Hello EP,

It’s under Configuration > Integration > PKI

Thanks,

Ludovic Zammit
Product Support Engineer Principal

Cell: +1.613.670.8432
Akamai Technologies - Inverse
145 Broadway
Cambridge, MA 02142
Connect with Us:         <https://community.akamai.com/>  
<http://blogs.akamai.com/>  <https://twitter.com/akamai>  
<http://www.facebook.com/AkamaiTechnologies>  
<http://www.linkedin.com/company/akamai-technologies>  
<http://www.youtube.com/user/akamaitechnologies?feature=results_main>

> On Nov 3, 2021, at 3:12 AM, E.P. <ype...@gmail.com> wrote:
> 
> Ludovic,
> You caught off guard with the question about PKI.
> After I upgraded to PF ver 11.0 iI was using PF native PKI.
> Hence its sample certificate, i.e. C=FR, ST=Radius, O=Example Inc., 
> CN=Example Server Certificate, emailAddress=ad...@example.org 
> <mailto:emailAddress=ad...@example.org>
> Of course we can’t use it. Hence I tried to upload the wild card certificate 
> with the private key that was installed on many servers and network devices 
> in our company without any issues. For some reason as I demonstrated it 
> earlier Windows OS supplicant can’t use or rather doesn’t trust RADIUS server 
> presenting this certificate for PEAP session .
> I downloaded this wildcard certificate using PF web interface by going to 
> into Edit under RADIUS section.
> I don’t mind generating and using the certificate from within PF. As long as 
> it  uses the acceptable subject name and an issuer under our control we can 
> live it with it. But I don’t see PF PKI anymore in the new version. I 
> remember playing with PF CA earlier and was successful with configuring 
> EAP-TLS
>  
> Eugene
>  
> From: Zammit, Ludovic <luza...@akamai.com> 
> Sent: Tuesday, November 02, 2021 1:49 PM
> To: ype...@gmail.com
> Cc: packetfence-users@lists.sourceforge.net
> Subject: Re: [PacketFence-users] Rejected users logging via Windows
>  
> Hello,
>  
> You an use the Web admin to install the RADIUS SSL cert.
>  
> Make sure to restart radiusd on all servers to apply the cert.
>  
> You can use the PF PKI and the PF PKI provisioner to install it on Windows 
> for a Wireless interface. You could also download the cert from the PF web 
> interface and install it manually on the device.
>  
> What’s the PKI that you are using ?
>  
> Thanks,
>  
> Ludovic Zammit
> Product Support Engineer Principal
> 
> Cell: +1.613.670.8432
> Akamai Technologies - Inverse
> 145 Broadway
> Cambridge, MA 02142
> Connect with Us:
>  <https://community.akamai.com/> <http://blogs.akamai.com/> 
> <https://urldefense.com/v3/__https://twitter.com/akamai__;!!GjvTz_vk!Bxspdps_NfYU4Ec04UZfer20gvG6N0ZG3sq3Norn7drY3bWQx4jKDcN5r1d-yg$>
>  
> <https://urldefense.com/v3/__http://www.facebook.com/AkamaiTechnologies__;!!GjvTz_vk!Bxspdps_NfYU4Ec04UZfer20gvG6N0ZG3sq3Norn7drY3bWQx4jKDcNKJ82nTA$>
>  
> <https://urldefense.com/v3/__http://www.linkedin.com/company/akamai-technologies__;!!GjvTz_vk!Bxspdps_NfYU4Ec04UZfer20gvG6N0ZG3sq3Norn7drY3bWQx4jKDcPmzXiK2Q$>
>  
> <https://urldefense.com/v3/__http://www.youtube.com/user/akamaitechnologies?feature=results_main__;!!GjvTz_vk!Bxspdps_NfYU4Ec04UZfer20gvG6N0ZG3sq3Norn7drY3bWQx4jKDcM1tFbzZg$>
>  
> 
> 
>> On Nov 2, 2021, at 2:18 PM, E.P. <ype...@gmail.com 
>> <mailto:ype...@gmail.com>> wrote:
>>  
>> Yes, Ludovic,
>> Apparently the certificate has some issues. RADIUS debug revealed this:
>>  
>> (18) Tue Nov  2 11:06:07 2021: ERROR: eap_peap: (TLS) Failed reading 
>> application data from OpenSSL: error:14094419:SSL 
>> routines:ssl3_read_bytes:tlsv1 alert access denied
>> (18) Tue Nov  2 11:06:07 2021: ERROR: eap_peap: [eaptls process] = fail
>> (18) Tue Nov  2 11:06:07 2021: ERROR: eap: Failed continuing EAP PEAP (25) 
>> session.  EAP sub-module failed
>> (18) Tue Nov  2 11:06:07 2021: Debug: eap: Sending EAP Failure (code 4) ID 
>> 215 length 4
>> (18) Tue Nov  2 11:06:07 2021: Debug: eap: Failed in EAP select
