9fans - fans of the OS Plan 9 from Bell Labs
 help / color / mirror / Atom feed
From: Axel Belinfante <Axel.Belinfante@cs.utwente.nl>
To: Fans of the OS Plan 9 from Bell Labs <9fans@cse.psu.edu>
Subject: Re: [9fans] factotum/802.1x catch 22?
Date: Sun, 25 Mar 2007 22:15:51 +0200	[thread overview]
Message-ID: <200703252015.l2PKFp314597@zamenhof.cs.utwente.nl> (raw)
In-Reply-To: Your message of "Sun, 25 Mar 2007 11:40:03 -0400." <bb5862bf50785d4c0682af6f08fce3d4@coraid.com>

> if code needs to be added to the bootstrap process to feed factotum
> wireless keys and to later point factotum at the secstore server, then
> that code needs to be added.

just to give some background of what 802.1x is about,
and the role of my current 802.1x supplicant.
(see also http://en.wikipedia.org/wiki/802.1x )
I'll reply to lucio in a separate message.

802.1x is a standard for port-based Network Access Controls,
to allow access to the LAN only to those that have proven
themselves worthy. the network hardware (switch, access point)
does not allow those unauthenticated to talk any protocol other
than 802.1x, which is to be used for authentication with (e.g.)
a radius server (not even dhcp may be available yet).
there is the concept of a 'realm' to allow roaming: the realm
tells which radius server (could be off-site) should be
contacted to do the authentication.
a site can choose from many possible authentication methods.
at our univ a tls tunnel must be set up through which a
user/passwd is passed (this is the ttls-pap method).
other methods may involve e.g. certificates or challenge/resp.

I think 802.1x was originally developed to control access to
wired networks. when used on wireless networks 802.1x can be
used to distribute (and periodically renew) wep keys.


my 802.1x supplicant takes care of setting up the tunnel
and passing the user/passwd over it. it uses factotum
to obtain the user/passwd that is to be passed; it should
(but does not) use factotum to do the passing such that the
supplicant never sees user/passwd.
for other auth methods (when implemented) factotum might
play a bigger role (our univ now also supports peap
which uses mschap).
the supplicant receives wep keys passed via 802.1x and
feeds them directly to the wavelan driver (by writing
to /net/ether0/0/ctl). also here factotum could be used,
but I guess that would only complicate things (I have
a vague recollection that russ advised against passing
the wep keys to via factotum, but I could be wrong).

only after the supplicant has authenticated itself
for the first time (and obtained wep keys in the process)
it will be useful to run ipconfig, because dhcp may not work
until authenticated.
I wrote 'may not' because this seems to be a local decision.
at our univ dhcp does not work until authenticated.
at a different univ (where I can use the wireless net
via a roaming agreement, and authentication is done
using our univ radius server) dhcp is also available when
unauthorized (but ip is disabled until auth-ed).

after the supplicant has authenticated itself and
obtained wep keys it continues to run in the background
to do the periodic re-authentication and obtain new
wep keys and pass them to the wavelan driver.


Axel.


  parent reply	other threads:[~2007-03-25 20:15 UTC|newest]

Thread overview: 19+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2007-03-19 13:47 Axel Belinfante
2007-03-20 13:44 ` erik quanstrom
2007-03-21 23:03 ` Axel Belinfante
2007-03-22  4:38   ` lucio
2007-03-22  5:19     ` Uriel
2007-03-22  6:13       ` Noah Evans
2007-03-22  9:11     ` erik quanstrom
2007-03-22 15:31       ` Joel C. Salomon
2007-03-25 11:56     ` Axel Belinfante
2007-03-25 12:12       ` Uriel
2007-03-25 14:48         ` lucio
2007-03-25 20:38           ` Charles Forsyth
2007-03-26  6:51             ` lucio
2007-03-27  9:24               ` Charles Forsyth
2007-03-27 17:29                 ` lucio
2007-03-25 15:40         ` erik quanstrom
2007-03-25 16:44           ` lucio
2007-03-25 20:15           ` Axel Belinfante [this message]
2007-03-25 14:46       ` lucio

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=200703252015.l2PKFp314597@zamenhof.cs.utwente.nl \
    --to=axel.belinfante@cs.utwente.nl \
    --cc=9fans@cse.psu.edu \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).