work (after some tests i did). But my immediate question
is how the server is supposed to verify client certificate if we don't
configure any CA certificate?.
i.e. don't put ca certificates of the chain into that file.
I don't know how to prevent the client from sending CA path
cer
Hi Alan,
err, no. you need to handle those fragmented packets. where is it failing,
on your network or more
remotely?
Actually, it is not failing. I got a successful authentication I was only
trying to avoid fragmentation if possible.
EAP-TLS places much larger demands on the packet sizes d
te authority may optionally be omitted from the
chain, under the assumption that the remote end must already
possess it in order to validate it in any case.
==
Benjamin K. Eshun
- Message d'origine
De : Rafa Marin
Hi all,
Is there any way to configure free radius + eap-tls module to avoid to send
CA certificate during EAP-TLS negotiation? As Free Radius is sending it
right now EAP-TLS packets get fragmented and I would like to avoid it.
Thanks in advance.
-
List info/subscribe/unsubscribe? See http://www
4 matches
Mail list logo