cat-users AT lists.geant.org
Subject: The mailing list for users of the eduroam Configuration Assistant Tool (CAT)
List archive
- From: Stefan Winter <stefan.winter AT restena.lu>
- To: "Downton, Sam" <samuel.downton AT metoffice.gov.uk>, "cat-users AT lists.geant.org" <cat-users AT lists.geant.org>
- Subject: Re: [[cat-users]] TLS Failures from Android
- Date: Mon, 14 Jan 2019 10:38:08 +0100
- Autocrypt: addr=stefan.winter AT restena.lu; prefer-encrypt=mutual; keydata= mQINBFIplEwBEADTSz+DS8nio+RSvfSLLfaOnCGi1nqpn8Pb1laVUyEvnAAzZ5jemiS88Gxf iDH6hUGlWzcaW0hCfUHGiohr485adbjxRksPngWgAt/1bRxpifsW3zObFjgog01WWQV5Sihl wc4zr8zvYbFA5BJZ6YdkR9C5J015riv5OS30WTjA65SSXgYrb7zJWPwmegTFwE093uBFvC39 waz3xYpVu5j87nO6w2MVQt/8sY2/2BFPEq+xfOajl18UEwc7w8SCgnZdlVNcmEK4UBvJuwS/ 1lsR2JeQa8Gu1EDxC7PRgMgNXsDSWnnBe9aVmfG54+6ILe1QH2dwk9sPBQT5w2+vjijrb3Dv 9ur+1kN+TNU2XE436jVpnnY/3OsLdix30STQn4Q/XOm7YoVMeDwwviefilRxzK0dXA+wKj92 T68Od82CFxuZqPAgBCVmWfQM91iK9piqFK+QP+R3vF6+NGDBdwbe68iVKs0v5L8XmbxBQndj pmo+lo2asmBR2TAIfZHaKdgtBw13u3GPVVKlg/Mpko8ki9JOSem2aFyi3kQEVKptWgXT3POl 97DWJzsR5VyKz6GOx9kJAEISRyLZwm0wqh8+9LCza5oeIKW381lzq1b9x30vOh8CBSQQJ+cG 9ko0yPHAj7Suw2TmPXx1qMctmE6Ahq82ZW30SljdZby8WQuR2wARAQABtDxTdGVmYW4gV2lu dGVyIChSRVNURU5BIGtleSAyMDEzKykgPHN0ZWZhbi53aW50ZXJAcmVzdGVuYS5sdT6JAjkE EwECACMFAlIplEwCGwMHCwkIBwMCAQYVCAIJCgsEFgIDAQIeAQIXgAAKCRDA3mo1ijncZj7/ D/99hVS+mJr8dSPCaDaUFFxBiT2eI1LoR8VKEerTCRw5BsdL6pN2eRJZ9NmsqWo1ynWVHEzO 91bNZ+oZGgyoNohcBAI7p+r0qUTzkyqwdZO4kMm0pqKoM9xkP3tf2mjGujKjOz4Y7S7wnz2Z FokeUsecoRVJF/++/qHnmeWLn44J1HUKLHYCjMu+QXGOgGXgz024jQ5eUrnPwzNp0Z90AFVH lWC+bymty/ToIUUCQqS5Ff0jzdWLd8U695OG9iGvjBQT1LdEjsfbAwuKV5UcnpxNqUpUwKa5 9hdX5/2cMZP07FI1UXwnBlxa8rJfdb13FLjSKX4vUUHedYUZMjMPgcwl1a+zGE22lHiSQWgP 8QLA/W3BLsi22ERCEPZBfexOeOtaWIItDIz18fIaQoMDoRPshzar0JI2CzLYsyeKySAtYJEH FVoLmMvhkwzBmgqA/BEswUA67CfCr1jFHRXdpmWM7YkyAmMa9q6LwquWKS5+MXlUXe/3oZUc gpw/T9Uuy3Jo3RdS7B3jFcWaVr6KsO/A9u1gr/aYn5M+iJTQSj4vzqtkQaJTpSspRZoKa66H Zt3IwSYiDiYZqtM83ynuj9kjnZzGfnuTaNIi996q6Mptr33mOzIE1wmMqnJYwTr3EcNtf483 q/qrJwh5ES8Q9xY7aat/ZcSl8fKubW4TlfVr8bkCDQRSKZRMARAAvBPpn7FQq7LQ5glohtbL 