For eduroam we use EAP-TTLS. For onboarding we use SecureW2's JoinNow.
We create radius certs through InCommon (Sectigo now?). The 20 year CA
root cert AddTrust expires May 30. The USERTrust RSA CA will be used
going forward. 

Assuming no user interaction, MacOS, iOS and Windows should start to use
the USERTrust CA to build the cert chain to validate the server cert.
JoinNow has been installing both the AddTrust CA and USERTrust RSA CA on
devices during onboard for the last couple of years, so if the OS vendor
didn't install these certs then JoinNow did.

For us, Androids are expected to see the greatest potential impact on
May 31. This is because Android didn't (doesn't?) support two CA root
certs. And until fairly recently they only supported SHA-1. So the
AddTrust CA was used with dual intermediates. The good news is that
Androids that receive regular carrier updates should now support SHA-2.
That should be most if not all devices. Our latest JoinNow profile now
installs the USERTrust RSA CA cert on Androids. This will allow them to
build the cert chain to the radius cert. The problem is if users don't
re-run JoinNow to get the new root CA they will fail validity checking
when connecting to eduroam. This assumes the device was onboarded
previously or otherwise *correctly* configured to use validate server
cert. Our experience is that most users who DIY their Android eduroam
config tend to not enable validate server cert. It will be interesting
to see what percentage reruns JoinNow and who just "figures it out".

Mike

Michael Dickson
Network Engineer
Information Technology
University of Massachusetts Amherst
413-545-9639
[email protected]
PGP: 0x16777D39

