Freeradius and Android, TLS Internal Error
Alan DeKok
aland at deployingradius.com
Fri Feb 23 11:22:03 UTC 2024
On Feb 23, 2024, at 6:01 AM, Lorenzo Mirabella <lorenzo.mirabella at outlook.it> wrote:
>
> I have configured FreeRADIUS with EAP-TTLS/GTC and I am using valid certificates issued by Let's Encrypt. The certificate is valid for radius.foo.it and I have cert.pem, chain.pem, fullchain.pem, and privkey.pem. I have configured the tls section of the FreeRADIUS eap module as follows:
That should work. The caveat is that TLS algorithms change over time. So newer certs might not be accepted by older devices.
> When I try to connect to the access point with an older Android device, I have no issues, as it uses the system certificates. Using Linux and specifying the CA Authority as the Let's Encrypt root, I encounter no problems either. However, when using an iPad, I am prompted to accept the certificate (which is the correct one), but it claims it is untrusted despite the Let's Encrypt root being among the trusted CA. With newer versions of Android, you can choose between 3 options: do not verify, request certificate status, and require certificate status. The first two options work (by entering radius.foo.it as the domain), but for security reasons, I would like the third option to work as well. However, I get this error:
> ...
> (13) eap_ttls: (TLS) recv TLS 1.2 Alert, fatal internal_error
> (13) eap_ttls: (TLS) The client is informing us that there is a failure inside the TLS protocol exchange.
The client says "no". Why? "no". What went wrong? "Too bad, not telling you".
How friendly.
> There is definitely something wrong with the configuration, but honestly, I can't figure out what. Any advice?
There's nothing wrong with the configuration. One client doesn't like what the server is doing. But all other clients are fine. So the problem isn't really FreeRADIUS.
> I'm using the official freeradius docker container version 3.2.3.
>
> Thank you in advance.
>
> P.S. I am 100% sure that the certificate is valid, which can be verified using openssl verify or by creating a virtual host with HTTPS using Apache.
"TLS works" involves a whole lot more than a binary choice of "yes" or "no". There's TLS 1.0, 1.1, 1.2, and 1.3. Within each TLS version, there are dozens of choices for encryption methods, and more choices for digest methods. If by some miracle both sides agree, then it works.
If both sides don't agree on the various versions, methods, etc., then things don't work. And you get helpful error messages like "failed".
In most cases, up-to-date devices will "just work". So if a device doesn't work, then either it's running old software, or it's not configured correctly.
Perhaps try configuring FreeRADIUS to limit the TLS versions it's using. The server will do TLS 1.3, but older clients won't do TLS 1.3 correctly. Maybe set the maximum TLS version to 1.2, or even 1.1. Then see if it works.
There are too many variants of devices for us to keep up. Apple && Google's budget for coffee and snacks is multiple times the yearly budget of all FreeRADIUS developers put together.
We just can't keep up. We can only give vague advice about what usually works, and then hope for the best.
Alan DeKok.
More information about the Freeradius-Users
mailing list