Hi
I'm currently testing FreeRadius in order to replace Windows NPS as it's not compliant with Windows 11 security hardening (TLS 1.3 by default, Credential Guard active ...). (At the moment, we won't disable TLS 1.3 and/or credential guard through GPO as we'd like to respect Microsoft standards and settings.)
I'm struggling since weeks as you can see here and here for further details.
As a brief, Windows 11 802.1X clients have GPO applied that allow EAP-TLS using user certificate. Certificate are delivered within auto-enrolment process within our Active Directory and our on prem PKI (Windows too). GPO is applied and enforced on the client, currently no issue with that.
According to this Microsoft KB , server but also client certificate should respect some requirements (especially on EKUs) which I do respect at the same time for my freeradius certificate + my Windows 11 client certificate.
At the moment, i'm still in a loop where Windows 11 client and FreeRadius server send each others Access-Request / Access-Challenge, but it never ends...
I had a look to CAPI2 logs and WLAN-AutoConfig but nothing gone wrong (except timeout due to the Access loop...). Also, using eapol_test cli from Linux with user certificate + private key from our PKI, works perfectly. Using same CLI and/or same user certificate from Windows => it loops again and again and again.
According to this post, it seems that Windows doesn't handle correctly information from server certificate.
Is there any debug ideas and/or fix you guys may advise ?
thanks a lot !
Gael