ok :) I provide certificate files and eap.conf in a tar ball to not to post a mail too long. If I print [EMAIL PROTECTED] in text form I see how radius is the issuer of the certificate. This is the default PKI and I don't know what I'm doing wrong.
Thanks for your attention.

I get the exact same error at the CLI:

[EMAIL PROTECTED] tmp]$ openssl verify -CAfile ca.pem  < server.pem
stdin: OK

[EMAIL PROTECTED] tmp]$ openssl verify -CAfile ca.pem < [EMAIL PROTECTED] stdin: /C=FR/ST=Radius/O=Example Inc./[EMAIL PROTECTED]/[EMAIL PROTECTED]
error 20 at 0 depth lookup:unable to get local issuer certificate

Your certificates are invalid:

 * server.pem is signed by ca.pem, which is correct:

Issuer: C=FR, ST=Radius, L=Somewhere, O=Example Inc./[EMAIL PROTECTED], CN=Example Certificate Authority

Subject: C=FR, ST=Radius, O=Example Inc., CN=Example Server Certificate/[EMAIL PROTECTED]

 * user.pem is signed by *server.pem* which is WRONG

Issuer: C=FR, ST=Radius, O=Example Inc., CN=Example Server Certificate/[EMAIL PROTECTED]

Subject: C=FR, ST=Radius, O=Example Inc., [EMAIL PROTECTED]/[EMAIL PROTECTED]


You have signed the user cert with the server cert, which is incorrect. You must sign the user cert with the CA cert.


-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to