Currently EAP-TLS does not require OCSP.  Ryan has requested that we
make support for the OCSP TLS (RFC4366 - section 3.6) extension a SHOULD
implement in EAP-TLS.  

The benefit of this is that it allows the peer to check for certificate
revocation before it has access to the network.  Without this if the
peer does not have an up to date CRL it must defer revocation checking
until it has network access and can receive an up to date CRL.  The peer
must limit its trust of the security of its network connection until it
can access the CRL.  

The downside of this is that it places a new requirement on EAP-TLS
implementations.  Even though it is a SHOULD and not a MUST it is
important to realize that a SHOULD is a requirement to implement unless
there are circumstances which make this requirement not apply to a
particular situation.  

I would like to here views from the working group on this topic.

Joe

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www1.ietf.org/mailman/listinfo/emu

Reply via email to