On 5/27/20 8:42 AM, Tim Cappalli wrote:
>
> It will be a mixed bag across operating systems and even OS versions.
> There will not be a consistent user experience if the CA is not
> trusted by the OS.
>
>  
>
> * Tim Cappalli *| @timcappalli <https://www.twitter.com/timcappalli>
> Microsoft logo
>
>  
>
> *From: *Turner, Ryan H <mailto:[email protected]>
> *Sent: *Wednesday, May 27, 2020 08:40
> *To: *[email protected]
> <mailto:[email protected]>
> *Subject: *Re: [WIRELESS-LAN] securew2 root ca radius server cert change
>
>  
>
> Good question.  I do not know.  I assume there are plenty of people on
> this list with a lot more PEAP experience than me that can say.
>
>  
>
> *From:* The EDUCAUSE Wireless Issues Community Group Listserv
> <[email protected]> *On Behalf Of *Hurt,Trenton W.
> *Sent:* Wednesday, May 27, 2020 8:20 AM
> *To:* [email protected]
> *Subject:* Re: [WIRELESS-LAN] securew2 root ca radius server cert change
>
>  
>
> I was always told to use public signed for peap byod clients.   Will
> clients like windows/idevices prompt to trust a private signed cert?
> Is it just the connect/accept like the behavior with public signed?
>
>  
>
> Trent Hurt
>
>  
>
> University of Louisville
>
>  
>
> *From:*The EDUCAUSE Wireless Issues Community Group Listserv
> <[email protected]
> <mailto:[email protected]>> on behalf of Turner, Ryan
> H <[email protected] <mailto:[email protected]>>
> *Sent:* Wednesday, May 27, 2020 8:16:24 AM
> *To:* [email protected]
> <mailto:[email protected]>
> <[email protected]
> <mailto:[email protected]>>
> *Subject:* Re: [WIRELESS-LAN] securew2 root ca radius server cert change
>
>  
>
> *CAUTION:*This email originated from outside of our organization. Do
> not click links, open attachments, or respond unless you recognize the
> sender's email address and know the contents are safe.
>
> My guidance is for properly onboarded TLS devices.   It doesn’t apply
> to PEAL or anything else.  Actually, that does bring a wrinkle into my
> previous email.  If PEAP and TLS both exist, I am going to guess there
> will be more prompts or issues with a private CA (perhaps) 
>
> Ryan Turner
>
> Head of Networking, ITS
>
> The University of North Carolina at Chapel Hill
>
> +1 919 274 7926 Mobile
>
> +1 919 445 0113 Office
>
>  
>
>     On May 26, 2020, at 8:21 PM, Hurt,Trenton W.
>     <[email protected] <mailto:[email protected]>> wrote:
>
>     
>
>     I’m also doing unmanned eap peap (yes I know all the security
>     reasons against this)  if I don’t use public signed ca will byod
>     devices be able to connect via eap peap with that private cert? 
>
>      
>
>     Trent Hurt
>
>      
>
>     University of Louisville
>
>      
>
>     *From:* The EDUCAUSE Wireless Issues Community Group Listserv
>     <[email protected]
>     <mailto:[email protected]>> on behalf of Turner,
>     Ryan H <[email protected] <mailto:[email protected]>>
>     *Sent:* Tuesday, May 26, 2020 8:10 PM
>     *To:* [email protected]
>     <mailto:[email protected]>
>     *Subject:* Re: [WIRELESS-LAN] securew2 root ca radius server cert
>     change
>
>      
>
>     *CAUTION:*This email originated from outside of our organization.
>     Do not click links, open attachments, or respond unless you
>     recognize the sender's email address and know the contents are safe.
>
>     You are likely totally hosed.  In fact, you should consider
>     abandoning public CAs entirely when you re-do this.   Through-out
>     the years, I’ve counseled a lot of schools about TLS deployments,
>     and I cautioned strongly against using public CAs for this exact
>     reason.  You have no control, and your CA can totally hose you, as
>     you can see.
>
>      
>
>     There is no way around this if the CA will not cooperate.   You
>     should talk to your active directory folks.  They should spin up a
>     new offline private CA root, then intermediary, then issue your
>     RADIUS servers from the intermediary.  The expiration should be
>     many years.
>
>      
>
>     OR, you can utilize SecureW2 and their online CA to generate
>     RADIUS server certificates.  In any event, get off the public CAs.
>
>      
>
>     Ryan
>
>      
>
>     *From:* The EDUCAUSE Wireless Issues Community Group Listserv
>     <[email protected]
>     <mailto:[email protected]>> *On Behalf Of
>     *Hurt,Trenton W.
>     *Sent:* Tuesday, May 26, 2020 5:36 PM
>     *To:* [email protected]
>     <mailto:[email protected]>
>     *Subject:* [WIRELESS-LAN] securew2 root ca radius server cert change
>
>      
>
>     I have both eap peap and eap tls setup and working.  My radius
>     server cert is going to expire soon.  I have received new one from
>     public ca.  It works fine for eap peap clients.  But for my
>     existing eap tls clients they all fail auth when I switch to this
>     new updated rad cert.  I see that my public ca has issued this new
>     cert using different root ca then my old one ()the one that is
>     install/config on my securew2 app in the cloud.  Securew2 has told
>     me that users will have to onboard again once I change the cert on
>     clearpass and update the cloud app since public ca changed root ca
>     on cert chain.  I asked my public ca if they could reissue using
>     the other root ca so my eap tls clients will still work once I do
