...
# | Name | Description | Status | Tools | |
---|---|---|---|---|---|
1 | Verify IdP functionality | Verify that the authentication is performed according to the policy by checking authentication flow through the FTLRs or by checking authentication of an issued test account. | MUST (IdP only) | NRO verifies by checking the FTLRs or by checking authentication of a test account (NRO self) | |
2 | Verify SP functionality | Verify that the authentication is performed according to the policy by checking authentication flow through the FTLRs or by checking authentication of a known account eligible for eduroam. Check presens of Calling-Station-Id. | MUST (SP only) | NRO verifies by checking the FTLRs or by checking authentication of a test account (NRO self) | |
3 | Use the right SSID | NROs MUST ensure all members only deploy the service under the 'eduroam' SSID unless there is more than one eduroam SP at the same physical location and the signal overlap would create operational problems,in which case an SSID starting with "eduroam-" MAY be used. Non-compliant networks MUST NOT be labelled 'eduroam' or anything similar to avoid confusion for visitors. The eduroam SSID MUST NOT be shared with other network services. | MUST | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
4 | Adopt AES | eduroam wi-fi services MUST implement WPA2 Enterprise with the use of the CCMP (AES) algorithm | MUST | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
5 | Disable WPA-TKIP | The WPA specification MUST NOT be supported and the TKIP algorithm MUST NOT be employed in eduroam services | MUST NOT | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
6 | Separate non-eduroam guests | NRO and its members may offer a public guest Wi-Fi service for those unable to access eudroam; such users SHOULD be provisioned onto a separate network from eduroam visitors, with its own authentication, monitoring, and anti-circumvention measures. | SHOULD | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
7 | Ensure clarity | NRO members SHOULD act to minimise any possibility of confusion between eduroam and other guest services they may offer (e.g. to prevent credentials being inappropriately presented) | SHOULD | Check info on web pages and other information sources (OT manual) | |
8 | Adopt encrypted comms | NRO SHOULD recommend to members that they use a VPN to protect communications between Access Points and the RADIUS server. (Usually there is a controller here?!? Is VPN really needed?) | SHOULD | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
9 | Permit 802.11 only | NROs MUST ensure members offer eduroam ONLY on 802.11-based wireless media (i.e. NOT over bluetooth etc). | MUST | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
10 | Well-managed identity system | Ensure a well-managed identity management backend system. | MUST (IdP only) | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
11 | Maintain an audit trail | NROs MUST ensure that they and their members retain authentication and DHCP logs for <period defined in central policy?> to enable the cooperative resolution of identity in the event of abuse of eduroam. All relevant logs MUST be created with synchronisation to a reliable time source (GPS or in its absence NTP/SNTP) | MUST | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
12 | Logs | Logs of all authentication requests and responses MUST be kept. The minimum log retention time is six months, unless national regulations require otherwise. These logs may constitute personal data and MUST be managed in a GDPR-compliant way. The information in the requests and responses MUST as a minimum include: The time the authentication request was exchanged. The value of the User-Name attribute in the request ('outerEAP-identity'). The value of the Calling-Station-Id attribute in authentication requests. The result of the authentication. The value of Chargeable-User-Identity (if present in Access-Accept message). | MUST | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
13 | Standardise end-user access | NROs MUST ensure all members offer eduroam users access to the minimum standard ports and protocols, which are specified in the eduroam policy, such that the baseline services (web email and VPN) are consistently available.the eduroam policy, such that the baseline services (web email and VPN) are consistently available. | MUST | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
14 | Filtered protocols | Network access to roaming visitors SHOULD not be port-restricted at all (i.e. in additionto the minimum list of open ports from above, allow all outgoing communication). Where this is not possible, the number of filtered protocols SHOULD be kept as low as possible. | SHOULD | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
15 | NAT | The use of NAT SHOULD be avoided | SHOULD | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
16 | IPV6 | IPv6 connectivity SHOULD be supplied. | SHOULD | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
17 | Application & interception proxies | Service providers SHOULD NOT deploy application or interception proxies. Service providers deploying application or interception proxiesMUST NOT use the proxy to require users to submit personal informationbefore gainingaccess to the Internet,and MUST publish information aboutthese proxies on their eduroam website. If an application proxy is nottransparent, the service provider MUST also provide documentation on theconfiguration of applications to use the proxy. | SHOULD NOT / MUST (NOT)MUST | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
1418 | Ensure physical security | NROs must advise their members that WiFi APs and cabling SHOULD be be secured as much as possible (e.g. to restrict opportunities to introduce network taps or other tampering). All servers MUST be hosted in a secure environment. | MUST | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
1519 | Provide physical signage | NRO advises member organisations to deploy physical signage in areas where eduroam is available (e.g. to assist visitors with medical prosthetics) (What does this mean in practice?(WBK)) | SHOULD | Evidence: copy of documentation/web page | |
