FreeRADIUS EAP-TLS and SSL certificate chains

Phil Mayers p.mayers at imperial.ac.uk
Fri Feb 20 13:28:02 CET 2009


> We have exactly the same setup - verisign root->intermediate->our cert. 
> What happens with an XP client on our WPA EAP-PEAP network is exactly 
> the same as documented here:

Also - for info, when I take a "tcpdump" of eapol_test against 
FreeRadius, the TLS records over EAP go as follows:

C : client hello
FR: server hello, certs x2 [my server cert, intermediate ca], hello done
C : client key exch, change cipher, encrypted handshake
FR: change cipher, encrypted handshake

...that is, FreeRadius *is* sending back the intermediate certificate to 
the client - but as I say, a post-SP2 change to XP appears to not 
automatically "trust" it.

Our config is as follows:

eap {
   tls {
     private_key_file = ${confdir}/certs/wireless4.key
     certificate_file = ${confdir}/certs/wireless4-verisign-crt.pem

     # note: this is *our* local CA, trusted for EAP-TLS client certs
     CA_file = ${confdir}/certs/ICca.pem
   }
   # and peap later on
}

...the file "wireless4-verisign-crt.pem" contains:

-----BEGIN CERTIFICATE-----
...our cert
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
...intermediate cert
-----END CERTIFICATE-----



More information about the Freeradius-Users mailing list