[tech] Secure wireless
David Adam
zanchey at ucc.gu.uwa.edu.au
Mon Apr 12 18:44:19 WST 2010
On Sun, 11 Apr 2010, David Adam wrote:
> WPA2-Enterprise uses PEAPv0/MS-CHAPv2, which is complex way of saying
> 'there's an SSL-based tunnel wrapping the password exchange'. That tunnel
> is currently set up to use the secure.ucc.asn.au certificates, although
> switching back to the UCC CA self-signed certificates is straightforward.
>
> I'm curious how much effect the actual certficate has on the user
> experience. The iPhone asks you to confirm the certificate regardless of
> whether it is signed by a trusted CA or not, but I didn't have a chance to
> test any other devices. If people with Mac OS and Windows laptops could
> try it out and let me know how they go I would appreciate it - in
> particular, whether there is a prompt to accept the certificate and if it
> provides any useful information in working out whether to trust the
> connection.
[MRD] suggested that the certificate confirmation prompt might be from the
hostname of the RADIUS server (currently mussel) not matching the name on
the cert (secure.ucc). I'm not sure about this; my understanding of the
WPA2 protocol doesn't extend to how the client knows what authentication
server is being used. Next time I'm in the clubroom, hopefully with a more
useful device than the iPhone, I might try changing that around.
In any case, apparently[1] a stock SSL certificate will not work on
Windows XP without a specific extension. If someone with a Windows
wireless client could test it out and let me know I would appreciate it,
although I'll try and bring my laptop in.
David Adam
[1]:
http://www.smallnetbuilder.com/wireless/wireless-howto/30213-how-to-setting-up-freeradius-for-wpa-a-wpa2-enterprise-part-2?start=1
More information about the tech
mailing list