S\303\251curit\303\251/Certificats/TLS.md
... ...
@@ -0,0 +1,148 @@
1
+Certificats TLS
2
+=================
3
+
4
+
5
+* http://lists.freeradius.org/pipermail/freeradius-users/2007-April/017460.html
6
+* http://lists.freeradius.org/pipermail/freeradius-users/2007-April/017461.html
7
+* http://www.linuxjournal.com/article/8095
8
+
9
+* http://javadoc.iaik.tugraz.at/iaik_jce/current/iaik/x509/extensions/ExtendedKeyUsage.html
10
+The following extended key usage purposes are defined by RFC 3280:
11
+
12
+```
13
+serverAuth (1.3.6.1.5.5.7.3.1) — TLS Web server authentication <= notre certificat
14
+
15
+[ xpserver_ext ]
16
+extendedKeyUsage = 1.3.6.1.5.5.7.3.1 <= ce que demande MS
17
+```
18
+
19
+* https://msdn.microsoft.com/en-us/library/cc731363.aspx
20
+
21
+ * The Subject name contains a value. => ok
22
+ * The computer certificate [is valid] => ok (j'ai même chain le sub et le CA dans le doute)
23
+ * The computer certificate for the NPS server or VPN server is configured with the Server Authentication purpose in Extended Key Usage (EKU) extensions. (The object identifier for Server Authentication is 1.3.6.1.5.5.7.3.1) => ok
24
+ * The server certificate is configured with a required algorithm value of RSA . => ok
25
+ * The Subject Alternative Name (SubjectAltName) extension, if used, must contain the DNS name of the server. => ?? je comprend pas, le supplicant ne connait jamais le nom du serveur, comment il peut comparer ?
26
+
27
+https://2.bp.blogspot.com/-jnB3G_rjFgk/UBiepn7rM0I/AAAAAAAADNs/gC2Ju8CyPsM/s1600/PEAP+Ladder+Diagram.png
28
+
29
+! https://serverfault.com/questions/318851/third-party-wildcard-certificates-for-use-with-microsoft-nps-radius-peap
30
+
31
+
32
+http://wiki.cacert.org/FAQ/subjectAltName :
33
+According to the standards commonName will be ignored if you supply a subjectAltName in the certificates, verified to be working in both the latest version of MS IE and Firefox (as of 2005/05/12)...
34
+
35
+https://code.google.com/p/android/issues/detail?id=37178 :
36
+In general, this value is set to the DNS name of the RADIUS server presenting the certificate to the end device supplicant. Matching is usually done with a static, or wildcard version of the address. (Such as radius.foo.com, or *.foo.com)
37
+
38
+Having this setting available is critical for situations where commercial CA certificates are used with the authentication. When doing SSL/TLS over IP, a client can easily resolve the DNS name of the server and match that to the certificate to be sure that the device presenting the certificate has the same DNS name as the value set in the certificate. With 802.1X authentications the client doesn't have IP connectivity, so the only way to validate this is for the user to tell the supplicant what value is expected.
39
+
40
+Eduroam:
41
+* https://www.eduroam.us/node/89
42
+* http://www.eduroam.fr/specif_tecnik.html
43
+* http://confluence.diamond.ac.uk/display/PAAUTH/Configuring+an+eduroam+FreeRADIUS+3.0+server
44
+* http://www.siris.sorbonne.fr/documents/Configuration_Wifi_Eduroam.pdf
45
+
46
+http://wiki.freeradius.org/guide/Certificate-Compatibility :
47
+Windows does not support wildcard certificates
48
+
49
+## Traces
50
+
51
+```
52
+Alexandre L., [20.10.15 20:18]
53
+Tue Oct 20 20:16:41 2015 : Error: TLS Alert read:fatal:access denied
54
+Tue Oct 20 20:16:41 2015 : Auth: Login incorrect (TLS Alert read:fatal:access denied): [hcognet/<via Auth-Type = EAP>] (from client borneswifi-brest port 0 cli 60-36-DD-87-AC-A3)
55
+
56
+Hervé C., [20.10.15 20:21]
57
+et là ?
