Hi there,
I've found a bug in the rlm_eap_tls module.
Which is created by the following commit (CVS):
File: eap_tls.c
Revision: 1.178
Changes since 1.16: +6 -1 lines
Comment: Try to handle the case where we get an ACK after sending the last fragment
I'm using the default config with the following changes in eap.conf:
default_eap_type = tls
and
the tls section excepted by check_crl and check_cert_cn out-commented.
So I'm using the test certificates.
EAP-Type: TLS
freeRADIUS version 1.0.0
Verified with Windows 2000/XP 802.1x Authentication
2 matches
Mail list logo