For eduroam we use EAP-TTLS. For onboarding we use SecureW2's JoinNow. We create radius certs through InCommon (Sectigo now?). The 20 year CA root cert AddTrust expires May 30. The USERTrust RSA CA will be used going forward.
Assuming no user interaction, MacOS, iOS and Windows should start to use the USERTrust CA to build the cert chain to validate the server cert. JoinNow has been installing both the AddTrust CA and USERTrust RSA CA on devices during onboard for the last couple of years, so if the OS vendor didn't install these certs then JoinNow did. For us, Androids are expected to see the greatest potential impact on May 31. This is because Android didn't (doesn't?) support two CA root certs. And until fairly recently they only supported SHA-1. So the AddTrust CA was used with dual intermediates. The good news is that Androids that receive regular carrier updates should now support SHA-2. That should be most if not all devices. Our latest JoinNow profile now installs the USERTrust RSA CA cert on Androids. This will allow them to build the cert chain to the radius cert. The problem is if users don't re-run JoinNow to get the new root CA they will fail validity checking when connecting to eduroam. This assumes the device was onboarded previously or otherwise *correctly* configured to use validate server cert. Our experience is that most users who DIY their Android eduroam config tend to not enable validate server cert. It will be interesting to see what percentage reruns JoinNow and who just "figures it out". Mike Michael Dickson Network Engineer Information Technology University of Massachusetts Amherst 413-545-9639 [email protected] PGP: 0x16777D39 On 5/27/20 8:42 AM, Tim Cappalli wrote: > > It will be a mixed bag across operating systems and even OS versions. > There will not be a consistent user experience if the CA is not > trusted by the OS. > > > > * Tim Cappalli *| @timcappalli <https://www.twitter.com/timcappalli> > Microsoft logo > > > > *From: *Turner, Ryan H <mailto:[email protected]> > *Sent: *Wednesday, May 27, 2020 08:40 > *To: *[email protected] > <mailto:[email protected]> > *Subject: *Re: [WIRELESS-LAN] securew2 root ca radius server cert change > > > > Good question. I do not know. I assume there are plenty of people on > this list with a lot more PEAP experience than me that can say. > > > > *From:* The EDUCAUSE Wireless Issues Community Group Listserv > <[email protected]> *On Behalf Of *Hurt,Trenton W. > *Sent:* Wednesday, May 27, 2020 8:20 AM > *To:* [email protected] > *Subject:* Re: [WIRELESS-LAN] securew2 root ca radius server cert change > > > > I was always told to use public signed for peap byod clients. Will > clients like windows/idevices prompt to trust a private signed cert? > Is it just the connect/accept like the behavior with public signed? > > > > Trent Hurt > > > > University of Louisville > > > > *From:*The EDUCAUSE Wireless Issues Community Group Listserv > <[email protected] > <mailto:[email protected]>> on behalf of Turner, Ryan > H <[email protected] <mailto:[email protected]>> > *Sent:* Wednesday, May 27, 2020 8:16:24 AM > *To:* [email protected] > <mailto:[email protected]> > <[email protected] > <mailto:[email protected]>> > *Subject:* Re: [WIRELESS-LAN] securew2 root ca radius server cert change > > > > *CAUTION:*This email originated from outside of our organization. Do > not click links, open attachments, or respond unless you recognize the > sender's email address and know the contents are safe. > > My guidance is for properly onboarded TLS devices. It doesn’t apply > to PEAL or anything else. Actually, that does bring a wrinkle into my > previous email. If PEAP and TLS both exist, I am going to guess there > will be more prompts or issues with a private CA (perhaps) > > Ryan Turner > > Head of Networking, ITS > > The University of North Carolina at Chapel Hill > > +1 919 274 7926 Mobile > > +1 919 445 0113 Office > > > > On May 26, 2020, at 8:21 PM, Hurt,Trenton W. > <[email protected] <mailto:[email protected]>> wrote: > > > > I’m also doing unmanned eap peap (yes I know all the security > reasons against this) if I don’t use public signed ca will byod > devices be able to connect via eap peap with that private cert? > > > > Trent Hurt > > > > University of Louisville > > > > *From:* The EDUCAUSE Wireless Issues Community Group Listserv > <[email protected] > <mailto:[email protected]>> on behalf of Turner, > Ryan H <[email protected] <mailto:[email protected]>> > *Sent:* Tuesday, May 26, 2020 8:10 PM > *To:* [email protected] > <mailto:[email protected]> > *Subject:* Re: [WIRELESS-LAN] securew2 root ca radius server cert > change > > > > *CAUTION:*This email originated from outside of our organization. > Do not click links, open attachments, or respond unless you > recognize the sender's email address and know the contents are safe. > > You are likely totally hosed. In fact, you should consider > abandoning public CAs entirely when you re-do this. Through-out > the years, I’ve counseled a lot of schools about TLS deployments, > and I cautioned strongly against using public CAs for this exact > reason. You have no control, and your CA can totally hose you, as > you can see. > > > > There is no way around this if the CA will not cooperate. You > should talk to your active directory folks. They should spin up a > new offline private CA root, then intermediary, then issue your > RADIUS servers from the intermediary. The expiration should be > many years. > > > > OR, you can utilize SecureW2 and their online CA to generate > RADIUS server certificates. In any event, get off the public CAs. > > > > Ryan > > > > *From:* The EDUCAUSE Wireless Issues Community Group Listserv > <[email protected] > <mailto:[email protected]>> *On Behalf Of > *Hurt,Trenton W. > *Sent:* Tuesday, May 26, 2020 5:36 PM > *To:* [email protected] > <mailto:[email protected]> > *Subject:* [WIRELESS-LAN] securew2 