Dear all,
at the moment we are facing a small issue since our OCSP responders are behind
a traffic manager.
As explained in the eap.conf file, the freeradius' HTTP requests sent to the
responder does not contain the "Host:" information and therefore the traffic
manager can't handle it properly
31
To: FreeRadius users mailing list
Subject: Re: OCSP parsing in client certificate
Beltramini Francesco wrote:
> Ok I see what you mean.
> However, in my first mail I've also specified that:
>
> openssl x509 -in beltraminif.cer -noout -ocspid -ocsp_uri returns
> http://crl.
list
Subject: Re: OCSP parsing in client certificate
Beltramini Francesco wrote:
> Alan: does the change log refer to certificates without the proper extensions
> defined ? Because my situation is slightly different, the clients present a
> certificate that does contain the OCSP propertie
amini=ema.europa...@lists.freeradius.org]
On Behalf Of Matthew Newton
Sent: 16 April 2013 21:56
To: FreeRadius users mailing list
Subject: Re: OCSP parsing in client certificate
On Tue, Apr 16, 2013 at 04:30:18PM -0400, Alan DeKok wrote:
> Beltramini Francesco wrote:
> > but when I try to remov
Dear all,
I have a small/big issue and I cannot find a good solution for that.
Scenario:
iPhones with certificates from internal PKI, joining a Wi-Fi network protected
by WPA2-Enterprise authenticating against a Freeradius server v. 2.1.12 (Redhat
6.3). The radius server has as well an interna
5 matches
Mail list logo