And here comes the culmination of my saga with PKI ;)
Actually, I was slowly going towards it and really hoped I will jump through
this final hoop smoothly.
Alas… Anyways, to cut the long story short, I failed TLS authentication for
Windows 10 endpoint.
Here’s what I did so far. We want to issue certificates to users based on MAC
addresses of their devices.
Hence I added a new certificate and used MAC address in CN field in the format
70:1a:04:2c:52:ff
The profile I used while issuing this certificate was created exactly as it was
described in the admin guide for PKI, namely TLSClient. Then I downloaded this
certificate after it was signed and imported to Windows laptop.
The security properties of the wireless connection profile on the laptop was
configured to use TLS, i.e.
Microsoft: Smart card or other certificate
Trying to authenticate while running radius in debug mode and see a lot of
interesting stuff.
Pasting only relevant lines:
(5) eap_tls: Continuing EAP-TLS
(5) eap_tls: Got final TLS record fragment (46 bytes)
(5) eap_tls: [eaptls verify] = ok
(5) eap_tls: Done initial handshake
(5) eap_tls: <<< recv TLS 1.0 Handshake [length 03ac], Certificate
(5) eap_tls: Creating attributes from certificate OIDs
(5) eap_tls: TLS-Client-Cert-Serial := "03"
(5) eap_tls: TLS-Client-Cert-Expiration := "200110080019Z"
(5) eap_tls: TLS-Client-Cert-Subject :=
"/CN=70:1a:04:2c:52:ff/[email protected]/ST=BC/O=Options
Community Services/C=CA"
(5) eap_tls: TLS-Client-Cert-Issuer :=
"/CN=Options-PF-CA/[email protected]/ST=British
Columbia/O=Options Community Services/C=CA"
(5) eap_tls: TLS-Client-Cert-Common-Name := "70:1a:04:2c:52:ff"
(5) eap_tls: ERROR: SSL says error 20 : unable to get local issuer certificate
(5) eap_tls: ERROR: TLS Alert write:fatal:unknown CA
tls: TLS_accept: Error in error
(5) eap_tls: ERROR: Failed in __FUNCTION__ (SSL_read): error:14089086:SSL
routines:ssl3_get_client_certificate:certificate verify failed
(5) eap_tls: ERROR: System call (I/O) error (-1)
(5) eap_tls: ERROR: TLS receive handshake failed during operation
(5) eap_tls: ERROR: [eaptls process] = fail
(5) eap: ERROR: Failed continuing EAP TLS (13) session. EAP sub-module failed
(5) eap: Sending EAP Failure (code 4) ID 213 length 4
(5) eap: Failed in EAP select
(5) [eap] = invalid
(5) } # authenticate = invalid
(5) Failed to authenticate the user
(5) Login incorrect (eap_tls: SSL says error 20 : unable to get local issuer
certificate): [70:1a:04:2c:52:ff] (from client 172.19.254.2 port 0 cli
70:1a:04:2c:52:ff)
(5) Using Post-Auth-Type Reject
Same happens if I issue the certificate to the user based on its name, not MAC
address
(5) eap_tls: TLS-Client-Cert-Serial := "04"
(5) eap_tls: TLS-Client-Cert-Expiration := "200110083931Z"
(5) eap_tls: TLS-Client-Cert-Subject :=
"/CN=it.tech/[email protected]/ST=BC/O=Options Community
Services/C=CA"
(5) eap_tls: TLS-Client-Cert-Issuer :=
"/CN=Options-PF-CA/[email protected]/ST=British
Columbia/O=Options Community Services/C=CA"
(5) eap_tls: TLS-Client-Cert-Common-Name := "it.tech"
(5) eap_tls: ERROR: SSL says error 20 : unable to get local issuer certificate
Eugene
From: Durand fabrice [mailto:[email protected]]
Sent: Tuesday, January 09, 2018 2:46 PM
To: E.P.
Cc: [email protected]
Subject: Re: [PacketFence-users] PKI installation
The admin user is different between PacketFence and the PKI.
When i said "In configuration -> Users -> Edit admin -> Change User Password"
in was in the pki admin interface.
Fabrice
Le 2018-01-09 à 13:47, E.P. a écrit :
Sorry for being a pain in the lower part of the back, Fabrice ;)
I thought that the admin user in PF is different from PKI.
At least I know that I did change the password for admin in PF as you described
and this is how I login to the main GUI.
But I can’t login as admin with the same password to PKI.
Eugene
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users