Trust Anchor: Using a CA for the APC

Bug #1259980 reported by Adam Bishop
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Project Moonshot
Fix Released
Wishlist
Unassigned

Bug Description

Currently, the documentation for Moonshot assumes that a certificate hash will be used for verifying the certificate presented by the APC IdP.

It would be useful if it were possible for a CA (public or private) root certificate to be trusted instead of the subordinate certificate, allowing key changes and revocation. To do this correctly would also require use of a CRL or OCSP.

A quick search indicates wpa_supplicant supports OCSP stapling:

  "When using OpenSSL with TLS-based EAP methods, wpa_supplicant can now be
  configured to use OCSP stapling (TLS certificate status request) with
  ocsp=1 network block parameter. ocsp=2 can be used to require valid OCSP
  response before connection is allowed to continue."

And CRL checking:
  added support for verifying certificate revocation list (CRL) when
  using integrated EAP authenticator for EAP-TLS; new hostapd.conf
  options 'check_crl'; CRL must be included in the ca_cert file for now

I do not know if FreeRADIUS supports this functionality - wpa_supplicant uses OpenSSL too, so in theory it should.

Changed in moonshot:
status: New → Fix Committed
importance: Undecided → Wishlist
milestone: none → pilot6
Sam Hartman (hartmans)
Changed in moonshot:
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.