cat-users AT lists.geant.org
Subject: The mailing list for users of the eduroam Configuration Assistant Tool (CAT)
List archive
- From: Stefan Winter <stefan.winter AT restena.lu>
- To: db AT alaska.edu
- Cc: cat-users AT lists.geant.org
- Subject: Re: [[cat-users]] connect failure with Win10 CAT installed profile
- Date: Fri, 2 Nov 2018 16:34:21 +0100
- Autocrypt: addr=stefan.winter AT restena.lu; prefer-encrypt=mutual; keydata= xsFNBFIplEwBEADTSz+DS8nio+RSvfSLLfaOnCGi1nqpn8Pb1laVUyEvnAAzZ5jemiS88Gxf iDH6hUGlWzcaW0hCfUHGiohr485adbjxRksPngWgAt/1bRxpifsW3zObFjgog01WWQV5Sihl wc4zr8zvYbFA5BJZ6YdkR9C5J015riv5OS30WTjA65SSXgYrb7zJWPwmegTFwE093uBFvC39 waz3xYpVu5j87nO6w2MVQt/8sY2/2BFPEq+xfOajl18UEwc7w8SCgnZdlVNcmEK4UBvJuwS/ 1lsR2JeQa8Gu1EDxC7PRgMgNXsDSWnnBe9aVmfG54+6ILe1QH2dwk9sPBQT5w2+vjijrb3Dv 9ur+1kN+TNU2XE436jVpnnY/3OsLdix30STQn4Q/XOm7YoVMeDwwviefilRxzK0dXA+wKj92 T68Od82CFxuZqPAgBCVmWfQM91iK9piqFK+QP+R3vF6+NGDBdwbe68iVKs0v5L8XmbxBQndj pmo+lo2asmBR2TAIfZHaKdgtBw13u3GPVVKlg/Mpko8ki9JOSem2aFyi3kQEVKptWgXT3POl 97DWJzsR5VyKz6GOx9kJAEISRyLZwm0wqh8+9LCza5oeIKW381lzq1b9x30vOh8CBSQQJ+cG 9ko0yPHAj7Suw2TmPXx1qMctmE6Ahq82ZW30SljdZby8WQuR2wARAQABzTxTdGVmYW4gV2lu dGVyIChSRVNURU5BIGtleSAyMDEzKykgPHN0ZWZhbi53aW50ZXJAcmVzdGVuYS5sdT7CwXkE EwECACMFAlIplEwCGwMHCwkIBwMCAQYVCAIJCgsEFgIDAQIeAQIXgAAKCRDA3mo1ijncZj7/ D/99hVS+mJr8dSPCaDaUFFxBiT2eI1LoR8VKEerTCRw5BsdL6pN2eRJZ9NmsqWo1ynWVHEzO 91bNZ+oZGgyoNohcBAI7p+r0qUTzkyqwdZO4kMm0pqKoM9xkP3tf2mjGujKjOz4Y7S7wnz2Z FokeUsecoRVJF/++/qHnmeWLn44J1HUKLHYCjMu+QXGOgGXgz024jQ5eUrnPwzNp0Z90AFVH lWC+bymty/ToIUUCQqS5Ff0jzdWLd8U695OG9iGvjBQT1LdEjsfbAwuKV5UcnpxNqUpUwKa5 9hdX5/2cMZP07FI1UXwnBlxa8rJfdb13FLjSKX4vUUHedYUZMjMPgcwl1a+zGE22lHiSQWgP 8QLA/W3BLsi22ERCEPZBfexOeOtaWIItDIz18fIaQoMDoRPshzar0JI2CzLYsyeKySAtYJEH FVoLmMvhkwzBmgqA/BEswUA67CfCr1jFHRXdpmWM7YkyAmMa9q6LwquWKS5+MXlUXe/3oZUc gpw/T9Uuy3Jo3RdS7B3jFcWaVr6KsO/A9u1gr/aYn5M+iJTQSj4vzqtkQaJTpSspRZoKa66H Zt3IwSYiDiYZqtM83ynuj9kjnZzGfnuTaNIi996q6Mptr33mOzIE1wmMqnJYwTr3EcNtf483 q/qrJwh5ES8Q9xY7aat/ZcSl8fKubW4TlfVr8c7BTQRSKZRMARAAvBPpn7FQq7LQ5glohtbL 6XIEo1U4X67S0TzUYieENSWSVYuWYIhCBldmWdmH8Bpj/qHeqdon7v+SLtR4WngzMR9toupK cFfHnbP9kpazTSB2ySHxXWGX1gJOpPXdCcg9iveKBHEsDn00ThTcPsvtXpnnzET16pXIvOXO 0bxTmVZ4INIF1SWgvYma/g8kBbgXLpkj8tOywBqFiiYPEZlDeCxDHiMgUDh6olda9K/0TZFT dMPUgjKuubfAeaDNCOrVt4RjmFOaRLikcZocmgJhm3z/j25x7/mnNu+0di1H/S67YGQJ+pqC FInzIXDx7aRW2+JCiqsY2X3xOPWZZzjyis5SNnfOcPH3gt2hYz1fy+thsBGf4NgCN01JRqIJ 2/MOQCgUdwh+9l8xqaJvCkUHM4hVh4W62MAe1u7UEqQbvvNEqxM5034vcvlE+/LRkrDCspw+ 