Monday, 2011-01-24

*** nowen (~nowen@adsl-176-210-205.asm.bellsouth.net) has joined #wikid13:13
*** Sanjar (ca4194fc@gateway/web/freenode/ip.202.65.148.252) has joined #wikid13:54
Sanjarhi... i am looking at wikid as an alternate to RSA two factor authentication13:54
Sanjarcan someone help me out in this13:55
nowenok - that would be us13:55
nowensure13:55
nowendo you use RSA now?13:55
Sanjarok nowen13:55
Sanjarnope we are doing poc for RSA13:55
nowenhardware tokens or software tokens?13:56
Sanjarwe tried with both13:56
Sanjarlet me put across my requirement13:56
nowenok13:56
SanjarWe are looking for two factor authentication for VMWare virtual desktops, VMWare VCenter server, ADS, Oracle, Firewall, Storage etc. Appreciate if we can have comparison sheet of RSA and Verisign two factor authentication.13:56
nowenwhat authentication protocol do you use?13:57
Sanjarfor ads and vmware virtual desktop its ldap13:58
Sanjarfor rest we havent tested13:58
nowendo ADS and virtual desktop also support radius?13:58
Sanjarok let me give u an intro of ourselves13:59
Sanjarwe are an MSP13:59
Sanjarand this is for one of our customer13:59
nowenok14:00
Sanjarcustomer would to go with LDAP14:00
Sanjarif radius is required we can talk to our customer14:00
nowenok, well, we support LDAP, Radius  TACACS+  and have an api too14:00
Sanjargrt14:00
nowenI do think that Radius is a better protocol that ldap for authentication14:01
Sanjarwe would prefer to go with commercial version of wikid if we are through with the testing with the customer setup14:01
nowenwe're very interested in the MSP space and there is a lot we can do with our API14:01
Sanjarcan you plz help us out with a comaparision with RSA and how we can pitch in wikid14:02
nowenyes, I can14:02
Sanjarcost is certainly one big factor which we are clearly aware of14:02
Sanjarwe need the features and support comparision14:02
nowenyes, but also our API will make life a lot easier14:02
Sanjarok14:02
nowenand each user can have more than one token14:02
nowenfor the price of one14:02
Sanjarcan i have the comparision sheet at sanja.a@ctrls.in14:03
Sanjari would appreciate14:03
Sanjarsorry its sanjar.a@ctrls.in14:03
nowenI'll send you what we have, which is not necessarily targeting RSA14:03
Sanjarok will do14:03
nowenbut it does the job :)14:03
Sanjarplz send n i wl confirm u rite away14:04
Sanjarok one more thing u hv got only the soft tokens rite14:04
nowencorrect - only software tokens14:04
Sanjarok we are fine with this ..14:04
nowenhow did you hear about us?14:04
Sanjargoogle14:05
nowenok14:05
Sanjarr u sending the docs now14:05
nowenyes14:05
nowenon their way14:06
Sanjarok14:07
nowenmy one suggestion is that you try to get all the apps using the same standard protocol14:08
nowenDoes the customer use AD?14:08
Sanjaryes14:08
Sanjarok nowen is your chat service available 24/714:10
nowenthe benefit of using Radius is that you can send the auth requests through AD using their radius plugin.  if they have the right AD rights, the creds are proxied to the WIKID server14:10
Sanjarok14:10
nowenno, usually only east coast hours.  24x7 support is available for extra14:11
Sanjarbut i need to setup radius auth for all the components14:11
nowenideally14:11
nowenor run them through something that supports radius, like ISA or apache or a ssl-vpn14:12
Sanjaryeah got it ... ok so even the vmware vcenter and virtual desktop should talk to radius first14:12
Sanjarhow u suggest us to kick off setting up the demo for our customre14:13
nowenyeah - it actually makes life a lot easier in the long urn14:13
nowenrun14:13
nowendownload the server!  we really encourage testing14:13
nowenit's quite easy to setup.  I can walk you through it on irc14:13
Sanjarok not now... can we have this sometime tomorrow14:15
nowensure14:15
Sanjarlet us first convince the customer to have poc on wikid14:15
nowenwith guidance, setting up the server should only take about 20-30 minutes14:15
Sanjargrt14:15
Sanjarwill u b available 2moro14:15
nowenyes14:15
Sanjarfine then i will catch u up tomorrow14:16
nowengrt14:16
