Review Request 125233: WPA/WPA2 Enterprise - add options to use system certificates

Jan Grulich jgrulich at redhat.com
Wed Sep 16 08:20:22 UTC 2015



> On Zář. 15, 2015, 11:34 dop., Lamarque Souza wrote:
> > Stefan Winter <stefan dot winter at restena dot lu> or <swinter at kde dot org>, who also helped in Eduroam specification, once said this about system ca certificates: "I meant the "Use System CA Certs". That option makes no sense in WiFi Enterprise auth; there's actually a reason why none of the big supplicants allows to set that (Windows by default *un-checks* all CAs in its system store, and you have to enable the one that matches your server cert; and Mac OS always warns you about a new certificate as it comes in *unless* you used the Profile installation tool and you have put exactly the CAs you trust into the profile." Please add him to this review request.
> 
> Jan Grulich wrote:
>     It seems he doesn't have active developer account so I don't know how to add him to this review, but I can forward the email with this review to him. Regarding usage of that option, I implemented it because it's also present in the latest nm-connection-editor so I suppose it's used by NetworkManager, they just have it as "No CA certificate is required" so it has a different meaning there, but I guess they set "system-ca-certs" property anyway. I'll check that further while waiting for Stefan's response.
> 
> Stefan Winter wrote:
>     Jan,
>     
>     the security model for Enterprise Wi-Fi is the following: the user trusts exactly one server. That server identifies itself with a X.509 certificate. The configuration on the user-side end thus needs to pin one certificate from one CA. That information is provided to the user by the network admin; either via manual instructions or some config file that is consumed on the device (see e.g. https://datatracker.ietf.org/doc/draft-winter-opsawg-eap-metadata/ ).
>     
>     In that security model, there is *no* place for the system CA store.
>     
>     You can either turn off security altogether (which is probably the semantics of NetworkManager's "No CA certificate is required") - this is of course not recommended from a security perspective, but it is an option.
>     Or you can turn on security and specify CA and server name exactly.
>     
>     The system CA store does neither of this correctly. The system CA store is designed for the web browser use case and it is a useful security model there: since you can visit any website you like, and the web server operator has chosen any CA he wanted to to get his web server certificate, the only trust model that works is that a pool of CAs is considered acceptable.
>     
>     Again, this is absolutely unrelated to the Enterprise Wi-Fi use case and there are good reasons for NOT providing the option. It's option bloat which weakens security. See also our extensive documentation of this subject at https://wiki.geant.org/display/H2eduroam/EAP+Server+Certificate+considerations
>     
>     Your "guessing" what other implementations mean is probably (hopefully) incorrect - their UI language suggests that they are doing the right thing by allowing to turn security on or off; and not providing a nonsensical option.
>     
>     My review of this patch is: burn and burry it.

Looking into the source code of implementation of "No CA certificate is required" it looks it's used just for validation, which means that in their editor you are not able to press the OK button to save the connection until you select CA certificate or check the checkbox.


- Jan


-----------------------------------------------------------
This is an automatically generated e-mail. To reply, visit:
https://git.reviewboard.kde.org/r/125233/#review85438
-----------------------------------------------------------


On Zář. 15, 2015, 6:23 dop., Jan Grulich wrote:
> 
> -----------------------------------------------------------
> This is an automatically generated e-mail. To reply, visit:
> https://git.reviewboard.kde.org/r/125233/
> -----------------------------------------------------------
> 
> (Updated Zář. 15, 2015, 6:23 dop.)
> 
> 
> Review request for Network Management, Lukáš Tinkl and Lamarque Souza.
> 
> 
> Repository: plasma-nm
> 
> 
> Description
> -------
> 
> As summary says, this patch adds option to use system certificates for WPA/WPA2 Enteprise setting, namely for PEAP, TLS and TTLS.
> 
> 
> Diffs
> -----
> 
>   libs/editor/settings/security802-1x.cpp 0f8f71d 
>   libs/editor/settings/ui/802-1x.ui ac5732a 
> 
> Diff: https://git.reviewboard.kde.org/r/125233/diff/
> 
> 
> Testing
> -------
> 
> 
> Thanks,
> 
> Jan Grulich
> 
>

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.kde.org/pipermail/kde-networkmanager/attachments/20150916/93284423/attachment-0001.html>


More information about the kde-networkmanager mailing list