Skip to Content.
Sympa Menu

cat-users - Re: [[cat-users]] CAT Static Connectivity Tests

cat-users AT lists.geant.org

Subject: The mailing list for users of the eduroam Configuration Assistant Tool (CAT)

List archive

Re: [[cat-users]] CAT Static Connectivity Tests


Chronological Thread 
  • From: Tomasz Wolniewicz <twoln AT umk.pl>
  • To: aaron.wyatt AT bc.edu, cat-users AT lists.geant.org
  • Subject: Re: [[cat-users]] CAT Static Connectivity Tests
  • Date: Tue, 17 Jan 2017 20:37:15 +0100

Hi Aaron,


W dniu 17.01.2017 o 19:21,
aaron.wyatt AT bc.edu
pisze:
> Hi All-
>
> We recently obtained a new RADIUS certificate and so I am in the process of
> rebuilding the CAT configuration for our organization. Running through the
> static connectivity tests, we pass without issue, but there are two pieces
> of
> feedback I get:
>
> (1) This realm has no NAPTR records.
> (2) The certificate chain includes the root CA certificate. This does not
> serve any useful purpose but inflates the packet exchange, possibly leading
> to
> more round-trips and thus slower authentication.
>
> Regarding #1, a quick google search tells me that NAPTR records are commonly
> used for SIP and other telephony protocols. What role do they plan in the
> RADIUS world?
They are used for the so-called dynamic discovery. You may read more
about it in
section 4.2 of RFC 7593 https://tools.ietf.org/html/rfc7593#section-4.2
Connectivity checks test if the realm is configured for dynamic
discovery, if it was more tests would be run.
>
> Regarding #2, this makes sense to me but I had never heard it explained
> before. Does this mean I don't need any of my chain in the RADIUS
> certificate
> used for CAT? Does this also mean I don't need to provide the entire chain
> when I install the certificate on my RADIUS servers? i.e. I don't need to
> present the entire chain to clients attempting to authenticate?
The root certificate is the anchor of the whole trust, therefore it
needs to be known to the client in advance so that it can use it to
verify the server chain.
Obviously verifying the server certificate against the root that the
server provides by itself would be pointless.
If every of your client devices had all intermediates installed then, in
principle they should be able to verify the server certificate even if
nothing else was sent, but this would mean that you would need to update
the intermediates on the clients if one of them was changed. It seems to
be a much healthier approach to provide the server cert and all
intermediates on the server side, but ship the root.

It would seem to be a contradiction to the above, that CAT installers
allow for intermediates loading and installation on the clients (as this
would seem an overkill), unfortunately we have observed that some
clients had a problem using the wireless profile unless the
intermediates were also local. This is why we suggest the safest
strategy to put the intermediates on both sides.
Tomasz

>
> Any insights would be much appreciated.
>
> Aaron
> Boston College
> To unsubscribe, send this message:
> mailto:sympa AT lists.geant.org?subject=unsubscribe%20cat-users
> Or use the following link:
> https://lists.geant.org/sympa/sigrequest/cat-users

--
Tomasz Wolniewicz

twoln AT umk.pl
http://www.home.umk.pl/~twoln

Uczelniane Centrum Informatyczne Information&Communication Technology
Centre
Uniwersytet Mikolaja Kopernika Nicolaus Copernicus University,
pl. Rapackiego 1, Torun pl. Rapackiego 1, Torun, Poland
tel: +48-56-611-2750 fax: +48-56-622-1850 tel kom.: +48-693-032-576




Archive powered by MHonArc 2.6.19.

Top of Page