Sanjarthanx a lot ... gud day14:16
nowenyou too!14:16
*** Sanjar has quit (Quit: Page closed)14:16
*** vpn2factor (97b70024@gateway/web/freenode/ip.151.183.0.36) has joined #wikid14:55
vpn2factorI was wondering how auth works if I set up a Cisco VPN device using Radius. How does the authetication take place for the user?14:57
nowenhi14:57
nowenthere are a couple of options14:58
nowenauth can pass through AD using radius or the cisco can talk directly to WiKID14:58
nowenthe user logs in with their username and the OTP in both cases14:58
nowendoes that answer your question?14:59
vpn2factorI want to understand enough so that I feel confident that we are still able to do 2 factor. I am thinking...14:59
vpn2factorI guess I want to make sure that the OTP is indeed a private thing for the user. I haven't quite gotten the hang of it.15:00
nowenahh15:00
nowenok. so the two factors are knowledge of the PIN and possession of the private key embedded in the token15:01
nowenyou can think of WiKID as compared to certificates.15:01
nowenbut, there is no infrastructure, they are just flat keys..15:01
nowenthe difference is that the private key is used to encrypt the PIN, which is then sent to the server for validation15:02
nowenso, unlike certs, WiKID cannot be brute-forced attacked like certs15:02
vpn2factorThat is of course what I want to get away from, that and the platform dependency of smartcards15:03
noweninteresting.  I think that one-time passcodes are great because the UI piece has been done for everything - there are username and password boxes for all apps15:04
nowenthen, all you need to do is choose applications that support the right protocol15:04
nowensuch as radius15:05
vpn2factorWhat troubles me here is that the only service I have available is a crappy Cisco box (using Radius). Don't I need to host more myself?15:06
nowennot sure I follow - you will host the WiKID server15:06
vpn2factorThat's were I got confused I guess, I realize I will have to have a WIKID server (or rather 2 for redundancy). But do I need to expose that on the Internet. Sorry if I sound stupid, but I just started reading about WIKID...15:07
vpn2factor? after Internet of course.15:08
nowenno problem! that's why I'm here ;)15:08
nowenThe server typically goes in the dmz, with one port facing out for token requests and one internal for network traffic to the cisco15:09
vpn2factorOK, now I see. This is what I lack in the docs I looked at. I couldn't quite put it together.15:10
nowenit's a very different architecture - the token talks to the server15:10
nowenit allows us to do some different stuff though15:10
noweneach user can have more than one token and each token can work with multiple wikid servers/wikid domains15:11
vpn2factorHow do you limit who may talk to a wikid server?15:11
nowenthere's a two-step process for validation.  we have a bunch of ways to do it, but the simple version is:15:12
nowenthe token communicates with the server and the user is prompted to double enter their PIN15:13
nowenthe PIN is sent to the server and the server responds with a registration code15:13
nowenthat reg code has to get back to the WiKID server in a trusted way for the account to be validated15:13
nowenthe admin can validate or we have scripts that allow the users to self-validate based on existing trusted creds from AD15:14
vpn2factorI am kind of scared of the DMZ placed servers that are supposed to be the basis of authentication to the whole network. Do you get this past PCI/DSS auditors?15:15
nowenyes, constantly.  You can put a server in the dmz that then routes the token info to WIKID.  We do this with apache15:16
vpn2factorAhh, so the server in DMZ is not the WIKID server itself15:17
nowencorrect.  the tokens use port 80 to /wikid/ so a simple redirect rule works fine15:17
nowenbrb - got to get some coffee ;)15:20
vpn2factorOnce again I feel a bit lost as to how to get the token info all the way in and still not exposing too much. You get some coffee. I will too15:20
