How to connect to the WPA2 EAP-TLS network: Unterschied zwischen den Versionen

aus Metalab Wiki, dem offenen Zentrum für meta-disziplinäre Magier und technisch-kreative Enthusiasten.
Zur Navigation springenZur Suche springen
Keine Bearbeitungszusammenfassung
K (verschob „Archiv:How to connect to the WPA2 EAP-TLS network“ nach „How to connect to the WPA2 EAP-TLS network“ und hat dabei eine Weiterleitung überschrieben: fuck namespaces grml)
 
(20 dazwischenliegende Versionen von 6 Benutzern werden nicht angezeigt)
Zeile 1: Zeile 1:
How to connect to the WPA2 accesspoint with EAP-TLS encryption.
{{Veraltet}}


== Create certificates ==
You need to create/use a certificate to connect to the WPA2 access point.
You need to create/use a certificate to connect to the WPA2 access point.
# Connect to the unencrypted wireless network ''metalab_802.11g_WPA2-certcreate''
# Open your browser and go to https://10.215.23.1/ <br>Please verify the fingerprints to make sure that there is no man in the middle pretending to be webserver:<br>SHA1 E1:C4:0F:06:C9:0A:C0:71:D3:D5:75:73:C7:D8:ED:FD:E7:40:15:05 <br> MD5 24:28:1F:FF:4F:E5:EA:47:A0:3A:FD:D4:0D:A0:8B:62<br> For the even more paranoid people: you should also check the history of this page to verify that noone altered the checksums.
# Create the certificate by entering a hostname and password


<pre>
You are now able to connect to the network by using the ca and your client certificate.
## To create it connect to wpa-01.in.metalab.at (10.20.30.25) as root.
# user@host:~# ssh -l root wpa-01.in.metalab.at
# root@wpa-01:~# cd /ca
# root@wpa-01:~# ./mkclient.sh yourname
## enter ca password
## choose secretpassword for your key file
# root@wpa-01:~# exit
# user@host:~# scp -r root@wpa-01.in.metalab.at:/ca/users/yourname /path/to
</pre>


you are now able to connect to the network by using the ca-certificate, your client certificate and your keyfile to the ca-certficate with the chosen password.
== Use certificates ==
=== Linux ===


sample wpa_supplicant.conf:
==== wpa_supplicant ====
<pre>
sample wpa_supplicant.conf:<br>
network={
  network={
        ssid="metalab-wpa2"
    ssid="metalab-wpa2"
        scan_ssid=1
    scan_ssid=1
        key_mgmt=WPA-EAP
    key_mgmt=WPA-EAP
        proto=WPA2
    proto=WPA2
        eap=TLS
    eap=TLS
        pairwise=CCMP
    pairwise=CCMP
        group=CCMP
    group=CCMP
        identity="yourname"
    identity="''yourname''"
        ca_cert="/path/to/ca.crt"
    ca_cert="/path/to/ca.crt"
        client_cert="/path/to/yourname.crt"
    client_cert="/path/to/''yourname''-cert.pem"
        private_key="/path/to/yourname.key"
    private_key="/path/to/''yourname''-key.pem"
        private_key_passwd="secretpassword"
    private_key_passwd="''secretpassword''"
}
  }
</pre>
 
 
==== NetworkManager ====
==== NetworkManager 0.6 ====
Use ''yourname'' as identity, ''ca.crt'' as ca-certificate, ''yourname-cert.pem'' as client-certificate and ''secretpassword'' as key-password.
 
==== NetworkManager 0.7 ====
Use ''yourname'' as identity, leave the client-certificate untouched, ''ca.crt'' as ca-certificate, ''yourname-cert.p12'' as key (this includes the client cert) and ''secretpassword'' as key-password.
 
=== MacOS X ===
[[Image:Wpa2_cacert.png|300px]]<br>
Import the ca-certifcate "''ca.crt''" to the system keychain.<br>
 
[[Image:Wpa2_cacert_trust.png|300px]]<br>
Set the trust level for the ca-certificate<br>
 
[[Image:Wpa2_clientcert.png|300px]]<br>
Import the client certifcate "''yourname-cert.p12''" to the login keychain with the choosen import password.<br>
 
[[Image:Wpa2_macgui.png|300px]]<br>
Connect to the metalab-wpa2 network <br>
(No Login, No Password, change the used certificate to the one you added to your Login keychain.)<br>
 
=== Windows ===
 
==== Windows XP (SP3) ====
* deine ...-cert.p12 doppelklicken, dem assistenten folgen (passwort wird gebraucht)
* ca.crt doppelklicke, dem assistenten folgen
 
eventuell, falls das nicht reicht um eine verbindung aufzubauen:
 
# Start -> Einstellungen -> Netzwerverbindungen -> doppelklick Drahtlose Netzwerkverbindung oder in der taskleiste auf das WLAN symbol
# "Eigenschaften"
# Reiter "Drahtlosnetzwerke"
# Metalab ..._WPA2 auswählen
# "Eigenschaften"
# Reiter "Authentifizierung"
# EAP-Typ: "geschütztes EAP (PEAP)"
# "Eigenschaften"
# Autthentifizierungsmethode auswählen: "Smartcard oder anders Zertifikat"
 
