User-Friendly Access Control for Public Network Ports
Abstract
We are facing a growing user demand for ubiquitous Internet access. As a result, network ports and wireless LANs are becoming common in public spaces inside buildings such as lounges, conference rooms and lecture halls. This introduces the problem of protecting networks accessible through these public ports from unauthorized use. In this paper, we study the problem of access control through public network ports. We view this problem as a special case of the more general problem of access control for a service on a network. We present an access control model on which we base our solution. This model has three components: authentication, authorization, and access verification. We describe the design and implementation of a system that allows secure network access through public network ports and wireless LANs. Our design requires no special hardware or custom client software, resulting in minimal deployment cost and maintenance overhead. Our system has a user-friendly, web-based interface, offers good security, and scales to a campus-sized community.
References (17)
- Ip security protocol. http://www.ietf.org/html.charters/ipsec-charter.html.
- Wavelan, by lucent technologies, inc. http://www.wavelan.com/.
- Mary G. Baker, Xinhua Zhao, Stuart Cheshire, and Jonathan Stone. Sup- porting mobility in mosquitonet. In Proceedings of the 1996 USENIX Technical Conference, January 1996.
- Stuart Cheshire and Mary Baker. Internet mobility 4x4. In Proceedings of SIGCOMM'96, August 1996.
- Dorothy Denning. Cryptography and Data Security. Addison-Wesley Publishing, Inc., 1982.
- Ralph Droms. Dynamic host configuration protocol -rfc2131, 1997. ftp://ftp.isi.edu/in-notes/rfc2131.txt.
- Taher Elgamal, Sean Cotter, and the Netscape Security Team. Netscape security: Open-standard solutions for the enterprise, 1998. http://developer.netscape.com/docs/manuals/security/scwp/.
- Neil M. Haller. The s/key one-time password system. In The Internet Society's 4th Annual Networking Conference, 1994. ftp://ftp.bellcore.com/pub/nmh/docs/ISOC.symp.ps.
- Jeff Hodges. Lightweight directory access protocol (v3), extension for transport layer security, 1997. Work in Progress, IETF: draft-ietf-asid- ldapv3-tls-02.tx.
- Peter Honeyman. Workstation authorization. USITS conference, Work in Progress Report, See http://www.citi.umich.edu/ u/ honey/ ppt/ insite/ in- dex.htm, 1997.
- Kevin Lai, Mema Roussopoulos, Diane Tang, Xinhua Zhao, and Mary Baker. Experiences with a mobile testbed. In Proceedings of the Second International Conference on Worldwide Computing and its Applications, March 1998.
- Steve Lucas, Joseph Reagle, et al. Platform for privacy preferences, the p3p project, 1998. http://www.w3.org/P3P.
- Erikas Napjus. Netbar: Carnegie mellon access for mobile machines. http://www.net.cmu.edu/design/netbar.html.
- Elliot Poger and Mary Baker. Secure public internet access handler (spinach). In Proceedings of the USENIX Symposium on Internet Tech- nologies and Systems, 1997.
- J.G. Steiner, C. Neuman, and J.I. Schiller. Kerberos: An authentication service for open network systems. In USENIX Winter Conference Pro- ceedings, 1988.
- Dwayne Virnau. Stanford distributed computing consulting, 1998. http://dcc.stanford.edu/.
- D. L. Wasley. Authenticating aperiodic connections to the campus net- work. ConneXions, Volume 10, No. 8, pp 20-26, 1996.