Trusted CA, Signed Certs and Verification
Sam Fakhreddine
Sam.Fakhreddine at ledcor.com
Fri Apr 4 19:13:56 CEST 2014
>how to fix? you need to ensure that the RADIUS server hands out not only ITS cert,
>but also the intermediates... so just concatenate the intermediates and the RADIUS cert into one single file a
>send that out (configure that in the eap.conf file) instead. the client will receive the
> intermediates..which it can link against the known/trusted CA...and the RADIUS cert which is can link to the intermediates.
Thank you for your reply Alan,
I have concatenated all the files together in every possible configuration I can think of.
Currently what I have is:
private_key_file = ${certdir}/lcajra1.key
certificate_file = ${certdir}/server.int.root.pem
Inside of that Certificate file is: the server certificate, the intermediate certificate and the Trusted root, all that I got from Digicert.
When I run radius -X everything works normally and the config file loads those files, and yet I still get "server identity cannot be verified" even though the entire chain is available there.
I can verify with openssl verify that my certificate and my chain are OK
[root at lcajra1 certs]# openssl verify -CAfile server.int.root.pem -verbose lcajra1_ledcor_net.crt
lcajra1_ledcor_net.crt: OK
[root at lcajra1 certs]# openssl verify -CAfile server.int.root.pem -verbose server.int.root.pem
server.int.root.pem: OK
More information about the Freeradius-Users
mailing list