Hello,

for all of you who are not happy (as I wasn't) that Freeradius doesn't verify 
Certificate Revocation Lists.

1. Apply this patch (based on Freeradius 0.8 diff -c)


*** src/modules/rlm_eap/types/rlm_eap_tls/tls.c.orig    Wed Jun 11 14:56:09 2003
--- src/modules/rlm_eap/types/rlm_eap_tls/tls.c Thu Jun 12 16:08:19 2003
***************
*** 75,80 ****
--- 75,82 ----
        int verify_mode = 0;
        int ctx_options = 0;
        int type;
+       /* CRL validation Jun 11 2003 ivandolezal */
+       X509_STORE *store = NULL; 
  
        /*
         * Add all the default ciphers and message digests
***************
*** 102,107 ****
--- 104,113 ----
                radlog(L_ERR, "rlm_eap_tls: Error reading Trusted root CA 
list");
                return NULL;
        }
+       /* CRL validation Jun 11 2003 ivandolezal */
+         store = SSL_CTX_get_cert_store(ctx);
+         X509_STORE_set_flags(store, 
X509_V_FLAG_CRL_CHECK|X509_V_FLAG_CRL_CHECK_ALL);
+ 
        SSL_CTX_set_client_CA_list(ctx, SSL_load_client_CA_file(conf->ca_file));
  
        /* 


recompile, reinstall, restart


2. Glue periodically your current crl.pem to the end of CA Certificate. Put the 
result to root.pem in freeradius, otherwise you could get "unable to get 
certificate CRL".


3. Send me an e-mail postcard or something. No spam, please. :-)



Ivan Dolezal
Computer Center
VSB - Technical University of Ostrava
Czech Republic



- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to