On Sat, Jan 13, 2018 at 06:07:39PM +0700, Victor Sudakov wrote:
> Eitan Adler wrote:
> > On 13 January 2018 at 01:55, Victor Sudakov <v...@mpeks.tomsk.su> wrote:
> > >
> > >
> > > Are there any network experts willing to look at the dump of RADIUS
> > > traffic at http://noc.sibptus.ru/~sudakov/radius.pcap ?
> > 
> > 
> > >From wireshark: PEAP / EAP-MD5-CHALLENGE
> 
> Eitan, do you mean it's EAP-MD5 encapsulated in PEAP (TLS tunnel)?
> 
> Why is the client not checking the server's certificate authenticity
> and how do I make the client check it against a CA (if I need to)?
 
Dear Виктор,

Android client doesn't care for server certificate authenticity, so you
don't have to install CA certificate, which was probably automatically
generated by radius and written to file:
/usr/local/etc/raddb/certs/ca.der 

Windows and Mac clients do care for it, so the CA cert should be
installed as a Trusted Root Certificate Authority for these clients.

If you want to have 0 problems with Windows clients, I recommend building
simple captive portal based on PF redirection and simple login page.

The page could be written as a CGI script in Perl or PHP.
I also recommend incorporating net-mgmt/pftabled to manage the PF table
directly from this portal without any risk of privilege escalation.

Bear also in mind, that all initial client request should be redirected
by HTTP server with "Status: 302 Moved" response, otherwise the portal
will not be properly discovered by clients, as it was pointed before. 

-- 
Marek Zarychta

Attachment: signature.asc
Description: PGP signature

Reply via email to