Missing SSL Change Cipher Spec in EAP-TLS withClientCertificate verify failed
yuqiang
yuqiang1973 at 163.com
Fri Jul 8 18:37:06 CEST 2011
I think the packets described in red rect should be communicate between client and server, when the certificate verification failed.
2011-07-09
yuqiang1973
发件人: Alan DeKok-2 [via FreeRadius]
发送时间: 2011-07-09 00:21:07
收件人: yuqiang
抄送:
主题: Re: Missing SSL Change Cipher Spec in EAP-TLS withClientCertificate verify failed
Phil Mayers wrote:
> EAP-TLS in FreeRADIUS WORKS. Stop posting nonsense about RFC compliance.
If the certificate verification fails, then the server is *supposed*
to stop the EAP-TLS conversation.
> FreeRADIUS just uses OpenSSL. OpenSSL works. OpenSSL is compliant with
> the standards.
>
> There is nothing wrong with FreeRADIUS or OpenSSL.
Everything is working as expected, and as required by the specifications.
Alan DeKok.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/devel.html
If you reply to this email, your message will be added to the discussion below:
http://freeradius.1045715.n5.nabble.com/Missing-SSL-Change-Cipher-Spec-in-EAP-TLS-with-Client-Certificate-verify-failed-tp4565228p4565389.html
To unsubscribe from Missing SSL Change Cipher Spec in EAP-TLS with Client Certificate verify failed, click here.
--
View this message in context: http://freeradius.1045715.n5.nabble.com/Missing-SSL-Change-Cipher-Spec-in-EAP-TLS-with-Client-Certificate-verify-failed-tp4565228p4565453.html
Sent from the FreeRadius - Dev mailing list archive at Nabble.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freeradius.org/pipermail/freeradius-devel/attachments/20110708/271bf1d6/attachment.html>
More information about the Freeradius-Devel
mailing list