Originally, I had tried using an internal CA to issue the cert, which worked 
fine for the packetfence ssl site.  However, after running into the radius 
issue,  i reissued the cert using instructions from various sites online 
(self-issued), which comprised of:
 
cd /tmp
openssl req -new > packetfence.csr
openssl rsa -in privkey.pem -out server.key
openssl x509 -in packetfence.csr -out server.crt -req -signkey server.key -days 
365
mv server.crt /usr/local/pf/conf/ssl/
mv server.key /usr/local/pf/conf/ssl/
 
The actual cert references the server netbios name as the actual web site.
 
I did not install freeradius2 or any other permutation.  Am I possibly 
modifying/verifying the wrong files?  I'm simply following the guidelines in 
the packetfence v3 guide.
 
This is on centos 6 64bit.
------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2d-oct
_______________________________________________
Packetfence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to