OCSP parsing in client certificate
Alan DeKok
aland at deployingradius.com
Tue Apr 16 22:30:18 CEST 2013
Beltramini Francesco wrote:
> I have a small/big issue and I cannot find a good solution for that.
> Scenario:
> iPhones with certificates from internal PKI, joining a Wi-Fi network protected by WPA2-Enterprise authenticating against a Freeradius server v. 2.1.12 (Redhat 6.3).
...
> but when I try to remove this feature and use the OCSP property extracted from the client certificate, the radiusd -X output is:
>
> [tls] --> Starting OCSP Request
> [ocsp] --> Responder URL = http://(null):(null)(null)
From the v2.2.0 change log:
* Skip OCSP if there's no host / port / url, with soft_fail
Upgrade.
Alan DeKok.
More information about the Freeradius-Users
mailing list