Sending CA certificate during EAP-TLS

2007-06-20 Thread Rafa Marin
Hi all, Is there any way to configure free radius + eap-tls module to avoid to send CA certificate during EAP-TLS negotiation? As Free Radius is sending it right now EAP-TLS packets get fragmented and I would like to avoid it. Thanks in advance. - List info/subscribe/unsubscribe? See

Re: Re : Sending CA certificate during EAP-TLS

2007-06-20 Thread Rafa Marin
optionally be omitted from the chain, under the assumption that the remote end must already possess it in order to validate it in any case. == Benjamin K. Eshun - Message d'origine De : Rafa Marin [EMAIL PROTECTED] À : freeradius

Re: Re : Sending CA certificate during EAP-TLS

2007-06-20 Thread Rafa Marin
Hi Alan, err, no. you need to handle those fragmented packets. where is it failing, on your network or more remotely? Actually, it is not failing. I got a successful authentication I was only trying to avoid fragmentation if possible. EAP-TLS places much larger demands on the packet sizes

Re: Sending CA certificate during EAP-TLS

2007-06-20 Thread Rafa Marin
did). But my immediate question is how the server is supposed to verify client certificate if we don't configure any CA certificate?. i.e. don't put ca certificates of the chain into that file. I don't know how to prevent the client from sending CA path certificates Rafa Marin wrote: Hi