Connecting using wpa_supplicant to a WPA EAP-TLS network

Jouni Malinen j
Mon Oct 13 08:35:33 PDT 2008


On Mon, Oct 13, 2008 at 03:41:04PM +0800, Soh Kam Yung wrote:

> 	eap=TLS
> 	identity="user at example.com"
> 	ca_cert="/etc/cert/ca.pem"
> 	client_cert="/etc/cert/user.pem"
> 	private_key="/etc/cert/user.prv"
> 	private_key_passwd="password"

> Are all the parameters (identity, ca_cert, client_cert, private_key,
> private_key_passwd) required?

No. At minimum, you will need to configure a user private key and
certificate (in one of the optional ways) and CA certificate.

> My MIS says that no identity is required.  Does this mean I can leave
> it out or should I configure it as identity=""?

Some supplicants generate the identity string from the certificate, but
if the network is indeed configured to not require any specific
identity, yes, you could set it to "". Though, I would set it to
something like "anonymous" etc. to make it distinct from some
auto-probing software that uses an empty identity string to figure out
what authentication mechanism should be used.

> I exported my client certificate from my Windows Machine (using
> Internet Explorer) at a PKCS#12 file and I am trying to use openssl to
> generate the various certificates.

> How do I use openssl to generate the private_key? Is it:
> openssl pkcs12 -in example.pfx -out user.prv

You don't need to convert the PKCS#12 file; just use it as-is with
wpa_supplicant: private_key="example.pfx" (and private_key_passwd to
set the passphrase if needed). This will make wpa_supplicant read both
the private key and user certificate (i.e., separate client_cert is not
needed).

-- 
Jouni Malinen                                            PGP id EFC895FA



More information about the Hostap mailing list