2YJ9QyroLerVRwW5DVleP8Ifi8VB3yD80nqXYs9aqRy0BkDNIQ43ERhESMt8dJqrNkxgC6pe mZrhNwyDh+hy2kPNGQh/iBpdKuH1o3E24TIZoV2v3YHvzob7aAYHddE/PofAXhJW7I9mAs+H dWDmnI8ckuPDFpFH+Y/BFGvEXgcnJAJ1wEvf+4LuiIi0MHjR4EWFn9vvoFDAIqD10h3FSd3D 59HGtdSsNn4XaCsAEQEAAcLBXwQYAQIACQUCUimUTAIbDAAKCRDA3mo1ijncZhBtEACL036d djc5pFoYIdoUY1vT8SMXJNquewCnL1quDADzqDZFU5GNlQEy10krSfBwlTb9ahTtE0JFrOdZ wUZtoa1Pgfr8nU6KOgrXPHbNjS/9dyc5CwGVVIpOavIm2CsMVDJ9LCF/NT+u/t1k6eGfHhPV l3dUQyDa/lzc1chKUIVQYQkFmr0A/iXP+29lFCaI+IeyU0bSdZhezDwUROn5vEx+fiPZyHDS hCb+BxJv/o2LQp9JHenCiSbO+ioRZdxgbWfoKBuXOfmSStqMWXas/gZ5vS3xq72LNtKPRxgp jX3P8Zml1XDqpcBau7eK75VKE0Yd06YxnUIsbcEzInUc3uzW/u0DFpXYkMJb0XIvJyUt5yYP KfV13N8kSkPi5pLxm8yuftXMzfgeFMR7nafY3glTVj/TxElzg6xeZNqfC2ZjIbBtZg9ylHU8 u8wwB+dX282crs0R3N9A064C71/cXlBqcjzjlKH2NUIWGxr+od3TXFIFjszSU3NgMPKrWNhF LLwS81MpbkOe73s6aDhS8RDyNucoxtKXriLR+4Xiu4+pyj5ukYP1JqpB3ZobY/XZgCnJMye+ 7xeTpIDJ1LPORxM3NNAElyb26lxAK2P+km+EpI0Zzz6rNSCfg5jYQ474+e/GBgaSG4MlaPoZ +XAfN46u1Xjjv1/AkkA4IA6m5zP5og==
- Openpgp: id=AD3091F3AB24E05F4F722C03C0DE6A358A39DC66
Hello,
I've received a response to the Win10/AddTrust
analysis from our team lead deploying new infrastructure:
We obviously don’t have control over external CA’s processes at all, or operating system certificate trust stores, and the only resolution would be to use an alternative (non UAF standard) certificate issue process from another CA entirely.....We have established is that a non-CAT assisted connection from Win10 operates as expected and we just reconfirmed this as well. From our perspective, this is an issue that will need to be resolved via the CAT tool since it appears to be specific to CAT’s ability to process certificates and the stated issue does not impact the ability for Win10 machines to join the network without CAT. and
my reply:
No one's
saying the certificate chain in ISE is "wrong" or needs to
be changed. What is being claimed is that an intermediate
certificate in that chain may be viewed/trusted as root CA
by the Windows supplicants [because it has been issued as a
self-signed root CA in the past and may have root trust in
the client's trusted certificate store], and that in turn
causes the supplicant to incorrectly not trust the server
certificate. [We've NOT determined that that is the issue we
encountered, but the limited evidence points in that
direction.] This
triggers my follow-up questions:
Is
my restatement of the issue above more or less correct, or
importantly incorrect?
