On Feb 7, 2021, at 10:46 PM, Martin Thomson <[email protected]> wrote: > What I was concerned about was the information that is exchanged in EAP > *before* the TLS handshake begins that might affect the choice of certificate > to offer. As this is not authenticated at all, there are trivial attacks if > a client uses that information to guide its choice of certificate.
There isn't anything sent in EAP-TLS from the server to the client, which lets the client choose a certificate. The clients choice of certificate is driven by layers *outside* of EAP-TLS. e.g. a client certificate may be tied to a WiFi SSID. Alan DeKok. _______________________________________________ Emu mailing list [email protected] https://www.ietf.org/mailman/listinfo/emu
