Library items tagged:

Published: 06/10/2021 This advisory applies to all organisations providing a Home or Home and Visited (Wi-Fi) service.
Last updated: 6th July 2021, Lesley Ford, Connectivity Product Manager   Janet Public Peering Agreement Jisc Services Limited Peering Policy Jisc Services Limited (JSL) operates an open peering policy and all ISPs are invited to peer. We are present at LINX LON1, LINX LON2, LINX Manchester and IXLeeds
Published: 14/06/2021 This advisory applies to all organisations providing a Visited (Wi-Fi) service. Whilst not specifically an eduroam/802.1X related issue, the FragAttacks vulnerabilities highlight the need to keep your Wi-Fi devices patched to ensure that fixes developed by your equipment vendors are applied to your infrastructure. Several vendors have been quick to respond and have released updates; you may have received direct e-mail notification.
Created 4/06/2021 Fast Track Guide to implementing an eduroam Visited-only (Wi-Fi for guest visitors) service. This document has been produced in response to the initative to encourage deployment of eduroam services alongside existing govroam services. It can nevertheless be used as guide for any organisation wishing to deliver a visitor-only service, for instance NHS Hospital Trusts, conference venues or for organisations wishing to take a first visitor-only step towards a full Home and Visited service.
This is the presentation given by Nik Mitev at Networkshop 45 in Nottingham on 11/04/2017, introducing Support Server 2. An overview of the portal screens and under the bonnet features and function is presented. Support Server 2 is now in production and continues to be developed in line with our ethos of continual service improvement.
Released 1st April 2021 Updated 16th April 2021 This advisory applies to all organisations providing a Home (IdP) service who wish to support users on Android 11 devices. A number of issues have arisen simultaneously which have resulted in a complex situation which requires a careful response from member organisations to avoid user disappointment. The recommended actions are summarised at the bottom of this page. Contents:
May 2016 - 10/05/2016 This advisory applies to any member organisation that operates an ORPS that is configured to send RADIUS accounting packets to the NRPS. Originator: Edward Wincott Scope
Buried in the historic mail archives (and likely in some older eduroam documentation) are advisories concerning the type of RADIUS certificate that eduroam(UK) participants should be using.  Basically, do not use MD5 certificates. For some time now, MD5 has been deprecated and over the past few years Operating Systems have been dropping support for such certificates. e.g. http://support.apple.com/kb/HT4999  (since iOS 5 MD5 certs are only valid for CA certs not server certs)
Announcement regarding Windows Mobile 8 and 802.1X authentication with certificate validation Best practice is that clients must be configured to trust/verify the CA that signsthe RADIUS server that presents during an 802.1X authentication - a major securitypin for eduroam is this trust/check. It has been noted that Windows Mobile 8 (WM8) devices would not authenticate the userif this 'verify' option was chosen.