Permissions are now 600 for client.[pem|key] and [ca|server].pem (still
using ca and also server certificate on client), but the result is
similar.
Does it still say unknown ca or something else? If it's something else
you need to poost a new debug. If it's still the same you need to go to
t...@kalik.net wrote:
Permissions are now 600 for client.[pem|key] and [ca|server].pem (still
using ca and also server certificate on client), but the result is
similar.
Does it still say unknown ca or something else? If it's something else
you need to poost a new debug. If it's still the
t...@kalik.net wrote:
t...@kalik.net wrote:
Also tried modify wpa_supplicant conf:
- ca_cert=ca.pem
+ ca_cert=server.pem
But with the same result.
Because the path is wrong, ie. certificate is not there. Put the correct
path to where you have imported the certificate.
Ivan Kalik
-
t...@kalik.net wrote:
Also tried modify wpa_supplicant conf:
- ca_cert=ca.pem
+ ca_cert=server.pem
But with the same result.
Because the path is wrong, ie. certificate is not there. Put the correct
path to where you have imported the certificate.
Ivan Kalik
-
List
On Mon, 2009-11-23 at 20:37 +0100, Tomas Pelka wrote:
t...@kalik.net wrote:
Also tried modify wpa_supplicant conf:
- ca_cert=ca.pem
+ ca_cert=server.pem
But with the same result.
Because the path is wrong, ie. certificate is not there. Put the correct
path to where you have
Paul Ryszka wrote:
On Mon, 2009-11-23 at 20:37 +0100, Tomas Pelka wrote:
t...@kalik.net wrote:
Also tried modify wpa_supplicant conf:
- ca_cert=ca.pem
+ ca_cert=server.pem
But with the same result.
Because the path is wrong, ie. certificate is not there. Put the correct
path to where you
t...@kalik.net wrote:
Also tried modify wpa_supplicant conf:
- ca_cert=ca.pem
+ ca_cert=server.pem
But with the same result.
Because the path is wrong, ie. certificate is not there. Put the correct
path to where you have imported the certificate.
Ivan Kalik
-
List
Paul Ryszka wrote:
On Mon, 2009-11-23 at 20:37 +0100, Tomas Pelka wrote:
t...@kalik.net wrote:
Also tried modify wpa_supplicant conf:
- ca_cert=ca.pem
+ ca_cert=server.pem
But with the same result.
Because the path is wrong, ie. certificate is not there. Put the
correct
path to where
Hi,
Problem is on the server site, isn't it? CA and server certs are now in
same dir as whole RADIUS configuration, is necessary put certs into
trusted directory like /etc/ssl/certs?
you can stick them whereever the server user can read them - but you must
specify the path of the file
t...@kalik.net wrote:
So the problem is in certificate:
[tls] TLS 1.0 Handshake [length 038d], Certificate
-- verify error:num=20:unable to get local issuer certificate
[tls] TLS 1.0 Alert [length 0002], fatal unknown_ca
That means that you haven't imported self-signed ca certificate
Also tried modify wpa_supplicant conf:
- ca_cert=ca.pem
+ ca_cert=server.pem
But with the same result.
Because the path is wrong, ie. certificate is not there. Put the correct
path to where you have imported the certificate.
Ivan Kalik
-
List info/subscribe/unsubscribe? See
t...@kalik.net wrote:
Alan DeKok wrote:
Tomas Pelka wrote:
have a problem with advanced EAP authentication methods including
PEAP, EAP-TLS, EAP-TTLS-MD5/MSCHAPV2.
I wouldn't call them advanced...
Certs was created with the makefile included in freeradius sources.
All my experiments
Tomas Pelka wrote:
t...@kalik.net wrote:
Alan DeKok wrote:
Tomas Pelka wrote:
have a problem with advanced EAP authentication methods including
PEAP, EAP-TLS, EAP-TTLS-MD5/MSCHAPV2.
I wouldn't call them advanced...
Certs was created with the makefile included in freeradius sources.
All
So the problem is in certificate:
[tls] TLS 1.0 Handshake [length 038d], Certificate
-- verify error:num=20:unable to get local issuer certificate
[tls] TLS 1.0 Alert [length 0002], fatal unknown_ca
That means that you haven't imported self-signed ca certificate onto the
client.
#
Tomas Pelka wrote:
have a problem with advanced EAP authentication methods including
PEAP, EAP-TLS, EAP-TTLS-MD5/MSCHAPV2.
I wouldn't call them advanced...
Certs was created with the makefile included in freeradius sources.
All my experiments ending with: decapsulated EAP packet (code=4
Alan DeKok wrote:
Tomas Pelka wrote:
have a problem with advanced EAP authentication methods including
PEAP, EAP-TLS, EAP-TTLS-MD5/MSCHAPV2.
I wouldn't call them advanced...
Certs was created with the makefile included in freeradius sources.
All my experiments ending with:
Alan DeKok wrote:
Tomas Pelka wrote:
have a problem with advanced EAP authentication methods including
PEAP, EAP-TLS, EAP-TTLS-MD5/MSCHAPV2.
I wouldn't call them advanced...
Certs was created with the makefile included in freeradius sources.
All my experiments ending with: decapsulated
17 matches
Mail list logo