OCSP parsing in client certificate
    Alan DeKok 
    aland at deployingradius.com
       
    Tue Apr 16 22:30:18 CEST 2013
    
    
  
Beltramini Francesco wrote:
> I have a small/big issue and I cannot find a good solution for that.
> Scenario: 
> iPhones with certificates from internal PKI, joining a Wi-Fi network protected by WPA2-Enterprise authenticating against a Freeradius server v. 2.1.12 (Redhat 6.3). 
...
> but when I try to remove this feature and use the OCSP property extracted from the client certificate, the radiusd -X output is:
> 
> [tls] --> Starting OCSP Request
> [ocsp] --> Responder URL = http://(null):(null)(null)
  From the v2.2.0 change log:
	* Skip OCSP if there's no host / port / url, with soft_fail
  Upgrade.
  Alan DeKok.
    
    
More information about the Freeradius-Users
mailing list