WPA Certificate Question

Mike Diggins mike.diggins at mcmaster.ca
Sun Jan 31 06:09:34 CET 2010


On Sun, 31 Jan 2010, Peter Lambrechtsen wrote:

> On 31/01/2010, at 11:59 AM, Mike Diggins <mike.diggins at mcmaster.ca> 
> wrote:
>
>>
>> I was able to get freeradius 2.1.3 and wireless WPA working, likely 
>> due to the fact that FreeRadius was mostly configured for me 
>> (thanks ;) ). I’m a little confused about the certificate that is re 
>> quired in the process, and what the relationship is with the client,
>>  the Wireless Controller and the FreeRadius server.  The README file
>>  states:
>>
>> “ In general, you should use self-signed certificates for 802.1x (EA 
>> P) authentication.”
>>
>> Why self signed versus CA signed? Ideally I would like my clients to 
>> not be questioned about the certificate at all. Is that even 
>> possible with WPA? If I purchase a CA signed cert, would that 
>> eliminate the requirement on the client to acknowledge the 
>> certificate or import it?
>
> It would also mean that anyone could go to the same CA, get a client 
> certificate and would be able to login to your wireless network. Not 
> really ideal IMHO ;)
>
> Hence why controlling your own CA, and managing the CRL or OCSP is the 
> only way to go if you want to properly maintain control over your 
> wireless or 802.1x wired network.
>
> Minting certificates is pretty trvial depending on the CA software you 
> are using and importing a CA into every workstation is also easy using 
> the numerous tools available.
>
> My preference is to use the "rootsupd" package and extract that out 
> and update the p7b with your own ca. Then get everyone to run that, or 
> use software distribution to get it out enterprise wide.
>

But I don't plan on distributing client certificates for authentication. I 
intend for them to login with a username and password checked against my 
Radius server, so I'm not sure what role the certificate plays in that 
process?

-Mike


More information about the Freeradius-Users mailing list