Very true, thank you for pointing that out as well.
Note to anyone following:
If you use a certificate signed by a general authority (verisign for example) then anyone with a verisign cert will be trusted in your place, and able to "authenticate" your users, IE as a man in the middle. They'll have access to the un-encrypted password payload (NT, cleartext), which is a severe security compromise. That's why you (should) always use an internal Certificate Authority, where you control which certs are signed and distributed.

On 9/20/2011 00:31, Alan DeKok wrote:
Christ Schlacta wrote:
I thought if you had a certificate signed by a trusted root CA, you were
good and didn't need to install anything on the client.
   It's true that you don't need to install anything on the client.  It's
*not* true that it's a good idea.

   Alan DeKok.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to