meta data for this page
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| network:wifi:wpae [2023/06/21 13:37] – niziak | network:wifi:wpae [2023/10/23 11:14] (current) – niziak | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== WiFi WPA Enterprise ====== | ====== WiFi WPA Enterprise ====== | ||
| + | |||
| + | ===== Win 11 ===== | ||
| + | |||
| + | Windows 11 22H2 not connecting to WPA Enterprise | ||
| + | |||
| + | - Open Registry Editor | ||
| + | - Navigate to '' | ||
| + | - Create '' | ||
| + | |||
| + | '' | ||
| + | - 0000 1100 0000 = 0x0C0 TLS1.0 | ||
| + | - 0011 0000 0000 = 0x300 TLS1.1 | ||
| + | - 1100 0000 0000 = 0xC00 TLS1.2 | ||
| ===== Android 11+ Devices ===== | ===== Android 11+ Devices ===== | ||
| Line 19: | Line 32: | ||
| Background: | Background: | ||
| * [[https:// | * [[https:// | ||
| + | * [[https:// | ||
| Hints: | Hints: | ||
| Line 38: | Line 52: | ||
| TODO | TODO | ||
| + | |||
| + | Android: | ||
| + | * " | ||
| + | * Possible to add alternate names to cert to use short domain | ||
| + | [[https:// | ||
| + | |||
| + | [[https:// | ||
| + | |||
| + | |||
| + | |||
| + | [[https:// | ||
| + | < | ||
| + | I don't disagree, but bottom line is that 11 will never connect without a trusted CA root (and all intermediates in the chain, if there are any, above the certificate your RADIUS server is presenting) physically installed to the phone. Just how it is. | ||
| + | </ | ||
| + | |||
| + | Starting with Android 11 QPR1, you must enter the domain for server certification validation in order to successfully connect. | ||
| + | |||
| + | |||
| + | [[https:// | ||
| + | < | ||
| + | The RADIUS certificate used by the 802.1X wireless controller or access point must use either: | ||
| + | |||
| + | A certificate signed by a trusted public Root certificate authority and configured to supply clients with the full certificate chain (root -> intermediate(s) -> server), OR | ||
| + | In the case of self-signed or private CA, pre-load the root and any intermediate certificates on the device' | ||
| + | </ | ||
| Add both certs to client ? how to add intermediate ca ? | Add both certs to client ? how to add intermediate ca ? | ||
| + | |||
| + | New CA are added to '' | ||
| + | |||
| + | |||
| + | |||
| + | [[https:// | ||
| / | / | ||
| Line 53: | Line 98: | ||
| auto_chain = yes | auto_chain = yes | ||
| + | } | ||
| + | </ | ||
| + | |||
| + | <file / | ||
| + | tls-config tls-common { | ||
| + | private_key_password = | ||
| + | private_key_file = ${certdir}/ | ||
| + | |||
| + | certificate_file = ${certdir}/ | ||
| + | auto_chain = no | ||
| } | } | ||
| </ | </ | ||
| apt-get install eapoltest | apt-get install eapoltest | ||
| + | |||
| + | |||
| + | Consider one selfsigned CA: [[https:// | ||
| + | |||