>     the change.  They have told me that shouldn’t need reissue as the
>     old root ca (one tls clients currently use) because my new cert
>     root ca is cross signed by the old root ca.  They told me that I
>     should be able to use this new one but I still cant seem to get
>     things working correctly.  Anyone who is using securew2 had issues
>     like this with root ca changing and clients forced to reonboard? 
>     Im not really pki person so if there is some way I could  chain
>     these or something.  Just looking for way to update the rad cert
>     on servers and not have to force all my onboard clients to have to
>     go thru that process once I make the change.
>
>      
>
>      
>
>     **********
>     Replies to EDUCAUSE Community Group emails are sent to the entire
>     community list. If you want to reply only to the person who sent
>     the message, copy and paste their email address and forward the
>     email reply. Additional participation and subscription information
>     can be found at https://www.educause.edu/community
>     
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.educause.edu%2Fcommunity&data=02%7C01%7Ctim.cappalli%40MICROSOFT.COM%7C5e9216a19ec04783536f08d8023b2d49%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637261800489200801&sdata=tfUSROrNx7Pl0cTz%2FYI2v5mWyIrOwOsfWfPkpY3BQZQ%3D&reserved=0>
>
>
>     **********
>     Replies to EDUCAUSE Community Group emails are sent to the entire
>     community list. If you want to reply only to the person who sent
>     the message, copy and paste their email address and forward the
>     email reply. Additional participation and subscription information
>     can be found at https://www.educause.edu/community
>     
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.educause.edu%2Fcommunity&data=02%7C01%7Ctim.cappalli%40MICROSOFT.COM%7C5e9216a19ec04783536f08d8023b2d49%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637261800489200801&sdata=tfUSROrNx7Pl0cTz%2FYI2v5mWyIrOwOsfWfPkpY3BQZQ%3D&reserved=0>
>
>
>     **********
>     Replies to EDUCAUSE Community Group emails are sent to the entire
>     community list. If you want to reply only to the person who sent
>     the message, copy and paste their email address and forward the
>     email reply. Additional participation and subscription information
>     can be found at https://www.educause.edu/community
>     
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.educause.edu%2Fcommunity&data=02%7C01%7Ctim.cappalli%40MICROSOFT.COM%7C5e9216a19ec04783536f08d8023b2d49%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637261800489210752&sdata=oTqZIMNBNd3izM1J%2Bxbm5LC25uOkRKVTAbpMyTAi79g%3D&reserved=0>
>
>
> **********
> Replies to EDUCAUSE Community Group emails are sent to the entire
> community list. If you want to reply only to the person who sent the
> message, copy and paste their email address and forward the email
> reply. Additional participation and subscription information can be
> found at https://www.educause.edu/community
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.educause.edu%2Fcommunity&data=02%7C01%7Ctim.cappalli%40MICROSOFT.COM%7C5e9216a19ec04783536f08d8023b2d49%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637261800489210752&sdata=oTqZIMNBNd3izM1J%2Bxbm5LC25uOkRKVTAbpMyTAi79g%3D&reserved=0>
>
>
> **********
> Replies to EDUCAUSE Community Group emails are sent to the entire
> community list. If you want to reply only to the person who sent the
> message, copy and paste their email address and forward the email
> reply. Additional participation and subscription information can be
> found at https://www.educause.edu/community
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.educause.edu%2Fcommunity&data=02%7C01%7Ctim.cappalli%40MICROSOFT.COM%7C5e9216a19ec04783536f08d8023b2d49%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637261800489210752&sdata=oTqZIMNBNd3izM1J%2Bxbm5LC25uOkRKVTAbpMyTAi79g%3D&reserved=0>
>
>
> **********
> Replies to EDUCAUSE Community Group emails are sent to the entire
> community list. If you want to reply only to the person who sent the
> message, copy and paste their email address and forward the email
> reply. Additional participation and subscription information can be
> found at https://www.educause.edu/community
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.educause.edu%2Fcommunity&data=02%7C01%7Ctim.cappalli%40MICROSOFT.COM%7C5e9216a19ec04783536f08d8023b2d49%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637261800489220709&sdata=QwE8Scw2vEk1ajdW0gRsQVLHXkWKTDlVu9o0JDhYuOY%3D&reserved=0>
>
>
>  
>
> **********
> Replies to EDUCAUSE Community Group emails are sent to the entire
> community list. If you want to reply only to the person who sent the
> message, copy and paste their email address and forward the email
> reply. Additional participation and subscription information can be
> found at https://www.educause.edu/community
>


**********
Replies to EDUCAUSE Community Group emails are sent to the entire community 
list. If you want to reply only to the person who sent the message, copy and 
paste their email address and forward the email reply. Additional participation 
and subscription information can be found at https://www.educause.edu/community

Reply via email to