Skip to Content.

cat-users - Re: [[cat-users]] Correct method for certificate rollover in CAT?

cat-users AT lists.geant.org

Subject: The mailing list for users of the eduroam Configuration Assistant Tool (CAT)

List archive


Re: [[cat-users]] Correct method for certificate rollover in CAT?


Chronological Thread 
  • From: Paul Dekkers <paul.dekkers AT surf.nl>
  • To: Guy Halse <guy AT tenet.ac.za>
  • Cc: "cat-users AT lists.geant.org" <cat-users AT lists.geant.org>
  • Subject: Re: [[cat-users]] Correct method for certificate rollover in CAT?
  • Date: Fri, 15 Oct 2021 11:55:00 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=surf.nl; dmarc=pass action=none header.from=surf.nl; dkim=pass header.d=surf.nl; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=g4+/rRoF1ILy+OWDkoumXPn/m+ig0dKh+rQL2YKenJM=; b=MQi7VDY8xj17eEI5fVsNUMK2BICFT0UVPS+13kjPHAKS+dD/095wUD4nvwP8Y3jBSpMY4KByS2xll2xFTMk4v5meixmbzuE0gApPoo19bD0XE/pq9GW4/3XqvgXZOxD9z8FsEXGrA1VZoUdXxMlp5Q869r/CP2hCHZVnWF5kp7sbERmRpGbw4qppVIDWfH6wogFPFfYSGTkUvDug+UVlam6X9zwqb1fe3GqDH1olrkcmypIwtUb3Ko6GDpjaYMwV+jj+1tV4EjQe+XnJy9xWjy/eLi0zwZbVHu1skOWmvbS5xxATNnLe8a6buQv5TNkacjmLgjfqdcwqIu90rN2+jg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=obH355XbMQPKBbX1Qdg+tFmByC80iDIR83L+NI5E715dD7Nknt+OvKISqHb0gO96HicodUjyB8UofvgZX9/vDMisivMVRyKb9O8HKT/jGBNlNBAjQhxfbgPwIf47ScMOQlnDJjiqgVPW+T7RpcXVwZCq/aa0IqlTvhEIXMMQsaxN/lJNz6LjyAiM3ZGsMK8VDRka0DoZpvPd7hKs6mpPY0JsxAUpCS+TOXOyn+8uOAMfDjkLdmW+DuS5vy8CwjnFqZeIcMwThlgbywyp/6tgeTAzHMgabQo1U8bz34TK8PbOfNiM6XYD2lTE+4QZiOKbzThLHLYdYxfSy1nUJwLUFw==
  • Authentication-results: tenet.ac.za; dkim=none (message not signed) header.d=none;tenet.ac.za; dmarc=none action=none header.from=surf.nl;

Hi,

On 15/10/2021 10:40, Guy Halse wrote:
06f7c4ea-2cb0-bba1-30e4-9a23138c94c6 AT tenet.ac.za"> Hi

We have an IdP that wants to roll over the certification authority it uses and deploy on a new RADIUS instance. In this process, both the CA certificate and the CN used for validation will necessarily change.

The CAT web application supports adding both multiple root certs and multiple subject CNs into a profile, which means it's possible to generate a profile that theoretically covers both the old and new infrastructure. This looks to be the way to mimise the end-user impact of rolling over, since users can be asked to re-install from CAT prior to the migration with the assurance then they'll work in both scenarios without interruption.

However, I seem to remember there were platform-specific limitations on how that works in practice. The platforms they're most interested in are Windows 10, Android, and iPhone -- and for some reason I seem to remember this being broken on Android?

That is true for the old eduroam CAT App I believe, but geteduroam supports multiple CAs just fine. So I can myself actually only speak for geteduroam; but there I don't see this as an issue. (Also the Windows geteduroam App installs multiple CAs, and I believe the CAT installer does as well.)

The proof of the pudding, ... ;-) if you have older devices that need the old CAT app, that may be an issue.

06f7c4ea-2cb0-bba1-30e4-9a23138c94c6 AT tenet.ac.za"> Does it help to issue a cert with a SubjectAlternativeName matching the old CN used for validation? (I'm not sure that's actually possible in this case, but it was a thought I had.)
I don't think this is necessary per se, but it's better not to change it too much, for some platforms will fall back to a "matching substring". But that's also the more legacy Android types,
06f7c4ea-2cb0-bba1-30e4-9a23138c94c6 AT tenet.ac.za"> Does anyone have experience with this sort of roll-over who can offer advice one what does and doesn't work? Or better yet, point me at documentation?

I do like Jan-Frederik comments/experiences too. The part I described is only ... well, part of the story. The rest is getting people to migrate. (Of course the tric with anonymous usernames may trigger the anonymous username bugs; it may be safer if you prefix with anon also, so anon2021 may be better, I forgot the entire logic that worked or didn't work.)

Regards,
Paul


06f7c4ea-2cb0-bba1-30e4-9a23138c94c6 AT tenet.ac.za">





Archive powered by MHonArc 2.6.19.

Top of Page