Hi Ludovic, Thanks for your feedback. Indeed, that is what I was referring to. I tested both on Windows 10 and Android 10. This is what I did: 1. Generate a root CA using Integration > PKI > Certificate Authorities 2. Copy the root CA to System Configuration > SSL Certificates > Radius > Certificate Authority 3. Create a template 4. Create a user cert based on this template 5. Export the cert to p12 (thus including the root ca) 6. Import the p12 to Windows/Android
Best regards, Thijs Op ma 1 feb. 2021 om 17:34 schreef Ludovic Zammit <lzam...@inverse.ca>: > Hello, > > eap_tls: TLS Alert read:fatal:unknown CA > > That error means that the client want to trust the Radius certificate that > is installed on PAcketFence and does not trust his root CA. > > To avoid that error, you can first configure a good certificate on the > PacketFence Radius service and trust his root CA / install the root CA on > the testing device or you can ignore the certificate check. > > What’s the OS of your testing device ? > > Thanks, > > > Ludovic zammitlzam...@inverse.ca :: +1.514.447.4918 (x145) :: www.inverse.ca > Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence > (http://packetfence.org) > > > > > > On Jan 30, 2021, at 8:40 AM, Thijs Vandecasteele via PacketFence-users < > packetfence-users@lists.sourceforge.net> wrote: > > Hi, > > For a while now, I'm trying to get EAP-TLS working on Packetfence using > the built-in PKI. > I'm following the installation guide ( > https://www.packetfence.org/doc/PacketFence_Installation_Guide.html#pf-pki), > but I think I'm still missing something, or doing something wrong: > > The guide mentions: > *Once done copy the certificate in the clipboard from the Certificate > Authorities list (Configuration → Integration → PKI → Certificate > Authorities and click on Copy Certificate) then edit the RADIUS certificate > section in Configuration → Systen Configuration → SSL Certificates → RADIUS > → Edit and paste the public key in "Certificate Authority" and Save. (Don’t > forget to restart radiusd-auth)* > > However, this makes the RADIUS certificate chain invalid: > *Failed verifying chain: error stdin: verification failed . Ensure the > intermediates certificate file you provided contains all the intermediate > certificate authorities in x509 (Apache) format.* > > Indeed, I can only connect using a generated certificate when choosing not > to validate the CA on the end-device. When I ask to verify the CA, this is > the error I get in radius.log: > > > > > > *Jan 14 21:36:26 AS01NAC01 auth[24562]: (1208) eap_tls: ERROR: TLS Alert > read:fatal:unknown CAJan 14 21:36:26 AS01NAC01 auth[24562]: (1208) eap_tls: > ERROR: TLS_accept: Failed in unknown stateJan 14 21:36:26 AS01NAC01 > auth[24562]: (1208) eap_tls: ERROR: Failed in __FUNCTION__ (SSL_read)Jan 14 > 21:36:26 AS01NAC01 auth[24562]: [mac:xx:xx:xx:xx:xx:xx:xx] Rejected user: > <username>Jan 14 21:36:26 AS01NAC01 auth[24562]: (1208) Login incorrect > (eap_tls: TLS Alert read:fatal:unknown CA): [<username>] (from client > X.X.X.X/X port 0 cli xx:xx:xx:xx:xx:xx)* > > I tried this on PF 10.0.1 and 10.2.0, same behavior. > > Any ideas? > > Thanks! > Thijs > > > > > _______________________________________________ > PacketFence-users mailing list > PacketFence-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/packetfence-users > > >
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users