Yes, it is very much correct. What
work-around(s) can we propose for Windows clients?
If you can still change the supplier of the server certificate: going to any other CA than AddTrust would of coure make the problem moot. As others have responded already, using your own private CA achieves the same or superior level of security and is as easy to deploy with CAT installers. Reading your conversations with your team, I guess it would take some amount of pursuasion to make them believe that this statement of level of security is true. You can always inspire yourself at our published argumentation at https://wiki.geant.org/display/H2eduroam/EAP+Server+Certificate+considerations . Consideration 1 goes into a lot of explanatory detail there. Finally ... Would
adding a second rootCA in the configuration (the one now
used as intermediate) enable the Win supplicant to trust the
server cert chain?
... this is probably also an option. It would make the trust issue in 802.1X go away. You should carefully examine if there are any side effects elsewhere on the user device. After all, the root variant of the CA certificate is historic and meant to go away. You might be prolonging a transition situation where ideally you shouldn't. (and
what would be the impact on Android clients said somewhere
to require only a single root CA in the profile)
We haven't seen issues with other supplicants on the AddTrust question. If one implements CA certificate chain checks correctly (as per RFC5280), as most supplicants do, then the chain can be observed to end in two alternate roots; and if one of those succeeds, the certificate is valid. To my knowledge, only Windows does not behave like that. How
are other institutions getting around this issue? In my scan
for Universities' eduroam onboading documentation I saw a
couple emphasize strongly that Windows be fully updated /
patched before running the CAT installers; is that in some
way related and a mitigation of this problem?
Keeping up to date is always a good idea. I can't tell at all if this advice is being given just as a generic one, or if it relates to other issues on the system (Wi-Fi drivers are still a problem sometimes, and updates do help there), or if it is indeed about the AddTrust situation. Greetings, Stefan Winter Thank
you for ongoing insight and assistance.
David
Bantz
U
Alaska
On Wed, Oct 31, 2018 at 12:02 AM Stefan Winter
<stefan.winter AT restena.lu>
wrote:
Hello,oh dear. This appears to be AddTrust all over again. I had hoped this problem had withered out over time. The issue has been brought up four or five times now and is mighty annoying. I'm pasting below a post from 2015 with a very similar or even the exact problem, depending on how InCommon's chain building is done from the AddTrust External CA Root. The core of the issue is that there is an intermediate CA certificate which hasn't always been an intermediate. It used to be a self-signed root, but then during some company merger was re-issued as an intermediate under AddTrust. Windows devices which have the self-signed variant installed fall over if they see the identical certificate as an intermediate in their EAP conversation. The self-signed variant is not shipped in all Windows installs (Windows has an updater for its trust store and this may or may not have been dynamically added in the device you test with). Can you take a look at the system trust store of this particular Win 10 device and see if any of the intermediates in the chain (as sent in the EAP conversation) are registered as root CAs in the system? If so, does removing the root variant help? Greetings, Stefan Winter -------- Weitergeleitete Nachricht -------- Betreff: Re: [cat-users] problem detected with installer from cat.eduroam.org Datum: Wed, 21 Jan 2015 15:53:58 +0000 Von: Louis Twomey <louis.twomey AT heanet.ie> An: cat-users AT geant.net, stefan Winter <stefan.winter AT restena.lu> This is perhaps the same problem that I have encountered with Windows 7 and 8 machines locally. I replaced our Radius server cert recently, both new and old certs were from TCS, the new one is signed by "TERENA SSL CA 2". All existing