6XIEo1U4X67S0TzUYieENSWSVYuWYIhCBldmWdmH8Bpj/qHeqdon7v+SLtR4WngzMR9toupK cFfHnbP9kpazTSB2ySHxXWGX1gJOpPXdCcg9iveKBHEsDn00ThTcPsvtXpnnzET16pXIvOXO 0bxTmVZ4INIF1SWgvYma/g8kBbgXLpkj8tOywBqFiiYPEZlDeCxDHiMgUDh6olda9K/0TZFT dMPUgjKuubfAeaDNCOrVt4RjmFOaRLikcZocmgJhm3z/j25x7/mnNu+0di1H/S67YGQJ+pqC FInzIXDx7aRW2+JCiqsY2X3xOPWZZzjyis5SNnfOcPH3gt2hYz1fy+thsBGf4NgCN01JRqIJ 2/MOQCgUdwh+9l8xqaJvCkUHM4hVh4W62MAe1u7UEqQbvvNEqxM5034vcvlE+/LRkrDCspw+ 2YJ9QyroLerVRwW5DVleP8Ifi8VB3yD80nqXYs9aqRy0BkDNIQ43ERhESMt8dJqrNkxgC6pe mZrhNwyDh+hy2kPNGQh/iBpdKuH1o3E24TIZoV2v3YHvzob7aAYHddE/PofAXhJW7I9mAs+H dWDmnI8ckuPDFpFH+Y/BFGvEXgcnJAJ1wEvf+4LuiIi0MHjR4EWFn9vvoFDAIqD10h3FSd3D 59HGtdSsNn4XaCsAEQEAAYkCHwQYAQIACQUCUimUTAIbDAAKCRDA3mo1ijncZhBtEACL036d djc5pFoYIdoUY1vT8SMXJNquewCnL1quDADzqDZFU5GNlQEy10krSfBwlTb9ahTtE0JFrOdZ wUZtoa1Pgfr8nU6KOgrXPHbNjS/9dyc5CwGVVIpOavIm2CsMVDJ9LCF/NT+u/t1k6eGfHhPV l3dUQyDa/lzc1chKUIVQYQkFmr0A/iXP+29lFCaI+IeyU0bSdZhezDwUROn5vEx+fiPZyHDS hCb+BxJv/o2LQp9JHenCiSbO+ioRZdxgbWfoKBuXOfmSStqMWXas/gZ5vS3xq72LNtKPRxgp jX3P8Zml1XDqpcBau7eK75VKE0Yd06YxnUIsbcEzInUc3uzW/u0DFpXYkMJb0XIvJyUt5yYP KfV13N8kSkPi5pLxm8yuftXMzfgeFMR7nafY3glTVj/TxElzg6xeZNqfC2ZjIbBtZg9ylHU8 u8wwB+dX282crs0R3N9A064C71/cXlBqcjzjlKH2NUIWGxr+od3TXFIFjszSU3NgMPKrWNhF LLwS81MpbkOe73s6aDhS8RDyNucoxtKXriLR+4Xiu4+pyj5ukYP1JqpB3ZobY/XZgCnJMye+ 7xeTpIDJ1LPORxM3NNAElyb26lxAK2P+km+EpI0Zzz6rNSCfg5jYQ474+e/GBgaSG4MlaPoZ +XAfN46u1Xjjv1/AkkA4IA6m5zP5og==
- Openpgp: id=AD3091F3AB24E05F4F722C03C0DE6A358A39DC66; url=http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xC0DE6A358A39DC66
Hello Sam!
Thanks for the server certificate. I have taken a look.
The trusted CA as per your CAT profile is:
Subject: C = GB, ST = Greater Manchester, L = Salford, O = COMODO CA
Limited, CN = COMODO RSA Certification Authority
The actual server cert is issued by:
C = GB, ST = Greater Manchester, L = Salford, O = COMODO CA Limited,
CN = COMODO RSA Extended Validation Secure Server CA
=> an intermediate certificate linking "COMODO RSA Extended Validation
Secure Server CA" to "COMODO RSA Certification Authority" is required.
