Expired CRL with integrated EAP server rejects client authentication
david.graziano at rockwellcollins.com
Mon Jul 17 06:19:24 PDT 2017
On Mon, Jul 17, 2017 at 3:35 AM, Jouni Malinen <j at w1.fi> wrote:
> On Wed, Jul 12, 2017 at 04:53:03PM -0500, David Graziano wrote:
>> I have a project that is using hostapd with its integrated eap_server
>> with EAP-TLS authentication. I’m running into an issue with the
>> check_crl feature. When the crl expires it rejects all eap-tls
>> authentication attempts with a “TLS: Certificate verification failed,
>> error 12 (CRL has expired) depth 0” error. I have a use
>> case/requirement that I need to continue allowing clients to
>> authenticate even if the CRL has expired as I won’t always have the
>> ability to download a new CRL with the current one expires.
> Are you in control of generating the CRL? If so and if it is not used
> for other purposes, I'd simply increase the lifetime of each CRL to be
> sufficiently long to avoid this.. Expired CRL is expected to reject
> authentication, so the behavior here in eap_server looks quite
Unfortunately, I don't have control of generating the CRLs as that is
what was initially proposed.
>> Strongswan, for example, has a “strictcrlpolicy” option that makes it
>> tolerant an expired CRL. With this option disabled if the expiration
>> date defined by the nextUpdate field of a CRL has been reached a
>> warning is issued, but a peer certificate will still be accepted if it
>> has not been revoked.
>> I’ve looked and an option such as this doesn’t seem to exist for
>> hostapd. Would the community be willing to consider a patch-set adding
>> such a feature? I’m thinking of adding a new “check_crl_strict” config
>> option that defaults to the current behavior but when set to 0 ignores
>> the openssl error codes related to CRL validation dates. Or possibly
>> add more options to the “check_crl” config option such that when set
>> to 3 or 4 it behaves the same as 1 and 2 respectively but ignores the
>> CRL validation dates.
> As long as this is clearly documented and disabled by default, it sounds
> fine to add such an option.
> Jouni Malinen PGP id EFC895FA
Thanks for the input. We'll submit the patchset when it's complete and tested
More information about the Hostap