[strongSwan] FreeBSD 12.x .vs. 13.x - change in strongswan as well?
Tobias Brunner
tobias at strongswan.org
Mon Oct 17 11:19:00 CEST 2022
Hi Karl,
> Using the "stroke" interface does not impact this; it appears to be
> something changed between 5.9.5 and 5.9.6 and the release notes imply
> this is likely the cause:
>
> * The client identity (e.g. the IKE or EAP identity for EAP-TLS) is
> again enforced by libtls.
Yes, this was a regression introduced with the TLS 1.3 changes in 5.9.2.
Any version between that and 5.9.6 didn't verify that the client's
identity is confirmed by the certificate (so users could authenticate as
any identity as long as they had a valid and trusted certificate).
> And, it appears, Windows is insisting on using the CN when presenting
> the identity (instead of the field(s) in the SAN) unless you set the
> option on the VPN profile to allow an override -- and then you have to
> hand-key it on each connection. I don't believe there is any way to
> tell Windows to use the SAN identity or identities on its own.
Yes, as documented on [1], the Windows client uses the CN value as EAP
identity with EAP-TLS (i.e. user certificates). I didn't know this can
actually be changed, so that might be something we could add to the
docs. Could you provide details on this? Anyway, without explicit
changes on the client, this only works if the certificate contains a
matching SAN.
The problem is that the EAP identity does not contain a type, so unless
the data is ASN.1 (e.g. a full binary DN), the rules at [2] apply when
the identity is parsed. In your case, with
> the "CN" of these certs is the full name of the person, not an email address
the SAN would have to be of type dNSName as that's the default fallback
for the parser. Considering that the full name probably contains spaces
that might be a bit weird but it's perfectly legal as dNSName is of type
IA5String, which accepts all ASCII characters, and DNS names may consist
of any 8-bit characters (only to host names apply some further
restrictions).
Regards,
Tobias
[1]
https://docs.strongswan.org/docs/5.9/interop/windowsCertRequirements.html#_client_certificates
[2] https://docs.strongswan.org/docs/5.9/config/identityParsing.html
More information about the Users
mailing list