>> (18) Tue Nov  2 11:06:07 2021: Debug:     [eap] = invalid
>> (18) Tue Nov  2 11:06:07 2021: Debug:   } # authenticate = invalid
>>  
>> So, all that I did was copying three files into /usr/local/pf/raddb/certs 
>> folder
>> Server.crt (the certificate issued by Godaddy CA)
>> Server.key (private key)
>> ca.pem (root CA)
>>  
>> I just wanted to replace this example certificate that PF uses for EAP/TLS 
>> session
>>  
>> <image001.png>
>>  
>> Is there any instruction how to generate a different certificate on PF that 
>> will be accepted by Windows OS supplicant ?
>>  
>> Eugene
>> From: Zammit, Ludovic <luza...@akamai.com <mailto:luza...@akamai.com>> 
>> Sent: Tuesday, November 02, 2021 5:51 AM
>> To: packetfence-users@lists.sourceforge.net 
>> <mailto:packetfence-users@lists.sourceforge.net>
>> Cc: E.P. <ype...@gmail.com <mailto:ype...@gmail.com>>
>> Subject: Re: [PacketFence-users] Rejected users logging via Windows
>>  
>> Hello EP,
>>  
>> It looks like the certificate passed to PF was not correct.
>>  
>> Use the command:
>>  
>> raddebug -f /usr/local/pf/var/run/radiusd.sock
>>  
>> Thanks,
>>  
>> Ludovic Zammit
>> Product Support Engineer Principal
>> 
>> Cell: +1.613.670.8432
>> Akamai Technologies - Inverse
>> 145 Broadway
>> Cambridge, MA 02142
>> Connect with Us:
>>  <https://community.akamai.com/> <http://blogs.akamai.com/> 
>> <https://urldefense.com/v3/__https:/twitter.com/akamai__;!!GjvTz_vk!AaUextL_VDqbW5caHWMmIh3876Ltlye32g0DQrmp4OvULBz38Eq0qNd3a-yo5g$>
>>  
>> <https://urldefense.com/v3/__http:/www.facebook.com/AkamaiTechnologies__;!!GjvTz_vk!AaUextL_VDqbW5caHWMmIh3876Ltlye32g0DQrmp4OvULBz38Eq0qNcYAR2ZcA$>
>>  
>> <https://urldefense.com/v3/__http:/www.linkedin.com/company/akamai-technologies__;!!GjvTz_vk!AaUextL_VDqbW5caHWMmIh3876Ltlye32g0DQrmp4OvULBz38Eq0qNdX7v2epA$>
>>  
>> <https://urldefense.com/v3/__http:/www.youtube.com/user/akamaitechnologies?feature=results_main__;!!GjvTz_vk!AaUextL_VDqbW5caHWMmIh3876Ltlye32g0DQrmp4OvULBz38Eq0qNfuFopyQg$>
>>     
>> 
>> 
>> 
>>> On Nov 2, 2021, at 3:07 AM, E.P. via PacketFence-users 
>>> <packetfence-users@lists.sourceforge.net 
>>> <mailto:packetfence-users@lists.sourceforge.net>> wrote:
>>>  
>>> Hello,
>>> A while ago someone asked here this question and there was no reply.
>>> I hit it again and I have clue, out of the blue, all authentications 
>>> attempts from Windows OS fail:
>>>  
>>> Nov 1 23:52:53 packetfence auth[2736]: Adding client 172.19.254.2/32
>>> Nov 1 23:52:53 packetfence auth[2736]: (24) eap_peap: ERROR: (TLS) Alert 
>>> read:fatal:access denied
>>> Nov 1 23:52:53 packetfence auth[2736]: [mac:c4:9d:ed:8c:11:03] Rejected 
>>> user: it.tech 
>>> <https://urldefense.com/v3/__http:/it.tech/__;!!GjvTz_vk!AaUextL_VDqbW5caHWMmIh3876Ltlye32g0DQrmp4OvULBz38Eq0qNfsXrekrw$>
>>> Nov 1 23:52:53 packetfence auth[2736]: (24) Login incorrect (eap_peap: 
>>> (TLS) Alert read:fatal:access denied): [it.tech 
>>> <https://urldefense.com/v3/__http:/it.tech/__;!!GjvTz_vk!AaUextL_VDqbW5caHWMmIh3876Ltlye32g0DQrmp4OvULBz38Eq0qNfsXrekrw$>]
>>>  (from client 172.19.254.2/32 port 0 cli c4:9d:ed:8c:11:03)
>>>  
>>> No problem with mobile phones.
>>> Trying to run RADIUS in the debug mode using the old radiusd -X command but 
>>> on ver 11 it can’t be found anymore.
>>> Any ideas ?
>>>  
>>> Eugene
>>> _______________________________________________
>>> PacketFence-users mailing list
>>> PacketFence-users@lists.sourceforge.net 
>>> <mailto:PacketFence-users@lists.sourceforge.net>
>>> https://urldefense.com/v3/__https://lists.sourceforge.net/lists/listinfo/packetfence-users__;!!GjvTz_vk!HSzjvTbxfJXK0mkPrgLUPV-NYCaZZ_BeC5q6gvsmiOPixf6OENCNuSHeVErDcS-r$
>>>  
>>> <https://urldefense.com/v3/__https:/lists.sourceforge.net/lists/listinfo/packetfence-users__;!!GjvTz_vk!HSzjvTbxfJXK0mkPrgLUPV-NYCaZZ_BeC5q6gvsmiOPixf6OENCNuSHeVErDcS-r$>

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to