Fw: EAP-TLS problem

Bryan Kadzban bryan
Tue Jun 12 15:39:15 PDT 2007


-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160

shantanu choudhary wrote:
> i am using cerificates generated from the server itself and they are
> self signed.

Then they will have to be trusted by wpa_supplicant.

> with windows using same set of certificates i am able to get
> connected to AP.

I suspect that's because Windows is set up so it doesn't require a valid
cert from the server.  But it doesn't really matter.

> ca_cert="/etc/wpa_supplicant/root.pem"

If your RADIUS server is using a self-signed cert, then that self-signed
cert needs to be named in this option, not root.pem.  The ca_cert option
controls which certs the supplicant will accept from the RADIUS server:
the RADIUS server has to use a cert that's signed by the cert in the
ca_cert file.  (This is for client-side security, so the client doesn't
associate with a network served by an untrusted RADIUS server.)

I am assuming that root.pem is the CA that signed the client cert you're
using (shan.pem), right?  I don't think the client cert's signer needs
to be listed in the ca_cert option; I think the only thing controlled by
that option is which server certs are valid.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFGbyCRS5vET1Wea5wRAzZhAJ0VArNuxuShoxXxq2mVAIgtWq6eBACeIL30
MWsHSss+r8zoR1Zb0wtqxOA=
=00o1
-----END PGP SIGNATURE-----




More information about the Hostap mailing list