View Single Post
Posts: 2,153 | Thanked: 8,462 times | Joined on May 2010
#17
Originally Posted by Malakai View Post
You mean that even if I don't specify a certificate when asked by the connection wizard (so I leave it blank), a certificate is still required and that certificate should be in my N900 as every other certificates?
If yes, is there a security problem by not having that certificate and connecting to that wifi hotspot? In other words what does that certificate secure? The user and password used? The connection?
First you need to understand how wifi is working. There are more layers, to simplify it:

- wifi frames
- aes encryption
- wpa2 protocol (key exchange, encryption)
- eap auth

Basically wpa2 is there to get keys for aes encryption (every packet is encrypted) and those keys are changing in time. Normally packets of all clients are encrypted with same aes key, so you can listen for (encrypted) communication of other clients. But when you are using also EAP protocol in wpa2 (sometimes called wpa2-enterprise) then each connected client has different aes key and therefore you cannot monitor & decrypt communication of other clients. EAP protocol is there for client authentication plus for keyring material needed for aes ecryption.

EAP as stand for Extensible Authentication Protocol is easy protocol which could support lot of algorithms/methods which can provide authentication plus way for exchaning wpa2/aes keys.

EAP methods PEAP, TLS and TTLS uses TLS protocol for creating secure channel between client and AP. EAP is unencrypted protocol.

So next layer is TLS. Same implementation like in web browsers (https). Server send public part of server certificate and all certificates in signed chain by some certificate authority.

To be sure that you are speaking with correct TLS server, you need to have (at least) fingerprint of trusted certificates in your local store. Same as with https.

So, you need to trust certificate because:

* it is used for creating secure tunnel with server in which you send your username & password for autentication to wifi hotspot (in case for PAP and GTC, password is in plain-text)

* it is used for exchaining aes keys between client and wifi hotspot, keys are used for encrypting all packets

Originally Posted by Malakai View Post
Will this command be the one to use as I am not sure :

$ gconftool -s -t boolean /system/osso/connectivity/IAP/<UUID>/EAP_disable_certificate_check true

As I am out of town, it will have to wait for a few days as I don't have access to any of my ISPs wifi hotspots where I am, but as soon as I will try it I will let you know.
Yes, but I really do not know if it work...
 

The Following 3 Users Say Thank You to pali For This Useful Post: