Requirements for certificates used with Windows 7 » History » Version 6
charchess ney, 02.06.2010 08:34
1 | 1 | Martin Willi | h1. Requirements for certificates used with Windows 7 |
---|---|---|---|
2 | 1 | Martin Willi | |
3 | 3 | Andreas Steffen | The Windows 7 Beta release was liberal in accepting certificates, but the Release Candidate adds new requirements for the VPN gateway certificate. |
4 | 1 | Martin Willi | |
5 | 1 | Martin Willi | h2. Required fields |
6 | 1 | Martin Willi | |
7 | 3 | Andreas Steffen | Your gateway certificate must have: |
8 | 1 | Martin Willi | |
9 | 5 | Andreas Steffen | * An *Extended Key Usage* flag explicitly allowing the certificate to be used for authentication purposes. It is currently unclear which OIDs are accepted by Windows, but it seems that the *serverAuth* EKU having the OID _1.3.6.1.5.5.7.3.1_ (often called _TLS Web server authentication_) is ok. If you are using OpenSSL to generate your certificates then include the option |
10 | 1 | Martin Willi | |
11 | 4 | Andreas Steffen | <pre> |
12 | 3 | Andreas Steffen | extendedKeyUsage = serverAuth |
13 | 3 | Andreas Steffen | </pre> |
14 | 1 | Martin Willi | |
15 | 6 | charchess ney | In Windows 7, you now have to add the "IP Security IKE Intermediate", this is done by adding the oid : 1.3.6.1.5.5.8.2.2 as extendedKeyUsage (a good page about ikev2/windows understanding is "this one":http://www.carbonwind.net/blog/post/VPN-Reconnect-in-Windows-7-RC-redux.aspx ) |
16 | 6 | charchess ney | Which give extendedKeyUsage = serverAuth, 1.3.6.1.5.5.8.2.2 |
17 | 6 | charchess ney | |
18 | 4 | Andreas Steffen | * The hostname of the VPN gateway entered in the clients connection properties *MUST* be contained either in the *subjectDistinguishedName* of the server certificate |
19 | 1 | Martin Willi | |
20 | 4 | Andreas Steffen | <pre> |
21 | 4 | Andreas Steffen | C=CH, O=strongSwan Project, CN=vpn.strongswan.org |
22 | 4 | Andreas Steffen | </pre> |
23 | 4 | Andreas Steffen | |
24 | 4 | Andreas Steffen | or in a *subjectAltName* extension that can be added with the option |
25 | 4 | Andreas Steffen | |
26 | 4 | Andreas Steffen | <pre> |
27 | 1 | Martin Willi | subjectAltName = DNS:vpn.strongswan.org |
28 | 1 | Martin Willi | </pre> |
29 | 1 | Martin Willi | |
30 | 1 | Martin Willi | h2. Disabling extended certificate checks |
31 | 1 | Martin Willi | |
32 | 1 | Martin Willi | Alternatively, you may disable these extended certificate checks on the client. |
33 | 1 | Martin Willi | |
34 | 1 | Martin Willi | > *This is potentially dangerous, as any certificate holder assured by your CA may act as the VPN gateway.* |
35 | 1 | Martin Willi | |
36 | 4 | Andreas Steffen | To disable the extended checks, add a _DWORD_ called *DisableIKENameEkuCheck* to |
37 | 1 | Martin Willi | |
38 | 4 | Andreas Steffen | <pre> |
39 | 4 | Andreas Steffen | HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RasMan\Parameters\ |
40 | 4 | Andreas Steffen | </pre> |
41 | 4 | Andreas Steffen | |
42 | 4 | Andreas Steffen | in the client's registry. |
43 | 4 | Andreas Steffen | |
44 | 4 | Andreas Steffen | |
45 | 4 | Andreas Steffen | h2. Further information |
46 | 1 | Martin Willi | |
47 | 1 | Martin Willi | For more details about the requirements and other ways to disable the certificate checks, have a look to "this knowledge base article":http://support.microsoft.com/kb/926182. |