166
General Discussion / Re: FreeRadius EAP Settings Root and Server Certificate
« on: November 03, 2021, 10:42:08 am »My question is, if this is the correct way to have now 3 Certificates installed on the Client?Yes, it would appear so, at least on a Mac. This is the full certificate chain. The leaf or server certificate is only trusted because the issuing or intermediate Certificate Authority is trusted. In turn the intermediate CA certificate is only trusted because the Root CA is trusted. The Root CA is the self-signed trust anchor.
Im also not sure yet, if under the EAP Settings Root CA the Intermediate CA or the Radius Root CA should be selected?It is usually best practice to keep the Root CA offline and never use it to issue certificates except for an intermediate or issuing CA. As such, the intermediate CA should be selected here. If you look at the in-line help on the Services: FreeRADIUS: EAP page, you will notice it says:
Quote
Choose the Root CA [sic]. This CA will be trusted to issue client certificates for authentication. [Emphasis mine]I can understand why it would be confusing, it clearly calls it a Root CA, but a Root CA should not be used to issue leaf certificates. It really should be changed to "Issuing CA".
What is the real benefit to have a intermediate CA in general?The real benefit is that if the issuing or intermediate CA is compromised it's certificate can be revoked by the Root CA and a new intermediate CA established. Keeping the Root CA offline helps to mitigate this risk.
Having said that, I think OPNsense would need additional steps to preserve the Root CA offline. I'll raise that in the discussion being had here.





