Hi, 
 
Question on the following text: 

 

"However, in the case where the EAP-TLS peer is attempting to obtain
network access, it will not have network connectivity and is therefore
not capable of checking for certificate revocation until after
authentication completes and network connectivity is available. For this
reason EAP-TLS peers and servers SHOULD implement Certificate Status
Request messages, as described in "Transport Layer Security (TLS)
Extensions" [RFC4366] section 3.6.  To enable revocation checking in
situations where servers do not support Certificate Status Request
messages and network connectivity is not available prior to
authentication completion, peer implementations MUST also support
checking for certificate revocation after authentication completes and
network connectivity is available, and they SHOULD utilize this
capability by default."

 

In cases where the server does not support the certificate_status
extension, this is a little awkward, the server's cert is expired, but
the server does not support the extension. The client has already gotten
access to the network after EAP-TLS and so both TLS and the EAP exchange
is terminated by an EAP Success. How is the spec suggesting the client
to perform the revocation checking? and what is the process to break the
network access (ignoring the question on why a client who would
otherwise be a paying customer, really wanted this) after already have
gained the access?

 

Thanks,

 

Madjid 

 

_______________________________________________
Emu mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/emu

Reply via email to