Sergio wrote:
For the other side, i don't know anything about WiMAX, but i suposse that credentials are the same. Hope this helps
______________________________________________________________________

I do. WiMAX certs (the ones uses in EAP-TLS and EAP-TTLS sessions over the airlink to identify the device and AAA server) are required to use sha256withRSAEncryption and should use 2048 bit RSA but may use 1024 bit RSA if the notAfter date doesn't go past 2010. The root and subordinate certs for the server and device hierarchies from the WiMAX PKI do use sha256withRSAEncryption and 2048 bit RSA as do all the certs signed by the WiMAX CA. The WiMAX CA uses vanilla OpenSSL.

I can confirm that people have got these WiMAX compliant certs authenticating with FreeRADIUS in a WiMAX network.

Things to look out for.. Run it on a 64 bit OS. E.G. it has worked on 64 bit fedora. The dates of the root and sub certs hit the 2038 problem, so 64 bit is required for chain validation to work. Use the most current FreeRADIUS and OpenSSL packages that has support for the signature algorithms. Make sure you have the proper chain certs installed. If you are a WiMAX member, the certs are there on the WiMAX Forum web site with various documents including handy overview document that describes what chain certs to put where.

Don't confuse these certs with the 802.16 authorization certs for fixed operation. These have a different profile that is in the 802.16 spec, don't go over EAP and use a different CA that I have nothing to do with.

David Johnston




______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to