On Feb 7, 2021, at 10:46 PM, Martin Thomson <[email protected]> wrote:
> What I was concerned about was the information that is exchanged in EAP 
> *before* the TLS handshake begins that might affect the choice of certificate 
> to offer.  As this is not authenticated at all, there are trivial attacks if 
> a client uses that information to guide its choice of certificate.

  There isn't anything sent in EAP-TLS from the server to the client, which 
lets the client choose a certificate.  The clients choice of certificate is 
driven by layers *outside* of EAP-TLS.

  e.g. a client certificate may be tied to a WiFi SSID.

  Alan DeKok.

_______________________________________________
Emu mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/emu

Reply via email to