eduroam Development VC Minutes 2022-11-08 1530 CET
Attendance
Attendees
- Stefan Winter (Restena)
- Tomasz Wolniewicz (PSNC)
- Wenche Backman-Kamila (CSC/Funet)
- Ed Kingscote (CANARIE)
- Mohit Sharma (CANARIE)
- Chris Phillips (CANARIE)
- Stephanie Cooper (ANYROAM)
- Philippe Hanset (ANYROAM)
- Zbigniew Ołtuszyk (PSNC)
- Paul Dekkers (SURF)
- Guy Halse (TENET)
- Stefan Paetow (Jisc)
- Maja Gorecka-Wolniewicz (PSNC)
- Mike Zawazcki (Internet2)
- Anders Nilsson (SUNET)
- Ed Wincott (Jisc)
- Arnaud Lauriou (RENATER)
- Kilian Krause (Uni Stuttgart)
- Janos Mohacsi (KIFU)
Regrets
Agenda / Proceedings
Welcome / Agenda Bashing
Chris: inquisitive on sentiment on 2.4ghz /5ghz trajectory and sentiment on base eduroam support (obligations?? --> is it still ‘eduroam’ if not on 2.4ghz?)
no policy issue with providing only 5 GHz - it is still eduroam (for those who are still able to connect)
- observations
- no 2.4ghz reduces coverage as it is capable of increased range than 5ghz
- the 6ghz range (future) requires 5ghz for wifi alliance acredited
- experience is that users are driven to cheaper devices thus cannot use eduroam (if 2.4 disabled, sacrifices these users)
- IETF Update (short - immediate meeting follow-up)
- radextra BoF
- -> forming working group (will update RFC6614 as one of the first; define an SRADIUS that gets rid of shared secrets; deprecates RADIUS/UDP when not on secure networks)
- https://www.ietf.org/mailman/listinfo/radext
- vendors and deployers in the room, broad support for implementing and deploying this
- emu discussing
- onboarding issues and server validation
- even eap-metadata was a topic
- private vs. public CA
3a. Backward compatibility discussion
- lots of fancy new stuff comes out of IETF, WFA, …
- but there are many devices and people out there that need support for “legacy”; sometimes for 10+ years
- need to strike a balance between embracing new things vs. caring for the long tail of existing deployed tech
- We should try our best to conserve the long tail connectivity (but not be shy to include new things so long as the don’t break a large part of our userbase)
CAT feature requests:
a. “CAT Lower Decks”
* entry-level administrator privileges that can do realm testing, but no config changes
* Good idea?
* Might be useful, via the invitation workflow (choose to invite either a “real” admin or the new role - new roles could age-out automatically)
* Generally interest in this. Investigate how easily this is doable.
b. “NRO View Institution”
* Ability to view only in the UI for institution/profile without taking full control of the organization.
* Good idea?
* Also nice to have.
* Ephemeral equivalent of “Take Control” - only impersonate IdP for the session.
* maybe even higher prio than a)
c. MAC randomisation control in profiles
* This has been raised before (back when iOS 14 arrived)
* Useful motivations for this?
* Exposure to liability (OS provides Privacy and you block it)
* Bad messaging in OSes if such a feature is on - marketing impact “eduroam is insecure”
* Conclusion: Not every IdP in the world has to use CAT. Maybe a different product is better for them.
Crazy IETF idea (deferred)
- in an earlier call, someone mentioned the word Passkey; and it happened again during the IETF emu meeting
- It is probably possible to use FIDO2 security keys / Passkeys also for Enterprise Wi-Fi authentication
- We’re talking no less than a brand new EAP type here (“EAP-FIDO”)
- (this agenda item can and will suck up every minute the other topics still leave free)
Recurring: Passpoint hardware and onboarding chit-chat
AOB / next VC: 22 Nov 2022 1530 CET