RE: [WIRELESS-LAN] PEAP cert signed by 3rd party CA

2012-12-12 Thread Hurt,Trenton W.
Thank You   With this command I was able to get exactly what I needed.

-Original Message-
From: The EDUCAUSE Wireless Issues Constituent Group Listserv 
[mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of James JJ Hooper
Sent: Tuesday, December 11, 2012 6:13 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] PEAP cert signed by 3rd party CA

On 11 December 2012 22:19, Hurt,Trenton W.  wrote:
> No I’m actually using Idengines.  I have exported including the key, 
> and now have a .pfx file.  I need a .pem and private key file from the 
> pfx file.  I have tried a few different openssl commands on the pfx 
> file, but have yet to get the right combo for the server.
>

IIRC+AFAIK IdEngines uses freeradius underneath. If that's true you can do:

openssl pkcs12 -in yourcert.pfx -out cert-with-key.pem –nodes

to get your key and certificate in PEM format in one file. Then split 
cert-with-key.pem in to two files [e.g. duplicate the file and delete the bit 
you don't want from each with a text editor] - one file then has just your 
private key in it, one then has just your server-cert in it.

Then add the root ca cert and any chaining certs to your server cert *in order* 
(server-cert first [top of file], then any chaining [in order], then root 
[bottom of file])

e.g.

cat my-server.pem chain1.pem chain2.pem root.pem > combined.pem

The combined.pem and your-key.pem should be the two files you need.

Kind regards,
  James

--
James J J Hooper
Senior Network Specialist, University of Bristol 
http://www.wireless.bristol.ac.uk
--

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.



Re: [WIRELESS-LAN] PEAP cert signed by 3rd party CA

2012-12-11 Thread James JJ Hooper
On 11 December 2012 22:19, Hurt,Trenton W.  wrote:
> No I’m actually using Idengines.  I have exported including the key, and now
> have a .pfx file.  I need a .pem and private key file from the pfx file.  I
> have tried a few different openssl commands on the pfx file, but have yet to
> get the right combo for the server.
>

IIRC+AFAIK IdEngines uses freeradius underneath. If that's true you can do:

openssl pkcs12 -in yourcert.pfx -out cert-with-key.pem –nodes

to get your key and certificate in PEM format in one file. Then split
cert-with-key.pem in to two files [e.g. duplicate the file and delete
the bit you don't want from each with a text editor] - one file then
has just your private key in it, one then has just your server-cert in
it.

Then add the root ca cert and any chaining certs to your server cert
*in order* (server-cert first [top of file], then any chaining [in
order], then root [bottom of file])

e.g.

cat my-server.pem chain1.pem chain2.pem root.pem > combined.pem

The combined.pem and your-key.pem should be the two files you need.

Kind regards,
  James

--
James J J Hooper
Senior Network Specialist, University of Bristol
http://www.wireless.bristol.ac.uk
--

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


Re: [WIRELESS-LAN] PEAP cert signed by 3rd party CA

2012-12-11 Thread James JJ Hooper
On 11 December 2012 21:59, Hurt,Trenton W.  wrote:
> What 3rd party CA’s are people using for their PEAP server side certificate?
> I have previously used verisign because they have a specialized wlan radius
> cert that included the correct EKU’s for server authentication,
> 1.3.6.1.5.5.7.3.1.  I cannot get the cert from verisign to work and I’m now
> looking at possibly changing CA’s.  My server requires the CSR be generated
> from the actual server itself, and it requires a .pem file and a private key
> file along with the private key passphrase when importing.


Hi Trent,
  I just had a look at what US eduroam providing institutions are
using. Results below. N.B. This was just a quick test, so the numbers
are only approximate (also, this is obviously indicative of
purchase-time choice, and so choices might be different if considered
now).

InCommon 34%
Comodo 12%
DigiCert 7.3%
Thawte 7.3%
VeriSign 4.9%
GlobalSign 4.9%
GeoTrust 4.9%
CaCert.org 2.4%
-
Self-Signed: ~22%

Kind regards,
  James

--
James J J Hooper
Senior Network Specialist, University of Bristol
http://www.wireless.bristol.ac.uk
--

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


Re: [WIRELESS-LAN] PEAP cert signed by 3rd party CA

2012-12-11 Thread John Center

InCommon Federation
https://www.incommon.org/


On 12/11/2012 04:59 PM, Hurt,Trenton W. wrote:

What 3^rd party CA’s are people using for their PEAP server side
certificate?  I have previously used verisign because they have a
specialized wlan radius cert that included the correct EKU’s for server
authentication, /1.3.6.1.5.5.7.3.1*. *I cannot get the cert from
verisign to work and I’m now looking at possibly changing CA’s.  My
server requires the CSR be generated from the actual server itself, and
it requires a .pem file and a private key file along with the private
key passphrase when importing. /

//

/  Any suggestions, tips, tricks on this process is immensely appreciated. /

//

/Thanks
Trent/

** Participation and subscription information for this EDUCAUSE
Constituent Group discussion list can be found at
http://www.educause.edu/groups/.



**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] PEAP cert signed by 3rd party CA

2012-12-11 Thread Charles Rumford
I've used InCommon before with success.

Have you tried just a normal VeriSign cert and not the specialized one?


Sent from my Android phone using TouchDown (www.nitrodesk.com)

-Original Message-
From: Hurt,Trenton W. [trent.h...@louisville.edu]
Received: Tuesday, 11 Dec 2012, 16:58
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU [WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU]
Subject: [WIRELESS-LAN] PEAP cert signed by 3rd party CA

What 3rd party CA’s are people using for their PEAP server side certificate?  I 
have previously used verisign because they have a specialized wlan radius cert 
that included the correct EKU’s for server authentication, 1.3.6.1.5.5.7.3.1.  
I cannot get the cert from verisign to work and I’m now looking at possibly 
changing CA’s.  My server requires the CSR be generated from the actual server 
itself, and it requires a .pem file and a private key file along with the 
private key passphrase when importing.

  Any suggestions, tips, tricks on this process is immensely appreciated.

Thanks
Trent


** Participation and subscription information for this EDUCAUSE 
Constituent Group discussion list can be found at 
http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.