From Fedora Project Wiki
(Feature is going to be dropped from F19 as agreed by the owner, ongoing work)
 
(13 intermediate revisions by 2 users not shown)
Line 2: Line 2:


== Summary ==
== Summary ==
This feature provides Trusted Network Connect(TNC) framework that can be used to assess and verify clients' posture (or integrity measurements or configuration) and its compliance to a predefined policy with existing network access control (NAC) solutions.
This feature provides Trusted Network Connect(TNC) framework that can be used to assess and verify end clients' system state (such as network ports/firewall status or legitimate binaries) and its compliance to a predefined policy with existing network access control (NAC) solutions.


== Owner ==
== Owner ==
Name: [[User:Avesh| Avesh Agarwal]]
* Name: [[User:Avesh| Avesh Agarwal]]
* Email: avagarwa@redhat.com


Email: avagarwa@redhat.com
== Current status ==
* Targeted release: [[19 | Fedora 19 ]]
* Last updated: 2013-03-11
* Percentage of completion: 80%
 
Currently this work requires a patch in freeradius for enabling EAP-TNC. The patch is attached in this rh bz https://bugzilla.redhat.com/show_bug.cgi?id=712903 . freeradius upstream has already committed the TNC part of the patch and the upstream commit is here:
 
https://github.com/FreeRADIUS/freeradius-server/commit/529b3fed6964969820b83f4e1501520231af7b3f .


== Current status ==
I am still working with freeradius upstream to merge the ttls part. As soon as the upstream merges the whole patch, the patch will be built in fedora, and I will provide concrete testing instructions for anybody to test, and update the status here.
Targeted release: [[19 | Fedora 19 ]]


Last updated: 1/24/2013
Meanwhile, I have added a new package to fedora which is strongswan-tnc-imcvs that provides PTS functionality for this feature. The link for this package is here:


Percentage of completion: 50%
http://kojipkgs.fedoraproject.org//packages/strongswan/5.0.2/1.fc19/x86_64/strongswan-tnc-imcvs-5.0.2-1.fc19.x86_64.rpm


== Detailed Description ==
== Detailed Description ==
Line 25: Line 32:


== Scope ==
== Scope ==
This feature involves following packages as of now: tncfhh, openpts, wpa_supplicant, freeradius, tpm_tools, trousers, NetworkManager
This feature involves following packages as of now: tncfhh, openpts, wpa_supplicant, freeradius, tpm_tools, trousers, NetworkManager, strongswan-tnc-imcvs


== Goals ==
== Goals ==
Line 64: Line 71:


== Contingency Plan ==
== Contingency Plan ==
Although, this feature works on top of wpa_supplicant and can be used with NM, this does not require any changes in wpa_supplicant currently, so wont impact any existing functionality, and other packages part of this feature are stand alone in themselves. In summary, this feature does not change any part of the current networking stack, so wont break any existing networking functionality. If a user does not use this feature, there is no impact on other functionalities.
Although, this feature works on top of wpa_supplicant and can be used with NM, this does not require any changes in wpa_supplicant currently, so wont impact any existing functionality, and other packages part of this feature are stand alone in themselves. In summary, this feature does not change any part of the current networking stack, so won't break any existing networking functionality. If a user does not use this feature, there is no impact on other functionalities.


== Documentation ==
== Documentation ==
Line 87: Line 94:
None yet.
None yet.


[[Category:FeatureReadyForFesco]]
[[Category:FeaturePageIncomplete]]
<!-- When your feature page is completed and ready for review -->
<!-- When your feature page is completed and ready for review -->
<!-- remove Category:FeaturePageIncomplete and change it to Category:FeatureReadyForWrangler -->
<!-- remove Category:FeaturePageIncomplete and change it to Category:FeatureReadyForWrangler -->
<!-- After review, the feature wrangler will move your page to Category:FeatureReadyForFesco... if it still needs more work it will move back to Category:FeaturePageIncomplete-->
<!-- After review, the feature wrangler will move your page to Category:FeatureReadyForFesco... if it still needs more work it will move back to Category:FeaturePageIncomplete-->
<!-- A pretty picture of the page category usage is at: https://fedoraproject.org/wiki/Features/Policy/Process -->
<!-- A pretty picture of the page category usage is at: https://fedoraproject.org/wiki/Features/Policy/Process -->

Latest revision as of 15:32, 9 May 2013

Trusted Network Connect (TNC)

Summary

This feature provides Trusted Network Connect(TNC) framework that can be used to assess and verify end clients' system state (such as network ports/firewall status or legitimate binaries) and its compliance to a predefined policy with existing network access control (NAC) solutions.

Owner

Current status

  • Targeted release: Fedora 19
  • Last updated: 2013-03-11
  • Percentage of completion: 80%

Currently this work requires a patch in freeradius for enabling EAP-TNC. The patch is attached in this rh bz https://bugzilla.redhat.com/show_bug.cgi?id=712903 . freeradius upstream has already committed the TNC part of the patch and the upstream commit is here:

https://github.com/FreeRADIUS/freeradius-server/commit/529b3fed6964969820b83f4e1501520231af7b3f .