1620 | Use the CAT | NRO SHOULD maintain a CAT adminstrator/config for its own staff and also recommend CAT usage to all members. Wherever possible, CAT SHOULD be used to assist with client deployments. | SHOULD | Check CAT (OT automatic), NRO verifies that CAT has been strongly recommended to eduroam IdPs/SPs (NRO self) | |
1721 | Deprecate manual configuration | Where CAT-assisted end user device configuration is not possible, it SHOULD NOT be undertaken by the end user. Administration staff should undertake such configuration to ensure it is correctly completed. Manual configuration is not recommended. | SHOULD NOT | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
1822 | Provide end-user education | NRO and members SHOULD implement training for end users on the expected legitimate behaviours of eduroam systems. Many attacks rely on incorrect user responses to inappropriate service behaviours such as password requests, certificate mismatch warnings etc. | SHOULD | NRO verifies that this has been communicated to eduroam IdPs/SPs and that NRO has offered to help with training implementation (NRO self) | |
1923 | Prevent credential sharing | NROs MUST ensure that all their members enforce the policy that credentials SHOULD NOT be shared between users (or devices where device authentication is used). Automated monitoring of high numbers of simultaneous logins may help with this. | MUST | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) Automated monitoring (OT automatic or NRO automatic) | |
2024 | Select a certificate type | NRO and members SHOULD undertake a risk-based selection of private vs. public CAs for their RADIUS infrastructure. Private is usually preferrable. | SHOULD | NRO verifies that this has been communicated to eduroam IdPs/SPs and that NROs have offered help and advice (NRO self) | |
2125 | Deploy secure CA servers | CA servers MUST be hosted on a dedicated, locked-down server in a secure location, configured for minimum user access. Such servers SHOULD have a fully qualified domain name, although this MAY not be published through DNS. | MUST | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
2226 | Select an EAP Type | NRO should advise members that they SHOULD use at least one of TLS, TTLS, EAP-FAST or PEAP (see reference 9) | SHOULD | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
2327 | Implement certificate revocation | If an EAP type which uses client side certificates is used (e.g. EAP-TLS), a robust revocation process SHOULD be in place to cover loss, theft or compromise of devices. | SHOULD | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self). NRO checks authentication flows through the FLTRs, identifies the organisations utilizing client certs and shows evidence that a robust revocation process is in place (NRO self) | |
2428 | Disable PAP | Password Authentication Protocol MUST NOT be used between access points and RADIUS servers | MUST NOT | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
2529 | DIsable SPAP | Shiva Password Authentication Protocol MUST NOT be used, as their encryption is reversible (see reference 7) | MUST NOT | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
2630 | Disable MS-CHAPv1 | Challenge Handshake Authentication Protocol is considered weak and MUST NOT be used. | MUST NOT | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
2731 | Use anonymous outer identities | Where supported by the EAP type and the supplicant, it is strongly recommended that anonymous outer identities SHOULD be used. (see reference 10) | SHOULD | NRO verifies that this has been communicated to eduroam IdPs/SPs and checks FTLR logs (NRO self) | |
2832 | Set Operator-Name | Where possible, NRO and members SHOULD ensure all Access-Request packets proxied to the NRPS (FTLRs) contain the Operator-Name attribute correctly set to the relevant realm. | SHOULD | NRO checks authentication flow through the FTLRs (NRO self) | |
2933 | Operator-Name functionality | The appearance of the Operator-Name attribute (RFC5580) in Access-Requests MUST NOT cause these requests to be treated as invalid | MUST NOT | NRO verifies that this has been communicated to eduroam IdPs/SPs and checks FTLR logs (if possible) (NRO self) | |
3034 | Enable CUI | Chargeable User Identity (CUI) SHOULD be implemented to enhance accountability of end user behaviour by pseudonymous means. | SHOULD | NRO verifies that this has been communicated to eduroam IdPs/SPs and checks FTLR logs (NRO self) | |
3135 | Implement rogue AP detection | Where available, NRO and members SHOULD monitor for rogue access points. IF possible, automated suppression of rogues SHOULD be implemented. | SHOULD | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
3236 | Implement wireless IPS | Where available, NRO and members SHOULD implement Wi-Fi Intrusion Prevention Systems (IPS) to detect AP spoofing, malicious broadcasts etc. | SHOULD | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
3337 | Operate to default deny | NROs SHOULD advise all members to operate a default deny policy on all firewalls and access control lists, only granting specific traffic types that are required and have been risk assessed to pass. | SHOULD | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
3438 | Provide maps | Websites MAY includes graphical maps of accessible locations, noting additional services such as charging points | MAY | Check information on web site (OT manual) | |
3539 | UDP fragmentation | Make sure UDP fragmentation works | MUST | Test this once a year with eduroam managed IdP - one account per organisation, verify results (OT automatic) Can be checked by peers. | |
3640 | Adopt network segmentation | Network segmentation SHOULD be considered, placing roaming users into a separate segment to local organisation users. | SHOULD | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
3741 | Deploy VLAN spoofing countermeasures | the visitor network design SHOULD prevent devices from mailiciously placing themselves into unauthorised VLANs | SHOULD | NRO verifies that this has been communicated to eduroam IdPs/SPs (NRO self) | |
3842 | audit eduroam IdPs/SPs | NROs SHOULD regularly audit eduroam IdPs/SPs on the criteria mentioned above | SHOULD | Show documentation of audit (OT manual) (Added by WBK) |
...