Help in moving FR1.x to 3.x EAP-TLS setup.

Gregory Sloop gregs at sloop.net
Wed May 29 17:48:35 CEST 2019


So, I've got a current FR setup, version 2.2.8 [although the last time I've done this was under a 1.x FR version - these configs are under an upgraded distro version - so the newer FR setups are somewhat confusing for me. This is all under Ubuntu - this setup started life as a 12.04 (IIRC) setup, and got upgraded to 16.04. I'm now trying to migrate it to a fresh setup on 18.04.]

I'm trying to move it to a new FR setup under 3.0.16.

It's a Wifi WPA setup - using EAP-TLS with certificates/key only. [Not PEAP etc.]

And I'm having trouble. Rather than have you look at a debug - perhaps I should start here.
I'm not sure I'm doing the right steps for setup/configuration.

Moving clients.conf is obvious.
[Though I've added the newer "ipaddr" to them.]

I have created new certs/keys/ca - and I'm pretty sure I've done that correctly. [Lets assume I have for now - we'll come back to that later, if needed. I can always test with the old certs/keys too, because I know those work. I'm using GNUTLS to handle CA/Cert/Key creation, and I know I need to add the OID's for "server" and "client" as applicable. And I've verified these are present in the relevant certs.]

Now, to where I'm quite unsure...
I need to edit the EAP configuration in ./mods-available, and create a link to it in ./mods-enabled - right?

---
Here's what is in my current eap [in FR 2.2.8] - though the eap.conf file isn't in the mods-available directory, it's in the main FR config dir. I suppose I could probably leave it that way, but I'm trying to do this the "new" way.

---
eap {
        default_eap_type = tls
        timer_expire     = 60
        ignore_unknown_eap_types = no
        cisco_accounting_username_bug = no
        max_sessions = 4096

        #md5 {
        #}
        #
        #leap {
        #}
        #
        #gtc {
        #        auth_type = PAP
        #}

        tls {
                certdir = ${confdir}/certs
                cadir = ${confdir}/certs
                #private_key_password = whatever
                private_key_file = ${certdir}/radius.somedom.local.key
                certificate_file = ${certdir}/radius.somedom.local.pem
                CA_file = ${cadir}/ca.pem
                dh_file = ${certdir}/dh
                random_file = /dev/urandom
                CA_path = ${cadir}
                check_crl = yes
                cipher_list = "DEFAULT"
                make_cert_command = "${certdir}/bootstrap"

                cache {
                      enable = no
                      lifetime = 24 # hours
                      max_entries = 255
                }
                verify {
                }
        }

        #ttls {
        #        default_eap_type = md5
        #        copy_request_to_tunnel = no
        #        use_tunneled_reply = no
        #        virtual_server = "inner-tunnel"
        #}

        #peap {
        #        default_eap_type = mschapv2
        #        copy_request_to_tunnel = no
        #        use_tunneled_reply = no
        #        virtual_server = "inner-tunnel"
        #}

        #mschapv2 {
        #}
}

---
Though to start, I think I'll avoid checking a CRL - just to keep things simple.
Do, I just essentially paste this config straight into the new one? 
[I don't think so - there's a new section "tls-config tls-common" and I'm unsure about that.]

I don't believe there are any changes I made previously [or need to make now] to radiusd.conf?
Is there anything else I need to do? 

Thanks in advance!

-Greg



More information about the Freeradius-Users mailing list