Trouble with OCSP
Orion Poplawski
orion at nwra.com
Wed Dec 4 16:53:06 UTC 2024
On 12/4/24 08:03, orion at nwra.com wrote:
> Hello,
>
> We setup OCSP validation on our FreeRADIUS servers a while back and it
> had been working great until yesterday when we started seeing errors like:
>
> Dec 03 14:03:09 radiusd[109894]: (437) eap_tls: ERROR: (TLS) Alert
> write:fatal:internal error
> Dec 03 14:03:09 radiusd[109894]: (437) eap_tls: ERROR: (TLS) Server :
> Error in error
> Dec 03 14:03:09 radiusd[109894]: (437) eap_tls: ERROR: (TLS) Failed
> reading from OpenSSL
> Dec 03 14:03:09 radiusd[109894]: (437) Login incorrect (eap_tls: ocsp:
> Couldn't get OCSP response): [HOSTNAME]
>
> We discovered some errors on our Windows OCSP responders due to
> configuration certificates expiring and resolved that.
>
>
> However, even after that Windows machines are unable to authenticate.
> Running in debug mode we see:
>
> 
> Certificate chain - 1 cert(s) untrusted
> (TLS) untrusted certificate with depth [0] subject name /
> CN=staff01.ad.nwra.com
> (14) eap_tls: Starting OCSP Request
> (14) eap_tls: WARNING: (TLS) ocsp: No OCSP URL in certificate, falling
> back to configured URL
> (14) eap_tls: ocsp: Using responder URL "http://ocsp.ad.nwra.com:80/ocsp/"
> (14) eap_tls: ERROR: ocsp: Couldn't verify OCSP basic response
> (14) eap_tls: ERROR: (TLS) ocsp: Certificate has been expired/revoked
> (14) eap_tls: (TLS) send TLS 1.2 Alert, fatal internal_error
> (14) eap_tls: ERROR: (TLS) Alert write:fatal:internal error
> (14) eap_tls: ERROR: (TLS) Server : Error in error
> (14) eap_tls: ERROR: (TLS) Failed reading from OpenSSL
> (14) eap_tls: ERROR: (TLS) error:13800070:OCSP routines::root ca not
> trusted
> (14) eap_tls: ERROR: (TLS) error:0A000086:SSL routines::certificate
> verify failed
> (14) eap_tls: ERROR: (TLS) System call (I/O) error (-1)
> (14) eap_tls: ERROR: (TLS) EAP Receive handshake failed during operation
> (14) eap_tls: ERROR: [eaptls process] = fail
> (14) eap: ERROR: Failed continuing EAP TLS (13) session. EAP sub-module
> failed
>
>
> We have 3 certificates in the FreeRADIUS ca_file configuration - an AD
> CA cert that is expiring in about 18 months, a new AD CA cert that was
> issued in October, and an IPA CA cert - and that's been the case since
> the new AD CA cert was issued. That should cover all of the
> certificates issued internally, so I don't see why radiusd is
> complaining about an untrusted cert.
>
> Running openssl ocsp checks against the Windows ocsp responders work fine.
I think it is just having trouble with ocsp checks of certs issued by
the older AD CA cert. Here is a successful check of an IPA issued cert:
Certificate chain - 1 cert(s) untrusted
(TLS) untrusted certificate with depth [1] subject name
/O=NWRA.COM/CN=Certificate Authority
(TLS) untrusted certificate with depth [0] subject name /O=NWRA.COM/CN=FQDN
(6) eap_tls: Starting OCSP Request
(6) eap_tls: ocsp: Using responder URL "http://ipa-ca.nwra.com:80/ca/ocsp"
This Update: Dec 4 15:50:19 2024 GMT
(6) eap_tls: ocsp: Cert status: good
(6) eap_tls: ocsp: Certificate is valid
It also has the message about untrusted certs (although it also mentions
the CA cert - so maybe the windows clients don't provide it?), so that
does not seem particularly relevant. I guess the key then is:
(14) eap_tls: ERROR: ocsp: Couldn't verify OCSP basic response
But why? openssl doesn't complain:
$ openssl ocsp -issuer /etc/pki/ca-trust/source/anchors/ad.nwra.com.crt
-cert orionad.crt -url http://ocsp.ad.nwra.com/ocsp
Response verify OK
orionad.crt: good
This Update: Dec 3 17:50:03 2024 GMT
Next Update: Dec 5 06:10:03 2024 GMT
--
Orion Poplawski
he/him/his - surely the least important thing about me
IT Systems Manager 720-772-5637
NWRA, Boulder/CoRA Office FAX: 303-415-9702
3380 Mitchell Lane orion at nwra.com
Boulder, CO 80301 https://www.nwra.com/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4087 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20241204/1f9850ee/attachment.bin>
More information about the Freeradius-Users
mailing list