I am still working with freeradius upstream to merge the ttls part. As soon as the upstream merges the whole patch, the patch will be built in fedora, and I will provide concrete testing instructions for anybody to test, and update the status here.

Meanwhile, I have added a new package to fedora which is strongswan-tnc-imcvs that provides PTS functionality for this feature. The link for this package is here:

http://kojipkgs.fedoraproject.org//packages/strongswan/5.0.2/1.fc19/x86_64/strongswan-tnc-imcvs-5.0.2-1.fc19.x86_64.rpm

Detailed Description

Traditionally network access control (NAC) has lacked the ability in its decision making to assess endpoint's security posture and its compliance to enterprise policies. (For example, a network might want to grant only limited access to clients that have exploitable browser plugins installed.) This lack of assessment may leave an enterprise's network vulnerable to malicious attacks. Trusted Computing Group (TCG) (and IETF too) has defined an open architecture called Trusted network connect (TNC) (IETF's Network Endpoint Assessment (NEA)) to fill this gap. TNC, as part of its architectural components, includes integrity measurement collectors (IMCs) and TNC client at endpoint and integrity measurement verifiers (IMVs) and TNC server at enterprise network side communicating over NAC solutions such as EAP with 802.1X to evaluate and verify the security posture of the endpoint against the enterprise policies before allowing network access. For this, TCG has released transport (IF-T), session (IF-TNCCS) and messaging (IF-M) standards which are open and interoperable. TNC architecture by virtue of it's IF-M protocol can leverage NIST's SCAP's (OpenSCAP) automated security aspects for measurement collection, verification and remediation. In addition, TCG has defined IF-PTS and PTS protocol specifications to integrate platform trust services (PTS) with TNC for TPM based attestation of integrity measurements. PTS protocol defines messaging payloads to be used over IF-M protocol.

This feature includes the aforementioned functionalities and aims to provide an end-to-end network based client assessment, verification and remediation.

Benefit to Fedora

System and network administrators using fedora can now utilize the potential of open and interoperable TNC protocols over existing NAC solutions. It helps them reduce the possibility of allowing a vulnerable client accessing their network.

Scope

This feature involves following packages as of now: tncfhh, openpts, wpa_supplicant, freeradius, tpm_tools, trousers, NetworkManager, strongswan-tnc-imcvs

Goals

TNC client and server functionality: TCG's IF-TNCCS 1.1 and IETF RFC 5793

Integrity measurements collector (IMC) and verifier (IMV) messaging protocol functionality: IF-M 1.2 and IETF RFC 5792

Implementation of Local IMC and IMV interfaces: IF-IMC 1.2, IF-IMV 1.2

A development library for building custom IMCc and IMVs.

OpenSCAP based IMC and IMV that follow IF-IMC, IF-IMV and IF-M specifications.

PTS protocol (PTS-IMC and PTS-IMV) functionality and its integration (IF-PTS) with platform trust services for TPM based attestation of integrity measurements.

Support with NetworkManager.

How To Test

Configure wpa_supplicant at client and Freeradius at server.

Configure 802.lX managed switch.

Configure tnc.

Configure policies at IMC (provided or custom built) client and IMV (provided or custom built) at server.

Start network access.

Observe if network access is allowed or not.

If not, remediate the system, and try again.

User Experience

Users should be able to see if their system is in compliance to their network's predfined policy and are able to gain access to the network. If their system is not compliant, they should remediate it before trying to access the network again.

Dependencies

This feature requires EAP-TNC support with wpa_supplicant and freeradius.

Contingency Plan

Although, this feature works on top of wpa_supplicant and can be used with NM, this does not require any changes in wpa_supplicant currently, so wont impact any existing functionality, and other packages part of this feature are stand alone in themselves. In summary, this feature does not change any part of the current networking stack, so won't break any existing networking functionality. If a user does not use this feature, there is no impact on other functionalities.

Documentation

http://people.redhat.com/avagarwa/files/tnc-details.pdf

http://www.trustedcomputinggroup.org/developers/trusted_network_connect/specifications

http://tools.ietf.org/html/rfc5209

https://tools.ietf.org/html/rfc5793

https://tools.ietf.org/html/rfc5792

http://www.trustedcomputinggroup.org/resources/tcg_attestation_pts_protocol_binding_to_tnc_ifm

http://www.trustedcomputinggroup.org/resources/tnc_and_scap_an_integrated_solution_for_automating_security

Release Notes

Fedora 19 offers support for Trusted Network Connect protocols to be used with 802.1X framework. OpenSCAP based client (IMC) and server (IMV) plugins are provided to leverage SCAP based measurements collection, verification, and remediation. It offers PTS protocol functionality for TPM based attestation of integrity measurements. It also includes some basic prototype IMCs and IMVs and provides a development library to build custom IMCs and IMVs.

Comments and Discussion

None yet.