EAP-TLS: Strategies for getting the right certificate to the right user
chevalier.violet at gmail.com
Wed Sep 13 17:12:00 CEST 2017
PS Alan (Buxley), it seems that apple no longer supports the Apple
Configurator for Windows. ($#!π)
On Tue, Sep 12, 2017 at 1:00 AM, Chevalier Violet <
chevalier.violet at gmail.com> wrote:
> Update: I got my iPhone working. I think the problem was that I needed to
> import the client.p12 cert (helpfully mentioned not very often of course).
> Anyway, it's working!
> As for how to make THAT relatively automatic... wow, I may need the
> website Alan proposed.
> On Tue, Sep 12, 2017 at 12:29 AM, Chevalier Violet <
> chevalier.violet at gmail.com> wrote:
>> Hi all,
>> Thanks for all the thoughts. It's much appreciated to know that maybe
>> it's not just n00bness that is causing me to struggle with this!
>> I ended up making a pw protected page on my website (sigh)--but the
>> limits of that solution without internet access are pretty obvious I'd say!
>> And never mind that using TTLS-PAP with passwords saved as SSHA-512
>> doesn't work on the iphone... !!! That's kinda insane if you ask me. But
>> obviously apple didn't!
>> Getting certs on the iPhone has been a real hassle--it'd be easier with
>> mac or windows machines around because I could use iTunes, but anyway, it
>> has been done through the website option!
>> Now, I can't get EAP-TLS to work on my iPhone because I can't choose
>> "mode" EAP-TLS. Instead, it continually asks me for the username & pass,
>> which is precisely what I'm trying to avoid! I think there may be someway
>> to signal that my wifi prefers TLS mode that I don't know about.
>> If you have help on that point, that'd be great, and sigh&thanks!
>> PS Indeed my routher is not exactly hotspot 2.0 or captive portal
>> On Mon, Sep 11, 2017 at 10:22 AM, Chevalier Violet <
>> chevalier.violet at gmail.com> wrote:
>>> I've been googling around and kind of surprised to not be seeing a ton
>>> of resources about this. Maybe you all can help!
>>> EAP-TLS: Strategies for getting the right certificate to the right user.
>>> It needs to be relatively automated. I do have users coming by with BYOD
>>> devices, e.g. iPhones (omg they're super finicky about the freeradius setup
>>> but that's another story!), frequently when I'm not around to set them up.
>>> Users are starting with no internet access.
>>> I was thinking maybe of the following:
>>> 1) Use some kind of TTLS-MSCHAPv2 thing with a standard user & password
>>> for guests that would change every so often. Maybe let them use the
>>> internet either i) for a few minutes at a time or ii) only to access a page
>>> on the internal network from which they could download the guest
>>> certificate that would allow them to connect via EAP-TLS? 3) the certs
>>> would expire after a few days.
>>> I have been struggling to get even my own iPhone to have the proper
>>> cert! On the bright side, my two linux machines are now working with
>>> EAP-TLS so there's hope for me! I wish I could just put the certs on a USB
>>> key but that doesn't work for phones. And it's a bunch of Linux machines,
>>> no Windows or Macs around. Excuse me if this is a n00b question.
>>> Thanks everyone!
>>> PS At this link:
>>> Arr2036 mentions that the hot spot 2.0 standards set out how this could
>>> work, with auto-renewing certs and the whole 9 yards. I wasn't able to find
>>> how to make that work for linux, for instance with freeradius. Thanks!
>> "Do not speak, unless it improves on silence." -- Buddha
> "Do not speak, unless it improves on silence." -- Buddha
"Do not speak, unless it improves on silence." -- Buddha
More information about the Freeradius-Users