== Manual server side setup ==
 
=== Create a certificate ===
  ## connect to wpa-01.in.metalab.at (10.20.30.25) as root.
  # user@host:~# ssh -l root wpa-01.in.metalab.at
  # root@wpa-01:~# ./mkclient.sh ''hostname'' ''password''
  # root@wpa-01:~# exit
  ## copy the certificates to your host
  # user@host:~# scp -r root@wpa-01.in.metalab.at:/tmp/''yourname''.tar /path/to
 
=== Revoke certificate ===
  ## connect to wpa-01.in.metalab.at (10.20.30.25) as root.
  # user@host:~# ssh -l root wpa-01.in.metalab.at
  # root@wpa-01:~# cd /ca
  # root@wpa-01:~# ./revoke.sh ''yourname''
  ## enter ca password
 
 
== Server documentation ==
tbd
 
 
[[Kategorie:Netzwerk]]

Aktuelle Version vom 8. Mai 2013, 11:09 Uhr

Icon-outdated-article.png Der Inhalt dieses Artikels ist nicht mehr aktuell.
Von der Metalab-Wiki-Startseite oder den Letzten Änderungen kommst Du zu den neuesten Beiträgen.

Create certificates

You need to create/use a certificate to connect to the WPA2 access point.

  1. Connect to the unencrypted wireless network metalab_802.11g_WPA2-certcreate
  2. Open your browser and go to https://10.215.23.1/
    Please verify the fingerprints to make sure that there is no man in the middle pretending to be webserver:
    SHA1 E1:C4:0F:06:C9:0A:C0:71:D3:D5:75:73:C7:D8:ED:FD:E7:40:15:05
    MD5 24:28:1F:FF:4F:E5:EA:47:A0:3A:FD:D4:0D:A0:8B:62
    For the even more paranoid people: you should also check the history of this page to verify that noone altered the checksums.
  3. Create the certificate by entering a hostname and password

You are now able to connect to the network by using the ca and your client certificate.

Use certificates

Linux

wpa_supplicant

sample wpa_supplicant.conf:

 network={
   ssid="metalab-wpa2"
   scan_ssid=1
   key_mgmt=WPA-EAP
   proto=WPA2
   eap=TLS
   pairwise=CCMP
   group=CCMP
   identity="yourname"
   ca_cert="/path/to/ca.crt"
   client_cert="/path/to/yourname-cert.pem"
   private_key="/path/to/yourname-key.pem"
   private_key_passwd="secretpassword"
 }


NetworkManager

NetworkManager 0.6

Use yourname as identity, ca.crt as ca-certificate, yourname-cert.pem as client-certificate and secretpassword as key-password.

NetworkManager 0.7

Use yourname as identity, leave the client-certificate untouched, ca.crt as ca-certificate, yourname-cert.p12 as key (this includes the client cert) and secretpassword as key-password.

MacOS X

Wpa2 cacert.png
Import the ca-certifcate "ca.crt" to the system keychain.

Wpa2 cacert trust.png
Set the trust level for the ca-certificate

Wpa2 clientcert.png
Import the client certifcate "yourname-cert.p12" to the login keychain with the choosen import password.

Wpa2 macgui.png
Connect to the metalab-wpa2 network
(No Login, No Password, change the used certificate to the one you added to your Login keychain.)

Windows

Windows XP (SP3)

  • deine ...-cert.p12 doppelklicken, dem assistenten folgen (passwort wird gebraucht)
  • ca.crt doppelklicke, dem assistenten folgen

eventuell, falls das nicht reicht um eine verbindung aufzubauen:

  1. Start -> Einstellungen -> Netzwerverbindungen -> doppelklick Drahtlose Netzwerkverbindung oder in der taskleiste auf das WLAN symbol
  2. "Eigenschaften"
  3. Reiter "Drahtlosnetzwerke"
  4. Metalab ..._WPA2 auswählen
  5. "Eigenschaften"
  6. Reiter "Authentifizierung"
  7. EAP-Typ: "geschütztes EAP (PEAP)"
  8. "Eigenschaften"
  9. Autthentifizierungsmethode auswählen: "Smartcard oder anders Zertifikat"

Manual server side setup

Create a certificate

 ## connect to wpa-01.in.metalab.at (10.20.30.25) as root.
 # user@host:~# ssh -l root wpa-01.in.metalab.at
 # root@wpa-01:~# ./mkclient.sh hostname password
 # root@wpa-01:~# exit
 ## copy the certificates to your host
 # user@host:~# scp -r root@wpa-01.in.metalab.at:/tmp/yourname.tar /path/to

Revoke certificate

 ## connect to wpa-01.in.metalab.at (10.20.30.25) as root.
 # user@host:~# ssh -l root wpa-01.in.metalab.at
 # root@wpa-01:~# cd /ca
 # root@wpa-01:~# ./revoke.sh yourname
 ## enter ca password


Server documentation

tbd