Re: Expired CRL with integrated EAP server rejects client authentication

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Jul 17, 2017 at 3:35 AM, Jouni Malinen <j@xxxxx> wrote:
> On Wed, Jul 12, 2017 at 04:53:03PM -0500, David Graziano wrote:
>> I have a project that is using hostapd with its integrated eap_server
>> with EAP-TLS authentication. I’m running into an issue with the
>> check_crl feature. When the crl expires it rejects all eap-tls
>> authentication attempts with a “TLS: Certificate verification failed,
>> error 12 (CRL has expired) depth 0” error. I have a use
>> case/requirement that I need to continue allowing clients to
>> authenticate even if the CRL has expired as I won’t always have the
>> ability to download a new CRL with the current one expires.
>
> Are you in control of generating the CRL? If so and if it is not used
> for other purposes, I'd simply increase the lifetime of each CRL to be
> sufficiently long to avoid this.. Expired CRL is expected to reject
> authentication, so the behavior here in eap_server looks quite
> reasonable.

Unfortunately, I don't have control of generating the CRLs as that is
what was initially proposed.

>
>> Strongswan, for example, has a “strictcrlpolicy” option that makes it
>> tolerant an expired CRL. With this option disabled if the expiration
>> date defined by the nextUpdate field of a CRL has been reached a
>> warning is issued, but a peer certificate will still be accepted if it
>> has not been revoked.
>>
>> I’ve looked and an option such as this doesn’t seem to exist for
>> hostapd. Would the community be willing to consider a patch-set adding
>> such a feature? I’m thinking of adding a new “check_crl_strict” config
>> option that defaults to the current behavior but when set to 0 ignores
>> the openssl error codes related to CRL validation dates. Or possibly
>> add more options to the “check_crl” config option such that when set
>> to 3 or 4 it behaves the same as 1 and 2 respectively but ignores the
>> CRL validation dates.
>
> As long as this is clearly documented and disabled by default, it sounds
> fine to add such an option.
>
> --
> Jouni Malinen                                            PGP id EFC895FA


Thanks for the input. We'll submit the patchset when it's complete and tested
- David

_______________________________________________
Hostap mailing list
Hostap@xxxxxxxxxxxxxxxxxxx
http://lists.infradead.org/mailman/listinfo/hostap




[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]

  Powered by Linux