nowenfor our demo server/www server, we have a rule that routes the wikid token requests to a different port on the server (since www uses 80, obviously)15:26
nowenRewriteRule ^/wikid/(.*) https://localhost:8443/wikid/$1 [P]15:26
nowenyou could have an apache server in the dmz to rewrite requests that come in to a server anywhere15:28
vpn2factorBy design, does that service that is provided for the tokens give access to actually change anything in the WIKID server?15:30
vpn2factorI would of course want a no to such a question, but based on facts ;-)15:30
nowenno, it only receives PINs and responds with OTPs15:31
nowenthe WiKIDAdmin wb ui service runs on 44315:31
vpn2factorThat is what I thought.15:32
vpn2factorI am thinking of how to further strengthen my case for using WIKID, since I feel it would suit our purposes.15:32
nowenso you use certs and smartcards now?15:33
vpn2factorYes, and I want to get away from it to avoid the hassle and also since it's a pain to support multiple platforms.15:34
vpn2factorMore coming real soon...15:36
nowenok15:36
nowenI assume you saw our pricing online?15:36
vpn2factorPricing doesn't hurt that much, no. and yes, I've seen it. By the way, what happens when the maintenance contract runs out?15:37
nowenit's an annual subscription, so it never runs out until you stop it ;)15:37
nowenwe also have a three year option.  pre-pay for 3 years and get a 30% discount15:38
vpn2factorI like the 3 year (both discount and not having to care for 3 years is great). I was rather wondering what happens after 3 years and a day, should one forget to renew. Keep in mind here that I am a consultant helping a customer (and not the one owning the IP for that matter) and I might not be around three years from now...15:40
nowencurrently nothing exceptionally bad happens.  we are working on a better system to track subscriptions that will have reminders, etc.  but after 3years they will be in violation of the license if they haven't renewed15:41
vpn2factorI do believe in reminders but was a bit scared about service dying when support runs out.15:42
vpn2factorYou should of course make sure that customers renew if they still use the application, but hurting them is of course not optimal15:43
nowenagreed15:43
vpn2factorIf you don't get paid, then company and application will eventually die. Not good for existing customers...15:44
nowentrue, but there sadly are always free-riders15:45
vpn2factorIs there nothing that upsets auditors when it comes the fact that you have a web service that does after all talk to the back end authentication service? I WANT to get a good grip of this...15:46
nowenI've talked to QSAs in the past about WiKID and nothing has been said about that.  We have a lot of PCI customers15:47
vpn2factorPerhaps I'm the most paranoid of all then... I guess that is better than the other way round.15:49
nowenwell, there'15:49
nowens pci compliance, and then there is security ;)15:50
nowenthe good ones look at it as a floor, others think it is a ceiling15:50
vpn2factorYes, indeed. They sure don't require everything I want to lock down on my servers. It's more a question of getting paid for what I feel as reasonable security (which is pretty tight)15:51
vpn2factorOK, I guess I should request the download link and start testing15:53
nowenplease do!15:53
vpn2factorThanks for your help!15:53
nowennp15:53
*** vpn2factor has quit (Quit: Page closed)15:54
*** nowen has quit (Quit: Leaving.)16:19
*** nowen (~nowen@adsl-176-210-205.asm.bellsouth.net) has joined #wikid18:02
*** microtosh (~nathan@adsl-75-47-249-111.dsl.lsan03.sbcglobal.net) has joined #wikid18:15
nowenhowdy microtosh18:15
microtoshhey nowen18:15
nowenahh, Hi Nathan :)18:16
microtoshheh18:17
microtoshhi Nick18:17
microtosh:-)18:17
nowenhow goes the install?18:17
microtoshhavent attempted yet, just got into the office18:17
microtoshI'm installing the ISO on VMware, what's the distro it's packaged with?18:17
nowencentos 518:17
microtoshok18:18
microtosh32bit?18:18
nowenyes18:18
microtoshhey did i read somewhere right that wikid is also a tacacs+ server?18:20
nowenwe have support for tacacs+.  It is a bit kludgey, IMO, but others have said they love it18:21
