Project

General

Profile

Requirements for certificates used with Windows 7 » History » Version 4

« Previous - Version 4/13 (diff) - Next » - Current version
Andreas Steffen, 12.05.2009 10:05
added OpenSSL options


Requirements for certificates used with Windows 7

The Windows 7 Beta release was liberal in accepting certificates, but the Release Candidate adds new requirements for the VPN gateway certificate.

Required fields

Your gateway certificate must have:

  • An Extended Key Usage flag, explicitly allowing the certificate to be used for authentication purposes. It is currently unclear which OIDs are accepted by Windows, but it seems that the serverAuth OID (1.3.6.1.5.5.7.3.1, often called TLS Web server authentication) gets accepted. If you are using OpenSSL to generate your
    certificates then include the option
    extendedKeyUsage = serverAuth
    
  • The hostname of the VPN gateway entered in the clients connection properties MUST be contained either in the subjectDistinguishedName of the server certificate
    C=CH, O=strongSwan Project, CN=vpn.strongswan.org
    

    or in a subjectAltName extension that can be added with the option

    subjectAltName = DNS:vpn.strongswan.org
    

Disabling extended certificate checks

Alternatively, you may disable these extended certificate checks on the client.

This is potentially dangerous, as any certificate holder assured by your CA may act as the VPN gateway.

To disable the extended checks, add a DWORD called DisableIKENameEkuCheck to

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RasMan\Parameters\

in the client's registry.

Further information

For more details about the requirements and other ways to disable the certificate checks, have a look to this knowledge base article.