root ca radius server cert change > > > > I have both eap peap and eap tls setup and working. My radius > server cert is going to expire soon. I have received new one from > public ca. It works fine for eap peap clients. But for my > existing eap tls clients they all fail auth when I switch to this > new updated rad cert. I see that my public ca has issued this new > cert using different root ca then my old one ()the one that is > install/config on my securew2 app in the cloud. Securew2 has told > me that users will have to onboard again once I change the cert on > clearpass and update the cloud app since public ca changed root ca > on cert chain. I asked my public ca if they could reissue using > the other root ca so my eap tls clients will still work once I do > the change. They have told me that shouldn’t need reissue as the > old root ca (one tls clients currently use) because my new cert > root ca is cross signed by the old root ca. They told me that I > should be able to use this new one but I still cant seem to get > things working correctly. Anyone who is using securew2 had issues > like this with root ca changing and clients forced to reonboard? > Im not really pki person so if there is some way I could chain > these or something. Just looking for way to update the rad cert > on servers and not have to force all my onboard clients to have to > go thru that process once I make the change. > > > > > > ********** > Replies to EDUCAUSE Community Group emails are sent to the entire > community list. If you want to reply only to the person who sent > the message, copy and paste their email address and forward the > email reply. Additional participation and subscription information > can be found at https://www.educause.edu/community > > <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.educause.edu%2Fcommunity&data=02%7C01%7Ctim.cappalli%40MICROSOFT.COM%7C5e9216a19ec04783536f08d8023b2d49%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637261800489200801&sdata=tfUSROrNx7Pl0cTz%2FYI2v5mWyIrOwOsfWfPkpY3BQZQ%3D&reserved=0> > > > ********** > Replies to EDUCAUSE Community Group emails are sent to the entire > community list. If you want to reply only to the person who sent > the message, copy and paste their email address and forward the > email reply. Additional participation and subscription information > can be found at https://www.educause.edu/community > > <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.educause.edu%2Fcommunity&data=02%7C01%7Ctim.cappalli%40MICROSOFT.COM%7C5e9216a19ec04783536f08d8023b2d49%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637261800489200801&sdata=tfUSROrNx7Pl0cTz%2FYI2v5mWyIrOwOsfWfPkpY3BQZQ%3D&reserved=0> > > > ********** > Replies to EDUCAUSE Community Group emails are sent to the entire > community list. If you want to reply only to the person who sent > the message, copy and paste their email address and forward the > email reply. Additional participation and subscription information > can be found at https://www.educause.edu/community > > <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.educause.edu%2Fcommunity&data=02%7C01%7Ctim.cappalli%40MICROSOFT.COM%7C5e9216a19ec04783536f08d8023b2d49%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637261800489210752&sdata=oTqZIMNBNd3izM1J%2Bxbm5LC25uOkRKVTAbpMyTAi79g%3D&reserved=0> > > > ********** > Replies to EDUCAUSE Community Group emails are sent to the entire > community list. If you want to reply only to the person who sent the > message, copy and paste their email address and forward the email > reply. Additional participation and subscription information can be > found at https://www.educause.edu/community > <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.educause.edu%2Fcommunity&data=02%7C01%7Ctim.cappalli%40MICROSOFT.COM%7C5e9216a19ec04783536f08d8023b2d49%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637261800489210752&sdata=oTqZIMNBNd3izM1J%2Bxbm5LC25uOkRKVTAbpMyTAi79g%3D&reserved=0> > > > ********** > Replies to EDUCAUSE Community Group emails are sent to the entire > community list. If you want to reply only to the person who sent the > message, copy and paste their email address and forward the email > reply. Additional participation and subscription information can be > found at https://www.educause.edu/community > <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.educause.edu%2Fcommunity&data=02%7C01%7Ctim.cappalli%40MICROSOFT.COM%7C5e9216a19ec04783536f08d8023b2d49%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637261800489210752&sdata=oTqZIMNBNd3izM1J%2Bxbm5LC25uOkRKVTAbpMyTAi79g%3D&reserved=0> > > > ********** > Replies to EDUCAUSE Community Group emails are sent to the entire > community list. If you want to reply only to the person who sent the > message, copy and paste their email address and forward the email > reply. Additional participation and subscription information can be > found at https://www.educause.edu/community > <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.educause.edu%2Fcommunity&data=02%7C01%7Ctim.cappalli%40MICROSOFT.COM%7C5e9216a19ec04783536f08d8023b2d49%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637261800489220709&sdata=QwE8Scw2vEk1ajdW0gRsQVLHXkWKTDlVu9o0JDhYuOY%3D&reserved=0> > > > > > ********** > Replies to EDUCAUSE Community Group emails are sent to the entire > community list. If you want to reply only to the person who sent the > message, copy and paste their email address and forward the email > reply. Additional participation and subscription information can be > found at https://www.educause.edu/community > ********** Replies to EDUCAUSE Community Group emails are sent to the entire community list. If you want to reply only to the person who sent the message, copy and paste their email address and forward the email reply. Additional participation and subscription information can be found at https://www.educause.edu/community
