OSCP stapling for RADIUS could open a big can of worms.  I know support is 
growing rapidly on web servers and web browsers, but I'm much less sure about 
RADIUS servers.  As for the client devices, I don't even know if OSCP would 
need to be supported by the OS, the supplicant, or both.  If anybody knows I'd 
be interested in learning more about how OSCP may relate to 802.1X.  If 
operating systems start to expect OSCP it could affect the way many of us use 
organizationally issued certs for auth.  It seems to me that one of the 
perceived virtues of that approach is not worrying about revocation.

I'm somewhat reassured by the fact that MS says this is a bug and not a 
feature, but things change - and quickly too.

Thanks,

Chuck

-----Original Message-----
From: The EDUCAUSE Wireless Issues Community Group Listserv 
<WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU> On Behalf Of Jonathan Waldrep
Sent: Wednesday, April 14, 2021 10:33 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Microsoft Windows 10 CRL Check on 802.1x 
Authentication

On 2021-04-13 21:20:32+0000, Pratik Mehta wrote:
> [...]
> The problem is that Windows attempts to perform a CRL check on the 
> RADIUS server certificate during the TLS handshake and before 802.1x 
> authentication is complete. This causes the EAP session to timeout and 
> wireless connectivity to take a long time to be established (more than
> 25 seconds). It does not make sense for the supplicant to perform a 
> CRL check before wireless connectivity is established.
> [...]

 I can't speak to the specifics of the situation, but in general, the solution 
is to use OCSP stapling instead of a CRL check.

 The gist of OCSP stapling is the server contacts the CA/OCSP server to get a 
token that asserts the cert has not been revoked, and sends that with the cert 
to the client. This allows the client to verify the server's cert hasn't been 
revoked without having to connect another network resource. I've probably got 
the details there wrong, but that is the _idea_ of what is happening.

 Implementing OCSP stapling on your authentication servers may bypass the bug.

 Full disclosure: we haven't gotten around to implementing this ourselves yet, 
so there may well be dragons ahead that I am completely unaware of.

--
Jonathan Waldrep
Network Engineer
Network Infrastructure and Services
Virginia Tech

**********
Replies to EDUCAUSE Community Group emails are sent to the entire community 
list. If you want to reply only to the person who sent the message, copy and 
paste their email address and forward the email reply. Additional participation 
and subscription information can be found at https://www.educause.edu/community

**********
Replies to EDUCAUSE Community Group emails are sent to the entire community 
list. If you want to reply only to the person who sent the message, copy and 
paste their email address and forward the email reply. Additional participation 
and subscription information can be found at https://www.educause.edu/community

Reply via email to