Requirements for certificates used with Windows 7 » History » Version 4
Andreas Steffen, 12.05.2009 10:05
added OpenSSL options
1 | 1 | Martin Willi | h1. Requirements for certificates used with Windows 7 |
---|---|---|---|
2 | 1 | Martin Willi | |
3 | 3 | Andreas Steffen | The Windows 7 Beta release was liberal in accepting certificates, but the Release Candidate adds new requirements for the VPN gateway certificate. |
4 | 1 | Martin Willi | |
5 | 1 | Martin Willi | h2. Required fields |
6 | 1 | Martin Willi | |
7 | 3 | Andreas Steffen | Your gateway certificate must have: |
8 | 1 | Martin Willi | |
9 | 4 | Andreas Steffen | * An *Extended Key Usage* flag, explicitly allowing the certificate to be used for authentication purposes. It is currently unclear which OIDs are accepted by Windows, but it seems that the *serverAuth* OID (_1.3.6.1.5.5.7.3.1_, often called _TLS Web server authentication_) gets accepted. If you are using OpenSSL to generate your |
10 | 3 | Andreas Steffen | certificates then include the option |
11 | 1 | Martin Willi | |
12 | 4 | Andreas Steffen | <pre> |
13 | 3 | Andreas Steffen | extendedKeyUsage = serverAuth |
14 | 3 | Andreas Steffen | </pre> |
15 | 1 | Martin Willi | |
16 | 4 | Andreas Steffen | * The hostname of the VPN gateway entered in the clients connection properties *MUST* be contained either in the *subjectDistinguishedName* of the server certificate |
17 | 1 | Martin Willi | |
18 | 4 | Andreas Steffen | <pre> |
19 | 4 | Andreas Steffen | C=CH, O=strongSwan Project, CN=vpn.strongswan.org |
20 | 4 | Andreas Steffen | </pre> |
21 | 4 | Andreas Steffen | |
22 | 4 | Andreas Steffen | or in a *subjectAltName* extension that can be added with the option |
23 | 4 | Andreas Steffen | |
24 | 4 | Andreas Steffen | <pre> |
25 | 1 | Martin Willi | subjectAltName = DNS:vpn.strongswan.org |
26 | 1 | Martin Willi | </pre> |
27 | 1 | Martin Willi | |
28 | 1 | Martin Willi | h2. Disabling extended certificate checks |
29 | 1 | Martin Willi | |
30 | 1 | Martin Willi | Alternatively, you may disable these extended certificate checks on the client. |
31 | 1 | Martin Willi | |
32 | 1 | Martin Willi | > *This is potentially dangerous, as any certificate holder assured by your CA may act as the VPN gateway.* |
33 | 1 | Martin Willi | |
34 | 4 | Andreas Steffen | To disable the extended checks, add a _DWORD_ called *DisableIKENameEkuCheck* to |
35 | 1 | Martin Willi | |
36 | 4 | Andreas Steffen | <pre> |
37 | 4 | Andreas Steffen | HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RasMan\Parameters\ |
38 | 4 | Andreas Steffen | </pre> |
39 | 4 | Andreas Steffen | |
40 | 4 | Andreas Steffen | in the client's registry. |
41 | 4 | Andreas Steffen | |
42 | 4 | Andreas Steffen | |
43 | 4 | Andreas Steffen | h2. Further information |
44 | 1 | Martin Willi | |
45 | 1 | Martin Willi | For more details about the requirements and other ways to disable the certificate checks, have a look to "this knowledge base article":http://support.microsoft.com/kb/926182. |