floof.org

Pippin friendica

Oh jeez. I don't suppose anyone here has experience with EAP certificates for RADIUS servers handling Wifi APs? I generated a root key+certificate and a server certificate for FreeRADIUS a couple of years ago and apparently I generated a new cert last year, but I cannot for the life of me figure out where I put the root cert key or how I generated last year's cert. I thought I was using gnomint (and there's a gnomint database right there) but it doesn't seem to have the right root cert and I can't seem to figure out how to generate a new cert in it this year anyway.

So my question is: are there many common Wifi clients that actually need (or benefit from) the CA public key being imported and cert verification turned on for connecting to that AP? If not, maybe it's unlikely any of the users will have turned on verification, in which case I might well be able to get away with just generating a new root key and cert and starting over. If it's common to import the cert and turn on verification I probably ought to keep searching all my computers and servers to see if I can find the flippin root CA key.

Have I mentioned I hate computers? :( I basically hate my chosen line of work, it seems.

Ghost mastodon (AP)

in my experience with EAP-TTLS and Apple, even if you important and trust the root, it still asks you to accept a new cert everytime it rotates anyway (usually with a warning it’s untrusted even if the root is trusted for everything else). Windows I don’t think checks, and I know Linux only checks if you explicitly specify it, I can’t speak to anything else though.

If you’re using EAP-TLS, then you absolutely need to have the root trusted, but this is pretty advanced.

1
Pippin friendica
@Ghost Ah, thanks. I don't remember for sure which method it's using, but as I'm using a self-generated CA I guess I can't be using EAP-TLS. It's definitely tunnelled as I remember configuring inner and outer authentication methods, that must be what the extra T is in TTLS. So yeah, sounds like I can probably just shove any old certificate in there and not cause more problems than usual. That's reassuring, thank you!
Ghost mastodon (AP)
no worries, feel free to message if you need any specific help
1
B4ckBOne mastodon (AP)
Not realy an answer, but habe you tried Dalradius or packetfence and maybe smallstep-ca? Could be abit more convenient.
Pippin friendica
@B4ckBOne No, haven't heard of any of them before and am not planning to change, but thanks. This was all sorted out a month ago and the client isn't complaining any more so I'm not planning to touch it again until next certificate renewal time. Thanks anyway.