Thank you for your reply.

We are (with the exception of some prototype tests) going to be
completely EAP-TLS.

Your answer brings me back to my original issue--the CA_path does not
exist in the eap.conf file. If I add it, it doesn't seem to work (on
1.1.4).

Just adding additional certs to the CA_file seems to work, but I'd
prefer to have proper signed (c_reshash) sym-links.

That's a useful CRL script, thanks for the link.


CA_path = ${raddbdir}/certs/trustedCAs/

with c_rehash generated fingerprint symlinks for a directory of trusted CA
certificates for EAP-TLS (with client authentication by client certificates).

Or

CA_file = ${raddbdir}/certs/trustedCAs.pem

a file with possibly multiple PEM formatted CA certificates for EAP-TLS
(with client authentication by client certificates).

My point was that the chain of the radius-server-certificate is actually to
be *added* to the file with the radius-server-certificate itself.

And that if you want to do plain EAP- *T* TLS and only EAP-TTLS to be
carefull to leave CA_file and CA_path nulled/empty.

I remember that the inline documentation of the eap.conf file suggests to
put the CA certificate issuing the radius-servers server-certificate into
the CA_file which could open up unwanted EAP-TLS client authentication by
client certificates if this CA issued client certificates.

If you configure radiusd to do EAP-TLS also make sure to use the check_crl =
yes option and have up-to-date CRLs available in the CA_path. Make sure
c_rehash is building the fingerprint symlinks here as well.

To automatically freshen/download CRLs by e.g. cron there is a neat script
with some build-in CRL checking etc available at
http://dist.eugridpma.info/distribution/util/fetch-crl/

HTH

--
Kind Regards

- List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
  • Re: CA Chain Jeffrey Sewell

Reply via email to