I was looking at Section 5.3 in RFC 2716bis, and I noticed that while RFC 3280 
conformant path validation is recommended for EAP-TLS servers, there is no such 
recommendation for EAP-TLS peers.  This seems odd. For example, Section 5.3 
states:   Since the EAP-TLS server is typically connected to the Internet, it   
SHOULD support validating the peer certificate using RFC 3280   [RFC3280] 
conformant path validation, including the ability to   retrieve intermediate 
certificates that may be necessary to validate   the peer certificate. For 
details, see [RFC3280] Section 4.2.2.1.There is no equivalent statement for 
EAP-TLS peers. I would propose the insert the following sentence in Section 
5.3:   The EAP-TLS peer SHOULD support validating   the server certificate 
using RFC 3280 [RFC3280] conformant path   validation.
_______________________________________________
Emu mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/emu

Reply via email to