58
+
59
+Alexandre L., [20.10.15 20:22]
60
+http://lists.freeradius.org/pipermail/freeradius-users/2007-April/017460.html / http://lists.freeradius.org/pipermail/freeradius-users/2007-April/017461.html / http://www.linuxjournal.com/article/8095
61
+
62
+Alexandre L., [20.10.15 20:22]
63
+Tue Oct 20 20:21:07 2015 : Error: TLS Alert read:fatal:access denied
64
+Tue Oct 20 20:21:07 2015 : Auth: Login incorrect (TLS Alert read:fatal:access denied): [hcognet/<via Auth-Type = EAP>] (from client borneswifi-brest port 0 cli 60-36-DD-87-AC-A3)
65
+T
66
+
67
+Hervé C., [20.10.15 20:23]
68
+du vient d'avoir un success je penses ! 😉
69
+
70
+Alexandre L., [20.10.15 20:24]
71
+Tue Oct 20 20:22:48 2015 : Auth: Login OK: [hcognet] (from client borneswifi-brest port 0 via TLS tunnel)
72
+Tue Oct 20 20:22:48 2015 : Auth: Login OK: [hcognet] (from client borneswifi-brest port 0 cli 60-36-DD-87-AC-A3)
73
+
74
+ Subject: C=FR, ST=Bretagne, L=Brest, O=\x00A\x00s\x00s\x00o\x00c\x00i\x00a\x00t\x00i\x00o\x00n\x00 \x1D\x00R\x00E\x00S\x00E\x00L \x1D, CN=*.resel.fr/emailAddress=webmaster@resel.fr
75
+ DNS:*.resel.fr, DNS:resel.fr, DNS:asso.resel.fr, DNS:club.resel.fr, DNS:clubs.resel.fr, DNS:campagne.resel.fr, DNS:resel.eu, DNS:resel.org, DNS:*.resel.org, DNS:*.resel.eu, DNS:*.asso.resel.fr, DNS:*.club.resel.fr, DNS:*.clubs.resel.fr, DNS:*.campagne.resel.fr, DNS:admin.resel.fr, DNS:*.admin.resel.fr, DNS:dev.resel.fr, DNS:*.dev.resel.fr, DNS:rennes.resel.fr, DNS:brest.resel.fr, DNS:nantes.resel.fr, DNS:*.rennes.resel.fr, DNS:*.brest.resel.fr, DNS:*.nantes.resel.fr, DNS:services.resel.fr, DNS:*.services.resel.fr
76
+
77
+Alexandre L., [20.10.15 21:28]
78
+— Subject: ... CN=*.resel.fr/emailAddress=webmaster@resel.fr
79
+— X509v3 Subject Alternative Name:
80
+ DNS:*.resel.fr, DNS:resel.fr, DNS:asso.resel.fr, DNS:club.resel.fr, DNS:clubs.resel.fr, DNS:campagne.resel.fr, DNS:resel.eu, DNS:resel.org, DNS:*.resel.org, DNS:*.resel.eu, DNS:*.asso.resel.fr, DNS:*.club.resel.fr, DNS:*.clubs.resel.fr, DNS:*.campagne.resel.fr, DNS:admin.resel.fr, DNS:*.admin.resel.fr, DNS:dev.resel.fr, DNS:*.dev.resel.fr, DNS:rennes.resel.fr, DNS:brest.resel.fr, DNS:nantes.resel.fr, DNS:*.rennes.resel.fr, DNS:*.brest.resel.fr, DNS:*.nantes.resel.fr, DNS:services.resel.fr, DNS:*.services.resel.fr
81
+
82
+Alexandre L., [20.10.15 21:30]
83
+Subject: OU=Domain Control Validated, CN=radius.telecom-bretagne.eu
84
+ X509v3 Extended Key Usage:
85
+ TLS Web Server Authentication, TLS Web Client Authentication
86
+
87
+
88
+Alexandre L., [20.10.15 20:18]
89
+Tue Oct 20 20:16:41 2015 : Error: TLS Alert read:fatal:access denied
90
+Tue Oct 20 20:16:41 2015 : Auth: Login incorrect (TLS Alert read:fatal:access denied): [hcognet/<via Auth-Type = EAP>] (from client borneswifi-brest port 0 cli 60-36-DD-87-AC-A3)
91
+
92
+Alexandre L., [20.10.15 20:22]
93
+Tue Oct 20 20:21:07 2015 : Error: TLS Alert read:fatal:access denied
94
+Tue Oct 20 20:21:07 2015 : Auth: Login incorrect (TLS Alert read:fatal:access denied): [hcognet/<via Auth-Type = EAP>] (from client borneswifi-brest port 0 cli 60-36-DD-87-AC-A3)
95
+
96
+Alexandre L., [20.10.15 20:24]
97
+Tue Oct 20 20:22:48 2015 : Auth: Login OK: [hcognet] (from client borneswifi-brest port 0 via TLS tunnel)
98
+Tue Oct 20 20:22:48 2015 : Auth: Login OK: [hcognet] (from client borneswifi-brest port 0 cli 60-36-DD-87-AC-A3)
99
+
100
+
101
+"With 802.1X authentications the client doesn't
102
+have IP connectivity, so the only way to validate this is for the user to tell the supplicant what value is expected."