You have not uploaded that intermediate to CAT. This is okay, but then
either the devices need to have that intermediate in their cert stores
"by chance", or your RADIUS server needs to supply it during the EAP
exchange.
Since this a commercial, well-known CA, I'm guessing that most operating
systems have it in their store, so the chain building would just work.
Possibly, Android is a little different and doesn't have or use the
intermediate CA information during the EAP exchange. Unfortunately,
uploading it to CAT won't help here, because Android is also the only
operating system where we cannot install an intermediary; only roots.
So the only option for a complete chain across all operating systems is
by making sure that the RADIUS server sends not only his own server
certificate, but also the intermediate CA certificate of "COMODO RSA
Extended Validation Secure Server CA".
I was trying to reach out to your RADIUS server to see if it does send
the chain but it looks like your server is not reachable internationally
at all. Directly from our Luxembourg primary NRO server using
eapol_test, I get: EAPOL test timed out. This is not an issue of wrong
usernames, it's basic connectivity on the RADIUS level. You may have
more issues than just certificate ones here.
As a side note: you are using a certificate from an Extended Validation
CA. We have received repeated reports that ChromeOS REJECTS EV
certificates for Wi-Fi server identification purposes. If you care about
ChromeOS, you may need to switch to a non-EV certificate, naturally with
a different validation chain. At the very least, this should be subject
to testing.
Greetings,
Stefan Winter
Am 14.01.19 um 09:03 schrieb Stefan Winter:
> Hello,
>
>> The opposite is true unfortunately! The clients we are experiencing the
>> issue on are Google Pixel 2 phones running Android 9. They have no issue
>> connecting to our eduroam implementation when configured manually, so it
>> would appear to be a configuration issue rather than a lack of
>> compatibility with the infrastructure.
>
> That's quite interesting. Can you confirm that version /before/ 9 work
> with the CAT profiles?
>
> When you write "manual configuration" then that probably means just
> username and password, without cert validation?
>
> If it fails with cert validation, but not without, then maybe it's a
> property of the cert that upsets the newest Android.
>
> Unfortunately, your IdP server seems to run on a Windows NPS or other
> RADIUS server configuration that rejects incoming requests if the outer
> ID does not match a known user - so I can't actually get to see the
> server cert for manual inspection.
>
> You could either edit your profile properties to add the "Use special
> Outer Identity for realm checks" and fill in a valid username - that way
> the CAT tests could get through to the actual EAP exchange; or just send
> me the server cert off-list so I can take a look.
>
> Greetings,
>
> Stefan Winter
>
--
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et
de la Recherche
2, avenue de l'Université
L-4365 Esch-sur-Alzette
Tel: +352 424409 1
Fax: +352 422473
PGP key updated to 4096 Bit RSA - I will encrypt all mails if the
recipient's key is known to me
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xC0DE6A358A39DC66
Attachment:
0xC0DE6A358A39DC66.asc
Description: application/pgp-keys
Attachment:
signature.asc
Description: OpenPGP digital signature
- [[cat-users]] TLS Failures from Android, Downton, Sam, 01/11/2019
- Re: [[cat-users]] TLS Failures from Android, Stefan Winter, 01/14/2019
- RE: [[cat-users]] TLS Failures from Android, Downton, Sam, 01/14/2019
- Re: [[cat-users]] TLS Failures from Android, Stefan Winter, 01/14/2019
- Re: [[cat-users]] TLS Failures from Android, Stefan Winter, 01/14/2019
- Re: [[cat-users]] TLS Failures from Android, Alan Buxey, 01/14/2019
- RE: [[cat-users]] TLS Failures from Android, Downton, Sam, 01/14/2019
- Re: [[cat-users]] TLS Failures from Android, Stefan Winter, 01/14/2019
- Re: [[cat-users]] TLS Failures from Android, Stefan Winter, 01/14/2019
- Re: [[cat-users]] TLS Failures from Android, Stefan Winter, 01/14/2019
- RE: [[cat-users]] TLS Failures from Android, Downton, Sam, 01/14/2019
- Re: [[cat-users]] TLS Failures from Android, Stefan Winter, 01/14/2019
Archive powered by MHonArc 2.6.19.