public:fticks
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| public:fticks [2021/04/28 10:07] – admin | public:fticks [2024/05/16 08:31] (current) – admin | ||
|---|---|---|---|
| Line 3: | Line 3: | ||
| The Jisc NRPS keep a log of successful roams between organisation connected to them. However, about 90% of roams happen within Federations so this data is not visible. To gain a complete picture of roaming Federations need to send their own roaming information to a central point. | The Jisc NRPS keep a log of successful roams between organisation connected to them. However, about 90% of roams happen within Federations so this data is not visible. To gain a complete picture of roaming Federations need to send their own roaming information to a central point. | ||
| - | The mechanism for accomplishing this is Syslog, a standard (RFC 5424) approach for logging information to centralised repositories. Jisc uses ELK (Elasticsearch, Logstash | + | The mechanism for accomplishing this is Syslog, a standard (RFC 5424) approach for logging information to centralised repositories. Jisc uses a combination of syslog-ng, loki, mysql and grafana |
| - | + | ||
| - | For doing a similar task within eduroam GEANT devised a standard syslog message body format and called it FTICKS. Their requirements were: | + | |
| + | For doing a similar task within eduroam, GEANT devised a standard syslog message body format and called it FTICKS. The requirements relevant here were: | ||
| 1. Allow receipt of statistics events in a decentralised manner (i.e. from arbitrary, but legitimate sources). | 1. Allow receipt of statistics events in a decentralised manner (i.e. from arbitrary, but legitimate sources). | ||
| Line 12: | Line 11: | ||
| 2. Support semantics of established eduroam statistics collection, in particular: | 2. Support semantics of established eduroam statistics collection, in particular: | ||
| - | a. Quantify number of authentications carried out, noting source country of user and country visited. | + | a. Quantify number of authentications carried out |
| b. Quantify number of roaming days (total number of distinct MAC addresses seen roaming on a given day). | b. Quantify number of roaming days (total number of distinct MAC addresses seen roaming on a given day). | ||
| - | c. Separate actual user traffic from automatically generated probe traffic (monitoring traffic). | + | 3. Be implementable by participants in a lightweight manner; ideally completely stateless for the participant. |
| - | + | ||
| - | 3. Be implementable by participants | + | |
| - | stateless for the participant. | + | |
| 4. Contain a reliable duplicate detection. | 4. Contain a reliable duplicate detection. | ||
| Line 31: | Line 27: | ||
| 8. Be independent of the server software used by participants. | 8. Be independent of the server software used by participants. | ||
| - | + | The format would be: | |
| + | |||
| + | < | ||
| + | F-TICKS/ | ||
| + | </ | ||
| + | # as a field separate makes sense because it doesn' | ||
| - | The eduroam model is very flat with just NRPS-> | + | This format can easily be machine parsed by the aforementioned tools. |
| - | Each site keeps logs internally which is enough for identifying local issues and passing on details for audit purposes. JISC's NRPS can see all the roaming interactions between sites and aren't interested in local users using eduroam | + | The REALM field contains the realm extracted from the username in the form 'holby.nhs.uk' and the CSI contains the Calling Station ID of the device making the authentication request (the user's device). More on the CSI later. |
| - | However, | + | VISINT is the identity of the organisation sending the authetication request. Ideally this should be the Operator-Name of the site from which the Visitor is making |
| - | There's a requirement to see if and how logging information could be passed from the RRPS to a central JISC logging site. The obvious answer would be to have the RRPS configured to send FTICKS (the standard logging format used by eduroam | + | RESULT should always be 'OK' because only successful authentication should |
| - | The problems start with the RADIUS software. Whilst | + | The CSI, or Calling-Station-Id, |
| - | ELK (ElasticSearch, | + | =====Syslog Configuration===== |
| - | Filebeat is available for Linux and Windows so should cover most installs. It's capable of reading the data from file logs generated by NPS at least. | + | The most basic form of syslog is to use UDP on port 514 to send through simple messages. This is an acceptable approach. TCP is also an option, as is TLS. Please discuss with Jisc which approach you'd like to take for sending syslog. |
| - | Discussions would be needed with various sites running various different type of RADIUS software to determine what's possible and acceptable. Security could be an issue at a policy level. The ELK software is all capable of communicating securely but sites may have security policies which wouldn' | + | ====Unix Syslog==== |
| - | ===Log Attributes=== | + | Syslog tools are available on all versions of Unix. |
| - | If extracting the data from the RADIUS server and sending it on to a log processing system has issues that can be overcome then the next problem, less surmountable, | + | [[siteadmin: |
| - | One of the key data is the Operator-Name. This is an attribute set in the RADIUS server configuration and identifies the site sending the request. Manchester University would have the Operator-Name set to ' | ||
| - | Insisting that all sites set the Operator-Name is problematic because some RADIUS servers don't have the capability of adding attributes (Microsoft NPS for example), but should still proxy any existing such attribute. | + | ====FTICKS configuration==== |
| - | In a perfect world the first proxy to see an authentication request should set its Operator-Name to a globally unique (based on DNS for example) name and then pass the request up the chain. If that happened then whichever proxy is at the ' | + | There are configuration fragments |
| - | We may have to accept that, until NPS is fixed/ | ||
public/fticks.1619604476.txt.gz · Last modified: 2021/04/28 10:07 by admin