103
+```
104
+
105
+## Ressources utiles
106
+
107
+* http://freeradius.1045715.n5.nabble.com/CA-Chain-td2757548.html
108
+* http://lists.freeradius.org/pipermail/freeradius-users/2009-February/035520.html
109
+* https://security.stackexchange.com/questions/65134/certificate-validation-with-802-1x-peap
110
+* http://www.kaplansoft.com/tekradius/docs/ssssl.pdf
111
+* http://community.arubanetworks.com/t5/AAA-NAC-Guest-Access-BYOD/PEAP-Public-Certificates-GoDaddy-VeriSign/td-p/23640
112
+* https://technet.microsoft.com/en-us/library/cc751157.aspx
113
+* https://msdn.microsoft.com/en-us/library/cc731363.aspx
114
+* https://technet.microsoft.com/en-us/library/cc731363(v=ws.10).aspx
115
+* https://supportforums.cisco.com/blog/154046#References
116
+* https://technet.microsoft.com/en-us/library/cc779326%28v=ws.10%29.aspx
117
+* https://2.bp.blogspot.com/-jnB3G_rjFgk/UBiepn7rM0I/AAAAAAAADNs/gC2Ju8CyPsM/s1600/PEAP+Ladder+Diagram.png
118
+* https://serverfault.com/questions/589065/tls-from-radius-for-wifi-is-rejected-by-win7
119
+* https://support.microsoft.com/en-us/kb/814394
120
+* https://trac.resel.fr/wiki/wifi
121
+* https://trac.resel.fr/wiki/Services/Radius
122
+* https://superuser.com/questions/853528/how-can-i-download-the-certificate-of-a-wireless-ap-using-802-1x
123
+* http://wiki.freeradius.org/guide/Windows-TLS-Methods
124
+* http://freenac.net/en/book/export/html/328
125
+* https://github.com/lnussel/sslcert/blob/master/openssl.cnf
126
+* http://pig.made-it.com/opensslca.html
127
+* https://technet.microsoft.com/en-us/library/cc754179(v=ws.10).aspx
128
+* https://social.technet.microsoft.com/Forums/windowsserver/en-US/afe32fdc-6a2a-421e-a157-6ca1d6c25472/i-dont-see-my-certificate-with-peap?forum=winserverNAP
129
+* https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_RADIUS_Authentication_with_WPA2-Enterprise
130
+* https://doc.pfsense.org/index.php/Using_EAP_and_PEAP_with_FreeRADIUS
131
+* http://wiki.freeradius.org/config/Virtual-server
132
+* http://wiki.freeradius.org/guide/Basic-configuration-HOWTO
133
+* http://freeradius.org/radiusd/man/radiusd.html
134
+* https://support.apple.com/en-us/HT202951
135
+* https://community.aerohive.com/aerohive/topics/ios-android-peap-mschapv2-problem
136
+* http://blogs.technet.com/b/pki/archive/2006/11/30/basic-crl-checking-with-certutil.aspx
137
+* https://community.aerohive.com/aerohive/topics/ios-android-peap-mschapv2-problem
138
+* http://javadoc.iaik.tugraz.at/iaik_jce/current/iaik/x509/extensions/ExtendedKeyUsage.html
139
+* https://www.openssl.org/docs/manmaster/apps/x509v3_config.html
140
+* https://forums.openvpn.net/topic7484.html
141
+* https://security.stackexchange.com/questions/100768/difference-between-certificates-with-extension-fields-and-non-repudiation-us
142
+* https://community.aerohive.com/aerohive/topics/problem_connecting_with_windows_8_1_with_radius
143
+
144
+## Articles liés
145
+TODO
146
+
147
+## TODO (rédacteur)
148
+* Il est nécessaire d'organiser toute cette information...