Re: RADIUS

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On 03/01/2018 03:06 AM, hw wrote:

It is illogical to lump all network access together into a single category.
...
If your device can communicate with a switch, even for the purpose of authenticating, then it has network access.

The device has access to the switch which, depending on what answer to an
authentication request it gets from a RADIUS server, decides if and how it
lets the device access the network.

You're still lumping networks into a single category.

Not "the" network, but "a" network.

Unauthenticated clients are, by definition connected to A network consisting of the device and the switch.  They might also be connected to a network consisting of the device, a switch, and a TFTP server that provides the boot image to the client.  And since there is nothing else on that network, other than a read-only TFTP server that your devices require in order to boot, it's difficult to understand why you think there is a security risk here.

Security is the process of restricting access to a resource to only the devices and persons that require it.  If your devices require a boot image before they can authenticate, then restricting their access to that resource can no longer be described as "security."

Where do your hypothetical customers in a store get the user credentials that you want to authenticate via RADIUS?

They might get it from employees of the store or read it from signs
inside the store, perhaps depending on what kind of access rights they
are supposed to have.

If you're sharing passwords, then you don't need RADIUS.  Set up separate SSIDs that are attached to VLANs with appropriate access levels, and continue using WPA2 Personal.  Using RADIUS will be no more secure than that.  It's not magic.

Right, but what about keeping track of customers?  Apparently RADIUS has some
accounting features, and it might be an advantage to use those.

It does, but you will get exactly the same information using WPA2 Personal that you will from WPA2 Enterprise and RADIUS.  "A client connected to the WAP at such and such time.  It disconnected at such and such time."

If you're sharing passwords, RADIUS is the most complex way to get the information.  You can get the same info by simply logging WAP events to a log server.


_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
https://lists.centos.org/mailman/listinfo/centos




[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]


  Powered by Linux