On 2021/01/16 13:35, Ian Timothy wrote:
> 
> 
> > On 14 Jan 2021, at 01:28, Stuart Henderson <s...@spacehopper.org> wrote:
> > 
> > On 2021-01-13, Ian Timothy <i...@thrivedata.it> wrote:
> >> Looking at some of the other information provided, I tried this along with 
> >> the registry edit below:
> >> 
> >> PS> Add-VpnConnection -Name "IPB2" -ServerAddress "vpn.company.com" 
> >> -TunnelType IKEv2 -AuthenticationMethod MachineCertificate 
> >> -AllUserConnection -Force
> > 
> > "-AuthenticationMethod MachineCertificate" - I thought you were using
> > MSCHAP not machine certs?
> 
> I’m just trying anything and everything at this point. I’ll do whatever works.

I can't help with machine cert config, but the config I outlined works
well for mschapv2 for me, it needs the CA and server certificate on the
server, and just the CA cert installing on the client, no machine cert
on the client.

(There should be a way of getting machine cert to work, but I haven't
gone down that rabbit hole).

> $ ikectl show ca vpn certificates
> subject= /C=US/ST=State/L=City/O=Company/OU=Information 
> Systems/CN=VPN/emailAddress=t...@company.com
> SHA256 
> Fingerprint=83:BE:37:FD:A9:B1:53:11:F6:7D:90:25:20:42:21:46:13:52:E1:C3:14:9B:F9:E1:74:C8:89:6A:3E:55:0F:FC
> notBefore=Jan 16 19:51:53 2021 GMT
> notAfter=May 13 19:51:53 2033 GMT
> 
> subject= /C=US/ST=State/L=City/O=Company/OU=Information 
> Systems/CN=vpn.company.com/emailAddress=t...@company.com
> SHA256 
> Fingerprint=9F:93:75:73:6A:F2:BE:59:4A:14:BD:C6:F3:1C:C0:DC:20:26:0D:B7:AE:1C:07:BC:FE:6A:04:C2:20:07:BC:6D
> notBefore=Jan 16 19:52:15 2021 GMT
> notAfter=Jan 16 19:52:15 2022 GMT

Make a calendar note to generate a new server certificate.
The CA certificate will still be valid so you don't need to touch
clients for that change, just the new server cert.

> subject= /C=US/ST=State/L=City/O=Company/OU=Information 
> Systems/CN=10.0.2.100/emailAddress=t...@company.com
> SHA256 
> Fingerprint=BF:E5:C4:64:55:4D:4E:E7:BC:7F:D9:6E:90:C2:06:BD:66:9A:40:04:EB:C3:BE:A3:2A:DA:91:1A:E7:3D:42:A4
> notBefore=Jan 16 19:52:41 2021 GMT
> notAfter=Jan 16 19:52:41 2022 GMT

If you are using client machine certs (rather than mschapv2), you will
need to be prepared to get that cert updated on the clients (or use some
other CA tool that allows setting a longer time).

> # Install certificates on Windows
> #
> 
> 1. scp 10.0.2.100.zip from vpn.company.com to Windows client
> 2. Unzip
> 3. Double click ca.pfx
>       1. Select “Local Machine”
>       2. Select “Place certificates in following store”
>               1. Select “Trusted Root Certificate Authorities”

fwiw I normally put them in Enterprise under there so they don't get
mixed up with internet CAs, either should work though.

Be aware that after this change is made, someone with access to the key
for the CA certificate is able to use it to spoof/intercept https requests
to sites on the internet in a way that they will usually be accepted by
the client machines. This is what needs doing here, but do look after
the key carefully, it protects more than just vpn access.

Reply via email to