wireless supplicants handled the new cert without incident, except for Windows 7 and 8 devices. They consistently failed on certificate verification. When I looked into it I discovered that the chaining on those Windows devices was broken, they chained my cert as follows: USERTrust RSA Certification Authority > TERENA SSL CA 2 > eduroam-idp.heanet.ie That "USERTrust RSA Certification Authority" is a root cert, so as such the chain is complete but it doesn't match the chain the client is configured to expect, which is: AddTrust External CA Root > USERTrust RSA Certification Authority > TERENA SSL CA 2 > eduroam-idp.heanet.ie When I checked the local Windows certificate store on a problem device, it had 2 certificates with the same name of "USERTrust RSA Certification Authority", one is the root cert, the other is the intermediate CA cert that TCS uses, it is choosing to chain via the root one. Deleting or disabling the root USERTrust cert in the local store solves the problem, the client chains correctly and server validation succeeds. So the issue is this extra(?) root cert, it exists on each of the 5 Windows laptops I have looked at here and they all chain to it. I assume that either this root cert doesn't exist on *every* Windows laptop, or perhaps is there but is not chained to on every such device - otherwise eduroam connectivity would, I presume, be failing for any Windows device where the home site uses a cert signed by the new TCS chain. Does anyone else have that root cert in the Third-Party Root Certificates store of their Windows device I wonder? These are the details of the cert: Version: V3 Serial number: 01 fd 6d 30 fc a3 ca 51 a8 1b bc 64 0e 35 03 2d Signature algorithm: sha384RSA Signature hash algorithm: sha384 Issuer: USERTrust RSA Certification Authority Valid from: 01 February 2010 00:00:00 Valid to: 18 January 2038 23:59:59 Subject: USERTrust RSA Certification Authority Public key: RSA (4096 Bits) Subject key Identifier: 53 79 bf 5a aa 2b 4a cf 54 80 e1 d8 9b c0 9d f2 b2 03 66 cb Key Usage: Certificate Signing, Off-line CRL Signing, CRL Signing (06) Basic Constraints: Subject Type=CA, Path Length Constraint=None Thumbprint algorithm: sha1 Thumbprint: 2b 8f 1b 57 33 0d bb a2 d0 7a 6c 51 f7 0e e9 0d da b9 ad 8e Friendly name: USERTrust Regards, Louis. On 21/01/2015 12:21, Stefan Winter wrote: > Hi, > >> just two comments... Stefan, please note that Marcos is from >> esci.upf.edu, not upf.edu (two different organizations). > > Okay. Sorry for being confused :-) > >> I explained Marcos that the SecureW2 installer is only used for >> Win XP, and it should'nt be used by default for win 7 and 8.x >> (if PEAP+MSCHAPv2 is selected as first option as is the case)... >> am I right? >> >> Of course you could use it in further windows versions too, but >> given the priority of methods allowed in the profile and their >> order (1. PEAP-MSCHAPv2, 2. TTLS-MSCHAPv2, 3. TTLS+PAP), I guess >> the installer for win 7 and win 8.1 is not based on SecureW2... > > Yes, with that priority, Vista and above would not trigger > SecureW2 installation. > > And the built-in supplicant which is then used is of course bound > to Microsoft's built-in TLS validation routines... which are on the > SHA-1 sunset crusade. > >> Also I have to say, I checked this morning and the profile looked >> fine to me. > > Maybe he is still sending the (superfluous) old TERENA intermediate > CA and Microsoft is (unrightfully) upset about that. Or he is > missing the second intermediate (IIRC) and the supplicants can't > complete the chain. > > Stefan >
|
Attachment:
0xC0DE6A358A39DC66.asc
Description: application/pgp-keys
Attachment:
signature.asc
Description: OpenPGP digital signature
- RE: [[cat-users]] connect failure with Win10 CAT installed profile, Tancred Fergus, 11/01/2018
- <Possible follow-up(s)>
- Re: [[cat-users]] connect failure with Win10 CAT installed profile, Jethro R Binks, 11/01/2018
- Re: [[cat-users]] connect failure with Win10 CAT installed profile, Alan Buxey, 11/01/2018
- Re: [[cat-users]] connect failure with Win10 CAT installed profile, Stefan Winter, 11/02/2018
Archive powered by MHonArc 2.6.19.