Re: Patch to use id-kp-eapOverLAN for TLS server authentication

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Nov 19, 2019, at 10:43 AM, Jouni Malinen <j@xxxxx> wrote:
> 
> id-kp-eapOverLAN sounds quite different compared to id-kp-serverAuth.

  Yes.  It's intended for EAP, whereas id-kp-serverAuth is intended for web servers. :)

> Most use cases for hostapd/wpa_supplicant would indeed be for EAPOL, but
> the EAP implementation could be used for something else as well.

  Sure.  There's PANA, among other things.

> More
> importantly, it is not immediately obvious that id-kp-eapOverLAN would
> imply that the certificate belongs to an authentication server while
> that part is obvious for id-kp-serverAuth. RFC 4334 does not seem to
> cover that either since it is only stating that the certificate "is
> appropriate for use by a peer". So that peer could be client device as
> well?

  Possibly, if the OID is inside of a client cert.

> Surely one client device should not trust an authentication server
> that uses a certificate that was signed for client/user for EAP-TLS.

  That is true.

  I'll check for other ways to verify that a server certificate is being provided to the client.

  Alan DeKok.


_______________________________________________
Hostap mailing list
Hostap@xxxxxxxxxxxxxxxxxxx
http://lists.infradead.org/mailman/listinfo/hostap



[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]

  Powered by Linux