Skip to Content.

cat-users - Re: [[cat-users]] Using InCommon certificates

cat-users AT lists.geant.org

Subject: The mailing list for users of the eduroam Configuration Assistant Tool (CAT)

List archive


Re: [[cat-users]] Using InCommon certificates


Chronological Thread 
  • From: Brian Epstein <bepstein AT ias.edu>
  • To: Stefan Winter <stefan.winter AT restena.lu>
  • Cc: Ricardo Stella <stella AT rider.edu>, cat-users AT lists.geant.org
  • Subject: Re: [[cat-users]] Using InCommon certificates
  • Date: Fri, 14 Feb 2020 06:06:58 -0500 (EST)
  • Importance: Normal

Take a look at this article:
https://depthsecurity.com/blog/when-802-1x-peap-eap-ttls-is-worse-than-no-wireless-security
"802.1x supplicants are often configured to trust public CAs from which an
attacker can obtain a fake certificate."
Further down:
"Install a certificate signed by an internal CA that is trusted by all
wireless users on the RADIUS server.
Avoid using RADIUS certificates signed by public CAs.
Enforce validation of RADIUS certificates and manually select the internal CA
to be trusted. Do this centrally, via tools like Active Directory Wireless
Group Policies if possible. Ensure help-desk personnel and users are not
capable of modifying this configuration since it has a way of becoming
disabled when people are troubleshooting wireless issues."
So basically, anyone who can create an InCommon cert could run a fake eduroam
AP and harvest user passwords. And, they can do it anywhere, like an airport,
or in a car on your campus.
If you do an internal CA, and force the clients to verify it, your are safe.
You also avoid having to use an intermediate, and can create a long term cert.
We use Eduroam's Cat tool to deploy, it works well.
All the best,ep
On Feb 14, 2020 03:19, Stefan Winter <stefan.winter AT restena.lu> wrote:


Hello,


> We have a eduroam setup in test mode and am looking at using the CAT
> tool. My question revolves around the intermediate and root certificates.
>
> My understanding is that the radius certs renewal won't affect the end
> users, as long as they are issued by the same intermediate/root certs.
> So I need to make sure the intermediates and roots don't expire any
> time soon, right? If they do, users would have to download a new
> version with the new certificates, right?


That's almost entirely correct.


The root needs to stay the same.


The intermediate can change, but some extra caution has to be applied in
that case: the EAP server needs to send the new intermediate along with
its server cert as a partial chain then, because clients do not possess
the intermediate locally.


It is usually considered good practice to always send the intermediate
anyway, so it's not a big deal. Just something to be and remain aware of.


Greetings,


Stefan Winter


--
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et de la
Recherche
2, avenue de l'Université
L-4365 Esch-sur-Alzette

Tel: +352 424409 1
Fax: +352 422473

PGP key updated to 4096 Bit RSA - I will encrypt all mails if the recipient's
key is known to me

http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xC0DE6A358A39DC66





Archive powered by MHonArc 2.6.19.

Top of Page