Issue with OCSP check

Antoine JOUBERT antoine at joubert.ninja
Mon Aug 5 17:21:06 CEST 2019


Hi Alan,

So... updating Freeradius to 3.0.19 as suggested fixed the issue.

I have no clue why I didn't try that sooner.

Thanks a lot for your help!

Regards,

Antoine

On 05/08/2019 15:15, Alan DeKok wrote:
> On Aug 5, 2019, at 9:01 AM, Antoine JOUBERT via Freeradius-Users <freeradius-users at lists.freeradius.org> wrote:
>> I had setup and got OCSP working with Freeradius in early 2016. However, I've recently noticed that it's not working anymore, as users with a revoked certificate are still able to connect to the network due to softfail being enabled.
>    That's largely what softfail means.
>
>> I'm using the Debian Stretch package of Freeradius :
>>
>> freeradius -v
>> radiusd: FreeRADIUS Version 3.0.12, for host x86_64-pc-linux-gnu, built on Aug 10 2017 at 07:05:06
>> FreeRADIUS Version 3.0.12
>    Arg.  You may want to update to 3.0.19 using the packages on http://packages.networkradius.com
>
>> Our company is using its own PKI, managed with EasyRSA. Every user certificate is signed directly with our CA certificate.
>> ...
>> (7) eap_tls: Starting OCSP Request
>> *(7) eap_tls: ERROR: Couldn't get issuer_cert for user*
>    The EAP-TLS session doesn't contain the issuer certificate.  Why?  It's not clear.  TLS and user supplicants are magic.  :(
>
>    Update to 3.0.19.  It will then set "request:TLS-OCSP-Cert-Valid = 2" if the OSCP checks were skipped.  You can check for that in policies.
>
>    Alan DeKok.
>



More information about the Freeradius-Users mailing list