Clarification of eduroam(UK) Policy and Tech Spec Wording - Visitor Activity Logging

Download as PDFDownload as PDF

The eduroam(UK) Policy calls for the following from Visited Organisations:

  • Since complaints may be received by a Visited organisation about the network activity of a visitor, the Visited organisation must keep sufficient logs to be able to trace network activity to an authenticated user, and to keep these logs securely for a minimum of three months.
  • If activity logs are collected (e.g. through web proxy), the Visited organisation must make the relevant portions available to the Home organisation and/or the eduroam(UK) Service when these are required to investigate misuse.
  • Must accept and log complaints of misuse and forward these promptly to the appropriate Home organisation.

In other words, the actual requirement is that if there is a complaint about something that a visitor did then the Visited site needs to be able to work out which Home site authenticated the visitor and provide the Home organisation with enough information for them to be able to use their logs to identify the individual and hold them to account. The requirement is definitely NOT that Visited organisations should log everything their visitors do on their networks.  (This would be technically challenging in any case given that organisations usually deploy DHCP and/or Proxying/NAT).

The technical details of the logging requirements are spelt out in the eduroam(UK) Technical Specification as detailed below.

Detailed and accurate logging (on participants’ RADIUS servers) of authentication and accounting requests is necessary for resolving technical problems and the tracking of network abuse. Note that the eduroam(UK) policy states that Visited organisations are responsible for all activities of visitors, and consequently it is in their interests to ensure that this logging is accurate and complete.

Logging requirements for all participating organisations, both Home and Visited:

(eduroam(UK) Tech Spec requirement number listed at left hand margin)

5        Every log entry must state the date and time it was logged.

6        Logs must be kept for at least three months, and for no longer than six months.

14.        Participants’ ORPSs MUST log all RADIUS authentication requests exchanged with the NRPS; the following information must be recorded.

14.1.            The value of the user name attribute in the request.

14.2.            The value of the Calling-Station-Id attribute in the request.

15.        Participants MUST log all RADIUS accounting requests exchanged with the NRPS; the following information must be recorded.

15.1.            The value of the user name attribute in the request.

15.2.            The value of the accounting session identifier.

15.3.            The value of the request’s accounting status type.

Specific requirements for Home organisations (ie applicable to most eduroam(UK) participants):

19.        Home organisations MUST log all authentication attempts; the following information MUST be recorded.

19.1.            The time that the authentication request was received.

19.2.            The authentication result returned by the authentication database.

19.3.            The reason given, if any, if the authentication was denied or failed.

Most RADIUS server software systems generally have adequate capability to enable the above to be configured fairly easily.  For example, see Appendix 1: Logging in the case study below:

https://community.ja.net/library/janet-services-documentationcase-study-complying-technical-specification