Hi

This question is rather a certificate question but ...
How does EAP-TLS certificate authentification work?

As I know the server sends his certificate first with his public key to the client.
The client sends his certificate to the radius server.


I had first the username of the client (identity string of EAP) in the users file.
My client is authorized.
Than I deleted the user and the client is still accepted.


How can I restrict the clients?

Does it mean that every generated certificate which is not revoked can be used
i.e. is authorized?


The same is for the server side. How can I guaranty I'm on the right server
if I don't have the server certificate on the client (supplicant) side?

In the wpa_supplicant config file there are "talking" about Phase1 (outer authentication)
and Phase2 (inner authentication) but only for EAP-PEAP or EAP-TTLS and it says
"Following certificate/private key fields are used in inner Phase2"


I'm really confused.

Is there any good beginner docu about certificate authentification and EAP-TLS works.
But please not rfc 2246 ...


I'm working with freeradius-1.0.2, wpa_supplicant-0.3.8 as Supplicant and a Linsys WRT54G as NAS.

Thanks a lot

Beat

- List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to