• Advisory services
  • Consultations
  • Network and technology policies
  • Network and technology service docs
  • Using Jisc community
  • Network and technology service docs
  • Domain name registration
  • How to sign up
  • Janet Support Manual
  • Janet CSIRT
  • Back-up services
  • eduroam
  • Backup Web Hosting
  • Certificate Service
  • Connection timeline
  • Eligibility
  • Janet 3G Buyer's Guide
  • Janet 3G eduroam interoperablity authentication methods
  • Janet Mail Services
  • Janet Network Charges
  • Janet Reach
  • Janet Videoconferencing Feedback results
  • Primary connections
  • Supporting Business Continuity
  • Business and Community Engagement (BCE) using Janet
  • Cost
  • Interconnect connections
  • Connecting student accommodation
  • Customer-owned routing equipment
  • Obtaining a Janet IP Address Range
  • Terms for the Provision of the Janet Service
  • Upgrading your existing bandwidth and Janet router
  • Fault reporting
  • IP address assignment
  • Janet Aurora
  • Janet Netsight
  • Janet txt
  • Routers
  • Network set-up
  • Guest access
  • Network time service
  • Training
  • Contact
  • Primary Nameserver Service
  • Secondary Nameserver Service
  • Vscene
  • eduroam
  • eduroam(UK) Policy
  • Advisories
  • FAQs
  • Information for users
  • eduroam Visitor Access service (eVA)
  • eduroam Web Sites Accessibility Documents
  • Information for tech admins
  • Information for management and general enquirers
  • Joining eduroam and terms of membership
  • Technical Reference Docs
  • Advisories
  • 2021-04 Advisory: Android 11 configuration issues, geteduroam, server certificates
  • 2020-11 Advisory: CA Certificate Validation on Android devices
  • 2020-11 Advisory: Implications of MAC address randomisation on eduroam(UK) members
  • 2020-07 Advisory: EAP server certificate considerations
  • Advisory: EAP-PWD Vulnerability
  • Advisory: Ending of RADIUS Accounting within eduroam(UK) (May 2016)
  • Advisory: Filtering of Invalid Realms in Auth Requests sent to the NRPS
  • Advisory: FreeRADIUS 2.1.10,11,12 Security
  • Advisory: Impact of change of Certificate Service CA on eduroam Home service providers
  • Advisory: Injection of Operator-Name Attribute at the NRPSs (Oct 2018)
  • Advisory: Injection of Operator-Name attribute (July 2012)
  • Advisory: Measures to Improve Stability of eduroam in UK
  • Advisory: NAPTR records - Improving Efficiency of International Authentication through utilisation of RadSec at National Level
  • Advisory: OpenSSL TLS Heartbleed Vulnerability
  • Advisory: Tier 2 changes and WPA/TKIP obsolescence
  • Advisory: Use at least SHA-1 for RADIUS server certificates (Apr 2014)
  • Advisory: Use of Status-Server (Jul 2015)
  • Advisory: WPA2 Key Reinstallation Attacks vulnerability, KRACK
  • Advisory: Windows Mobile 8 and certificate verification (Apr 2014)
  • Advisory: eduroam SSID broadcast policy announcement

Advisory: Filtering of Invalid Realms in Auth Requests sent to the NRPS

Download as PDFDownload as PDF

May 2014 - 15/05/2014

This advisory is relevant to ALL Visited (SP) service organisations participating in eduroam in the UK. It describes the recommendation, which will be included in the next revision of the Technical Specification, to filter out bad and doomed authentication requests containing malformed or 'homeless' usernames in order to reduce unnecessary loading of the national proxy servers.

In order to help maximise the efficiency of the National RADIUS Proxy Servers (NRPSs) all organisations providing Visited services should filter malformed outgoing RADIUS authentication requests on their border Organisation RADIUS Proxy Servers (ORPSs) and not pass bad requests to the NRPSs. This minimises the unsuccessful authentication attempts (ones which will never succeed) and means that genuine authentication requests are dealt with as quickly as possible.  To this end section 4.2.1 of the eduroam Technical Specification (version 1.3) states:

  • Visited organisations MUST forward RADIUS requests originating from eduroam Network Access Servers (NASs) which contain user names with non-local realms to a NRPS via an ORPS.

and

  • Visited organisations MUST NOT forward requests containing user names which do not include a realm nor any which are non-NAI compliant.

The first part of that statement is simple, user names MUST contain an "@" symbol (e.g. username@camford.ac.uk) and so bare usernames (e.g. "username" in this case) are NOT allowed. The second part is a little more complicated however. The definition of "NAI compliant" for the realm part is quite complex but basically it boils down meaning that it must be syntactically valid, i.e. the realm part of the user name must meet all of the following requirements:

  • MUST contain at least one dot ("."), e.g. "camford.ac.uk" is OK,
  • MUST NOT start or end with a dot, e.g. ".camford.ac.uk" or "camford.ac.uk." are both invalid,
  • MUST NOT have two or more sequential dots, e.g. "camford.ac..uk" is invalid,
  • MUST consist only of alphanumeric, hyphen and dot characters, so that's a-z, 0-9, "-" and ".", spaces are explicitly not permitted, e.g. "camford.ac uk" is invalid,
  • following on from the previous point the realm MUST NOT start or end with a space, e.g. "camford.ac.uk " is invalid,

We also request that sites do NOT forward requests with user names matching any of the following,

  • ends with ax.uk
  • ends with ax.edu
  • ends with @ac.uk
  • ends with sc.uk
  • ends with ac.edu
  • ends with ac.u
  • ends with .local
  • ends with the organisation's own realm without the .ac.uk (e.g. ends in camford rather than camford.ac.uk. Nb. this applies only to organisations providing both Home and Visited services)
  • contains common typo errors in the organisation's realm name (e.g. canford.ac.uk - check your NRPS error log for hints!)

There is also a list of common realms which we ask Visited organisations to reject locally rather than forward as, whilst they are syntactically valid, they are not eduroam members at this time and are not expected to be in the future. This list currently comprises:

  • myabc.com
  • 3gppnetwork.org (plus all subrealms thereof)
  • 3gppnetworks.org (plus all subrealms thereof)
  • gmail.com
  • googlemail.com
  • hotmail.com
  • hotmail.co.uk
  • live.com
  • outlook.com
  • yahoo.com
  • yahoo.cn
  • unimail.com

A description of how to implement the above recommendations is beyond the scope of this document since there are various different RADIUS servers deployed by members and each platform requires difference configuration methods.