Missing SSL Change Cipher Spec in EAP-TLS withClientCertificate verify failed

yuqiang yuqiang1973 at 163.com
Fri Jul 8 18:37:06 CEST 2011

 I think the packets described in red rect should be communicate between client and server, when the certificate verification failed. 



发件人: Alan DeKok-2 [via FreeRadius] 
发送时间: 2011-07-09  00:21:07 
收件人: yuqiang 
主题: Re: Missing SSL Change Cipher Spec in EAP-TLS withClientCertificate verify failed 
Phil Mayers wrote: 
> EAP-TLS in FreeRADIUS WORKS. Stop posting nonsense about RFC compliance. 

  If the certificate verification fails, then the server is *supposed* 
to stop the EAP-TLS conversation. 

> FreeRADIUS just uses OpenSSL. OpenSSL works. OpenSSL is compliant with 
> the standards. 
> There is nothing wrong with FreeRADIUS or OpenSSL. 

  Everything is working as expected, and as required by the specifications. 

  Alan DeKok. 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/devel.html

If you reply to this email, your message will be added to the discussion below:
To unsubscribe from Missing SSL Change Cipher Spec in EAP-TLS with Client Certificate verify failed, click here. 

View this message in context: http://freeradius.1045715.n5.nabble.com/Missing-SSL-Change-Cipher-Spec-in-EAP-TLS-with-Client-Certificate-verify-failed-tp4565228p4565453.html
Sent from the FreeRadius - Dev mailing list archive at Nabble.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freeradius.org/pipermail/freeradius-devel/attachments/20110708/271bf1d6/attachment.html>

More information about the Freeradius-Devel mailing list