SWID IMC uses the open source "swidGenerator":https://github.com/strongswan/swidGenerator python script to generate ISO/IEC 19770-2:2014 Software Identification Tags für all software packages managed by *dpkg* (which used e.g. by the Debian and Ubuntu Linux distributions) or *yum* (which is used by the RedHat and Fedora Linux distributions). A detailed HOWTO explaining the installation and use of the *swid_generator* function can be found [[swidGenerator|here]].

h2. Hardcopy Device Health Assessment

* [[HCD-IMC]] - Hardcopy Device Integrity Measurement Collector
* [[HCD-IMV]] - Hardcopy Device Integrity Measurement Verifier
* "HCD-EAP scenario":http://www.strongswan.org/uml/tnccs-20-hcd-eap/tnc/tnccs-20-hcd-eap/

h2. Mutual Attestation of IoT Devices

* [[IoT-Initiator|Raspi 3]] - Initiating Raspberry Pi 2 IoT Device
* [[IoT-Responder|Raspi 4]] - Responding Raspberry Pi 2 IoT Device

If the mutual attestation via IKEv2-EAP is successful, an IPsec transport mode connection is set up between the two IoT devices.

h2.
Presentations

* TCG Members Meeting June 2015 Edinburgh: "Mutual Attestation of IoT Devices ":http://www.strongswan.org/docs/TCG_Edinburgh_2015.pdf.

* TCG Demo at RSA Conference 2015 San Francisco: "Securing IoT with Trusted Computing":https://www.youtube.com/watch?t=45&v=Eozph-Y4_5Q

* TCG Members Meeting June 2014 Barcelona: "TNC Endpoint Compliance and Network Access Control Profiles ":http://www.strongswan.org/tcg/TCG_Barcelona_2014.pdf.

* Trusted Computing Conference September 2013 Orlando: "Android BYOD Security using Trusted Network Control Protocol Suite":http://www.strongswan.org/tcg/TCC_Orlando_2013.pdf.

* TCG Members Meeting June 2013 Dublin: "strongSwan TNC Activities Update":http://www.strongswan.org/tcg/TCG_Dublin_2013.pdf.

* Linux Security Summit August 30 2012 San Diego: "The Linux Integrity Subsystem and TPM-based Network Endpoint Assessment":http://www.strongswan.org/lss2012.pdf.

* TCG Members Meeting June 2011 Munich: "The strongSwan IPsec Solution with TNC Support":http://www.strongswan.org/tcg/tcg_munich_2011.pdf.