Some quick comments below:
Alan DeKok wrote:
>So it's possible for a malicious client to get the ticket, and close the
>connection without >sending a client cert. Then, if the EAP server doesn't
>destroy the ticket, the client can >reconnect.
The resumption_master_secret includes the client finished so the client in your
handshake with client authentication should not be able to reconnect, if it can
it is an OpenSSL bug. Alternatively the server did not ask for client
authentication and it is ok that the client reconnects.
>The packet flows in Figure 2 of draft-14 shows only one exchange of session
>tickets, not 2.
Looks to me that the Figure 2 of draft-14 provisions two tickets...?
EAP-Request/
EAP-Type=EAP-TLS
(TLS NewSessionTicket,
TLS NewSessionTicket,
<-------- TLS close_notify)
Cheers,
John
_______________________________________________
Emu mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/emu