OCSP parsing in client certificate

Alan DeKok aland at deployingradius.com
Tue Apr 16 22:30:18 CEST 2013


Beltramini Francesco wrote:
> I have a small/big issue and I cannot find a good solution for that.
> Scenario: 
> iPhones with certificates from internal PKI, joining a Wi-Fi network protected by WPA2-Enterprise authenticating against a Freeradius server v. 2.1.12 (Redhat 6.3). 
...
> but when I try to remove this feature and use the OCSP property extracted from the client certificate, the radiusd -X output is:
> 
> [tls] --> Starting OCSP Request
> [ocsp] --> Responder URL = http://(null):(null)(null)

  From the v2.2.0 change log:

	* Skip OCSP if there's no host / port / url, with soft_fail

  Upgrade.

  Alan DeKok.


More information about the Freeradius-Users mailing list