Hi everyone,

I got stuck with OCSP configuration between PacketFence and Microsoft PKI, it 
seems to be something known which was discussed before (but with no solution 
provided) and I will highly appreciate any community assistance:
https://www.mail-archive.com/search?l=packetfence-users%40lists.sourceforge.net&q=OSCP+not+functioning+to+MS+PKI&submit.x=0&submit.y=0
I have the same messages in radius logging on the PacketFence side.

So, when I enabled OCSP verification on PacketFence, authentication for each 
EAP TLS attempt was rejected with the following reason: Reason eap_tls: ocsp: 
Couldn't verify OCSP basic response

I believe the problem is related to the issuer certificate chain which  
PacketFence uses for OCSP requests. Here’s what I found during my 
troubleshooting with the OpenSSL utility:
When I use SubCA public certificate for OCSP request - I get an answer for 
certificate verification:
root@packetfence1:~# openssl ocsp -issuer chain.pem -cert L-0060.pem -text -url 
http://wss12-mssca01.domain.lu/OCSP
OCSP Request Data:
    Version: 1 (0x0)
    Requestor List:
        Certificate ID:
          Hash Algorithm: sha1
          Issuer Name Hash: 0B3DA617D000A7D825136DE0A70B7B7BCBEB4290
          Issuer Key Hash: 11C156C66A70F293C00FB31606BEC14D08F7DE17
          Serial Number: 1B000000F0156DB6DE7BA445290000000000F0
    Request Extensions:
        OCSP Nonce:
            041005E25E6AC97612EC5C4BB7F773270494
Responder Error: unauthorized (6)

When I use full chain for OCSP request - I got unauthorised response.
root@packetfence1:~# openssl ocsp -issuer SubCA.pem -cert L-0060.pem -text -url 
http://wss12-mssca01.domain.lu/OCSP
OCSP Request Data:
    Version: 1 (0x0)
    Requestor List:
        Certificate ID:
          Hash Algorithm: sha1
          Issuer Name Hash: 0B3DA617D000A7D825136DE0A70B7B7BCBEB4290
          Issuer Key Hash: AC797F76A888497C02E83E5B58529830D314C033
          Serial Number: 1B000000F0156DB6DE7BA445290000000000F0
    Request Extensions:
        OCSP Nonce:
            0410BAF1E6A39CA4AF9ECFCE9EF17BB5FEDC
OCSP Response Data:
    OCSP Response Status: successful (0x0)
-----------output was ommited-----------
-----END CERTIFICATE-----
Response verify OK
LISER-L-0060.pem: good
        This Update: Feb 16 13:56:02 2024 GMT
        Next Update: Jun 17 12:40:20 2024 GMT


Microsoft PKI infrastructure is pretty common: RootCA is turned off, SubCA is 
responsible for certificate issuing, OCSP role is running on SubCA server. For 
EAP TLS authentications full certificate chain was imported to PacketFence.

Any ideas how to force PacketFence to use SubCA certificate only for OCSP 
requests?

--

Andrey Chernyakov
Senior Network and Security Engineer

email: chernya...@npsconsult.com
phone: (+352) 621260657

NPS Consult S.A.
L-5687, Dalheim
Luxembourg
_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to