Windows 11 22H2 not connecting to WPA Enterprise
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RasMan\PPP\EAP\13
DWORD
key TlsVersion
value FC0
TlsVersion
coding (values cane be OR-ed):
NOTE: DRAFT!
Freeradius log:
eap_peap: TLS Alert read:fatal:unknown CA
Reason: The CA (Certification Authority) is not recognized by the client.
Cerficate used by Freeradius:
private_key_file = /etc/ssl/private/radius.int.example.com.key certificate_file = /etc/ssl/certs/radius.int.example.com.crt
Background:
Hints:
Workaround for Android based phone:
Settings
–> Security
–> Encryption & Credentials
–> Install a Certificate
–> Wi-Fi Certificate
TODO
Android:
https://learn.microsoft.com/pl-pl/mem/intune/configuration/wi-fi-settings-android-enterprise
I don't disagree, but bottom line is that 11 will never connect without a trusted CA root (and all intermediates in the chain, if there are any, above the certificate your RADIUS server is presenting) physically installed to the phone. Just how it is.
Starting with Android 11 QPR1, you must enter the domain for server certification validation in order to successfully connect.
https://extremeportal.force.com/ExtrArticleDetail?an=000092023
The RADIUS certificate used by the 802.1X wireless controller or access point must use either: A certificate signed by a trusted public Root certificate authority and configured to supply clients with the full certificate chain (root -> intermediate(s) -> server), OR In the case of self-signed or private CA, pre-load the root and any intermediate certificates on the device's trust store prior to connection.
Add both certs to client ? how to add intermediate ca ?
New CA are added to User store
only. There is no option without root right to move it to System store
/etc/freeradius/3.0/mods-enabled/eap
Use ca_path
or ca_file
not both. Using ca_path
requires run c_rehash
on pointed dir to created hashes do certs.
tls-config tls-common { private_key_password = private_key_file = ${certdir}/radius.int.example.com.key certificate_file = ${certdir}/radius.int.example.com.crt ca_path = ${cadir} auto_chain = yes }
tls-config tls-common { private_key_password = private_key_file = ${certdir}/radius.int.example.com.key certificate_file = ${certdir}/radius-chain.crt auto_chain = no }
apt-get install eapoltest
Consider one selfsigned CA: https://networkradius.com/doc/3.0.10/raddb/home.html