The issue is described here: https://github.com/FreeRADIUS/freeradius-server/issues/4820 https://github.com/FreeRADIUS/freeradius-server/issues/4785 Effectively, checking client certificates fails as the code mixes up intermediate certificate and client certificate. There is a fix suggested: https://github.com/FreeRADIUS/freeradius-server/commit/3d08027f30c6d9c1eaccf7d60c68c8f7d78017c3 Unfortunately, it is not part of a release yet, so we are stuck with a borken freeradius port. Could the maintainer please consider applying this fix? Thank you
Thanks
A commit in branch main references this bug: URL: https://cgit.FreeBSD.org/ports/commit/?id=6fe12ab2c86d2ac9801365840193637256d51f71 commit 6fe12ab2c86d2ac9801365840193637256d51f71 Author: Ryan Steinmetz <zi@FreeBSD.org> AuthorDate: 2023-01-14 14:17:43 +0000 Commit: Ryan Steinmetz <zi@FreeBSD.org> CommitDate: 2023-01-14 14:20:02 +0000 net/freeradius3: Fix certificate parsing - Bump PORTREVISION - Attempt fix for OPNSense packaging PR: 268951 Obtained from: upstream/3d08027f30c6d9c1eaccf7d60c68c8f7d78017c3 net/freeradius3/Makefile | 3 ++- net/freeradius3/files/patch-src_main_tls.c (new) | 18 ++++++++++++++++++ 2 files changed, 20 insertions(+), 1 deletion(-)