microtoshdoes the system really require 2 NIC's?18:23
nowenit's recommended.  You most likely do not want your radius internal traffic on the same network as the external token traffic, but up to you18:24
microtoshok18:24
microtoshjust making sure18:24
microtoshlol awesome, as we just get an email from the client to hold on the project...18:27
nowendarn18:27
nowenis this for pci compliance?18:27
microtoshyes18:27
nowenwell, they will need two-factor.  are they looking at something else?18:28
microtoshits cool, we want to become a pci compliant service provider anyway18:28
microtoshno, unrelated to the infrastructure. something to do with their cart18:28
nowenhmm18:29
nowenok18:29
*** ciscorichy (423cb4f2@gateway/web/freenode/ip.66.60.180.242) has joined #wikid20:59
ciscorichyHi20:59
nowenhi ciscorichy20:59
nowenwhat's up?21:00
ciscorichyI am looking for a two factor authentication for a client and came across Wikid.  What is the renewal cost per year for this and how is it implemented?  Is it server based, virtual appliance based or what?21:01
nowenserver or vm-based.  lots of people deploy it virtually21:01
nowentypically they put it in their dmz21:01
nowenpricing is per-user http://www.wikidsystems.com/learn-more/financial21:02
nowenhow did you find us?21:02
ciscorichyGreat.  I have about 100 users for a client and they are using Citrix. Will it work for that?21:02
nowenit should as long as the Citrix product you're using supports radius21:02
ciscorichyOk  I see the price for 100 seats as $24 per year.  Is that correct?21:04
nowencorrect. it includes everything but 24x7 support.  that would be 18% extra21:04
ciscorichyOk Great.  Do you have both hard and soft tokens?21:05
nowenno, just software tokens21:05
ciscorichyAre they distributes as SMS or if not how does a user get the token?21:05
nowenthere is a software package for each platform, delivery mech varies.  iphone == app store, blackberry could be dl/ or push etc21:07
nowenwe also have PC tokens21:07
nowenweb start, full installers, .jar, .exe etc, etc21:07
nowenhtml5 token too ;)21:07
nowenonce the token is installed, it is registered with the server and then associated in a secure way with the user21:08
ciscorichyIs Windows 2003 or 2008 Server required?21:08
nowenwe have a number of ways to automate and simplify the process21:08
nowenno,  the best way to install is to create a linux vm image and install our appliance ISO. no os needed21:09
ciscorichywill the appliance work as a virtual appliance on VMware ESX?21:09
nowenyou need to use the ISO.  our vmware image was created with the VMWare Server product, so it's better just to boot the iso21:10
ciscorichyDoea it include the radius component?21:10
nowenyes21:11
nowenthe Enterprise version includes Radius21:11
ciscorichyOk so vor VMware, I just create a linux VM and then boot it with the iso and that is all that is needed to install the product.  Is that correct?21:12
nowenyes.  RHEL5,  we use Centos5.  Then, http://www.wikidsystems.com/support/wikid-support-center/manual/how-to-install-the-wikid-strong-authentication-server/referencemanual-all-pages21:13
ciscorichyWhat is the price for 100 users for the enterprise version?21:13
nowen$2400 per user per year21:13
nowenalso, we have a 3 year pre-payment option for a 30% discount21:13
ciscorichy$24 or $2400?21:14
nowen24! ha21:14
noweni wish21:14
nowenwishful typo'ing21:14
ciscorichyAwesome.  I need to relay this to our client. This is exactly what we are looking for.21:14
nowenexcellent. well, install is easy. just come back here and we'll walk through it21:15
ciscorichyThank you for your time today.  you are awesome.21:15
nowennp.21:15
nowenfeel free to download the server21:16
nowenhow did you find us?21:16
nowenour hits are off the hook today. I'm wondering what's going on21:16
ciscorichyGoogle search21:16
nowenthey must like us today21:16
*** ciscorichy has quit (Quit: Page closed)21:46
*** nowen has parted #wikid (None)22:57

Generated by irclog2html.py 2.11.0 by Marius Gedminas - find it at mg.pov.lt!